Paper ID #39391WIP: Skip the Lecture: A Decoding First Approach to IntroductoryComputing EducationDavid Zabner, Tufts UniversityTrevion S Henderson, Tufts University Trevion Henderson is Assistant Professor of Mechanical Engineering at Tufts University. He earned his Ph.D. in Higher Education at the University of Michigan. ©American Society for Engineering Education, 2023 (WIP) Skip the Lecture: A Decoding First Approach to Introductory Computing Education David Zabner Trevion Henderson david.zabner@tufts.edu
Blocks(i) We will utilize the code blocks editor for listening to an Arduino input pin. Next, the analogvalue or digital state will be print out in the SerialM onitor window. To open the code panel, astudent needs to click the “Code” button.(ii) Next, s/he is asked to click on the SerialM onitor which is located at the bottom of the codepanel.(iii) To run the Arduino code, s/he should click “Start Simulation”, and observe the numbers inthe Serial Monitor during the interaction with the potentiometer. As the potentiometer input valuechanges by moving the pointer on the dial, the serial output value will change accordingly. Sincethe circuit includes two independent Arduinos, students can click back and forth between the twoArduinos while the
Paper ID #36938Teaching IoT in Both Physical and Virtual EnvironmentsProf. James R. Mallory, Rochester Institute of Technology (COE)Edmund Lucas, National Technical Institute for the DeafWilliam Arnold ©American Society for Engineering Education, 2023Teaching IoT in Both Physical and Virtual EnvironmentsAuthors: Arnold, W., Fontaine, J., Griggs, S., Huff, G., Johnson, D., Linares, C., Patel, S.,Reader, J., Roman, J., Sawaqed, Y., Yadav, R., Lucas, E. & Mallory, J. National TechnicalInstitute for the Deaf / Rochester Institute of TechnologyPrimary Division: Computing and Information Technology DivisionSecondary Division: Education
Notes in Computer Science, no. 12225. Springer, 2020, pp. 3–14. [4] L. D’Antoni, D. Kini, R. Alur, S. Gulwani, M. Viswanathan, and B. Hartmann, “How can automatic feedback help students construct automata?” ACM Trans. Comput.-Hum. Interact., vol. 22, no. 2, pp. 9:1–9:24, 2015. [5] E. L. Deci, H. Eghrari, B. C. Patrick, and D. R. Leone, “Facilitating internalization: The self determination theory perspective,” Journal of Personality, vol. 62, pp. 119–142, 1994. [6] E. L. Deci and R. Ryan, “Self-determination theory,” in Handbook of Theories of Social Psychology, P. A. M. van Lange, A. W. Kruglanski, and E. T. Higgins, Eds. Sage Publications Ltd., 2012, vol. 1, ch. 20, pp. 416–436. [7] Y. Du, A. Luxton-Reilly, and P. Denny, “A
responsive teaching," Journal of teacher education, vol. 53, no. 2,pp. 106- 116, 2002.[02]R. T. White and R. F. Gunstone, "Metalearning and conceptual change," International Journal ofScience Education, vol. 11, no. 5, pp. 577-586, 1989.[03]D. Kuhn and S. Pearsall, "Developmental origins of scientific thinking," Journal of cognition andDevelopment, vol. 1, no. 1, pp. 113-129, 2000.[04]T. Litzinger, L. R. Lattuca, R. Hadgraft and W. Newstetter, "Engineering education and thedevelopment of expertise," Journal of Engineering Education, vol. 100, no. 1, pp. 123-150, 2011.[05]J. R. Frederiksen, M. Sipusic, M. Sherin and E. W. Wolfe, " Video portfolio assessment: Creating aframework for viewing the functions of teaching.," Educational Assessment, vol. 5
Affecting the Future Career Pathway Decisions of Lower-income Computing Students1. IntroductionWithin research on broadening participation in computing, the experience and perspectives ofundergraduate students have been important elements of exploration. As undergraduate studentsare experts of their own experience, conducting research that focuses on understanding theirperspective can help those who organize programmatic efforts to respond to student needs andconcerns. This paper emerges from the context of a specific National Science Foundation (NSF)-funded Scholarships in Science, Technology, Engineering, and Mathematics (S-STEM) program.As with all S-STEM programs, Florida Information Technology Graduation
CIT21400 course. In this study, we integrated the microlearning instructional approach into CIT 21400to help engage students and retain the knowledge gained through the introduction to datamanagement course. CIT 21400 is a required class for all CIT students and a prerequisite for allother courses in the data-management concentration. Figure 1 shows the current plan of study forthe CIT data-management concentration; we draw particular attention to CIT 21400’s position asa prerequisite course for all data-management courses. Approximately 140 students who enroll inCIT 21400 will directly benefit per academic year. We anticipate seeing learning and performancegains over time as students continue in their programs as an outcome of our research
indrawing our conclusion. Nevertheless, this work has an added value as a basis for us toconduct more extensive research in the future. Additionally, academics will have a wideropportunity to explore deep learning to produce more novel educational solutions since ourstudy discovered that only a small number of studies had investigated the application of thisAI technology.References[1] M. King, R. Cave, M. Foden, and M. Stent, “Personalised education From curriculum to career with cognitive systems,” 2016.[2] T. J. Sejnowski, The deep learning revolution. Cambridge: The MIT Press, 2018.[3] J. S. Groff, “Personalized learning: The state of the field & future directions,” 2017. [E-book]. Available: https://dam
253 600Students were asked to self-report their GPA. GPA was based on a scale of 4, with an “A” being a4.00, a “B” being a 3.00, a “C” being a 2.00, a “D” being a 1.00, and an “S” being a 0.00. Someclasses also used a “+” or “–” system. A “+” adds 0.33 to the base grade, while a “-” subtracts0.33. For example, a “B+” would quantitatively be a 3.33 (3.00 + 0.33), while a “B-” would be a2.77 (3.00 - 0.33).Data was gathered on students’ expected majors. Out of a total of 600 students, 311 (51.8%) weremechanical and/or aerospace engineering students, 114 (19.0%) were civil and/or environmentalengineering students, 102 (17.0%) were biomedical engineering students and 73 (12.2%) studentshad other majors. This data can be seen in Figure 2
Review of Centrality Measures in Social Networks,” Business & Information Systems Engineering, vol. 2, no. 6, pp. 371–385, Dec. 2010, doi: 10.1007/s12599-010-0127-3.[10] K. Das, S. Samanta, and M. Pal, “Study on centrality measures in social networks: a survey,” Social Network Analysis and Mining, vol. 8, no. 1, p. 13, Feb. 2018, doi: 10.1007/s13278-018-0493-2.[11] R. J. Abdill and R. Blekhman, “Tracking the popularity and outcomes of all bioRxiv preprints,” Elife, vol. 8, Apr. 2019, doi: 10.7554/eLife.45133.[12] B.-C. Björk and D. Solomon, “The publishing delay in scholarly peer-reviewed journals,” J. Informetr., vol. 7, no. 4, pp. 914–923, Oct. 2013, doi: 10.1016/j.joi.2013.09.001.[13] R. S. Mehta and N. A. Rosenberg
. Zhang. "On Time-based Exploration of LMS Data andPrediction of Student Performance", 2022 ASEE Annual Conference & Exposition,Minneapolis, MN, 2022, August. ASEE Conferences, 2022.[2] R. Conijn, C. Snijders, A. Kleingeld and U. Matzat, "Predicting Student Performance fromLMS Data: A Comparison of 17 Blended Courses Using Moodle LMS," IEEE Transactions onLearning Technologies, vol. 10, no. 01, pp. 17-29, 2017.[3] D. Gašević, S. Dawson, T. Rogers and D. Gasevic, "Learning analytics should not promoteone size fits all: The effects of instructional conditions in predicting academic success," TheInternet and Higher Education, vol. 28, pp. 68-84, 2016.[4] M. Riestra-Gonza ́lez, M. d. P. Paule-Ruíz and F. Ortin, "Massive LMS log data analysis
, W. D. (2015). Programming Robots with ROS: a practical introduction tothe Robot Operating System. " O'Reilly Media, Inc.".[11] Cañas, J. M., Perdices, E., García-Pérez, L., & Fernández-Conde, J. (2020). A ROS-based open tool forintelligent robotics education. Applied Sciences, 10(21), 7419.[12] Hur, B., Zhan, W., & Ryoo, B. Y. (2022). Integrated multidisciplinary capstone projects of an underwater robotand a quadcopter for building structural analysis. In 2022 ASEE Annual Conference.[13] Velamala, S. S., Patil, D., & Ming, X. (2017, December). Development of ROS-based GUI for control of anautonomous surface vehicle. In 2017 IEEE International Conference on Robotics and Biomimetics (ROBIO) (pp.628-633). IEEE.[14] Megalingam, R. K
rate for computer science students,”ACM SIGCSE Bulletin, vol. 37, no. 2, pp. 103–106, Jun. 2005, doi: 10.1145/1083431.1083474.[6] K. J. Bunker, L. E. Brown, L. J. Bohmann, G. L. Hein, N. Onder, and R. R. Rebb,“Perceptions and influencers affecting engineering and computer science student persistence,” in2013 IEEE Frontiers in Education Conference (FIE), 2013, pp. 1138–1144.[7] B. Burd et al., “The internet of things in undergraduate computer and information scienceeducation: Exploring curricula and pedagogy,” Jul. 2018. doi:https://doi.org/10.1145/3293881.3295784.[8] M. Felleisen, R. B. Findler, M. Flatt, and S. Krishnamurthi, “The structure and interpretationof the computer science curriculum,” Journal of Functional Programming, vol. 14, no
will typically increasethe pass rate of a course. This course is also one of the first programming classes taken by transferstudents which may contribute to the high DFW rate. Future work will include a comparison ofthe DFW rates between historic offerings and those that have made use of Plickers.In conclusion using Plickers in class is a positive experience for both the instructor and the stu-dents. Since each class has a clear structure of: Plicker question, lecture, break, Plicker question,lecture/activity, quiz, students are never doing any one task for very long. This aids in keepingstudents engaged and on task.References [1] L. Porter, D. Bouvier, Q. Cutts, S. Grissom, C. Lee, R. McCartney, D. Zingaro, and B. Simon, “A Multi
• Students learn to manage a project and manage a project timeline • Reinforces that programming is a tool that allows practitioners to implement solutions and designs and is far from the end all and be all of CS • Makes collaboration to learn from peers natural impacting overall learningWhen students have more agency over the project, they are empowered to become owners oftheir learning process.References[1] S. B. Jenkins, “The Experiences of African American Male Computer Science Majors in Two Year Colleges,” University of South Florida, 2019.[2] L. J. Sax, H. B. Zimmerman, J. M. Blaney, B. Toven-Lindsey, and K. J. Lehman, “DIVERSIFYING UNDERGRADUATE COMPUTER SCIENCE: THE ROLE OF DEPARTMENT CHAIRS IN PROMOTING GENDER AND
Computing Education, vol. 10, no. 2, pp. 1–22, Jun. 2010, doi: 10.1145/1789934.1789938.[4] P. Ardimento, M. L. Bernardi, M. Cimitile, and G. de Ruvo, “Reusing bugged source code to support novice programmers in debugging tasks,” ACM Transactions on Computing Education, vol. 20, no. 1, pp. 2–24, Nov. 2019, doi: 10.1145/3355616.[5] H. L. Nguyen, N. Nassar, T. Kehrer, and L. Grunske, “MoFuzz,” in Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, Dec. 2020, pp. 1103– 1115. doi: 10.1145/3324884.3416668.[6] J.-H. Ji, G. Woo, H.-B. Park, and J.-S. Park, “Design and Implementation of Retargetable Software Debugger Based on GDB,” in 2008 Third International Conference on
, Germany, Mexico, and Malaysia. Several research papers[5–11] have found that hands-on learning via mobile studio platforms such as the Mobile StudioBoard (MSB) and the Analog Discovery Board (ADB) can help students with diverse learningstyles, demographics, and academic backgrounds learn better. There are now several commercialproducts, such as Analog Devices Inc.'s ADALM 1000 board (ADALM 1K) and ADALM 2000board (ADALM 2K), Digilent's Analog Discovery 2TM, and Quanser's QUBE-Servo portableplatform, that allow students to conduct control engineering experiments.Given the difficulty, if not impossibility, of obtaining hands-on experience in a traditional labsetting in a CS department, portable hardware platforms could provide a tremendous
ofremote/isolated learning cannot be absorbed by their families due to economic pressures andfamily obligations. HBCUs need to move from Covid-19 crisis answers and learn how torecover and make sure that money and arrangements for learning recovery set the foundationsfor more efficient, unbiassed, and strong education systems. References[1]S. BARKER, "CISION PRWEB," Gartner Magic Quadrant for Data Science and MachineLearning (DSML) Platforms, 1 March 2021. [Online]. Available:https://www.prweb.com/releases/rapidminer_named_a_visionary_in_gartner_magic_quadrant_for_data_science_and_machine_learning_platforms/prweb17780545.htm.[2] P. H. England, "Disparities in the risk and outcomes of Covid-19," PHE
Student Experiences at a Minority Serving Institutuin (MSI)," in 2021 ASEE Annual Conference, Virtual conference, 2021.[2] D. R. Walker, Y. Maeda, M. Ohland and L. Tay , "The Impact of Department Diversity on Student Persistance and Success in Engineering," in 2021 ASEE Annual Conference, Virtual Conference, 2021.[3] R. Vivian, K. Falkner and C. Szabo, "Broadening Participation in Computer Science: Key Strategies from International Findings," in Preceedings of the 48th ACM Technical Symposium on Computer Science Education, Seattle, 2017.[4] R. Fall, S. Freeman, R. Greenberg, D. Kaiser and N. Sridhar, "Computer Science through Current Enrollment: A Strategy to Broaden Participation," in Proceeding of the 51st ACM Technical
outcomes between students from different colleges.References[1] D. Chatterjee, and J. Corral, How to Write Well-Defined Learning Objectives. The Journal ofEducation in Perioperative Medicine. Dec 2017. Volume 19, issue 4. (Online):https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5944406/[2] B. S. Bloom, M. D. Engelhart, E. J. Furst, E. J. Hill, and D. R. Krathwohl, Taxonomy ofeducational objectives: The classification of educational goals. 1956 New York, NY: Longmans,Green, and Co.[3] L. W. Anderson, and D. R. Krathwohl, et al, A Taxonomy for Learning, Teaching, andAssessing: A Revision of Bloom's Taxonomy of Educational Objectives. 2001 Allyn & Bacon.[4] Z. Taurina, Students’ Motivation and Learning Outcomes: Significant Factors in
. Fairlie, "The Impact of COVID-19 on Community College Enrollment and Student Success: Evidence from California Administrative Data," Education Finance and Policy, p. 745–764, 2022.[2] E. Filatova and D. Hecht, "Using Data Science to Create an Impact on a City Life and to Encourage Students from Underserved Communities to Get into STEM.," in ASEE Annual Conference, 2021.[3] E. Howe and M. Thornton, "Components-first approaches to CS1/CS2: principles and practice," Technical Symposium on Computer Science Education, 2004.[4] S. Janke, S. C. Rudert, Ä. Petersen, . T. M. Fritz and M. Daumiller, "Cheating in the wake of COVID-19: How dangerous is ad-hoc online testing for academic integrity?," Computers and Education Open, 2021.[5
ConfidenceAbstractBecause cybersecurity professionals are crucial to national security, public safety, and economicprosperity, employment opportunities in cybersecurity continue to increase. To meet the publicand private sectors’ need for cybersecurity professionals, universities are adding academicprograms in cybersecurity. West Virginia University, which is a land-grant R1 university with avibrant cybersecurity program that offers a B.S. degree, academic minor, and an Area ofEmphasis (AoE) in cybersecurity, has received an NSF S-STEM grant to increase the numberand diversity of highly qualified cybersecurity graduates by offering scholarships to high-achieving and economically challenged undergraduate students.Our past research was focused on grit and motivation
The computer science program is ABET accredited and has built-in assessments in all core courses in computing. CS I TABLE VII and CS II are a part of these core courses. C OURSE NUMBER TRANSLATIONS ABET states specific proficiencies that students must pos- sess at the conclusion of the semester. They are abilities to: Course # Name Semester COMP 1000 Computer Science I Fall 1) Choose the appropriate data type(s) for implementing a
, S. D. Blum, and S. D. Blum, Ungrading: Why Rating Students Undermines Learning (and What to Do Instead). Morgantown: West Virginia University Press, 2020. Accessed: Feb. 05, 2023. [Online]. Available: https://muse.jhu.edu/pub/20/edited_volume/book/78367[5] M. E. Selbach-Allen, S. J. Greenwald, A. E. Ksir, and J. E. Thomley, “Raising the Bar with Standards-Based Grading,” PRIMUS, vol. 30, no. 8–10, pp. 1110–1126, Nov. 2020, doi: 10.1080/10511970.2019.1695237.[6] J. K. Zimmerman, “Implementing Standards-Based Grading in Large Courses Across Multiple Sections,” PRIMUS, vol. 30, no. 8–10, pp. 1040–1053, Nov. 2020, doi: 10.1080/10511970.2020.1733149.[7] T. Buckmiller, R. Peters, and J. Kruse, “Questioning points and
a power drill, and multi-toolSwiss knife were not included in Section III. Access to individual(s) with basic workshop skills isrequired for replicating the construction process described in this manuscript.Individual(s) trying to replicate the process described in this manuscript may face circumstantialor contextual problems that we did not encounter. Reasons for potential differences incircumstantial problems include i) changes in the operating environment, ii) workshop skill levelof involved personnel, and iii) variations in purchased material quality.Instructors for courses with a large enrollment size may have to divide their class into multiplesubgroups and schedule separate time slots for each subgroup. Which will ensure students in
related survey items). Valuing Diversity is represented by the twoprimary factors of Serving Customers Better (VL-S) and Fulfilling a Greater Purpose (VL-F). Ahigh score on VL-S would indicate that the computing student believed customers could bebetter served if diversity is valued. A high score on VL-F would indicate the computing studentperceived valuing diversity aligned with a strong inward desire for purpose and fairness in theirwork. Furthermore, the Enacting Inclusive Behaviors construct is represented by the two primaryfactors of Promoting Healthy Behaviors (BH-P) and challenging discriminatory behaviors (BH-C). A high score on BH-P would indicate the engineering student would take measures to ensureevery team member was included and
implementation which is not guaranteed that theprogrammer will consider it. To do so, some constraints are included in this ER model toenforce this type of business rule as can be seen in Figure 2 which will be implementedby writing trigger(s). Figure 2: ER Diagram for Airplane Maintenance System Including Business RulesA mechanic is an individual with certain skills that make him qualified to maintainairplanes. If the plane is serviced by an unqualified mechanic, the plane will not becertified to fly. So, the mechanic must receive specific types of training related tomaintaining airplanes. There are many different types of training that a mechanic canreceive for maintaining airplanes such as training on landing gear, training on engines
STEMdegrees.Reference 1. Beninson, L. A., Koski, J., Villa, E., Faram, R. & O’Connor, S. E. Evaluation of the research experiences for undergraduates (REU) sites program. Council on Undergraduate Research Quarterly 32, (2011). 2. Eagan, M. K. et al. Making a Difference in Science Education the Impact of Undergraduate Research Programs. Am Educ Res J 50, 683–713 (2013). 3. Lopatto, D., Creating effective undergraduate research programs in science: the transformation from student to a scientist (eds. Taraban, R. & Blanton, R. L.) 112–132 (Teachers College Press, 2008). 4. Lopatto, D., Undergraduate Research
who violate UNCCharlotte ’s policies related to academic misconduct. In addition to an official record of theviolations, some of the sanctions / penalties that may be imposed according to UNC Charlotte ’spolicies are a reduced course grade, resubmission of an academic exercise, suspension, etc.Our module’s last objective is for students to be able to recall strategies and resources to avoidacademic misconduct. To achieve this objective, we provide practical strategies on how to avoidacademic misconduct. Example strategies include understanding UNC Charlotte ’s policies aboutacademic integrity, the policies of specific courses that define what is and is not allowed, whatonline sources are acceptable to consult and how they can be cited, how to