Session ETD 415 Experiential Learning, Action Research, and Metacognitive Reflection in the Senior Capstone Charles Feldhaus, John Buckwalter, and Elizabeth Wager Indiana University Purdue University IndianapolisExperiential and Integrative Learning and Connections to the Capstone ExperienceScience, technology, engineering and math (STEM) degree programs have for many years used acapstone course as the culminating experience for graduating seniors. Traditionally, this courserequires teams of students to come together and address real world problems by synthesizingdata and creating
Session ETD 465 Is It Ethical To Lie? Raymond Floyd IEEE Life Senior MemberAbstractWhen asked the question, “Is it ethical to lie?”, most people will respond with comments suchas, “No, it is immoral to lie!”, or “No, I wouldn’t lie!”, and so forth. In the first response, theresponder is reflecting on their moral upbringing, but not necessarily the ethical position of thequestion being asked. In the second response, they probably just did. The problem facing suchresponses is that the person responding is mixing two different concepts
models from images obtained with a scanning electron microscope (SEM). The projectwas motivated by a desire to showcase new technical capabilities of the UIC, for bothcommercial and K-12 educational outreach purposes. The students focused primarily onautomating to the extent possible the challenging tasks of converting a series of (SEM) imagestaken of complex specimens found in nature to a 3D CAD description suitable for generatinginstructions for a 3D printer via photogrammetry software. The methodologies and toolsincorporated by the students is described and examples are shown of successful modeling efforts.The challenges remaining and opportunities to improve the technical process are discussed. Theproject is reflected upon in terms of its
encounter similar events in their future. Over the course of the term, the students began toanticipate the impending change, and it became a point of enjoyment for them to prepare for thenext adjustment. Such changes were also reflected in their term papers, as some portionsrequired re-writes due to the revisions in the assignment.SolutionsThere a number of actions that could help address the problem. First, inter-departmentcommunications on content and structure of technical writing would help students understandingof the difference between writing and technical writing. The Engineering Department couldprovide specific research-like projects that could be undertaken by the pre-engineering students Proceedings of the 2019
Engineering Education Session CIEC 421Depending on the amount of light reflected by a surface (gloss), the surface is going to haveshiny or lustrous, metallic or matte appearances. Many factors can influence the gloss of asurface, such as the amount and type of coating applied or the quality of the substrate. Whenproducts look different after a period of time, customers think there is a deformity, for thatreason manufacturers want a maximum appeal on their products. “It is important therefore thatgloss levels be consistent on every product or across different batches of products. Gloss can alsobe a measure of the quality of a surface, for instance a drop in the gloss
Approach for Integrated CAD and Computer-Aided Inspection Planning”, Springer-Verlag London, 2014.[5] Cliff Mirman, “Pathways for Integrating Industry into an Engineering Technology Program”, Proceedings of the 2018 Conference for Industry and Education Collaboration, San Antonio, TX.[6] Fornaro, R.J., Heil, M.R, and Alan L. Tharp, A. L., 2006, “Reflections on 10 years of sponsored senior design projects: Students win–clients win!,” The Journal of Systems and Software 80 (2007) 1209–1216.[7] Kornecki, A.J., Khajenoori, S., Gluch, D., Kameli, N., 2003. “On a partnership between software industry and academia.” Proc. of the 16th Conference on Software Engineering Education and Training, Madrid, Spain, pp. 60–69
regions served. However, resources are continuously needed to foster morecomprehensive commercialization efforts by creating, developing and testing prototypes,providing assistance with patenting, discovering seed funding and assisting nascententrepreneurs with the development business skills.Between, June 1, 2016 and December 31, 2018, CMEC client demographics reflect inclusivity interms of diversity of the population in Northwest Indiana. Recently CMEC has providedservices to diverse clients as follows: Hispanic (8%); African American (15%); Asian (6%) andalso in terms of gender diversity, female (28%). Number of new prototypes developed 13 new prototypes Number of new products commercialized 9
Copyright ©2019, American Society for Engineering Education Session ETD 355Relevance for Undergraduate EducationThe ABET criteria for accrediting engineering and engineering technology programs reflect theimportance of standards competence for students. Specifically, both the ABET EngineeringAccreditation Commission (EAC) and Engineering Technology Accreditation Commission(ETAC) accreditation criteria give significant consideration to the topic of standards. 2018-19EAC criterion 5d states, “students must be prepared for engineering practice through acurriculum culminating in a major design experience based on the knowledge and skills acquiredin earlier course
of the welds will also beincorporated in a future study. Figure 4 Student using the VR welding system in labSurvey of students with resultsIn order to improve the welding experience this semester, faculty sent out a Qualtrics survey tostudents from previous semesters asking them to reflect on their experience with the virtualreality welding system, using a Likert scale for assessment.Before answering the first two questions, the students were requested to recall their impressionsafter using the virtual reality welding system, but before entering the welding lab to make a realweld. The first question was: “How confident were you that you could make a real weld after Proceedings of the 2019 Conference for
. If one thermocouple is touching the fins, then a hot spot would be seen andit can adversely affect the result. Another reason might be the equations used from literature hadlimitations over this study such as the Reynold’s number and fin dimensions.Assessment rubrics reflected students expectations from ABET learning outcomes. The capstoneassessment should be redesigned to include the other ABET outcomes such as ethics in workingenvironment and to allow better team work evaluation.References[1] Schmidt, E.D., (1926). “ie warmeuebertragung durch ripen,” Zeitschrift des Vereines Deutscher Ingenieure, 70,pp. 885–951.[2] Duffin, R.J., (1959). “A variational problem related to cooling fins,” Journal of Mathematical Mechanics, 8, pp.47–56.[3
measurements and the total relative uncertainty, including random,bias, and system uncertainties, ranged between ±7-17% for most cases.Assessment rubrics reflected students’ expectations from ABET learning outcomes. Thecapstone assessment should be redesigned to include the other ABET outcomes such as ethics inworking environment and to allow better team work evaluation. Proceedings of the 2019 Conference for Industry and Education Collaboration Copyright ©2019, American Society for Engineering Education Session ETD 545References[1] Mafiz, H., Huq, A. M. A., and Rahman, M. M., (1996). “An Experimental Study of Heat Transfer
]. Patriciu and Furtuna, developed a guide for the designof cybersecurity exercises. The guide suggested seven sequential steps that should be followed todesign an effective cybersecurity exercise. The steps were as follows: Objectives, Approach,Topology, Scenario, Rules, Metrics, and Lessons learned. As a high-level guide, Patriciu andFurtuna, explained what each step was meant to achieve; an effective scoring engine istransparent to participants and accurately reflects rules regarding scoring. The scoring metricsare to be directly related to learning objectives [17]. For example, if the learning objective wasto secure a service using firewall technology, the corresponding metric should have measuredwhether that service was secured by the firewall’s
mappings are actuallyassigning points in the 2-dimensional w-plane to points in the 2-dimensional z-plane.w = az + b w = ln(z) az+b w = sin(z) , w= arcsin(z)w= cz+d w = cos(z) , w= arccos(z)w = z2 , w = √z w = tan(z) , w = arctan(z) 𝑛w=z n . w = √𝑧w = e z = e (x + iy) = e x e iyThe reflection in the horizontal axis x – iy of a complex number z = x + iy is called the conjugateof z and is represented by the symbol z*. The conjugate of z can be used to