Asee peer logo
Displaying all 6 results
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
sufficient cachet that accreditation is not necessary. This may be true; who would not hirea Stanford University graduate simply because the computer science program at Stanford Univer-sity is not accredited by ABET? At the same time, conforming to accreditation standards and peerreview would have helped Stanford or University of Texas avoid headlines that revealed that theircomputer science students have been graduating without taking course work in ethics, somethingABET accreditation standards have required for decades 7 . In contrast, several high-profile andprestigious programs such as MIT are accredited. In this case, presumably, the program or theinstitution has seen value in the accreditation process, or even perhaps to signal to lesser
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Deng Cao, Central State University; Cadance Lowell, Central State University; Augustus Morris, Central State University
Tagged Divisions
Computing and Information Technology
implementation issues for software systems,including software life cycle, requirements definition and specification, prototyping,verification, validation, testing, fault-tolerance, social and ethical issues of commercialsoftware, and management.A term project is assigned to the students after the 2nd interim exam, which is approximatelyone month before the end of the semester. Each student is requested to design andimplement an image classifier using CNN. The students are expected to use transferlearning to customize pre-trained neural networks for new classes. The new network shouldbe able to distinguish at least two new classes that are not included in the pre-trainednetwork. The students are expected to use TensorFlow as the development tool, because
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
Tagged Divisions
Computing and Information Technology
Associate Professor in the Department of Information and Computer Sciences at Metropolitan State University, and a Senior Fellow at the Leadership Institute (TLI) at the University of Minnesota. Dr. Kaleem is an experienced lifelong cybersecurity practitioner. His research interests include multiple aspects of cybersecurity including Smart Grid Security, Computer, and Network Security but more specifically in the area of mobile device security, mobile malware analysis, and attribution, and mobile forensics. In the past few years, Dr. Kaleem has developed and taught several courses (Ethical Hacking, Digital Forensics Engineering, Mobile Device Forensics, Malware Reverse Engineering, etc.) in the area of cybersecurity
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
also realized early, that the future data scientists and analysts need to be well-versed in i) public speaking, ii) effective cross-disciplinary and cross-cultural communication,and iii) business ethics. While the initial committee of which we were a part of did not finalizethese aspects of the Data Analytics curriculum, by the time the program had final taken off,appropriate courses (“borrowed”, for example, from the Philosophy Department or theWashington State University’s internationally renowned College of Communication) that coverthese important “non-technical” skills were incorporated into the core requirements of the newBS/BA program – while still keeping the overall credit count manageable (and, in particular,comparable to other 4-year
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Nikole Harper; Hasan Muqri; Brian Keith Wesr Sr.
Tagged Divisions
Computing and Information Technology
1 0 0 Signal 3 2 1 1 Processing Electronics 2 3 1 1 Power Systems 5 7 2 4 Computer 4 5 1 1 Systems Control Systems 7 6 1 1 Communication 6 4 2 2 s Ethics 8 6 2 4 Total
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, they are suitable for thecosine similarity algorithm. Lastly, the text-based messages posted by students in their studygroups are analyzed and compared based on the measure of TF-IDF (i.e., term frequency-inverse document frequency). TF-IDF is broadly used by the content-based recommendersystems to compare the similarity between two pieces of textual contents [17-18]. The morefrequently two students use the same set of keywords, the more similar they are considered. Itshould be noted that, in consideration of ethics, the content analysis of group discussions canbe disabled in practice. The instructor is enabled to select whether he/she prefers to place themost similar/different students in the same study group.Figure 7 illustrates the system