Paper ID #33301Positive Impact of an S-STEM Scholarship Program on Computer ScienceStudents’ Academic Performance and Retention RateDr. Zhijiang Dong, Middle Tennessee State University Dr. Zhijiang Dong is a Professor in the Department of Computer Science at Middle Tennessee State University. His research areas are in the fields of formal methods, system verification and validation, and computer science education. He received his BS in Mathematics from Huazhong University of Science and Technology at China, and his PhD in Computer Science from Florida International University.Dr. Joshua Lee Phillips, Middle Tennessee State
Paper ID #32306Cracks in the Foundation: Issues with Diversity and the Hiring Processin Computing FieldsStephanie J. Lunn, Florida International University Stephanie Lunn is presently a Ph.D. candidate in the School of Computing and Information Sciences at Florida International University (FIU). Her research interests span the fields of Computing and Engineer- ing Education, Human Computer Interaction, Data Science, and Machine Learning. Previously, Stephanie received her B.S. and M.S. degrees in Neuroscience from the University of Miami, in addition to B.S. and M.S. degrees in Computer Science from FIU.Dr. Monique S
International University (FIU). Her research interests span the fields of educa- tional data mining, machine learning optimization, and data science. Leila also received an M.S. degree in Management of Advanced Information Systems, in addition to her B.S. and M.S. degrees in Computer Science.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and
founding chair of the Student Division, a Program Chair and a Director for the Educational Research and Methods Division, and the General Chair of the First-Year Division’s First-Year Engineering Experience Conference.Prof. Richard S. Stansbury, Embry-Riddle Aeronautical University Dr. Richard S. Stansbury is an associate professor of computer engineering and computer science at Embry-Riddle Aeronautical University in Daytona Beach, FL. His research interests include unmanned aircraft integration, machine learning, and aviation big data analytics. He is the ERAU lead for the FAA Center of Excellence for Unmanned Aircraft Systems, ASSURE.Dr. Mustafa Ilhan Akbas, Embry-Riddle Aeronautical University M. Ilhan Akbas is an
from FIU.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women (specifically Black and His- panic women) in computer-related engineering fields.Prof. Zahra Hazari, Florida International University Zahra Hazari is an Associate Professor
explore a new non-comparison sort. The linear transform sort uses alinear transformation to generate new keys between 0 and n and uses those keys to sort the datausing a recursive bucket sort. The idea of using new computed keys is adapted from theSchwartzian Transform [4], where a sorting key is extracted from other extraneous data all atonce instead of repeatedly during runtime. This sort is a proof of concept that transformation can adapt the input of non-comparisonsorts to increase speed of sorting. We will outline the linear transform sort algorithm, inductivelyprove its functionality, outline best and worst cases, present test data, and propose improvementsfor further research.Algorithmlinear transform sort(S)Input: a list of
underrepresentedgroups, particularly for women, Black students, and Hispanic students.AcknowledgementsThe authors would like to thank the instructors of these courses for their cooperation and supportof this study. We would also like to thank the 41 teaching assistants and section leaders whohelped distribute materials and did all the video showings. Lastly, we would like to thank thestudents who were enrolled in the course and participated in the study. There were many richdiscussions about the topics in these videos that cannot be captured by data or summarized in apaper.ReferencesBeilock, S. L. (2008). Math performance in stressful situations. Current directions in psychological science, 17(5), 339-343.Beilock, S. L., & Willingham, D. T. (2014
Center for Science and Engineering Statistics, “Women, minorities, and persons with disabilities in science and engineering: 2019,” https://ncses.nsf.gov/pubs/nsf19304/data, 2019, accessed: 2021-5-24. [4] H. S. Al-Khalifa, H. R. Faisal, and G. N. Al-Gumaei, “Teaching mobile application development in 20 hours for high school girls: A web-based approach,” in 2019 IEEE Global Engineering Education Conference (EDUCON), 2019, pp. 16–21. [5] Y. Chen, Z. Chen, S. Gumidyala, A. Koures, S. Lee, J. Msekela, H. Remash, N. Schoenle, S. Dahlby Albright, and S. A. Rebelsky, “A middle-school code camp emphasizing digital humanities,” in Proceedings of the 50th ACM Technical Symposium on Computer Science Education, ser. SIGCSE ’19. New York
equation is defined as the order of the highest derivative appearing in the equation and ODE can be of any order. A general form of a first-order ODE can be written in the form dy/dt + p(t)y + q(t) + s = 0 where p(t) and q(t) are functions of t. This equation can be rewritten as shown below d/dt(y) +y p(t) = - q(t) - s where s is zero. A classical integrating factor method can be used for solving this linear differential equation of first order. The integrating factor is e∫p dt . Euler Method Graphical methods produce plots of solutions to first order differential equations of the form y’ = f(x,y), where the derivative appears on the left side of the equation. If an initial condition of the form y(x0) = y0 is also specified, then the only solution
[4] C. Latulipe, A. Rorrer, and B. Long, “Longitudinal data on flipped class effects on performance in cs1 and retention after cs1,” in Proceedings of the 49th ACM Technical Symposium on Computer Science Education, ser. SIGCSE ’18. New York, NY, USA: Association for Computing Machinery, 2018, p. 411–416. [Online]. Available: https://doi.org/10.1145/3159450.3159518 [5] L. Deslauriers, L. S. McCarty, K. Miller, K. Callaghan, and G. Kestin, “Measuring actual learning versus feeling of learning in response to being actively engaged in the classroom,” Proceedings of the National Academy of Sciences, vol. 116, no. 39, pp. 19 251–19 257, 2019. [Online]. Available: https://www.pnas.org/content/116/39/19251 [6] D. Gross, E
as a scholar, dedicated to their course of study, hasbeen in decline since the 1960’s [1], [2]. A Bachelor’s degree was a means of academicintegration and status [3], facilitated by conventional lecture where an expert addresses thestudents using authoritative lecture style [4]. In this paradigm, students benefit from the student-mentor relationship having prepared for the interaction with intensive study. This has beenshown to be less beneficial to non-traditional students [5]. Non-traditional students come frompopulations such as community college transfer students or people who work temporary jobs thatare unrelated to their course of study [6]–[8]. Heavy workloads—greater than part-time workobligations—hamper their ability to do well
computing. She is currently involved with an NSF-funded S-STEM project that awards scholarships to students studying computing at USF. The project implements a suite of community- building activities designed to improve scholars’ self-efficacy and develop computing identity. Sami also co-directed a project that developed system support and user-driven strategies for improving energy effi- ciency in residential buildings. Sami has served in a number of service roles at USF and in her professional community. She was chair of the Computer Science department at USF from 2013-2016. She also served on the editorial board of Sigmobile’s GetMobile Magazine from 2014-2018. She has been involved with the discipline-specific
Kokomo 2300 S. Washington St., Kokomo, IN, 46902 Abstract IntroductionThe arrival of the Internet of Things (IoT) into our The growth of the Internet, in the past decade, hasdaily lives in various forms such as home appliances enabled exponential growth of over 26.66 billionand wearable devices has dominated Internet usage. connected devices in 2019, approximately a 57.81%This dominant behavior left network practitioners increase compared to 2015 [1]. This number iswith many questions to be answered related to IoT expected to grow significantly in the coming years
implies both a temporal dimension, in which organizations are improving all thetime, and a spatial dimension, in which organizations are improving all of their departments,units or divisions. In order to accomplish CI, Deming proposes utilizing the Plan-Do-Check-Act(PDCA) cycle for improvement at any stage [2]. PDCA is a 4-step cycle that repeatscontinuously through which organizations create a plan, execute it, review the results, and finallymake any corrective action before starting again.While Deming’s work was mainly directed towards business, academia took notice. The terms“Continuous Improvement” and “Total Quality Management” started to show up in highereducation research papers by the late 1980’s and early 1990’s [3]. CI then found its
$400K to ransomware hackers, 2019. Retrieved from: https://statescoop.com/georgia-county-paid-400k-to-ransomware-hackers/3. D. Kobialka, Regis University Cyberattack: What You Need to Know, 2019. Retrieved from: https://www.msspalert.com/cybersecurity-breaches-and-attacks/regis-university-cyberattack-what-you-need-to- know/4. Symantec, 10 cybersecurity facts and statistics for 2018, 2018. Retrieved from: https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that- you-should-know.html5. T. S. Chou, “Multi-Learning Techniques for Enhancing Student Engagement in Cyber Security Education,” American Society for Engineering Education (ASEE) Annual Conference and
B6 1/42 B8 -1/30 B10 5/66 B12 -691/2730 B14 7/6 etc.To illustrate the usefulness of his formula, Bernoulli computed the value of s 10(1000) with littleeffort in less than “half a quarter of an hour” [Smith]. He computed s10(1000) = 91409924241424243424241924242500To achieve this end, he needed to find B0 up to B10. One can observe that the Bernoullinumbers were at one time of great value because they shortened calculations of severalmathematical functions when lengthy computations were done by
their constructive comments that helped us improve the paper.References [1] R. L. S. De Oliveira, C. M. Schweitzer, A. A. Shinoda, and L. R. Prete, “Using mininet for emulation and prototyping software-defined networks,” in 2014 IEEE Colombian Conference on Communications and Computing (COLCOM). IEEE, 2014, pp. 1–6. [2] R. R. Fontes, S. Afzal, S. H. Brito, M. A. Santos, and C. E. Rothenberg, “Mininet-wifi: Emulating software-defined wireless networks,” in 2015 11th International Conference on Network and Service Management (CNSM). IEEE, 2015, pp. 384–389. [3] R. Ruslan, M. F. M. Fuzi, N. Ghazali et al., “Scalability analysis in mininet on software defined network using onos,” in 2020 Emerging Technology in Computing
release at the endof the year, Single Sign-On (SSO) configuration was not yet complete primarily due to logisticaldifficulties between IT teams. The team decided to use the old site for one final semester tocomplete more in-depth testing and help ensure a smooth transition. SSO is a critical productionfeature because it enables students to log into these applications using their Georgia Tech logincredentials, providing seamless accessibility.Spring 2020’s focus was EM development (9) and preparing IDCD for release. SSO was set upand the beta IDCD app was released on the production tenant for the Summer 2020 capstonedesign students (10). Typically, only about 60 students participate in capstone design’s ME andInterdisciplinary summer offerings as
- stories-from-25-entrepreneurial-founders/ Microsoft Alumni Startup Stories https://www.microsoftalumni.com/s/1769/19/interior. aspx?pgid=1969&gid=2&cid=8024 Table 2. Lean Launchpad Video Links Material URL Planning Customer Discovery – Part 1 https://vimeo.com/groups/204136/videos/75308828 Planning Customer Discovery – Part 2 http://vimeo.com/groups/204136/videos/75184102 Planning Customer Discovery – Part 3 http://vimeo.com/groups/204136/videos/75603393 Interviews – Part 1 http://vimeo.com/groups/204136/videos/75535337 Interviews – Part 2 http://vimeo.com/groups/204136/videos/76172223 Interviews
be close to initial expectations and the game was able to be played at a distancesuitable for a fun experience. This project was a success and student commented “I made anembedded systems laser tag system for my senior design project. I was able to apply what Ilearned in my engineering courses to achieve my design goals. I was able to combine suchsubjects as digital design, embedded systems, electronic systems, digital signals processing, andphysics. I also honed practical skills like soldering, putting together breadboards andprogramming in C. My professor helped me maintain a disciplined schedule to make sure Istarted early on prototypes so my final design would meet my goals”.This project was funded by NSF S-STEM Scholarship program at
/ap_21_cyber_security-fy2019.pdf4. Formal Education, The National Initiative For Cybersecurity Careers and Studies (NICCS). Retrieved from: https://niccs.us-cert.gov/formal-education#5. W. Hotalen and T. S. Chou, “A Multiplayer Peer-to-Peer Cyber Attack and Defense Infrastructure,” American Society for Engineering Education (ASEE) Annual Conference and Exposition, Salt Lake City, Utah, June 2018.6. T. S. Chou, “Labs and Three-Stage Learning Process for a Cyber Security Learning System,” International Conference on Engineering, Science and Technology (IConEST), Denver, CO, October 2019.7. N. Hempenius, Te-Shun Chou, and Lee Toderick, “Automatic Collection of Scoring Metrics in Competitive Cybersecurity Lab Environments,” The Conference
. Evans and F. Reeder, A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters. Washington, DC: Center for Strategic & International Studies, 2010.[2] Cyber Seek, “Cybersecurity Supply/Demand Heat Map,” Cyber Seek Website, 2019. https://www.cyberseek.org/heatmap.html (accessed Feb. 03, 2019).[3] D. Dasgupta, D. M. Ferebee, and Z. Michalewicz, “Applying Puzzle-Based Learning to Cyber-Security Education,” in Proceedings of the 2013 on InfoSecCD ’13 Information Security Curriculum Development Conference - InfoSecCD ’13, 2013, pp. 20–26, doi: 10.1145/2528908.2528910.[4] R. S. Cheung, J. P. Cohen, H. Z. Lo, and F. Elia, “Challenge Based Learning in Cybersecurity Education,” 2011, Accessed: Sep. 23
): 1447-1451[12] Yeager, David S., Carissa Romero, Dave Paunesku, Christopher S. Hulleman, Barbara Schneider, Cintia Hinojosa, Hae Yeon Lee et al. "Using design thinking to improve psychological interventions: The case of the growth mindset during the transition to high school." Journal of educational psychology 108, no. 3 (2016): 374.[13] Brady, Shannon T., Geoffrey L. Cohen, Shoshana N. Jarvis, and Gregory M. Walton. "A brief social-belonging intervention in college improves adult outcomes for black Americans." Science Advances 6, no. 18 (2020): eaay3689.[14] Silva, Mariana, Matthew West, and Craig Zilles. "Measuring the Score Advantage on Asynchronous Exams in an Undergraduate CS Course." Proceedings of the 51st ACM
students (S-STEM), Researcher Practitioner Partnership (RPP), IUSE, and EAGER.Alexandria Benedict, University of North Carolina at Charlotte Alexandria Benedict is a graduate student at the University of North Carolina at Charlotte pursuing her Master’s in Computer Science. She is a research assistant under the RPP STEM Ecosystem Project which helps study the effects of computational thinking inside classrooms.Audrey RorrerDr. David K. Pugalee, University of North Carolina at Charlotte Dr. David Pugalee is a full professor, and Director of the Center for Science, Technology, Engineering, and Mathematics Education (STEM) at UNC Charlotte. The recipient of millions of dollars in grant- funding, Dr. Pugalee has also
work at a college student conference.5. References[1] C. Herreid, "Case Studies in Science: A Novel Method of Science Education.," Journal of Research in Science Teaching, pp. 221-229, 1994.[2] V. Lee, "What is inquiry-guided learning?," New Directions for Teaching and Learning, 2012.[3] J. L. David, "What Research Says About Project-Based Learning," Educational Leadership, pp. 80-82, 2008.[4] R. D. De Veaux, M. Agarwal, M. Averett, B. S. Baumer, A. Bray, T. C. Bressoud, L. Bryant, L. Z. Cheng, A. Francis, R. Gould, A. Y. Kim, M. Kretchmar, Q. Lu, A. Moskol, D. Nolan, R. Pelayo, S. Raleigh , R. Sethi, M. Sondjaja, N. Tiruviluamala, P. X. Uhlig, T. M. Washington, C. L. Wesley, D. White and P. Ye, "Curriculum Guidelines for
Pedagogy,vol. 3, no. 1, pp. 86–106.[4] Coffman-Wolph, S., & Gray, K. (2020, June), Work in Progress: Student-generated Materialfor Artificial Intelligence Course Paper presented at 2020 ASEE Virtual Annual ConferenceContent Access, Virtual Online. 10.18260/1-2—35685[5] Miller, H. (2007). Designing effective writing assignments. Teaching with writing.University of Minnesota Center for Writing. Retrieved Mar. 8, 2021, fromhttp://writing.umn.edu/tww/assignments/designing.html[6] Coffman-Wolph, S., “Online/Hybrid/Flipped EM Learning in a Programming 1 Course andBeyond (2021 KNC Session).” Engineering Unleashed,https://engineeringunleashed.com/card/2403.
Recruitment Tools” in 2019 CoNECD - The Collaborative Network for Engineering and Computing Diversity , Crystal City, Virginia. https://peer.asee.org/31798[7] V. White, S. Lee, L. Lineberry, J. Ivy, C. Grimes, “Illuminating the Computing Pathway for Women in Mississippi”, in 2018 ASEE Annual Conference & Exposition , Salt Lake City, Utah. 10.18260/1-2--30596[8] K. Davis, S. Hardin, “Making STEM Fun: How to Organize a STEM Camp”, Teaching Exceptional Children, Vol. 45, No. 4, pp. 60-76, 2013.[9] http://www.alice.org/[10] https://cyber.org/[11] National Association of Colleges and Employers; “Career Readiness Defined”, https://www.naceweb.org/career-readiness/competencies/career-readiness-defined/[12] http
specialization areas.Database Engineering is a viable component of Software Engineering. In our UndergraduateComputer Science Degree, there is only one database course where Relational, ObjectRelational, Object-Oriented and Distributed Databases will be covered. Since the mission of thisUniversity is to graduate students with high quality education prepared for the competitive jobmarket, as part of this course work, students work on a set of assignments and implementone/two database(s) of their choice in teams. The contents represented in this paper is anexample of an assignment that student need to do in this course.Entity Relationship for University DatabaseThe following diagram (Figure 1) represents a simplified entity relationship for course
://www.datasciencedegreeprograms.net/rankings/affordable-bachelors/ • https://blog.collegevine.com/the-list-of-all-u-s-colleges-with-a-data-science-major/ • https://www.usnews.com/best-colleges/rankings/computer-science/data-analytics- science3.3 Datasets A total of 171 undergraduate Data Science programs were initially crawled, but only 136programs were evaluated for this study. 35 undergraduate programs were omitted from theanalysis due to the following: • no data science courses were evident in the list of core requirements for the program • only a graduate degree was offered • only a Data Science minor was offered. No Data Science major was offered. Each institution’s course offering as listed on the institution’s website, department
andSystem Implementation in Section 5. Discussion and conclusion are given in Section 6. 2. Related WorksFor many institutes, a student self-server or student information system or SIS, typicallyencounters bugs and glitches due to poor configuration as well as an increasing number ofstudents. With a vase amount of data, a student information system can experience systemoutages which can result in the student(s) not being able to retrieve specific information in atimely manner.As SIS begins to increase throughout numerous campuses, an ongoing issue steadily arises. Thecost to successfully build, test, and implement is relatively high. For most institutes, the cost canrange from 500,000 to several million dollars. However, the main question is “Is