Asee peer logo
Displaying all 18 results
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Tatiana Teslenko, University of British Columbia, Vancouver
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
American Society for Engineering Education, 2015 Focus on Social Learning in a First-Year Technical Writing Class: a Canadian Case-Study The University of British Columbia, CanadaAbstract: Incorporation of writing assignments into the first-year curriculum is a keyopportunity for engineering educators. The topics of sustainable consumption and design,environmental issues and global engineering were introduced into a first-year engineeringcommunication course in the Faculty of Applied Science at the University of British Columbia,Vancouver. This successful initiative was further expanded to include writing reflection papers,proposals and research reports on community service learning
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Bryan A. Jones, Mississippi State University; M. Jean Mohammadi-Aragh, Mississippi State University; Amy K. Barton, Mississippi State University; Donna Reese, Mississippi State University; Hejia Pan, Mississippi State University
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
-analysis and reflection. Emig describes the simple act ofreading one’s own writing as a valuable learning moment in which “information from the pro-cess is immediately and visibly available as that portion of the product already written.” Review-ing a set of writings collected over time, then, creates an opportunity to extend the learning pro-cess. Both instructors and students benefit from the act of collecting artifacts because they repre-sent the changes and growth that accompany learning. When integrated in a purposeful way ap-propriate to a given discipline, WTL deepens student understanding, improves student engage-ment, increases retention, and makes students active participants in the learning process10,11.1.2 WTL and computational
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Joseph Benin, U.S. Coast Guard Academy; Scott Thomas Howie, United States Coast Guard Academy; Benjamin B Hannon, USCGA; Nicholas Williamson, United States Coast Guard Academy
Tagged Divisions
Computing & Information Technology
tasks for the upcoming week. This is furthersolidified by weekly status reports that provide additional reflection on the project progress,outline problems, and highlight effort expended. In addition, students are required to draft aProblem Statement, Requirements Specification, Functional Design, Project Plan, and Test Plan.The nature of the projects varies widely from continuing a previous project with well-definedexpectations to venturing into uncharted waters with only a vague sense of a reasonabledestination. Thus all of these documents are flexible in their nature. For example, the test plancould be for the final product or for a milestone. Either way it will contain similar complexityand comprehensiveness. Assessment for this semester
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Vukica M. Jovanovic, Old Dominion University; Megan McKittrick, Old Dominion University; Pilar Pazos, Old Dominion University; Daniel Richards, Old Dominion University; Julia Romberger
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
and texts as resulting from typified behaviors, knowledge, and actions of agiven community of practice: “[T]o write, to engage in any communication is to participate in acommunity; to write well is to understand the conditions of one’s own participation with thatcommunity and determine the success or failure of communication”11. As such, genres reflect thevalue systems of individual organizations (e.g., a stand alone business) and also large scalecommunities (e.g., engineers). Being a proficient writer means becoming intimatelyknowledgeable of the conditions of participation in a given community of practice. According toJames Dubinsky, “our work [as professors] involves more than teaching our students strategies orforms; it also
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Michael Tamir; Ronald S Harichandran P.E., University of New Haven; Lueny Morell, InnovaHiEd
Tagged Divisions
Computing & Information Technology
real-life constraints and customer needs — all of which are constructivist in nature. Page 26.1354.7 • Constructivism promotes hands-on learning. Thus, in addition to having traditional classrooms for lectures, GalvanizeU/UNH has multiple places (including labs and computer workstations) where students can experiment and work on their class and capstone projects, meet in teams to discuss their work, reflect on issues, meet with industry representatives, meet with faculty informally, etc. • All students work as part of a community from the beginning. Current industry and/or
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Wei Zheng, Jackson State University; Jianjun Yin, Jackson State University; Yanhua Cao, Jackson State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Group C 3.47 1.19 Group D 3.24 1.33Team online discussion makes me reflect on the course content Group A 2.88 1.24in a deeper level. Group B 2.72 1.06 Group C 2.75 1.32 Group D 2.91 1.42I frequently respond to the post from my group members through Group A 3.53 1.45online discussion. Group B 3.28 1.11
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Arturo Camacho, University of Costa Rica
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
significant proportion ofstudents to fail in exams, which consisted mostly of simulating the execution of thealgorithms for a given input. Usually, students made two types of errors: simple involuntarymistakes and errors that reflect a lack of understanding of the algorithm. After applying themethodology, the former were less common, and the latter were infrequent. We started usingthe methodology in the II semester of 2010 (in our college, I semester goes from March toJune and II semester from August to November). Tables 1 and 2 show the average grades forTest 1 applied during the II semester of 2009-2010 and the I semester of 2010-2011 (beforeand after applying the methodology, in each case). This test is about analysis of algorithmsand sorting
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, -; Mohd Abdelgadir Khairi, Najran University; Jinan Ziade ABD, University of Phoenix
Tagged Divisions
Computing & Information Technology
://swtuopproxy.museglobal.com/MuseSessionID=fd925b9615e67115f7e6173 a6599d7e2/MuseHost=proquest.umi.com/MusePath/pqdweb?index=0&did=1454 942261&SrchMode=2&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309 &VName=PQD&TS=1258783964&clientId=13118[8] Kirby, P., Gile, C., & Fossner, L. (2006). Data warehouse architectures must reflect business consensus. Forrester. Retrieved from Microsoft Library[9] Longman, C. (2008). Why Master Data Management is Such a Challenge. DM Review, 18(11), 18-20[10] Loshin, D. (2008). Master Data Management. Morgan Kaufmann, CA: San Francisco[11] Lucas, A. (2010). TOWARDS CORPORATE DATA QUALITY MANAGEMENT. Portuguese Journal of Management Studies, 15 (2
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Forough Sheikh-Ansari, Purdue University; Baijian Yang, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, this imperfection inmeasuring can convincingly reflect the real overhead in a real system.5.1 Hash FunctionsIn the first set of experiments, we measured the H(VM) with several major CryptographicHashing Functions [12]. We chose different hash function to be able to compare them and chosethe best match for our proposed Architecture. Results of H(VM)’s Execution time are shown inthe Table 2. As seen from the results, the CPU processing time of hashing is basically linear tothe size of the VM templates. SHA-384 and SHA-512 has similar processing time due to the factthe construction of the hashing are very similar. An interesting to note was SHA-256 processtime is actually longer time than SHA-384 and SHA-512. This is because SHA-384 and SHA-512
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
andBriggs developed the MBTI tests for understanding preferences, and successors to the MBTItest3 are still widely used to today. Similarly David Kolb’s experiential learning theory4 promotesmultimodal learning based on a cycle of concrete experience, reflective observation, abstractconceptualization and active experimentation. All of these experiential learning modes can beenhanced by engaging the students with interactions with hardware modules. Small low-costcomputing platforms, such as the Arduino microcontroller and related devices, provide a way tophysically encapsulate many of the learning concepts related to IT and students can program,control and interact with these systems in a very direct physical fashion, involving not only sightbut
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Mohamed Abdelrahman, Texas A&M University-Kingsville; Mohamed Abdelsalam Salem, Text Scope; Mais Nijim, Texas A&M Kingsville
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. These software enabled devices allowed students to take notes,draw charts and diagrams. Afterwards the results were measured through student feedback. The Page 26.1592.3results of the experiment were satisfactory as more than 85% of the students thought that usingthe tablets contributed positively towards their active learning experience. Instructors observedthat the level of interaction and enthusiasm increased greatly among students. While it is difficultto provide accurate result values that reflect the amount of increase in student performance in theclassroom, the high level of attendance, which was observed, was certainly a good indicator
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/City University of New York
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. Despite thebenefits of an approach teaching problem-solving skills first, the transition from pre-programming problem-solving courses to courses in which students should master a full-fledgeprogramming language remains a challenge 18, 22. This is reflected in the number of students(44%) who did not have an acceptable performance in either concepts or skills (Figures 4 and 5).Even though those students had passed a previous problem solving course, they find thetransition to a learning environment that uses a full-fledge programming language like Javadifficult.According to Mayer 17, in addition to the cognitive and metacognitive aspects of problemsolving, other aspects like motivation and engagement are also important determinants of studentsuccess
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Kristine Donate, Florida Atlantic University; Ravi T. Shankar, Florida Atlantic University; Diana Mitsova, Florida Atlantic University; Francis Xavier McAfee, Florida Atlantic University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
information, funding sources, government entity, etc.) of information they seek. This preference will drive the use of the corresponding web site seed along with the presentation of the associated keywords to the user as defined by the attribute property also in the ontology. And third, the refined list of keywords, instead of all the keywords under a given topic, is used by the application for the searches. Figure 9 contains a sample mockup of the modified search application including the Page 26.1358.14 Figure  9  -­  Sample  Search  Application  Mock-­up   user’s ability to set the search aspect. Note the categories reflect
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Gretchen G. Achenbach, National Center for Women & IT; Leslie G. Cintron PhD, University of Virginia; J McGrath Cohoon, University of Virginia; Philip Michael Sadler, Harvard Smithsonian Center for Astrophysics; Gerhard Sonnert, Harvard University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
to succeed.AcknowledgementsThis work was supported by a National Science Foundation grant (#1203206) to the NationalCenter for Women and Information Technology, and a National Science Foundation grant(#062444) for Project PRiSE. Any opinions, findings, conclusions, or recommendationsexpressed in this paper are the authors’ and do not necessarily reflect the views of the National Page 26.328.16Science Foundation.References1. The White House. (2011). Women and girls in science, technology, engineering, and math (STEM). Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp-women-girls-stem-november2011.pdf2
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
courses if those courses fit intotheir schedule and academic requirements. This interest was expected given that the students wereenrolled in an upper-division elective course.Over the course of the three interviews, students’ responses showed low self-efficacy levels whenasked about performing various cybersecurity related tasks, with comments such as “I’m not sureI could do that” being common. Meanwhile interest levels seemed to grow, reflected in commentssuch as “That was really cool!”. For some students, self-efficacy levels decreased over the courseof the semester. Given that students admitted to having very little knowledge of cybersecurity atthe beginning of the semester, this was not totally unexpected as students became aware of
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Natascha M. Trellinger, Purdue University, West Lafayette; Rebecca R. Essig, Purdue University, West Lafayette; Cary D. Troy, Purdue University, West Lafayette; Brent K. Jesiek, Purdue University, West Lafayette; Josh Boyd, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
profession, yet it israrely included in sophomore and junior level courses. Reflecting on our own prior efforts todevelop writing assignments for such courses, we became curious about the extent to which themost popular engineering textbooks include writing prompts and related writing activities. Thisquestion seemed particularly important given that textbooks often play critical roles inengineering curricula and courses. Textbooks often influence how courses are structured, andreading assignments and homework problems are frequently assigned directly from textbooks.In this project, we systematically searched for and analyzed writing-based problems in sixpopular fluid mechanics textbooks, with a focus on chapters with similar technical content
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Emre Tokgoz, Quinnipiac University
Tagged Divisions
Computing & Information Technology
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Tanner Lund, Brigham Young University; Hayden Panike; Samuel Moses, Brigham Young University; Dale C Rowe, Brigham Young University; Joseph J Ekstrom, Brigham Young University
Tagged Divisions
Computing & Information Technology
views that enable users to search and make the data meaningful.This event cycle3 reflects the processes involved in turning events and their logs into usefulinformation, regardless of the implementation.Further System ExplanationThe core of this methodology utilizes search or data mining technologies. There are many toolsthat provide the ability to analyze large amounts of data and produce usable information. Toolscurrently available include: Splunk4, Apache Solr, and Elasticsearch Foundations’ ELK stack(Elasticsearch, Logstash, and Kibana). Each of these tools has the ability to take textual data andparse it into desired fields of information. For the purpose of this paper, we will be using theELK stack as our software of choice.Our