- Conference Session
- Computing and Information Technology Division Technical Session 7
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Robin K. Hill, University of Wyoming
- Tagged Divisions
-
Computing and Information Technology
assistance for understanding theories, astheir role is instrumental. Such descriptions must be carefully qualified with the warning thatethics is not actually computable; no mechanical procedure exists for making ethicaldecisions.Normative Theories as Subroutine HeadingsEthical theories sketched as function headings outlne high-level decision procedures suitable forcarrying out by a human agent, with input and output parameters (given as types). An example ofa function heading is the description of Consequentialism (“right and wrong depend onoutcomes”) as a subroutine that produces action-scores as output, given as input both anethical quandary Q and some knowledge of how the world works (to enable the computation ofoutcomes):action-scores
- Conference Session
- Computing and Information Technology Division Technical Session 5
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Mohammad Rafiq Muqri, DeVry University, Ontario, CA
- Tagged Divisions
-
Computing and Information Technology
equation is defined as the order of the highest derivative appearing in the equation and ODE can be of any order. A general form of a first-order ODE can be written in the form dy/dt + p(t)y + q(t) + s = 0 where p(t) and q(t) are functions of t. This equation can be rewritten as shown below d/dt(y) +y p(t) = - q(t) - s where s is zero. A classical integrating factor method can be used for solving this linear differential equation of first order. The integrating factor is e∫p dt . Euler Method Graphical methods produce plots of solutions to first order differential equations of the form y’ = f(x,y), where the derivative appears on the left side of the equation. If an initial condition of the form y(x0) = y0 is also specified, then the only solution
- Conference Session
- Computing and Information Technology Division Technical Session 3
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Jia Zhu, Florida International University; Leila Zahedi, Florida International University; Monique S. Ross, Florida International University
- Tagged Divisions
-
Computing and Information Technology
. Su and P. C. Lee, “Mapping knowledge structure by keyword co-occurrence: a first look at journal papers in technology foresight,” Scientometrics, vol. 85, no. 1, pp. 65–79, 2010. [5] V. Rodrigues, “How to write an effective title and abstract and choose appropriate keywords,” Editage Insights (04-11-2013), 2013. [6] Y. HaCohen-Kerner, “Automatic extraction of keywords from abstracts,” in International Conference on Knowledge-Based and Intelligent Information and Engineering Systems. Springer, 2003, pp. 843–849. [7] Y. B. Wu, Q. Li, R. S. Bot, and X. Chen, “Domain-specific keyphrase extraction,” in Proceedings of the 14th ACM international conference on Information and knowledge management, 2005, pp. 283–284. [8] K
- Conference Session
- Computing and Information Technology Division Poster Session
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Shahab Boumi, University of Central Florida; Adan Ernesto Vela, University of Central Florida
- Tagged Divisions
-
Computing and Information Technology
enrollmentstrategy have higher educational outcomes compared to students with mixed and part-timeenrollment strategies. In another study, Chen et al. [20] use HMM to categorize students based ontheir learning styles and investigate the relationship between learning style states and learningefficiency in massive open online courses (MOOCS).Hidden Markov Model, like any other Markov Models has a set of states Q = {q1 , q2 , . . . , qN }.However, in HMM, the states’ status are hidden, and the model aims to estimate the states given asequence of observations O = o1 , o2 , . . . , oT with the length of T , where each observation isdrawn from the set of M possible observations V = {v1 , v2 , . . . , vM }. Each Hidden MarkovModel has three parameters: (1) π0 , is
- Conference Session
- Computing and Information Technology Division Technical Session 1
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Elena Filatova, City University of New York; Deborah Hecht, Center for Advanced Study in Education
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
work at a college student conference.5. References[1] C. Herreid, "Case Studies in Science: A Novel Method of Science Education.," Journal of Research in Science Teaching, pp. 221-229, 1994.[2] V. Lee, "What is inquiry-guided learning?," New Directions for Teaching and Learning, 2012.[3] J. L. David, "What Research Says About Project-Based Learning," Educational Leadership, pp. 80-82, 2008.[4] R. D. De Veaux, M. Agarwal, M. Averett, B. S. Baumer, A. Bray, T. C. Bressoud, L. Bryant, L. Z. Cheng, A. Francis, R. Gould, A. Y. Kim, M. Kretchmar, Q. Lu, A. Moskol, D. Nolan, R. Pelayo, S. Raleigh , R. Sethi, M. Sondjaja, N. Tiruviluamala, P. X. Uhlig, T. M. Washington, C. L. Wesley, D. White and P. Ye, "Curriculum Guidelines for
- Conference Session
- Computing and Information Technology Division Technical Session 6
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Zhaohong Wang, California State University, Chico; Jing Guo, California State University, Chico
- Tagged Divisions
-
Computing and Information Technology
review,” Electronics, vol. 9, no. 2, p. 272, 2020.[15] M. Prakash and A. Abdrabou, “On the fidelity of ns-3 simulations of wireless multipath tcp connections,” Sensors, vol. 20, no. 24, p. 7289, 2020.[16] N. Kuse and B. Jaeger, “Network simulation with ns-3,” Network, vol. 67, 2020.[17] N. Jovanovi´c and A. Zaki´c, “Network simulation tools and spectral graph theory in teaching computer network,” Computer Applications in Engineering Education, vol. 26, no. 6, pp. 2084–2091, 2018.[18] Q. Gu, Y. Zhang, and H. Yang, “Application of “computer network teaching platform+ flipped teaching model” in online education-taking “information technology teaching method” as an example,” in International Conference on Machine Learning and Big
- Conference Session
- Computing and Information Technology Division Technical Session 5
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Paea LePendu, University of California, Riverside; Cecilia Cheung, University of California, Riverside; Mariam Salloum, University of California, Riverside; Pamela Sheffler, University of California, Riverside; Kelly Downey, University of California, Riverside
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
packed with team building andprofessional development activities. Activities include Skype and in-person alumni talks, industrysite visits and Q&A with engineers, faculty research talks, and a University career center visitwhere staff discusses the college application process, various majors in STEM, alumniconnections and inspirational stories. These features of the camp align with the dimensions ofrelatedness and autonomy in SDT.The code camp was led by a female faculty/lecturer that has extensive experience with teachinglower-level Computer Science courses at the University level. The code camp instruction teamalso included undergraduate student teacher assistants (TAs); two female TAs and one male TA,all of whom were Computer Science
- Conference Session
- Computing and Information Technology Division Technical Session 8
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology