AC 2008-2843: A WORLD WHERE EVERYTHING IS AUTOMATED: THECHALLENGES AND OPPORTUNITIES OF THE ROBUST RFIDINFRASTRUCTURE THAT WILL MAKE IT A REALITYOkechi Egekwu, James Madison University Okechi Geoffrey Egekwu obtained his PhD in Industrial & Systems Engineering from the University of Nebraska, Lincoln. He is currently a Full Professor in the Integrated Science and Technology (ISAT)program at James Madison University, Harrisonburg, VA, where he teaches undergraduate and graduate courses in the manufacturing and technology management areas. He also teaches operations management at MBA programs at James Madison University (JMU) and Eastern Mennonite University. Professor Egekwu worked in industry
AC 2008-2323: EXTENDED ACTIVE LEARNING AS A MEANS TO LEARNSYNTAX IN PROGRAMMING LANGUAGESSteven Hansen, University of St. Thomas Page 13.599.1© American Society for Engineering Education, 2008 Extended Active Learning As A Means To Learn Syntax in Programming LanguagesAbstractActive learning is an education form that has gained much interest in recent years. Manyinstructors can come up with schemes that help students better learn algorithmdevelopment, program development, project management, and other aspects of neededskills in the computer sciences. In the past decade, I worked on the development of activelearning techniques to learn syntax. I find
AC 2009-1453: REVISING A NETWORK ENGINEERING CURRICULUM TOREFLECT CURRENT INDUSTRY AND STUDENT TRENDSPhil Rawles, Purdue UniversityAnthony Smith, Purdue UniversityRaymond Hansen, Purdue UniversityJeffrey Sprankle, Purdue University Page 14.1033.1© American Society for Engineering Education, 2009 Revising a Network Engineering Curriculum to Reflect Current Industry and Student TrendsAbstractOne of the fastest changing areas of technology education is information technology. Within theInformation Technology (IT) field, the area of network engineering and security is changingespecially quickly. Ongoing issues such as machine and network security
AC 2010-1432: EVALUATION OF A WEB-BASED LEARNING TOOL FORTEACHING GIS WITHIN THE CONTEXT OF TRANSPORTATIONENGINEERINGAshley Banaszek, Missouri University of Science and TechnologyHong Sheng, Missouri University of Science and TechnologyRichard Hall, Missouri University of Science and TechnologyRonaldo Luna, Missouri University of Science and TechnologyGhulam Bham, Missouri University of Science and Technology Page 15.537.1© American Society for Engineering Education, 2010 Evaluation of a Web-Based Learning Tool for Teaching GIS within the Context of Transportation EngineeringAbstractAn exploratory study was conducted to evaluate a web-based learning
AC 2007-1538: VISIT – VISUALIZATION AND INFORMATION TECHNOLOGY -A MULTI-TIER SYSTEM FOR INTERDISCIPLINARY EXPERIENCES IN DATACOLLECTION AND VISUALIZATIONJudith Challinger, California State University, ChicoRachael Teasdale, California State University, Chico Page 12.1590.1© American Society for Engineering Education, 2007 VisIT - Visualization and Information Technology - A Multi-tier System for Interdisciplinary Experiences in Data Collection and VisualizationAbstractCollaboration on interdisciplinary teams is an important experience for computer sciencestudents, and one that is too rarely available. Methods for data
2006-559: A REMOTELY CONTROLLED AND ISOLATED COMPUTERNETWORK TEST BED FOR ATTACK UNDERSTANDING BASEDINFORMATION ASSURANCE DISTANCE EDUCATION COURSESPhilip Lunsford, East Carolina University Phil Lunsford received a B.S. in Electrical Engineering and a M.S. in Electrical Engineering from Georgia Institute of Technology and a Ph.D. in Electrical Engineering from North Carolina State University. He is a registered professional engineer and is currently an Assistant Professor at East Carolina University. His research interests include system simulation, telemedicine applications, and information assurance.Lee Toderick, East Carolina University Lee Toderick received a B.S. in Computer Science from
AC 2010-1815: FACILITATING TEACHING AND RESEARCH ON OPEN-ENDEDPROBLEM SOLVING THROUGH THE DEVELOPMENT OF A DYNAMICCOMPUTER TOOLMatthew Verleger, Purdue UniversityHeidi Diefes-Dux, Purdue University Page 15.575.1© American Society for Engineering Education, 2010 Facilitating Teaching and Research on Open-Ended Problem Solving Through the Development of a Dynamic Computer ToolAbstractModel Eliciting Activities (MEAs) are realistic open-ended problems set in engineering contexts;student teams draw on their diverse experiences both in and out of the classroom to develop amathematical model explicated in a memo to the client. These activities have been implementedin
student needs to develop b. Development of specific learning outcomes from these skill areas c. Identification of appropriate learning strategies to achieve learning outcomes d. Identification of indicators that establish the student has achieved learning outcomes e. Collection of pieces of evidence that demonstrates the student has met the performance indicators f. Organization and presentation of the evidence in a portfolio supplemented with commentaries to support student workAt Zayed University, the purpose of outcome-based learning assessment is to improve the qualityof learning and teaching in the College of Information Systems. It is based on three fundamentalprinciples: Student learning is the focus in
skills, and employcreativity in proposing new solutions.Their capstone process included an analysis phase, a design phase, a validation phase and aproduction phase.The analysis phase includes: A. Review of family science research to identify common traits or factors that build strong families. a. A number of references were found which discuss the relationship between technology and families and also define characteristics of strong families.11-15 B. Review of IT-related literature to identify what effects different information technologies have had on families. C. Defining target users demographic a. The selected user characteristics were: Caucasian families with 1 or more children
following constraint characteristics: cardinalityconstraints, attribute value constraints, polymorphic constraints and temporal constraints.References1. The Business Rules Group, “Defining Business Rules – What Are They Really?”, February, 2006, http:www.BusinessRulesGroup.org2. Perkins, “Business Rules = Meta Data”, The proceedings of the: Technology of Object-Oriented Languages and Systems, IEEE, 2000. Page 11.1082.73. J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005.4. G. Ronald Ross, “Business Rule Concepts”, Business Rule Solutions Inc., 1998.5
system.User network authentication within the university lab has not yet been addressed, but research isin process.Bibliography1. Campbell, A., Pargas, R., “Laptops in the Classroom”, Proceedings of SIGCSE’03, Feb. 2003, pp. 98-1022. Leone, J., Hartpence, B., Weber, B., “A Networking and System Administration Laboratory Infrastructure”,Proceedings of CITC3, Rochester, NY, 2002, session 2613. Higby, C., Blackham, N., Rogers, B., Bailey, M., “Re-imaging Computers for Multi-purpose Labs”, Computersin Education Journal, v 15, no. 3, 2005, pp. 34-404. Tarnoff, D., “Shifting Students’ Financial Responsibilities form Textbooks to Laboratory Resources”, Journalof Computing Sciences in Colleges, v 22, no. 3, January 2007, pp. 237-243
AC 2008-2882: NETWORK PROCESSES COMMUNICATION: CLASS PROJECTSMohammad Dadfar, Bowling Green State University MOHAMMAD B. DADFAR Mohammad B. Dadfar is an Associate Professor in the Computer Science Department at Bowling Green State University. His research interests include Computer Extension and Analysis of Perturbation Series, Scheduling Algorithms, and Computers in Education. He currently teaches undergraduate and graduate courses in data communications, operating systems, and computer algorithms. He is a member of ACM and ASEE. Page 13.925.1© American Society for Engineering Education, 2008 Network
relationships would add unnecessary complexity to this paper. Page 13.1194.8References[1] James F. Allen, “Maintaining Knowledge about Temporal Intervals”, Communications of the ACM, pp. 832-843, 1983.[2] James F. Allen, “Towards a General Theory of Action and Time”, Artificial Intelligence 23 pp. 123-154, 1984.[3] Reza Sanati Mehrizy, Curtis Welborn, Afsaneh Minaie, ”Representing and Enforcing Business Rules in Relational Data Model”, American Society for Engineering Education (ASEE) 2006.[4] J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005.[5] A
inputs and boundary conditions1, 2. A virtualfacility can have two purposes: a) to facilitate the feasibility study of an engineering systemwhile in the planning stage, and based on the study, designers can adjust the parameters duringtheir final planning so the anticipated system can serve its purpose and b) to study the behaviorand control of a complex engineering system for educational and research purposes withoutbuilding the system. The development of these virtual facilities can involve expertise withcomplex mathematical solutions with tedious software developments and effective graphical userinterface 3. Considering the level of involvement, sometimes it is difficult for an individualinstitution to develop and maintain such
Page 11.1200.5process and finally organizations that use the process.There is a basic context analysis protocol or general series of steps for the analysis of contextthat we can use: 1. Gather material about key context categories such as locations, organizations, technology or documents. 2. Gather/locate the target processes of interest 3. Create a core set of context matrices 4. Assess impact and create a ranking by category 5. Combine ranks into a composite ranking 6. Use three analytics techniques: a. Ranking of dimensions by attributes b. Ranking by frequency c. Inference of impact related to changers in:A combination of frequency of reference plus some quantitative and qualitative attributes of
or server.In the survey students commented that they could replay particular sections of the video to clarify pointsthey might have missed in the first hearing. Many students were not fluent in English and often do notunderstand certain points made in an oral lecture. The recorded videos help to alleviate this problem.During the first course offering in spring 2007, all the students passed with the majority of the gradesbeing B or B+. During the second offering in spring 2007, again all students passed. The majority ofgrades were A and the class average of 87%.In the fall of 2007 the author had the opportunity to teach 18 of the same students from the spring 2007class in a conventional lecture course. The course title was "Artificial
systematic use of technology actually helpsinstructors address perceptual dimensions of learning. Technology should not beviewed just as a growing trend; rather it must be intelligently implemented as avaluable instructional tool that can accommodate diverse learning styles of 21stcentury students. (Watkins, 2005). It is important to acknowledge that studentslearn better when alternative modes of information processing are made availableat college campuses. Dr. Walter B. Barbe, a nationally known authority in thefields of reading and learning disabilities has shown that perceptual modalitystyles provides an indication of an individual’s dominant learning mode. Thedegree of processing speed, accuracy and retention that an individual is able
recentlyused as laboratory assignments and semester projects in undergraduate and graduate courses. Asummary of our findings is presented in this paper.IntroductionMany universities have used different protocols and products for hands-on experiences inwireless and mobile network courses. The protocols and standards include IEEE 802.11 (a, b, gor simply WiFi), Bluetooth, IEEE 802.15.4 and Zigbee, sensor networks based on the standardBerkeley “mote” platform implemented in products such as WeC, Rene, Dot, MICA, and Telos.Many of the products use TinyOS, a small operating system targeted for minimum hardware.We present a summary of hands-on laboratory exercises we found on the Internet. In Vassar’sCMPU-395, students are asked to implement a simplified
this evaluation process can be a goodexperience for students or student teams. We recommend the following process: Page 13.952.5 1. Identify your requirements and preferences, and prioritize them as essential, desirable, or potential useful in the future. include factors such as: a. Language support, particularly if English is not the preferred language. b. Licensing options, particularly if the tools may be used for commercial activity. c. Technology: hardware, operating system, programming language, database. 2. Identify and quickly assess candidate tools. Start with general descriptions, including
applications may provide further insight.ConclusionsThis paper reviewed the historical underpinnings of cloud computing along with an overview ofthe technology background of cloud computing. The final sections of the paper described theresults of an action research project that was implemented to address the implementation of acloud computing application in an undergraduate information systems class.Bibliography1. Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R. H., Konwinski, A., et al. (2009). Above the Clouds: A Berkeley View of Cloud Computing EECS Department, University of California, Berkeley.2. Editions and Pricing. (2009). Retrieved from http://www.salesforce.com/crm/editions-pricing.jsp3. Hayes, B. (2008). Cloud computing
). Page 11.787.4Protocols and Standards2.1 Identify a MAC (Media Access Control) address and its parts.2.2 Identify the seven layers of the OSI (Open Systems Interconnect) model and their functions.2.3 Identify the OSI (OSI) layers at which the following network components operate:2.4 Differentiate between network protocols in terms of routing, addressing schemes, interoperability and naming conventions2.5 Identify the components and structure of IP (Internet Protocol) addresses (IPv4, IPv6) and the required setting for connections across the Internet.2.6 Identify classful IP (Internet Protocol) ranges and their subnet masks (example: Class A, B and C).2.7 Identify the purpose of subnetting2.8 Identify the differences between private
. International Journal of Information Management, 26(2), 128-141.6. Marshall, J., & Heffes, E. M. (2006). Surveys: Data losses spur consumer flight. Financial Executive, 22(1), 10.7. Lewis, D. (2005). Personal disaster recovery software: An essential part of business disaster recovery plans. Computer Technology Review, 25(6), 10.8. LaPage, A. & Gaylord, K. (2003). Protect against data loss with W2K’s backup utility. Windows Professional, 8(2), 8-12.9. Freeman, E. Q. (2000). E-merging risks: Operational issues and solutions in a cyberage. Risk Management, 47(7), 12-15.10. Eckert, B. (2006). Protect computerized data with off-site backups. Nursing Homes, 55(5), 42.11. Duke, B. (2006). Data security: behind the
http://www.zigbee.org/en/press/press_kit_010207/PressRoom/064337r00ZB_MWG-ZIGBEE-MEMBERS- SHIP-10,000-DEVELOPER-KITS,-SPEC-DOWNLOADS.pdf16. Bluetooth SIG (2006). Get Involved: Membership Online Resources. Retrieved January 17, 2007 from https://www.bluetooth.org/bluetooth/landing/membership.php17. ZigBee Alliance (2006). Member Benefits. Retrieved January 17, 2007 from http://www.zigbee.org/en/join/benefits.asp18. Bluetooth SIG (2007). Compare With Other Technologies. In Bluetooth Technology. Retrieved January 17, 2007 from http://www.bluetooth.com/Bluetooth/Learn/Technology/Compare19. Adams J. & Heile B. (2006). Busy as a ZigBee. Spectrum. 43(10). Online content. Retrieved January 17, 2007 from http
× σYear=2005 S C σYear=2005 S C A S A S A A (a) (b) (c) (d) πSName πSName πSName πSName σA.CNo=C.CNo σA.CNo=C.CNo >< ><
(IRETE)AbstractEngineers work in settings that are dictated by global perspectives. This places a need forengineers who can operate seamlessly in global environments. A key component for the successof this seamless knowledge exchange is the development of information repositories for theengineering fields. E-Lis < http://eprints.rclis.org > is an example of such a repository fordocuments, published or unpublished, on librarianship, information science and technology.IRETE will be a repository totally focused to the world-wide community of scholars and teachersdedicated to engineering education. IRETE will operate with an administrative group under theleadership of a Principal Investigator or Director. Several working groups will focus on
) using concepts like Authentication Header, Encapsulating Security Payload inPowerpoint files. There is in general no student involvement (in some of IPSec code forexample).WEPWEP (Wired Equivalent Privacy), a part of IEEE 802.11 protocols, is a wireless protocol thatpeople know well its vulnerability. The reason is due to that the initialization vectors areencrypted using the XOR (exclusive or) operation. Though XOR can scramble the bits well, it iseasy to break since if C = A XOR B, then A = C XOR B from elementary Boolean algebra. As aconsequence, WEP is subject to the so called known plaintext attack.The coverage of WEP before was limited to the explanation of its vulnerability (stage 1). It canbe enhanced as a demonstration in the class (or
fundamental concepts of networking, but also helps the students gainexperiences of managing a local area network. The lab assignments can also be used for theonline courses since the student have easy and full access to the home network.Bibliography[1] E. Freudenthal, F. Kautz, B. Das, and L. Longpre, A Virtualized Network Teaching Laboratory, ASEE 2009.[2] Java, http://www.java.com/en/download/index.jsp.[3] Data Communications and Networking, 4th Edition, by Behrouz A. Forouzan, McGraw-Hill, 2007.[4] Wireless-G Broadband Router, Model:WRT54GL, User Guide.[5] J. Loddo and L. Saiu. Marionnet: A Virtual Network Laboratory and Simulation Tool, SimulationWorks, 2008.[6] Wireshark, http://www.wireshark.org/.[7] D-Link AirPlus Xtreme GTM DI-624 High-Speed
teams in information systemseducation. SIGMIS Database 27, 2 (Apr. 1996), 44-60.[10] Freeman, E., Freeman, E., Bates, B. and Sierra, K. Head First Design Patterns. O'Reilly, 2004.[11] Gehringer, E. F., Deibel, K., Hamer, J., and Whittington, K. J. 2006. cooperative learning: beyond pairprogramming and team projects. In Proceedings of the 37th SIGCSE Technical Symposium on Computer ScienceEducation (Houston, Texas, USA, March 03 - 05, 2006). SIGCSE '06. ACM Press, New York, NY, 458-459.[12] Grissom, S. and Van Gorp, M. J. 2000. A practical approach to integrating active and collaborative learninginto the introductory computer science curriculum. In Proceedings of the Seventh Annual Consortium on Computingin Small Colleges Midwestern Conference
developing802.11s, a set of standards defining wireless mesh distribution systems. These standards wouldgreatly benefit this research, but are currently unfinished and a proprietary solution had to beutilized.Proxim AP-4900M access points were utilized for this research. These models supported allthree types of distribution systems (wired, WDS, and mesh) and are equipped with two separateradios. One of the radios was dedicated to 802.11b/g traffic, and one was dedicated to 802.11atraffic. There was no WEP/WPA security on any access points, and the AP was set to openauthentication. The client utilized was a Dell Latitude D620, utilizing the built-in IntelPRO/Wireless 3945ABG 802.11a/b/g card with version 10.5.1.72 of the manufacturer’s drivers.In each
12.490.2Rather than researching new cryptographic algorithms, our students focus on evaluatingcryptographic implementations in the context of particular enterprise security goal(s). Inthese evaluations, our students draw on existing standards and standard organizationssuch as the Security Requirements for Cryptographic Modules (FIPS-140) [2] and theNational Institute for Standards and Technology (NIST). A look at sample learning goalsfor our laboratory module’s will help illustrate this.Sample Module GoalsAt the end of this class, students will be able to:1. Apply cryptographic services to: a. Conceal information within a file (encryption). b. Verify a file’s integrity c. Authenticate a file’s origin2. Provide evidence of non