concludes with a list ofresources that include many more active and cooperative learning exercises.1. IntroductionIn bygone days, the “sage on the stage” was seen as the consummate teacher. Authoritative andentertaining, his words were eagerly listened to by students, and dutifully copied into spiralnotebooks. But today, the competition is tougher. Students grow up with interactive games,watch video on their cellphones, and surf the Web from their laptops during class. To be sure,spellbinding lecturers still exist, but most of us would not count ourselves among them. We canstill use class time to deliver an abridged oral rendition of the textbook, but the majority ofstudents will see it as a waste of time. We can do better.Active and collaborative
AJAX - no additional software is needed on the host computer, beyond the browser16. Another sim- ilar software package is Doxwiki. Page 12.1177.4A Sample VisionTechnologically we are ready for electronic books in the classroom. The major barrier at this pointis a proven model that others can reuse. A crude example model of use of the book in a course isoutlined below. 1. Before the course the instructor identifies the text sections and depth that she/he wants to use for the standard student. An instructor could even elect to provide a set of prob- lems to solve for the semester, and then references to
12.490.2Rather than researching new cryptographic algorithms, our students focus on evaluatingcryptographic implementations in the context of particular enterprise security goal(s). Inthese evaluations, our students draw on existing standards and standard organizationssuch as the Security Requirements for Cryptographic Modules (FIPS-140) [2] and theNational Institute for Standards and Technology (NIST). A look at sample learning goalsfor our laboratory module’s will help illustrate this.Sample Module GoalsAt the end of this class, students will be able to:1. Apply cryptographic services to: a. Conceal information within a file (encryption). b. Verify a file’s integrity c. Authenticate a file’s origin2. Provide evidence of non
areas, except Computer Science and Information Systems. InUnited States, many educational institutions developed information security assurance (ISA)educational models based on standards and guidelines promoted by the government or otherorganizations resulting in a large variety of information systems security education curricula [1].In 2005, the ACM Special Interest Group for Information Technology Education (SIGITE)Curriculum Committee developed a list of the topical areas for the information assurance andsecurity (IAS) domain of the information technology body of knowledge [2]. The topical areas Page 12.226.2include: • Fundamental Aspects
collection in the field andsubsequent graphing and analysis are important skills for students in many different scientificdisciplines. This paper presents a project currently underway by computer science andenvironmental science faculty at the California State University, Chico to address these needs. Amulti-tier system is being developed to serve as a repository for data collected in the field byenvironmental science students, facilitate graphing and analysis of data, and provide a platformfor interdisciplinary teams of students to collaborate on both software development and dataanalysis tasks.IntroductionIn 2005, Microsoft Research Cambridge brought together an international panel of scientists forthe Towards 2020 Science workshop.1 Their goal
weak in covering particular outcomes. This exercise allows the ISCollege to study the effectiveness of individual courses and the program overall in achieving thecollege and University learning outcomes. It is anticipated that using a measurement tool such asthe course outcome matrix may enable academic institutions monitor and improve informationsystems programs.1. IntroductionUniversities in the USA and worldwide are taking a critical look at their educational systems. Arecent US national panel report calls for a dramatic reorganization of undergraduate education toensure that all college students receive not just access to college, but an education of lastingvalue1. The report also recommends colleges to help students become “intentional
and subjects of research in informationtechnology, as well as the journals and trade periodicals deemed the most relevant for thediscipline. Although there were relatively few subjects in his survey, it serves as a starting pointfor studying journals in information technology. Accordingly, this study began with the scholarlyoutlets found to have the highest number of responses in the Bailey study. Additionally, therewere other relevant publications and conferences identified by the authors that were not includedin the Bailey study. It is interesting to note that some of these publications were also in thecomputing journals study by Rainer, et al., and in the information systems journals study byLowry, et al. This is shown in Table 1
between Wireless LANstation and Access Point was fixed to 8 meters and the distance between Master and Slavewas fixed to 2 meters. Table 1 shows the most important attributes used for the WLANstation, WLAN Access Point, Bluetooth Master Node and Bluetooth Slave Node.Table 1: Important attributes of WLAN Station, WLAN Access Point, Bluetooth MasterNode and Bluetooth Slave Node. Device Attribute Value Data Rate 11 Mb/sec Power 10 mWWLAN Station Physical Characteristics DSSS Access Point Functionality Disabled Data Rate
course was offered, the Arab university had a single 1 Mbit/sec Internet connection forthe entire campus at a cost of $1200 per month. During the hours students are on campus, all downloadsof audio or video content had to be blocked. This restriction made any sort of synchronous interactionwith students impractical except for text messaging or chat. It was not feasible to upload any files fromthe USA that were larger than a few megabytesSome students did not have personal computers at home, and had to rely on university computer labswhich were open from 8 AM to 4 PM Monday to Friday. Page 13.444.2The official language of instruction at
interactions of localized group work.The more specific goals are to understand how different learning styles feel about the use oftechnology for group work and to determine if there is a difference between genders. These goalswill be addressed through four research questions: (1) What are the current technologiesavailable for collaboration during group work and which of these students use? (2) Does the useof technology take away from the traditional face-to-face group work or does it enhance theexperience? (3) Is there a difference among students with different learning styles on the use oftechnology and group work? Does it affect the learning of those individuals? (4) Is there adifference due to gender on the use of technology and group work? Does it
AC 2008-1484: ASSESSING STUDENTS' WIKI CONTRIBUTIONSEdward Gehringer, North Carolina State University Page 13.230.1© American Society for Engineering Education, 2008 Assessing Students’ Wiki Contributions Edward F. Gehringer North Carolina State University efg@ncsu.eduAbstractPerhaps inspired by the growing attention given to Wikipedia, instructors have increasingly beenturning to wikis [1, 2] as an instructional collaborative space. A major advantage of a wiki isthat any user can edit it at any time. In a class setting, students may be restricted in
Credits Semester 1 Semester 2 COL 110 Computer Applications 3 COL 105 Career Exploration 2 COL 120 Colloquium 3 COL 111 Explorations in Mathematics 3 COL 130 Arabic Concepts 3 CIT 125 Discovering IT 2 Year 1 COL 140 English Composition I 3 Menu I Comparative Professional Systems 2 COL 150 Global Studies I 3 COL 135 Islamic Civilization I 3 COL 145
IAS7. Forensics (1) IAS8. Information States (1) IAS9. Security Services (1) IAS10. Threat Analysis Model (1) IAS11. Vulnerabilities (1)NET. Networking (20 core hours) NET4. Security (2)Since IT systems are increasingly under attack, the knowledge of Information Assurance andSecurity (IAS) is of paramount importance to the profession of IT. The IT professional mustunderstand, apply, and manage information assurance and security in computing,communication, and organizational systems. It is also important for the IT professional toprovide users in an organization with a framework to be sufficiently aware of security issues forthe users to be an asset to the organization rather than a liability. IAS includes
different platforms. Most hands-on exercises can be donelocally without Internet connection.Compared to the centralized remote lab, the virtual lab is very portable, inexpensive, can be runon the students’ computers, anywhere, and at any time. We have experimented with virtualmachines in a number of labs with a high degree of success. Feedback from students indicatedsatisfaction.1. IntroductionInformation and computer technology programs are plagued by several major challenges. First,computing technologies are evolving at a rapid pace, making it difficult for schools to maintainup-to-date technologies in physical labs due to budget constraints. Second, lab exercisesdeveloped by faculty have short life span and need to be updated to reflect new
utmostimportance to coastal communities that survive and thrive economically, not only from realestate rental services but also as the result of quick restoration of rental properties that havesustained damage after a coastal storm. The participants completed a demographic questionnairethat identified the organization they represented and their role in the organization. Thisquestionnaire also disclosed to the participants the intended use of the data collected. Asummary of the data obtained from the questionnaire is shown in Table 1.Table 1: Focus group participant organizations’ demographic statistics Government (n = 6) Commercial (n = 4) Total (N =10) Demographic Mean Range Mean
. Temporal logic[1],[2] defines a basic set of primitiverelationships that can exist between intervals in time. These same primitive relationshipscan be used to express temporal relationships between business objects. The EnhancedEntity Relationship (EER) notation allows business rules to be shown in a graphic formusing action assertions which keep the business rule at a conceptual level withoutspecifying how the rule will be implemented. In this paper we will show how the EERnotation can be augmented to allow a software engineer to specify temporal-basedbusiness relationships in a relational data model.IntroductionThere are three common types of business rules[6]: structural assertions, action assertionsand derivations. A structural assertion is
- Page 13.1394.5anytime arrangement and without any need of Matlab software package. At the same time, allthe updates could be introduced to a single server without any time delay and administrativeoverhead. Recently, Matlab has introduced the Matlab Web Server package that allows one toaccess the Matlab programs and run them from a remote location over the web without havingMatlab software running on clients’ system. With this provision, the lead author introduced theflexible manipulator software facility (simulation, modeling, and control) over the web. Figure 1: Shows major components and their integration within the facility.5. Integration of the Facility The facility is hosted within a server that incorporates a
laboratories.The current TCN curriculum covers digital circuit design, telecommunications and fiber optics,computer networking, network routing and switching, network design and maintenance, systemanalysis and design, wireless communications and networks, server techniques, and networksecurity. Considering that standard engineering courses focus on the technical aspects, but under-address the challenges in system design and configuration, maintenance and troubleshooting, andpure technical schools do not equip students with enough theoretical background, we created acurriculum to balance both theoretical and technical requirements. Ma & Nickerson [1] found that hands-on laboratories adhered to goals of the Accreditation Boardfor Engineering and
leisure time was the sport ofbird watching. The complexity of the number of plumages of birds due to age, sex, andbreeding plumages made identification a very difficult task for some species.In the 1930s, a method of identification was developed by Roger Tory Peterson4 thatbroke down bird identification to a listing of identifiable patterns, and he created theconcept of field guides containing paintings of each species with a listing of fieldidentification marks to look for when identifying the species. This method has beenwidely copied, and is now used for many organisms and other natural entities in additionto birds. An example of the use of this system for program code is provided in Figure 1.Figure 1. Example use of Peterson Identification
age-old format of separating lecture and lab in Engineering and Technology curriculahas many drawbacks given scheduling and classroom constraints. With the shift toward amore non-traditional student population, students are seeking courses taught in astreamlined fashion, preferring to complete weekly meetings in one day, if possible. Thecompressed format makes it even more imperative to diversify the experience in theclassroom in order to heighten motivation, and facilitate learning. The eStudio (SeeFigure 1), is a very new project within the department. The goals for the program aremultifaceted and include promoting collaboration among the students, facilitatingcontinuous improvement of the curriculum, and providing for distance learning
protocol, wireless distribution system, and the classic wirednetwork.1. IntroductionThe introduction of wireless networking has allowed people the freedom to access networks,including the Internet, from almost any location. This fact has been reflected, in part, by a surgein laptop sales over the recent years. Vice president of Gartner’s worldwide computingplatforms, Charles Smulders, states that “Consumers are flocking to notebooks because of lowerprices, better performance, and an increased appreciation for wireless technologies.”5 Theincreased appreciation here stems from the transparently bridging technologies. According to anengineer at Qualcomm, “One of the fundamental design goals for 802.11 is to provide servicesthat are consistent
to ease adoption pains. The paper will also discuss efforts at James MadisonUniversity to expose students to the various aspects of this technology.RFID NetworksAt the enterprise level, an RFID system will comprise many different technologies, includingbarcodes systems, passive and active tags, GPS/GIS systems, and chain of smart software – thehardware and software from different vendors must be seamlessly integrated. See Figure 1 forrepresentative auto ID technologies that one will find in a robust enterprise system. Transport Movement Item Packaging Unit Load Container unit
different levels of processes such asparent, children, and sibling processes. We also describe a practical client-server applicationstudents are already familiar with.1. IntroductionData communications and networking courses have been among the most popular courses incomputer science departments during the past two decades. Most students try to complete atleast one course in this area. Instructors assign different types of projects for their datacommunications and networking courses1, 2. In our department we have offered a sophomorelevel mandatory course (Operating Systems and Networks) that introduces both operatingsystems and data communications concepts. Following this course, we have elective courses ineach of operating systems and data
displayed on a connected laptop computer, saved for later analysis, or printed.Third, we list the technologies used for its development. Finally, we conclude with ademonstration of the software and our future plans for its continued development.The Ubiquity of Mobile Computing DevicesFollowing in the steps of PDAs, smartphones are becoming personal oracles of information 1, 2.While early generation cellular telephones were used only for voice communications, moderndigital mobile phones have quickly become societal necessities for daily existence. Not only dosmartphones support voice communications, these devices provide technologies for ShortMessage Service (SMS) messaging, Multi-Media Messaging Service (MMS) messaging, InstantMessaging (IM
summarize best practices, lessons learned, anddirections for future experimentation and development. Using OSS tools helps students learn touse new tools, exposes them to tools or types of tools they are likely to encounter in the future,and enables them to attempt and complete more ambitious projects under more realisticconditions. Like any tools, OSS requires an ongoing time investment by faculty, but helps themto diagnose and correct problems, assess student performance, and help the projects and teamsadapt to other factors.1. IntroductionOpen source software (OSS) is distributed without charge and with the underlying source code,so that other software developers can fix defects, update documentation, add enhancements, orotherwise modify the
Based UnitsIntel Education informs that:Authentic project work puts students in the driver's seat of their own learning. Itis important that instructors take advantage of curriculum developed by teachersin a large collection of Unit Plans that integrate technology. Models ofmeaningful classroom projects that integrate instruction in thinking skills alongwith tools and strategies for developing one’s own exemplary technology-supported learning are always encouraged. They focus on three areas:1. It is important to learn how project-based units can effectively engage students in meaningful work and promote higher-order thinking.2. It is necessary to see how questions and ongoing assessment keep project work focused on important learning goals
hypothesis was that understanding these latter models would be easier for students ifthey saw the same database example presented in all these three models. As a test of thispremise, one of the authors gave students in a database class the assignment ofimplementing a database problem in the three models. Students who participated wereasked to report their experiences from completing the assignment. The results obtainedfrom the students are evaluated and reported in this paper.KeywordsDatabase Design, Relational databases, Object-Relational databases, Object-Orienteddatabases.1. IntroductionIn a previous paper1, the authors discussed a perceived difficulty that students havelearning the features, capabilities, and uses of the three major database
IRETE ProjectIRETE will be a bibliographic database and repository developed using open-source softwaresuch as Fedora (Flexible Extensible Digital Object and Repository Architecture), EPrint, or Page 14.205.5DSpace with approximately 100,000 records - partially full-text - covering the period from 1980to the present. The major tasks for the development of this project are: 1. Identification ofdocuments, 2. Procurement of documents, 3. Thesaurus development, 4. Database development,and 5. Database Public Interface development.The identification of publications related to engineering education represents an essential step.The publications to be
of the way humans learn. The processby which humans build knowledge is complex, but there is agreement that as the brainprocesses inputs into information, each person organizes the inputs and information in away that is unique for that individual, so that everything that a person learns andexperiences is understood and appreciated by her in her own unique way. Each human’spersonal organization of input as information, or her knowledge, is her personal mentalschema. The term schema used here means a generalized mental structure that is anabstract representation of events, objects, and relationships in the world. Concept mapsare spatial semantic representations of a person’s mental schema about a topic 1.A concept map (a.k.a. semantic network