Asee peer logo
Displaying all 19 results
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University; Nelson Barnes Jr, Alabama A&M University
Tagged Divisions
Computing & Information Technology
testing tools based on varied IDE platforms (e.g.,Eclipse and NetBeans). The gamification design and mechanism is integrated in the social features and isdeveloped with several elements that are connected to the project objectives. We will discussthese elements, the mechanism, the psychological characters and system implementation in thenext section. An overview design and analysis is shown in Figure 2.Current Situation of Software Testing in the AAMU Computer Science Curriculum Table 2 includes a summary of the current situation of software-testing instruction withinAAMU’s computer science curriculum. Table 2. All Computer Science Class Studies at AAMUCourse Num Course Title
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State College; Sanjeev Arora, Fort Valley State University; Nabil A. Yousif, Fort Valley State University; Xiangyan Zeng, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Paper ID #17134Computer Science Curriculum Redesign at Fort Valley State UniversityDr. Masoud Naghedolfeizi, Fort Valley State College Dr.Masoud Naghedolfeizi is a senior professor in the Department of Mathematics and Computer Science at Fort Valley State University. His academic background includes a B.S. in Mechanical Engineering with minor in instrumentation and control, an M.S. in Metallurgical Engineering, and M.S. and Ph.D. in Nuclear Engineering. Dr. Naghedolfeizi’s research interests include instrumentation and measurement systems, applied articial intelligence, information processing, and engineering education
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Roxanne Moore, Georgia Institute of Technology; Douglas Edwards, Georgia Institute of Technology; Jason Freeman, Georgia Institute of Technology; Brian Magerko, Georgia Institute of Technology; Tom McKlin, SageFox Consulting Group; Anna Xambo, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
actuallydeclined in the past decade. To help change the perception of the computing field, researchers atGeorgia Institute of Technology developed EarSketch. EarSketch is an authentic STEAM(STEM + Arts) environment for teaching and learning programming (i.e. where learners areengaged in authentic practices both in computing and in the aesthetics of music remixing) aimedat increasing and broadening participation in computing. In the EarSketch environment, studentswrite code to manipulate, or remix, musical samples. It is an integrated programmingenvironment, digital audio workstation, curriculum, and audio loop library.EarSketch has already been piloted in multiple classroom environments, including ComputerScience Principles (CSP) classes in Atlanta-area
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Jinyi Zhang, Purdue University; Pan Fengjian, Purdue University, West Lafayette; Mrigank S. Jha, Purdue University, West Lafayette; Pranav Marla, Purdue University; Kee Wook Lee, Purdue University; David B Nelson, Purdue University, West Lafayette; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
  /  libraries  /  operating  systems   from  the  environment  used  by  instructors  in  grading. The  programs written by students may not execute correctly in the different environment and this creates  confusion   among  students.   The  proposed  system  eliminates  this  problem  because  every student uses the same back end that is virtualized by Docker container.  Codecademy  (​ https://www.codecademy.com/​ )  presents  step­by­step  coding  instructions  to beginners  in  an  interactive  online  programming  environment.  A  similar  approach  is   CS  Cycles (​http://cscircles.cemc.uwaterloo.ca/​ ),  which  integrates  university­style  curriculums,  embeds thousands  of  online  auto­gradable  practice  assignments,  and  an
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mayari I. Serrano, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Baijian Yang, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
development depends on representational fluencyand the ability to convert between diverse representational forms [7]. Model and modelingprocesses are used to foster integrations and problem-solving skills [8].Implications of the Conceptual Framework for the Learning DesignGuided by our conceptual framework, we used MEAs to deliver our learning design in the formof cybersecurity challenges. As stated previously, the MEAs are activities that intend to simulatereal-word client-driven scenarios in a team-based collaborative environment [4]. In addition,MEAs are essentially open-ended problems that are presented in an authentic context [8].Students’ problem solving skills and understanding of course concepts can be improved with theimplementation of MEAs
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afrin Naz, West Virginia University Inst. of Tech.
Tagged Divisions
Computing & Information Technology
impact of computing on individuals, organizations,and society(h) Recognition of the need for and an ability to engage in continuing professional development(i) An ability to use current techniques, skills, and tools necessary for computing practice.(j) An ability to apply mathematical foundations, algorithmic principles, and computer science theory inthe modeling and design of computer-based systems in a way that demonstrates comprehension of thetradeoffs involved in design choices(k) An ability to apply design and development principles in the construction of softwaresystems of varying complexity Performance indicators are a means to focus on specific expectations of a program. Theyfacilitate the curriculum delivery strategies, and assessment
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Samuel Moses, Brigham Young University; Nathaniel Scott Baker; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
outline a graduate-level curriculum for social engineering education, which can be used to teach aspiring offensivecybersecurity analysts the best methods to test the security of an organization’s human element,as well as teach aspiring security professionals about best practices and policies that they can useto protect the resources they are responsible for.IntroductionModern cybersecurity is seeing a spike in attention. Recent vulnerabilities and exploits haveprompted industry professionals to spend a greater amount on cybersecurity measures, frompowerful and comprehensive authentication systems to the most thorough and comprehensivefirewall and anti-virus systems. However, there is a simple fact that cannot be negated by anyamount of money or
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
validate understanding of the conceptsthey have learned during the course of their studies and for instructors to measure theachievement of established learning goals. As with many computer engineering programs,students of the computer engineering program at Utah Valley University complete their degreeprograms with a semester long capstone design experience. The intent is for students to utilizecompetencies developed in the first three years of the curriculum in the solution of an embeddeddesign problem.Embedded SystemsAn Embedded system is any mechanical or electrical system that is controlled by a computerworking as part of an overall system6. Embedded systems is one of the most dynamic and fastgrowing areas in industry. These systems continue
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
course major module objectives and module sub-objectives, in particular, those that are relevant to CBI implementation. 2. Identifying expected difficulties: What are the difficulties that students face when taking the course? 3. Real-world context: Why is the course an important part of the CS curriculum, and where can one find its applications? 4. Knowledge model: What is the conceptual model for the course, including prerequisites, course dependencies, and course level? What concepts and techniques should be considered to enhance understanding of the material? 5. Assessment of learning: How does one change the traditional testing and assessment methods to make sure these include formative assessment
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology; Reneta Davina Lansiquot, New York City College of Technology
Tagged Divisions
Computing & Information Technology
. (2008). High-impact educational practices. Washington, D.C.: AAC&U.[8] Johnson-Laird, P. N. (1983). Mental models. Cambridge: Cambridge University Press.[9] Lansiquot, R. D., & Cabo, C. (2015). Strategies to integrate writing in problem-solving courses: Promoting learning transfer in an interdisciplinary context. In Proceedings of the 122nd American Society for Engineering Education Annual Conference. Washington, DC: ASEE.[10] Lansiquot, R., & Cabo, C. (2014). Strengthening the narrative of computing with learning communities. In Proceedings of World Conference on Educational Media and Technology 2014. Chesapeake, VA: AACE.[11] Lansiquot, R. D., & Cabo, C. (2011). Alice’s adventures in programming narratives. In C
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University; Nathan H. Bean
Tagged Divisions
Computing & Information Technology
://www.youtube.com/channel/UCmY2tPu6TZMqHHNPj2QPwUQ28. Savery, J. R. (2009). Overview of problem-based learning: Definitions and Distinctions. Interdisciplinary Journal of Problem based Learning, 1(1), 269-282.29. Sengupta, P., Kinnebrew, J. S., Biswas, G., & Clark, D. (2013). Integrating computational thinking with K- 12 science education using agent-based computation: A theoretical framework. Education and Information Technologies, 18(2), 351-380.30. Spradling, C., Linville, D., Rogers, M., & Clark, J. (2015). Are MOOCs an appropriate pedagogy for training K-12 teachers computer science concepts? Computing Sciences in Colleges, 30(5), 115-125.31. Weintrop, D., & Wilensky, D. (2015). Using Commutative Assessments
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
learners to integrate software testing and other qualityassurance concepts into their programming skills.This paper is organized into four sections. WReST-CyLE will be introduced in Section 2.Afterwards, gamification design architecture used in WReSTT tool will be presented inSection 3. Following that section, class study and assessment results will be presented inSection 4. Conclusions and future works will be discussed in Section 5.WReSTT-CyLE – A Cyber Enabled Software Testing Learning EnvironmentWReSTT, the initial repository, was an online software testing repository which iscontained with learning materials about software testing tools only. This project was acollaborative effort between Florida International University (FIU) and Florida A
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Araceli Martinez Ortiz, Texas State University - San Marcos; Mina Guirguis, Texas State University
Tagged Divisions
Computing & Information Technology
to solve problems. They also call for students to make physical system modelsthat demonstrate their learning and understanding [9, 10]. PBL as an instructional practicemeets these objectives and can result in a novel curricular approach that include flexiblystructured activities and learning objectives around distinct learning standards in mathematics,science, engineering, or computer science.Research also indicates that using an interdisciplinary or integrated curriculum providesopportunities for more relevant, less fragmented, and more stimulating experiences forlearners [11]. Recently, there has been a particular interest in finding the overlap betweenengineering education and science, mathematics, and even the social sciences. While
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alireza Farahani; Mudasser Fraz Wyne, National University; Lu Zhang, National University
Tagged Divisions
Computing & Information Technology
in placefor assessment5. It is easy to collect evidence for assessment in preselected courses so thefaculty will then consider how to evaluate student achievement of skills in these courses.This will help to identify classes in which appropriate assignments are already part of thecurriculum, usually in a class in which the student outcome was a primary emphasis ofthe course. In this way, it is made sure that assessment is not an additional burden to thefaculty. We would also like to agree with authors9 that state that the best source ofcurriculum change seems to be the competent and experienced faculty who reviewcourses and curriculum on their own and propose curriculum and courses changes bothsmall and revolutionary
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
John (Lalit) Jagtiani, University of Bridgeport; Neal A Lewis, University of Bridgeport
Tagged Divisions
Computing & Information Technology
projects expected from students as part of course work. Make sure that metrics are Specific, Measurable, Attainable, Realistic, Timely (S.M.A.R.T.)By adopting the above enhancements to required SE course curriculums, we can improve uponthe learning objectives:Recommendation #2: S.M.A.R.T. Leverage of Open Source Software (OSS) CommunitiesEffective external benchmarking activities must be encouraged and taught in SE courses in orderfor students to understand modern and relevant software benchmarking techniques. An easilyadaptable method is to use one of several large and reliable OSS repositories. These repositoriesare easily accessible on the internet without cost. In this paper, we discuss an example of such arepository (SourceForge.net) and
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Chengcheng Li, University of Cincinnati; Rucha Kulkarni, University of Cincinnati
Tagged Divisions
Computing & Information Technology
preparedcybersecurity workforce to defend IT infrastructure and fight against cybercrimes. It’s projectedthat the US is in an urgent demand of thousands of information security workers. The NationalScience Foundation has established a number of grants to award projects that promotecybersecurity education and curriculum development. Some of these projects have reportedsuccess of teaching hands-on skills through Gamification, a game-like learning environment.CTF (Capture-the-Flag) events are particularly successful in attracting college students, evenfrom non-IT/CS major and high school students into cybersecurity. This paper summarizes thecurrent popular Gamification technologies and the practice of using CTF and competitionprojects in classroom
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Di Ma, University of Michigan - Dearborn
Tagged Divisions
Computing & Information Technology
activities toimprove learning outcomes by a project based learning paradigm. The designed labs will be usedthrough the class content and flow into the course context through the semester so that an activelearning and engagement of the student will be reached.Mobile Security Laboratory DevelopmentWe have initiated the mobile computing and security projects and labs and integrated them toclassroom since Spring 2012. Most of the labs were developed and applied in the softwareengineering and senior design classes, which are senior courses for computer science andelectrical engineering students. Later, with new labs developed more courses continued, weapplied in wireless computing and graduate courses. The mobile computing and security labswere developed
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Justin L. Hess, Purdue University, West Lafayette; Lorraine G. Kisselburgh, Purdue University; Carla B. Zoltowski, Purdue University, West Lafayette; Andrew O. Brightman, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
instrument designed to measuretheir perceived effectiveness of Scaffolding, Interactivity, and Reflectivity components of thecourse by using the SIRA scales.20 Lastly, in Phase 3 we used correlation analysis to compare therelationships between ethical reasoning development and the SIRA scale responses for bothmodes of participation.Figure 1 provides an overview of these research phases and the analysis methods that we utilizedwithin each. While Phases 1 and 2 do not inform one another, we integrated the data collectedthroughout these phases in Phase 3. Figure 1: Depiction of the multiphase research process of this studyIntervention/Course OverviewThe intervention used in this study began with training students to understand the
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Md Hossain Shuvo, Alabama A&M University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
activeness of the system. Since the system isaimed at controlling an embedded system which is Lego Mindstrom EV3, hence for avoidingsynchronization problem with Android platform in terms of programming, LeJOS EV3 API isused. It facilitates to program the whole system using Java without the integration of any otherprogramming environment. Immediately after the implementation of the system, it is tested forits functional validity and programming correctness. © American Society for Engineering Education, 2016 2016 ASEE Southeast Section ConferenceAs aforementioned and as mapped in the system architecture, each component of the overalllifecycle of the system implementation can be applied in