Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Physical Sciences and Mathematics

Mapping The Organizational Relations Within Physical Security’S Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice, Richard Coole, David J. Brooks Dec 2015

Mapping The Organizational Relations Within Physical Security’S Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice, Richard Coole, David J. Brooks

David J Brooks Dr.

Security Science education at university levels is still in its infancy, with little agreement towards knowledge, curriculum and competency. Therefore, it is essential that educators draw on relevant literature highlighting means of efficient and effective knowledge transfer for tertiary students within the Security Science domain. Such knowledge transfer will reduce the gap between academic knowledge (explicit) and professional competency (tacit knowledge). This paper presents phase one of a multiphase study. A qualitative “systems based knowledge structure” of security domain categories has been conceptually mapped as a domain heuristic. The heuristic drew on research highlighting that experts have both richer depths …


Mapping The Organizational Relations Within Physical Security’S Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice, Richard Coole, David J. Brooks Dec 2015

Mapping The Organizational Relations Within Physical Security’S Body Of Knowledge: A Management Heuristic Of Sound Theory And Best Practice, Richard Coole, David J. Brooks

David J Brooks Dr.

Security Science education at university levels is still in its infancy, with little agreement towards knowledge, curriculum and competency. Therefore, it is essential that educators draw on relevant literature highlighting means of efficient and effective knowledge transfer for tertiary students within the Security Science domain. Such knowledge transfer will reduce the gap between academic knowledge (explicit) and professional competency (tacit knowledge). This paper presents phase one of a multiphase study. A qualitative “systems based knowledge structure” of security domain categories has been conceptually mapped as a domain heuristic. The heuristic drew on research highlighting that experts have both richer depths …


Introduction To Computer Science In C#, Andrew Harrington, George Thiruvathukal Aug 2015

Introduction To Computer Science In C#, Andrew Harrington, George Thiruvathukal

George K. Thiruvathukal

Drs. Harrington and Thiruvathukal created a living textbook to introduce computer science and programming principles (using the C# language from Microsoft, read C-sharp, as in music) to computer science at Loyola University Chicago (and beyond). This book is a work in progress but has been used since AY 2012 to teach COMP 170 at Loyola University Chicago.


Effects Of Visualization On Algorithm Comprehension, Matthew Mulvey Aug 2015

Effects Of Visualization On Algorithm Comprehension, Matthew Mulvey

Theses and Dissertations

Computer science students are expected to learn and apply a variety of core algorithms which are an essential part of the field. Any one of these algorithms by itself is not necessarily extremely complex, but remembering the large variety of algorithms and the differences between them is challenging. To address this challenge, we present a novel algorithm visualization tool designed to enhance students understanding of Dijkstra’s algorithm by allowing them to discover the rules of the algorithm for themselves. It is hoped that a deeper understanding of the algorithm will help students correctly select, adapt and apply the appropriate algorithm …


Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev Jul 2015

Intrusion Detection System Of Industrial Control Networks Using Network Telemetry, Stanislav Ponomarev

Doctoral Dissertations

Industrial Control Systems (ICSs) are designed, implemented, and deployed in most major spheres of production, business, and entertainment. ICSs are commonly split into two subsystems - Programmable Logic Controllers (PLCs) and Supervisory Control And Data Acquisition (SCADA) systems - to achieve high safety, allow engineers to observe states of an ICS, and perform various configuration updates. Before wide adoption of the Internet, ICSs used "air-gap" security measures, where the ICS network was isolated from other networks, including the Internet, by a physical disconnect [1]. This level of security allowed ICS protocol designers to concentrate on the availability and safety of …


Course Outcome Prediction Using An Expert System, Michael Kuehn, Jared Estad, Jeremy Straub, Eunjin Kim Apr 2015

Course Outcome Prediction Using An Expert System, Michael Kuehn, Jared Estad, Jeremy Straub, Eunjin Kim

Jeremy Straub

Determining how well a student will perform in a course based on their prior knowledge of the course material and other factors may help determine student placement and the need for remedial instruction. This poster presents work on the creation of an expert system that attempts to predict a student’s performance based on a pre-evaluation test and responses to background preparation questions. This work utilizes data from prior students to train and test the system.


Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally Apr 2015

Teaching Cybersecurity Using The Cloud, Khaled Salah, Mohammad Hammoud, Sherali Zeadally

Information Science Faculty Publications

Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines. As such, employing cloud-based laboratories can have clear advantages over using classical ones, which impose major hindrances against fulfilling pedagogical objectives and do not scale well when the number of students and distant university campuses grows up. We show how the cloud paradigm can be leveraged to teach a cybersecurity course. Specifically, we share our …


An Extensible Technology Framework For Cyber Security Education, Frank Jordan Sheen Apr 2015

An Extensible Technology Framework For Cyber Security Education, Frank Jordan Sheen

Theses and Dissertations

Cyber security education has evolved over the last decade to include new methods of teaching and technology to prepare students. Instructors in this field of study often deal with a subject matter that has rigid principles, but changing ways of applying those principles. This makes maintaining courses difficult. This case study explored the kind of teaching methods, technology, and means used to explain these concepts. This study shows that generally, cyber security courses require more time to keep up to date. It also evaluates one effort, the NxSecLab, on how it attempted to relieve the administrative issues in teaching these …


How Success In A Task Depends On The Skills Level: Two Uncertainty-Based Justifications Of A Semi-Heuristic Rasch Model, Joe Lorkowski, Olga Kosheleva, Vladik Kreinovich Mar 2015

How Success In A Task Depends On The Skills Level: Two Uncertainty-Based Justifications Of A Semi-Heuristic Rasch Model, Joe Lorkowski, Olga Kosheleva, Vladik Kreinovich

Departmental Technical Reports (CS)

The more skills a student acquires, the more successful this student is with the corresponding tasks. Empirical data shows that the success in a task grows as a logistic function of skills; this dependence is known as the Rasch model. In this paper, we provide two uncertainty-based justifications for this model: the first justification provides a simple fuzzy-based intuitive explanation for this model, while the second -- more complex one -- explains the exact quantitative behavior of the corresponding dependence.


Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan Jan 2015

Building Cloud-Based Information Systems Lab Architecture: Deriving Design Principles That Facilitate The Effective Construction And Evaluation Of A Cloud-Based Lab Environment, Thomas J. Trevethan

CCE Theses and Dissertations

The problem explored in this dissertation report was that at the time of this study, there were no design principles or methodologies based on design science research (DSR) available to use for artifact construction, implementation, and effective evaluation of cloud-based networking lab environments that can be used to foster hands-on technology skills in students. Primarily based on Hevner’s 7 guidelines of DSR, Peffer’s design science research methodology (DSRM), and Gregor’s IS design theory, this study forms the groundwork for the development of procedures and specifications derived from DSR literature to facilitate the construction, implementation, and evaluation of a comprehensive cloud-based …


Interpretative Phenomenological Analysis Of Accessibility Awareness Among Faculty In Online Learning Environments, Rachael Sessler Trinkowsky Jan 2015

Interpretative Phenomenological Analysis Of Accessibility Awareness Among Faculty In Online Learning Environments, Rachael Sessler Trinkowsky

CCE Theses and Dissertations

Although all organizations and institutions should consider accessibility when developing online content, inaccessibility is a recurring issue in recent literature pertaining to online learning environments (OLEs) and faculty accessibility awareness. The goal was to describe how online faculty gain knowledge regarding accessibility, to explore the lived experiences of online faculty who have worked with students who have disabilities, and to gain a better understanding of how faculty experience the process of accessibility implementation. The following research questions guided this study: How do faculty in OLEs experience encounters regarding accessibility for students who have print related disabilities? How do faculty in …


An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns Jan 2015

An Application Of The Autism Management Platform To Tracking Student Progress In The Special Education Environment, Ryan Thomas Burns

Computational and Data Sciences Theses

In the age of online courses and digital textbooks, several areas of academia, such as special education, are far behind in the technological revolution. Some teachers use long unstructured digital documents, while others maintain large physical files for students containing every piece of information or coursework they have ever received. Could these extremely unstructured approaches to data collection and aggregation be streamlined with a software platform built specifically for this purpose? Could this platform also be built to accommodate multiple integrations and practical new features? Most importantly, in terms of usability, would this software be enjoyable to use? The Autism …


A Thread Safe Graphics Library For Visualizing Parallelism, Joel C. Adams, Patrick A. Crain, Mark B. Van Der Stel Jan 2015

A Thread Safe Graphics Library For Visualizing Parallelism, Joel C. Adams, Patrick A. Crain, Mark B. Van Der Stel

University Faculty Publications and Creative Works

Multicore processors are now the standard CPU architecture, and multithreaded parallel programs are needed to take full advantage of such CPUs. New tools are needed to help students learn how to design and build such parallel programs. In this paper, we present the thread-safe graphics library (TSGL), a new C++11 library that allows different threads to draw to a shared Canvas, which is updated in approximate real-time. Using TSGL, instructors and students can create visualizations that illustrate multithreaded behavior. We present three multithreaded applications that illustrate the use of TSGL to help students see and understand how an application is …