AC 2007-1360: A STUDY ON THE PERFORMANCE OF BLUETOOTH AND IEEE802.11B COEXISTENCEWarith Al-Sulaimani, Modern College of Business and Science-Sultanate of Oman Warith Al-Sulaimani is a Lecturer and Consultant at the Modern College of Business and Science, Oman. Warith earned a Bachelor’s Degree in Electronic & Electrical Engineering from the University of Strathclyde (UK), a Diploma in Computers and Information Systems from Sultan Qaboos University (Oman) and Master’s Degree in Advanced Computer networking from Glasgow Caledonian University (UK). His primary research focus is in the areas of Wireless Networking, Internet Technologies and Network Security. He holds certifications in A
successful completion of the tests. Figure 2 shows the lab and test processflowcharts for the user interface. Upon successful login in Figure 5a, the student will be directedto the welcome page shown in Figure 5b. This stage includes an overview of the lab and recordsthe student’s information. Page 12.30.4 Proceedings of the 2007 American Society for Engineering Education Annual Conference & Exposition Copyright®2007, American Society for Engineering Education (a) (b) Figure 2. User Interface Flowcharts. (a) Lab flowchart, (b) Quiz flowchart
of its above mentioned efforts. However, such anassessment is planned for the near future.Bibliography1. Hentea, M., H. Dhillon, and M. Dhillon. “Towards Changes in Information Security Education.” Journal ofInformation Technology Education, Volume 5, 2006. Page 12.226.92. Dark, M., J. Ekstrom, and B. Lunt. “Integrating Information Assurance and Security into IT Education: A Lookat the Model Curriculum and Emerging Practice.” Journal of Information Technology Education, Volume 5, 2006.3. Logan, P. “Crafting an Undergraduate Information Security Emphasis Within Information Technology.” Journalof Information Systems Education, 13 (3)4
withefficient time and resource investments specifically improving data selection, data preparation,data quality (from all the information sources), resulting in precision and reduction in theassociated computing costsBibliography1. Agarwal,R.,Imielinski,T.,and Swami,A. Mining Associations between Sets of Items in Massive Databases. In proceedings of the ACM-SIGMOD 1993 International Conference on Management of Data, pages 207-216.2. Allen ,J.,Christie,A.,Fithen,W.,McHugh,J.,Pickel,J.,and Stoner, E. State of the Practice of Intrusion Detection Technologies. Technical report, Carnegie Mellon University.3. Gurley B. R. Intrusion Detection. Macmillan Computer Publishing. (MCP), Indianopolis. 2000.4. Barbara D. and Jajodia S. Applications
AC 2007-1219: TECHNOLOGICAL ASPECTS OF A SMART COTTAGE FORSENIORSRobert Walters, Pennsylvania State UniversityJohn Bertoty, Blueroof Technologies, Inc. Page 12.1375.1© American Society for Engineering Education, 2007 Development of a Smart Cottage for SeniorsAbstractThis paper presents the design, development and construction of a new kind of housing for seniorcitizens. A Smart Cottage for Seniors has been developed that is accessible, affordable and containstechnology to keep the seniors at home longer, safer and healthier. The cottage uses Universal designtechniques that ensure that the cottage will change with the needs of the occupants. A
AC 2007-1538: VISIT – VISUALIZATION AND INFORMATION TECHNOLOGY -A MULTI-TIER SYSTEM FOR INTERDISCIPLINARY EXPERIENCES IN DATACOLLECTION AND VISUALIZATIONJudith Challinger, California State University, ChicoRachael Teasdale, California State University, Chico Page 12.1590.1© American Society for Engineering Education, 2007 VisIT - Visualization and Information Technology - A Multi-tier System for Interdisciplinary Experiences in Data Collection and VisualizationAbstractCollaboration on interdisciplinary teams is an important experience for computer sciencestudents, and one that is too rarely available. Methods for data
student needs to develop b. Development of specific learning outcomes from these skill areas c. Identification of appropriate learning strategies to achieve learning outcomes d. Identification of indicators that establish the student has achieved learning outcomes e. Collection of pieces of evidence that demonstrates the student has met the performance indicators f. Organization and presentation of the evidence in a portfolio supplemented with commentaries to support student workAt Zayed University, the purpose of outcome-based learning assessment is to improve the qualityof learning and teaching in the College of Information Systems. It is based on three fundamentalprinciples: Student learning is the focus in
system.User network authentication within the university lab has not yet been addressed, but research isin process.Bibliography1. Campbell, A., Pargas, R., “Laptops in the Classroom”, Proceedings of SIGCSE’03, Feb. 2003, pp. 98-1022. Leone, J., Hartpence, B., Weber, B., “A Networking and System Administration Laboratory Infrastructure”,Proceedings of CITC3, Rochester, NY, 2002, session 2613. Higby, C., Blackham, N., Rogers, B., Bailey, M., “Re-imaging Computers for Multi-purpose Labs”, Computersin Education Journal, v 15, no. 3, 2005, pp. 34-404. Tarnoff, D., “Shifting Students’ Financial Responsibilities form Textbooks to Laboratory Resources”, Journalof Computing Sciences in Colleges, v 22, no. 3, January 2007, pp. 237-243
http://www.zigbee.org/en/press/press_kit_010207/PressRoom/064337r00ZB_MWG-ZIGBEE-MEMBERS- SHIP-10,000-DEVELOPER-KITS,-SPEC-DOWNLOADS.pdf16. Bluetooth SIG (2006). Get Involved: Membership Online Resources. Retrieved January 17, 2007 from https://www.bluetooth.org/bluetooth/landing/membership.php17. ZigBee Alliance (2006). Member Benefits. Retrieved January 17, 2007 from http://www.zigbee.org/en/join/benefits.asp18. Bluetooth SIG (2007). Compare With Other Technologies. In Bluetooth Technology. Retrieved January 17, 2007 from http://www.bluetooth.com/Bluetooth/Learn/Technology/Compare19. Adams J. & Heile B. (2006). Busy as a ZigBee. Spectrum. 43(10). Online content. Retrieved January 17, 2007 from http
teams in information systemseducation. SIGMIS Database 27, 2 (Apr. 1996), 44-60.[10] Freeman, E., Freeman, E., Bates, B. and Sierra, K. Head First Design Patterns. O'Reilly, 2004.[11] Gehringer, E. F., Deibel, K., Hamer, J., and Whittington, K. J. 2006. cooperative learning: beyond pairprogramming and team projects. In Proceedings of the 37th SIGCSE Technical Symposium on Computer ScienceEducation (Houston, Texas, USA, March 03 - 05, 2006). SIGCSE '06. ACM Press, New York, NY, 458-459.[12] Grissom, S. and Van Gorp, M. J. 2000. A practical approach to integrating active and collaborative learninginto the introductory computer science curriculum. In Proceedings of the Seventh Annual Consortium on Computingin Small Colleges Midwestern Conference
12.490.2Rather than researching new cryptographic algorithms, our students focus on evaluatingcryptographic implementations in the context of particular enterprise security goal(s). Inthese evaluations, our students draw on existing standards and standard organizationssuch as the Security Requirements for Cryptographic Modules (FIPS-140) [2] and theNational Institute for Standards and Technology (NIST). A look at sample learning goalsfor our laboratory module’s will help illustrate this.Sample Module GoalsAt the end of this class, students will be able to:1. Apply cryptographic services to: a. Conceal information within a file (encryption). b. Verify a file’s integrity c. Authenticate a file’s origin2. Provide evidence of non
. Wood; Issues in Accounting Education, Vol. 21, No. 3, Aug 2006, pp 195- 218. 2. Journals in Economics; Tom Coupe; http://student.ulb.ac.be/~tcoupe/update/journals.html 3. Mind to Market: A Global Analysis of University Biotechnology Transfer and Commercialization; Ross DeVol, Armen Bedroussian, Anna Babayan, Meggy Frye, Daniela Murphy, Tomas J. Philipson, Lorna Wallace, Perry Wong, Benjamin Yeo; Milken Institute – Research Reports; Sept 20, 2006; http://www.bwl.uni-kiel.de/Prod/links/umbs_journal_ranking.pdf 4. Trieschmann, J. S., Dennis, A. R., Northcraft, G. B., Niemi, A. W. "Serving Multiple Constituencies in the Business School: MBA Program versus Research Performance," Academy of Management Journal
engineering; they allow very fast updates, they are easy to access, they do not require thebulk of paper, they are easily searchable, and they allow multiple/alternate sources. So, this begsthe question, why are there so few electronic books in use in higher education? In part, this isbecause many of the commercial books are not available electronically. Although some publishersare exploring ways to make their collections available electronically these efforts are still in theirinfancy.However, a larger puzzle is in the step away from paper to purely electronic media. For example,consider the following problems. How do you write notes or slip a page into a fixed PDF file? Isthe document you are viewing on your machine or on the network? Who can
AC 2007-1400: EXPLORATION OF JAVA PERSISTENCERobert E. Broadbent, Brigham Young UniversityMichael Bailey, Brigham Young UniversityJoseph Ekstrom, Brigham Young UniversityScott Hart, Brigham Young University Scott is an IT undergraduate working in the areas of information retrieval, and document management. Page 12.721.1© American Society for Engineering Education, 2007 Exploration of Java PersistenceAbstractData persistence in a relational database is one of the core requirements of many applications.There are a variety of methods for implementing data persistence; however the advantages
AC 2007-1013: KATRINA – AN INTERNSHIP OPPORTUNITYShelton Houston, University of Southern Mississippi Dr. Houston is a professor in the School of Computing at the University of Southern Mississippi. Dr. Houston has been involved in engineering technology education for 27 years. and has 10 years consulting experience in personal computer systems.Billy Walters, University of Southern Mississippi Prof. Walters holds a Masters of Science degree in Computer Science from The University of Arizona. Prof. Walters’ career includes academic and professional appointments. He has experience working at the Johnson Space Center, with secure government contractors, and directing law enforcement
AC 2007-1955: IPV6 COURSE DEVELOPMENT FOR INFORMATIONTECHNOLOGY CURRICULUMSJohn Pickard, East Carolina University John Pickard has more than 15 years in the Technical training profession and 9 years experience in the information technology field. John has held various positions and has experience involving management, designing, testing and teaching of data networks, enterprise networking systems, digital switching systems and transmission systems. Currently, John is a faculty member at East Carolina University and holds an instructor position in the Department of Technology Systems. John is also a senior trainer at Network Training and Consulting and teaches courses in networking
development and network engineering technology. She has co-authored a textbook, edited a second textbook, and written five chapters for other texts. She has published two journal articles and over twenty referred articles and has written or co-authored numerous grants aimed at increasing the number of women students in CIT. She serves as an Associate Editor for the International Journal of Information and Communication Technology Education. She has been the recipient of numerous teaching awards at the department, college, and university levels. She is actively involved in the academic alliance for the National Center for Women & Information Technology (www.ncwit.org), served as
the requirements of 30 credit hours of core courses common to allcomputer science students. The students continue taking core courses until the first semester oftheir junior year, when they begin taking their electives from different specialization areas.In this paper, the authors are proposing a new area of specialization in their computer sciencedepartment called Embedded Systems Engineering. The paper elaborates the detail content ofthe curriculum requirement for this track.Embedded Systems EngineeringThe area of Embedded Systems Design has been gaining a tremendous growth in recent years. Amajor aspect of this growth has been the addition of networking technologies and operatingsystems to embedded systems. Embedded systems have