- Conference Session
- Computing & Information Technology: Curriculum and Assessment
- Collection
- 2018 ASEE Annual Conference & Exposition
- Authors
-
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
sufficient cachet that accreditation is not necessary. This may be true; who would not hirea Stanford University graduate simply because the computer science program at Stanford Univer-sity is not accredited by ABET? At the same time, conforming to accreditation standards and peerreview would have helped Stanford or University of Texas avoid headlines that revealed that theircomputer science students have been graduating without taking course work in ethics, somethingABET accreditation standards have required for decades 7 . In contrast, several high-profile andprestigious programs such as MIT are accredited. In this case, presumably, the program or theinstitution has seen value in the accreditation process, or even perhaps to signal to lesser
- Conference Session
- Computing Research
- Collection
- 2018 ASEE Annual Conference & Exposition
- Authors
-
Deng Cao, Central State University; Cadance Lowell, Central State University; Augustus Morris, Central State University
- Tagged Divisions
-
Computing and Information Technology
implementation issues for software systems,including software life cycle, requirements definition and specification, prototyping,verification, validation, testing, fault-tolerance, social and ethical issues of commercialsoftware, and management.A term project is assigned to the students after the 2nd interim exam, which is approximatelyone month before the end of the semester. Each student is requested to design andimplement an image classifier using CNN. The students are expected to use transferlearning to customize pre-trained neural networks for new classes. The new network shouldbe able to distinguish at least two new classes that are not included in the pre-trainednetwork. The students are expected to use TensorFlow as the development tool, because
- Conference Session
- Topics in Computing and Information Technology-I
- Collection
- 2018 ASEE Annual Conference & Exposition
- Authors
-
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
- Tagged Divisions
-
Computing and Information Technology
Associate Professor in the Department of Information and Computer Sciences at Metropolitan State University, and a Senior Fellow at the Leadership Institute (TLI) at the University of Minnesota. Dr. Kaleem is an experienced lifelong cybersecurity practitioner. His research interests include multiple aspects of cybersecurity including Smart Grid Security, Computer, and Network Security but more specifically in the area of mobile device security, mobile malware analysis, and attribution, and mobile forensics. In the past few years, Dr. Kaleem has developed and taught several courses (Ethical Hacking, Digital Forensics Engineering, Mobile Device Forensics, Malware Reverse Engineering, etc.) in the area of cybersecurity
- Conference Session
- Computing & Information Technology: Curriculum and Assessment
- Collection
- 2018 ASEE Annual Conference & Exposition
- Authors
-
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
- Tagged Divisions
-
Computing and Information Technology
also realized early, that the future data scientists and analysts need to be well-versed in i) public speaking, ii) effective cross-disciplinary and cross-cultural communication,and iii) business ethics. While the initial committee of which we were a part of did not finalizethese aspects of the Data Analytics curriculum, by the time the program had final taken off,appropriate courses (“borrowed”, for example, from the Philosophy Department or theWashington State University’s internationally renowned College of Communication) that coverthese important “non-technical” skills were incorporated into the core requirements of the newBS/BA program – while still keeping the overall credit count manageable (and, in particular,comparable to other 4-year
- Conference Session
- Tools and Techniques
- Collection
- 2018 ASEE Annual Conference & Exposition
- Authors
-
Mohammad Rafiq Muqri, DeVry University, Pomona; Nikole Harper; Hasan Muqri; Brian Keith Wesr Sr.
- Tagged Divisions
-
Computing and Information Technology
1 0 0 Signal 3 2 1 1 Processing Electronics 2 3 1 1 Power Systems 5 7 2 4 Computer 4 5 1 1 Systems Control Systems 7 6 1 1 Communication 6 4 2 2 s Ethics 8 6 2 4 Total
- Conference Session
- Computing Technology Applications-II
- Collection
- 2018 ASEE Annual Conference & Exposition
- Authors
-
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
, they are suitable for thecosine similarity algorithm. Lastly, the text-based messages posted by students in their studygroups are analyzed and compared based on the measure of TF-IDF (i.e., term frequency-inverse document frequency). TF-IDF is broadly used by the content-based recommendersystems to compare the similarity between two pieces of textual contents [17-18]. The morefrequently two students use the same set of keywords, the more similar they are considered. Itshould be noted that, in consideration of ethics, the content analysis of group discussions canbe disabled in practice. The instructor is enabled to select whether he/she prefers to place themost similar/different students in the same study group.Figure 7 illustrates the system