- Conference Session
- Communication Across the Divisions III: Writing as Social–Technical Integration
- Collection
- 2015 ASEE Annual Conference & Exposition
- Authors
-
Vukica M. Jovanovic, Old Dominion University; Megan McKittrick, Old Dominion University; Pilar Pazos, Old Dominion University; Daniel Richards, Old Dominion University; Julia Romberger
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing & Information Technology, Liberal Education/Engineering & Society
and texts as resulting from typified behaviors, knowledge, and actions of agiven community of practice: “[T]o write, to engage in any communication is to participate in acommunity; to write well is to understand the conditions of one’s own participation with thatcommunity and determine the success or failure of communication”11. As such, genres reflect thevalue systems of individual organizations (e.g., a stand alone business) and also large scalecommunities (e.g., engineers). Being a proficient writer means becoming intimatelyknowledgeable of the conditions of participation in a given community of practice. According toJames Dubinsky, “our work [as professors] involves more than teaching our students strategies orforms; it also
- Conference Session
- Topics in Computing and Information Technologies I
- Collection
- 2015 ASEE Annual Conference & Exposition
- Authors
-
Wei Zheng, Jackson State University; Jianjun Yin, Jackson State University; Yanhua Cao, Jackson State University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing & Information Technology
Group C 3.47 1.19 Group D 3.24 1.33Team online discussion makes me reflect on the course content Group A 2.88 1.24in a deeper level. Group B 2.72 1.06 Group C 2.75 1.32 Group D 2.91 1.42I frequently respond to the post from my group members through Group A 3.53 1.45online discussion. Group B 3.28 1.11
- Conference Session
- Emerging Computing and Information Technologies II
- Collection
- 2015 ASEE Annual Conference & Exposition
- Authors
-
Arturo Camacho, University of Costa Rica
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing & Information Technology
significant proportion ofstudents to fail in exams, which consisted mostly of simulating the execution of thealgorithms for a given input. Usually, students made two types of errors: simple involuntarymistakes and errors that reflect a lack of understanding of the algorithm. After applying themethodology, the former were less common, and the latter were infrequent. We started usingthe methodology in the II semester of 2010 (in our college, I semester goes from March toJune and II semester from August to November). Tables 1 and 2 show the average grades forTest 1 applied during the II semester of 2009-2010 and the I semester of 2010-2011 (beforeand after applying the methodology, in each case). This test is about analysis of algorithmsand sorting
- Conference Session
- Emerging Computing and Information Technologies I
- Collection
- 2015 ASEE Annual Conference & Exposition
- Authors
-
Forough Sheikh-Ansari, Purdue University; Baijian Yang, Purdue University, West Lafayette
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing & Information Technology
, this imperfection inmeasuring can convincingly reflect the real overhead in a real system.5.1 Hash FunctionsIn the first set of experiments, we measured the H(VM) with several major CryptographicHashing Functions [12]. We chose different hash function to be able to compare them and chosethe best match for our proposed Architecture. Results of H(VM)’s Execution time are shown inthe Table 2. As seen from the results, the CPU processing time of hashing is basically linear tothe size of the VM templates. SHA-384 and SHA-512 has similar processing time due to the factthe construction of the hashing are very similar. An interesting to note was SHA-256 processtime is actually longer time than SHA-384 and SHA-512. This is because SHA-384 and SHA-512
- Conference Session
- Curricular Issues in Computing and Information Technology Programs II
- Collection
- 2015 ASEE Annual Conference & Exposition
- Authors
-
Mohamed Abdelrahman, Texas A&M University-Kingsville; Mohamed Abdelsalam Salem, Text Scope; Mais Nijim, Texas A&M Kingsville
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing & Information Technology
. These software enabled devices allowed students to take notes,draw charts and diagrams. Afterwards the results were measured through student feedback. The Page 26.1592.3results of the experiment were satisfactory as more than 85% of the students thought that usingthe tablets contributed positively towards their active learning experience. Instructors observedthat the level of interaction and enthusiasm increased greatly among students. While it is difficultto provide accurate result values that reflect the amount of increase in student performance in theclassroom, the high level of attendance, which was observed, was certainly a good indicator
- Conference Session
- Emerging Computing and Information Technologies II
- Collection
- 2015 ASEE Annual Conference & Exposition
- Authors
-
Candido Cabo, New York City College of Technology/City University of New York
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing & Information Technology
. Despite thebenefits of an approach teaching problem-solving skills first, the transition from pre-programming problem-solving courses to courses in which students should master a full-fledgeprogramming language remains a challenge 18, 22. This is reflected in the number of students(44%) who did not have an acceptable performance in either concepts or skills (Figures 4 and 5).Even though those students had passed a previous problem solving course, they find thetransition to a learning environment that uses a full-fledge programming language like Javadifficult.According to Mayer 17, in addition to the cognitive and metacognitive aspects of problemsolving, other aspects like motivation and engagement are also important determinants of studentsuccess
- Conference Session
- Information and Network Security
- Collection
- 2015 ASEE Annual Conference & Exposition
- Authors
-
Kristine Donate, Florida Atlantic University; Ravi T. Shankar, Florida Atlantic University; Diana Mitsova, Florida Atlantic University; Francis Xavier McAfee, Florida Atlantic University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing & Information Technology
information, funding sources, government entity, etc.) of information they seek. This preference will drive the use of the corresponding web site seed along with the presentation of the associated keywords to the user as defined by the attribute property also in the ontology. And third, the refined list of keywords, instead of all the keywords under a given topic, is used by the application for the searches. Figure 9 contains a sample mockup of the modified search application including the Page 26.1358.14 Figure 9 - Sample Search Application Mock-up user’s ability to set the search aspect. Note the categories reflect
- Conference Session
- Potpourri
- Collection
- 2015 ASEE Annual Conference & Exposition
- Authors
-
Gretchen G. Achenbach, National Center for Women & IT; Leslie G. Cintron PhD, University of Virginia; J McGrath Cohoon, University of Virginia; Philip Michael Sadler, Harvard Smithsonian Center for Astrophysics; Gerhard Sonnert, Harvard University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing & Information Technology
to succeed.AcknowledgementsThis work was supported by a National Science Foundation grant (#1203206) to the NationalCenter for Women and Information Technology, and a National Science Foundation grant(#062444) for Project PRiSE. Any opinions, findings, conclusions, or recommendationsexpressed in this paper are the authors’ and do not necessarily reflect the views of the National Page 26.328.16Science Foundation.References1. The White House. (2011). Women and girls in science, technology, engineering, and math (STEM). Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp-women-girls-stem-november2011.pdf2