Asee peer logo
Displaying all 5 results
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Edward F. Gehringer, North Carolina State University
Tagged Divisions
Computing & Information Technology
isasked to fill out a rubric that asks certain questions about the student author’s work. Forsummative review, the reviewer is asked to rate the work numerically based on a set ofcriteria (organization, clarity, etc.).Peer review has been widely used in higher education since the 1970s, and onlinesystems have been available for over 20 years. The largest ongoing project in this area isthe NSF-funded Calibrated Peer Review (CPR) project [11], which has been used bymore than a quarter-million students. While the pedagogical benefits of peer review arewell established, students must be trained in how to write an effective review. CPR doesthis by having students review three artifacts supplied by the instructor: one is a modelartifact, and the other
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Steven Walter Tuttle, University of Technology Sydney; Bruce Moulton, University of Technology Sydney; David Lowe, The University of Sydney
Tagged Divisions
Computing & Information Technology
. Page 26.188.1 c American Society for Engineering Education, 2015 An Information Taxonomy For Remotely-Accessible Engineering Instructional LaboratoriesAbstractThis paper introduces an information taxonomy for remotely-accessible engineeringinstructional laboratories [REILs]. A taxonomy within some given domain organizes andclarifies the domain content and provides a common framework that supports and facilitatesreasoning, discussion, and communication about the domain in question. In this case, thetaxonomy aims to support reasoning, discussion, and communication about remotely-accessible engineering instructional laboratories.This taxonomy was emergent from peer
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy
Tagged Divisions
Computing & Information Technology
ideas with peers, instructors, and computer administrators. Students discover that this team-based project with training interpersonal skills provides students with more communication opportunities. There are plenty of team meetings, in which students discuss a variety of algorithm development, software design and system integration aspects of this project. Students realize that this student-centered, research-featured, team-interactive and instructor-facilitated learning atmosphere is remarkably helpful for engineering leaning experience of student research. Students recognize that this multi-stage project encourages their full involvement to conduct
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Annie Y. Patrick, East Carolina University; Dustin Stocks
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Page 26.1292.2university.IPv4 exhaustionThe last remaining public IPv4 addresses were allocated by the Internet Assigned NumbersAuthority (IANA) to the Regional Internet Registries (RIRs) on February 3rd, 2011. Four of thefive RIRs have depleted their IPv4 address pools and are currently operating under final IPv4address depletion policies. At the time of writing, only the African Network Information Center(AFRINIC) has IPv4 address space remaining for general allocation and assignment. IPv4 is nowa legacy protocol and all future Internet growth will occur over IPv6.If an organization, such as a university, desires to maintain competitiveness, interoperability, andgrowth, that institution must become proactive in adopting IPv6. However
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Jessica Richards, BYU; Joseph J Ekstrom, Brigham Young University
Tagged Divisions
Computing & Information Technology
objectwas different for each individual. These people may talk for a long time about blue objects,thinking that they are discussing the same blue object, before they realize that one means a bluestar-shaped object, one means a blue triangle-shaped object, and one means a blue diamond-shaped object.An IT professional named “Bob” is instructed to develop software for the military. The softwareis intended to support the action of “securing” headquarters. • For the Navy, Bob needs to write financial support software that would enable them to issue a purchase order for the building • For the Air Force, Bob creates software that automatically locks the doors and switches on the alarm system. • For the Army, Bob needs to develop a program