Processes Communication: A System Project for Students Mohammad B. Dadfar, Ray Kresman Department of Computer Science Bowling Green State University Bowling Green, Ohio 43403 Phone: (419)372-2337 Fax: (419)372-8061 email: {dadfar, rama}@cs.bgsu.eduAbstractIn this paper we discuss two projects dealing with communication between network processes.They are assigned in our undergraduate data communications course. The implementationlanguage is C/C++ and the platform is Unix. We introduce a project where students createprocesses using Unix utilities such as fork that includes
AC 2009-1802: ATYPICAL SENIOR CAPSTONE PROJECTS: THE PROCESS ISTHE PRODUCTC. Richard Helps, Brigham Young UniversityBret Swan, Brigham Young University Page 14.266.1© American Society for Engineering Education, 2009 Atypical Senior Capstone Projects: The Process is the ProductAbstractSenior capstone projects in Engineering and Technology disciplines teach students valuableskills in design, teamwork, project management and related skills. Almost always these learningobjectives are achieved through student teams building a working prototype or simulation of aproduct or system. However there are other ways that students can exercise their technical designskills
2006-1323: HANDS-ON PROJECTS IN WIRELESS AND MOBILE COMPUTERNETWORK COURSESXiannong Meng, Bucknell University XIANNONG MENG is an Associate Professor in the Department of Computer Science at Bucknell University in Lewisburg, Pennsylvania, U.S.A. His research interests include distributed computing, data mining, intelligent Web search, operating systems, and computer networks. He received his Ph.D. in Computer Science from Worcester Polytechnic Institute in Worcester, Massachusetts, U.S.A.Luiz Perrone, Bucknell University LUIZ FELIPE PERRONE is Assistant Professor of Computer Science, at Bucknell University. He has been developing an elective in Computer Security since the spring of 2003
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION ANDDEFENSE SIMULATIONYu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological University. His research interests include network protocols, distributed systems and cyber security. He received his Ph.D. in Computer Science from University of Colorado in 2005. He is a memeber of IEEE and ACM.Guy Hembroff, Michigan Technological University Mr. Guy Hembroff is an Assistant Professor within Michigan Tech University's School of Technology Department. His research interests are within the areas of cyber security, network protocols, encryption methods, health-care
AC 2009-1705: EMBEDDED SYSTEMS CAPSTONE PROJECTS IN THECOMPUTER ENGINEERING AREA OF SPECIALIZATION WITHIN THECOMPUTER SCIENCE DEPARTMENTAfsaneh Minaie, Utah Valley UniversityReza Sanati-Mehrizy, Utah Valley University Page 14.527.1© American Society for Engineering Education, 2009 Embedded Systems Capstone Projects in the Computer Engineering Area of specialization within the Computer Science DepartmentAbstractThe purpose of a capstone design project is to provide graduating senior students the opportunityto demonstrate understanding of the concepts they have learned during the course of theirstudies. In order to provide our students
collection in the field andsubsequent graphing and analysis are important skills for students in many different scientificdisciplines. This paper presents a project currently underway by computer science andenvironmental science faculty at the California State University, Chico to address these needs. Amulti-tier system is being developed to serve as a repository for data collected in the field byenvironmental science students, facilitate graphing and analysis of data, and provide a platformfor interdisciplinary teams of students to collaborate on both software development and dataanalysis tasks.IntroductionIn 2005, Microsoft Research Cambridge brought together an international panel of scientists forthe Towards 2020 Science workshop.1 Their goal
Engineering Education, 2008 Open Source Software to Support Student Teams: Challenges, Lessons, and OpportunitiesAbstractTeam projects have a long history in education, with an extensive literature. Appropriate toolsand procedures can support team projects, and open source software tools present specificopportunities and challenges. Open source software (OSS) generally refers to software that isdistributed without charge and with the original source code, so that anyone can fix defects, addenhancements, or otherwise modify the software and share their changes with others. Thus, OSScan be freely installed on any number of computers, and modified by faculty and students withappropriate knowledge, but it may include
paper, we present the reactions of the students whoparticipated in this process.2. Teams of TwoAs part of a junior level computer science database theory class (CS 3520) students wereorganize into teams of two. Each team selected a project from a list of projects providedby the instructor (see Figure 1). Team 1: Employee Database Team 2. Bank Database Team 3. University Database Page 14.1090.2 Team 4. Patient Database Team 5. Recipe Database Figure 1. Projects SelectedFor the first phase of the project
, interface design, human computer interaction, ethics, and graduate life. For theremaining time, students conduct interdisciplinary research projects in groups of three. Eachgroup is mentored by graduate students in the Human Computer Interaction Graduate Programunder the supervision of HCI faculty. The five research projects are presented at an end-of-thesummer campus-wide research symposium in the form of posters, demos, and a five-pageresearch paper. This REU Site benefits from strong institutional support and mechanisms forrecruitment, mentoring and long-term retention that are particularly effective at targetingunderrepresented groups in science and engineering.This analysis offers the reader key insights into building an REU experience that
limited space, equipment, and high-end computing resources. Weare using the laboratory for two hands-on courses and four research projects, and have found thatthe flexible and reconfigurable concepts we have embedded into the design of the laboratoryhave already proven their worth. In this paper, we describe our efforts in developing this lab, thechallenges we face, specific goals and objectives, and specific outcomes we have alreadyobserved in the process of developing and utilizing this lab. The results presented in this paperwill be useful and interesting to groups seeking to develop curriculum and research programs inhigh performance computing and cyberinfrastructure.1.0 IntroductionThe department of Computer and Information Technology in
principles for this project. Two examples of successful subject repositoriesinclude the arXiv and E-Lis. The arXiv < http://arXiv.org >, a physics repository partially fundedby the National Science Foundation, resides at Cornell University and is one of the largest in theworld. Its main focus is physics but it also covers other related subjects. E-Lis is a repository for documents, published or unpublished, onlibrarianship, information science and technology. It is housed at CILEA, ConsorzioInteruniversitario Lombardo per l'Elaborazione Automatica, Italy. E-Lis is run by a multinationalgroup of volunteers. Page 14.205.2IRETE will be a
for transportation of laboratoryequipment, reduce the cost of software licensing, and provide flexible scheduling for studentlaboratory exercises.The overall project involves four major components: remotely controllable lab equipment,information transfer over the networks, student knowledge assessment tools, and a relationaldatabase and user interface design. Our paper focuses on the design and educational values of arelational database and user interface.IntroductionThrough the use of teleconferencing, a relational database and user interface can be used to linktwo or more sites together for instruction [3]. For operations such as distance learning, arelational database and user interface is critical for effective communication
course offered at theauthor’s academic institution. They do not cover the complete set of views of abstraction. Thenewly emerging DB applications dealing with Web-oriented queries and multimedia queries(audiovisual queries, special queries, XML queries, queries performed in mobile environment,and others considered in1, 7, 8, 9, 11, 13) have been considered in the next DB-oriented course,Database Systems Development and Applications. Similar issues have been researched in theReadings and Projects in Computer Science and Information Systems course, and in the out-of-class student seminar on Information Systems, organized by the author.In the introductory DB course, students should be able to easily switch from one to another typeof the expression
arearriving to school already familiar with communication technologies. A recent Pew Internet andAmerican Life Project study found that in 2004, 62% of the internet users between the ages ofeighteen and twenty-seven had used IM4. This number will only continue to rise as thetechnology becomes more and more popular.A trend towards the use of IM over face-to-face meetings is already taking place in the businessworld. In addition to personal use, 10% of the IM users in 2004 were business people5 and theRadicati Group predicted half the IM users to be business users by 20064. The use of IM in thebusiness world leads one to believe that students should be exposed to IM as a tool for groupcollaboration. However, inclusion of IM as a tool for group
AC 2008-2331: NOVEL TECHNOLOGY FOR ELECTRONICS INSTRUCTION –AN ELECTRONICS STUDIOArunachala Nadar Mada Kannan, Arizona State University Research focus is in the field of Alternative Energy Technologies, more specifically in fuel cells. Developed a brand new undergraduate course on Electronics projects and has been using the e-Studio as an effective teaching tool.Barbara Rempel, Arizona State University, Polytechnic campus An Edicator in the field of Electronics Engineering Technology for the past 17 years. Cureently involved in creating electronics embedded systems concentration for the undergraduate degree program. Her expertise involves, design and development of electronic circuits FPGA systems
Copyright © 2009, American Society for Engineering EducationDatabase Engineering Requirements (42 Credit Hours)All students graduating in database area of specialization must complete 42 credit hours whichconsist of 27 credit hours core and 15 credit hours electives:Database Engineering Core Courses: 1. CS 2450, Software Engineering (3.0 CR) Presents concepts, methodology and best-practices necessary to develop large scale software projects. Includes step-wise software requirements analysis, design, implementation, testing and release. Discusses software generation, reuse, scheduling, verification, and maintenance. Emphasizes current “real world” industry best-practices and tools
• Establish, configure, and properly protect a remote desktop connection to the 2003 Server using terminal services • Configure File EncryptionAt the end of each lab project, the students are required to write a laboratory reportdocumenting their experiences with the software installation and configuration. Thestudents do not like having to do this activity but as IT professionals they must be able tocommunicate technical information in a non-technical way. By providing them with theexperience of writing lab reports they get some exposure of having to write technicalreports. Many students take the course during their second semester sophomore year orsometime during their junior year and many students have come back and informed thefaculty
source tools also provide students with an opportunity to demonstrate critical thinkingskills. For example, in one class project, students analyze a particular security issue, define aspecific problem, survey the available tools, and select an appropriate security tool. The projectincludes both a conceptual problem/solution analysis and a hands-on class demonstration. Ineach of their courses, our students develop and utilize these skills in a structured project thatutilizes open source software and Live CDs.Future WorkFuture activities may include group projects with the goal of creating custom enterprise securitytoolkits. These toolkits will likely contain a diverse collection of Open Source Tools. Anothertype of group project would be for each
pin Socket HeaderAnalog Port – 20 pin Socket HeaderCAN PORT – CAN 0 I/O with 1M Baud TransceiverLCD Module and Keypad PortsEasy Power Connection and Tap points’Back Ground Debug (BDM) Port – 6 Pin standardPower Specifications: 7 to 25VDC input to 5V Power SupplyOperating Power: 60ma @ 5V Page 15.222.6Data Flow Diagrams:This project has at least three processes. The first process is for reading the tag and sendinginformation to the database. The second process is when the tag is located at one of the threereaders. The third process is a GUI allowing a passenger to search his name or tag (Figure 2). Begin
from it. There is no doubt that it is a great idea toteach a data mining course in computer science curriculum. As you can tell, students taking adata mining course need to have background in quite a few areas to be successful. Not everystudent taking this course may have the background required in all these areas. The question ishow can an instructor remedy the challenge of teaching a group of students with widely-rangingbackgrounds, and at what level should this course be taught. Furthermore, the issue of groupwork arises, specifically as to whether data mining course projects should be accomplishedindividually or as teams.Studies show that many universities are teaching data mining course(s) within their computersscience curriculum. Each
, they had to install many programs (Winpcap, SSH, Nmap, Wireshark and VMware Server or VMware Player etc.) on the host machine. These programs did not behave the same way across different platforms and caused maintenance issues. • Students depended on broadband Internet connections to download source codes, RPMs and other files for the labs. The labs were hindered if the Internet connections were unstable or unavailable.2. Virtual Lab Design and ImplementationTo solve the problems discussed above, we tested laboratory topologies using two virtualmachines in selected projects in undergraduate Intrusion Detection Technologies Lab in fall of2007. The addition of a virtual machine demanded more memory and more free hard
– This manufacturing automation course investigates, primarily through lectures and class projects, specific uses of RFID technology in automation systems. Specific topic areas like CIM, automated material handling, vulnerability of automated systems, and even robotics are used to introduce critical technological challenges that students will face in a real-world environment. 3. ISAT 433 – This is a project-based course and makes it easy to focus students’ attention in researching technological issues in specific industries. It requires regular technical presentations throughout the semester by student teams and a comprehensive project paper and presentation at the end of the term. Students thus learn
ofbiometric identification and provides a comparatively inexpensive and unobtrusive method ofhardening the normal login and password process. This Project aims at investigating the validityof using typing dynamics to strengthen security in a computer system. A Keystroke DynamicsAnalysis tool is developed that uses statistical analysis of a user’s typing patterns to performidentity verification.IntroductionThe increasing need for securing access to computer systems and networks from intruders isgrowing rapidly as the type of data and capabilities of these systems is becoming significantlysensitive. To provide access to these systems while preventing illegitimate access is the keyrequirement of modern day computing. Since biometric systems do not
ofspecialty: • CNS 4380 Adv/High-performance Computer Architecture • EENG 4890 Senior Design Project • EENG 2750 Circuit Theory • EENG 2740 Digital Design I • EENG 3740 Digital Design II • EENG 3750 Engineering Analysis • EENG 3770 Signals & Systems • EENG 2730 Introduction to Embedded Systems Page 12.597.4 • EENG 3730 Embedded System Design • EENG 4750 Digital Signal Processing • EENG 4730 Advanced Embedded Systems DesignEmbedded Systems Engineering students must take a minimum of 3 credits from the following: • EENG 4760 Semiconductor Devices
, the students are aided in efforts to integrate new knowledge with existing knowledgeand experience. They are expected to build on prior knowledge to solve a sequential series ofproblems involved in designing, building, and operating a commodity-component-based high-performance computing cluster utilizing resources in the lab that mirror the types of resourcesavailable to them in the real world. The courses involve at least one project in which studentsare presented with a problem within the context of a competition to achieve the best possibleperformance. This approach includes components of Problem Based Learning (PBL), whichchallenge students to apply their knowledge and skills as individuals and as a community tosolve a difficult
(EEES)project consists of four content subprograms22: 1. “A program to provide formative assessments in the key courses with follow-on ‘bootstrapping’ tutorials. 2. A supplemental instruction program which is called the PAL (Peer-Assisted Learning) subproject. 3. A program to directly engage engineering faculty with early engineering students. 4. A program to develop and exploit course material from one key course in another.”22Over the last three years they have initiated an aggressive recruitment program that has beensuccessful in recruiting more students to their program. A review of their enrollment andgraduation statistics over the last decade indicates that their most vulnerable period of loss is
Pathology in Washington, D.C. She has a Master's degree in Technology from Purdue University, and her research interests are in data privacy and software security. Page 14.123.1© American Society for Engineering Education, 2009 A Survey of Embedded Database Technology for Mobile ApplicationsAbstractA recent project required us to develop a software application that runs on mobile devices ofvarious form factors. Almost all non-trivial software requires data persistence of some sort, eventhose running on small mobile devices. For very small amounts of data, a simple sequential
database applications development. His interests are in open source software deployment, programming, applications design, and project management.Tulio Sulbaran, University of Southern Mississippi Tulio Sulbaran is an Assistant Professor at the University of Southern Mississippi’s School of Construction and is the director of the Innovation for Construction and Engineering Enhancement (ICEE) center. He received his BS in Civil Engineering from the University Rafael Urdaneta in Venezuela and his Ph.D in Civil Engineering from the Georgia Institute of Technology. His research interest is on the impact of information technology resources on construction and engineering education and training
book is more complex or has a small circulationIronically it is worth noting that all modern books are typeset in software and exist in an elec-tronic form before they are every printed. It would actually be much easier, but less lucrative, ifthe publishers dispensed with the printing process. Page 12.1177.3New DevelopmentsThe concept of electronic publishing and distribution is not new and is destined to happen eventu-ally. Some of the issues surrounding electronic publishing are; • The number of electronic books available on the internet has blossomed. One of the ear- liest pioneers of internet publishing is Project Gutenberg