currently ina new round of participant recruitment. Our data in this paper reflects the findings from ourinitial round of data collection.The traditional educational environment considered in this study includes several of theuniversity’s low-level undergraduate coding classes. They are made up primarily of computer-focused majors and consist of undergraduates of all ages and skill levels. The non-traditionaleducational environments follow two avenues: meetups and bootcamps. Coding meetups andworkshops serve a wider range of individuals than university courses, involving people from alldifferent walks of life, skill, and experience. Our primary non-traditional object of observation,meetups consist of small, intimate groups discussing their
design reflections), along with targetedinstruction to improve students’ writing and communication skills.In the Electrical Engineering program, both Capstone I and Capstone II courses are designated asWriting Enriched courses, satisfying this university requirement.Computer Engineering Senior Design Project Course (ECE 4800)Computer Engineering students at UVU are required to complete a one-semester capstone designcourse as part of their graduation requirements. This project-based course focuses on theintegrated design of hardware and software systems through collaborative team efforts, offeringstudents a substantial, hands-on engineering experience reflective of industry practices.Additionally, it satisfies the ABET accreditation requirement
by LLM suggestionsThe Halstead Measure, evaluated after implementing LLM-suggested changes to Expertiza, demonstratedreductions in difficulty, effort, and time. All approved changes adhered to proper code design principlesand caused no errors in Expertiza. The Halstead difficulty, which indicates how challenging the code is toread or write, decreased by 9.66. The Halstead time, estimating the time required to implement and fullyunderstand the software, decreased by 2047.5 minutes. This reduction highlights the substantial additionaltime previously required to implement and comprehend Expertiza. Adhering to principles like methodinheritance and minimizing unnecessary operators and operands, the code now reflects improved designand therefore
faculty hierarchy. hierarchical structure of Scrum encourage junior faculty to participate more? Scrum Team member considerations of Analyzing benefits, drawbacks, considerations Scrum. Is it helpful? successes, and challenges. Scrum process Team member understanding of How well did the faculty understanding Scrum processes (backlog, point understand the Scrum process? delegation, sprints, standups etc.). How did this reflect in the Include references to them using
after extensive usage. The scraper uses APIs from each recruiting website and sends arequest looking for jobs based on queries passed. The API returns multiple pages of jobs, wherepages are sorted by relevance to our queries, and fetches them page by page until the desirednumber of jobs has been retrieved [53].Computing degrees enable graduates to pursue multiple career options. To reflect this, we havecollected jobs from five different fields common for computing graduates to work in. These fieldswere selected based on public data released by universities such as Carnegie Mellon and Universityof Southern California about where their CS graduates go after graduation[8, 49]. These five fieldsare: • Cyber Security (CYS) • Data Science
support reflective learning andcommunication in computing courses [1].The goal of this work is twofold: 1. Provide a retrospective analysis of a novel instructional model, offering sufficient detail for other educators to adopt, adapt, or extend the approach. 2. Demonstrate the effectiveness of this modified instructional approach in addressing stagna- tion in content delivery, preparing students for the rapidly evolving field of computer science.In a field as rapidly changing as computer science, modifications to the methods of instruction mayhelp intrinsically prepare students for this rapidly changing ecosystem.Theoretical FrameworkConstructivism as an educational theoretical framework has often been applied to the sub-field
Sky Texture within in Blender. To explain, the computer graphics modelproposed by Wikkie and Hosek [48, 49] was adopted to simulate the sky background. To achievethe desired result, we first tuned the turbidity parameter, denoted as t, which influences theatmospheric conditions. According to [49], t = 2 yields a very clear, arctic-like sky; t = 6represents a sky on a warm moist day; and t = 10 leads to a slightly hazy day. The results of thesky background under different t values are shown in Figure 6a to c. Next, we tuned the groundalbedo parameter, denoted as g, which measures the reflective properties of the Earth's surface.Lower values of g produce a darker sky background; higher values create a brighter or whitetexture in the sky [49
more manageable. Wewill be testing several submission patterns over the next few terms including shortening thesubmission window and requiring a submission to be made by the initial due date. We are alsoplanning to perform more analysis on the quality of student work by comparing submissions toprojects under specifications grading to those submitted with a traditional grading scheme.Finally, we will be making additional modifications to deal with larger course sizes and will besurveying students to investigate their views of specifications grading.[1] D. Clark and R. Talbert, Grading for Growth. 2023.[2] E. Dosmar and J. Williams, “Student Reflections on Learning as the Basis for Course Grades,” in 2022 ASEE Annual Conference &
offer a more accurate reflection of how security istaught. It is hoped that this review presents a pessimistic view, since catalog entries may beoutdated, and individual instructors often include content beyond what is officially documented.As a study, this review is limited in scope. Although it analyzed 81 programs, this representsfewer than one-quarter of all accredited computer science programs. Moreover, while manycomputer science programs pursue accreditation, it is not as universal as it is in engineeringdisciplines. Although the programs were randomly selected, it remains difficult to determinewhether the sample is truly representative of the broader set of accredited programs.Furthermore, data were collected over a period, which
environment like Gazebo based ROS provided. The simulation also did not considerother environmental factors like wind, obstacles, etc. making the simulation less reflective of areal life flight. It was difficult to control the flight path due to the lack of a direct control system,instead relying on a separate console to send simple commands to the flight control system. Thismade it difficult to perform complicated maneuvers. It was also difficult to track the variousparameters of the flight, such as fuel, coordinates, altitude, etc. due to them being displayed oncemore on a separate monitor window. This made running the simulation more arduous andinconvenient.Despite these drawbacks, the convenient setup and ease of running cybersecurity tests
their academic journey. These projects foster self-directed learning, encouraging students to develop problem-solving skills, troubleshooting issues,research solutions independently, and interpret complex or poorly documented materials.Feedback from students and their final presentations reflect a strong sense of accomplishment andincreased confidence in their engineering capabilities. Senior capstone design projects continue toserve as a vital component of electrical engineering education and align with the standardsestablished by the Accreditation Board for Engineering and Technology (ABET). Overall,students’ feedback and their final project presentation indicate that they have pride in their projectaccomplishments and have gained confidence
-proving Undergraduate STEM Education (IUSE) program under Award Numbers DUE-1562773(Florida Gulf Coast University), DUE-1525112, DGE-2114911, and CNS-2246004 (Florida Inter-national University). Any opinions, findings, conclusions, or recommendations expressed in thismaterial are those of the authors and do not necessarily reflect the views of Cyber Florida or theNSF.References [1] Steve Morgan. Cybercrime To Cost The World $10.5 Trillion Annually By 2025, Nov. 2020. https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/ [Online] (Accessed Dec. 2024). [2] Cayley Wetzig. 5 Alarming Cybersecurity Facts and Statistics, Nov. 2022. https://thrivedx.com/resources/article/cyber-security-facts-statistics
camp followed roughly the same schedule, with a half-day module dedicated fora particular computing topic. Seven modules were delivered during the technical sessions asdescribed in the next section, with the final afternoon of the last day reserved for a showcasewhere participants could demonstrate their favorite projects to family and friends. Each daystarted with a setup/warm-up period and ended with a teardown/reflection, usually done with aKahoot (www.kahoot.com) as these online quiz games were familiar to the participants. Eachmodule was broken into 2 sessions divided by a break, with the first session usually involving“follow-me” style instruction, and the second on independent work.The university classroom used for the camp has