-WIE. She is also on the leadership team of the Kentucky Girls STEM collaborative network. c American Society for Engineering Education, 2019 USING A DATA SCIENCE PIPELINE FOR COURSE DATA: A CASE STUDY ANALYZING HETEROGENEOUS STUDENT DATA IN TWO FLIPPED CLASSESAbstractThis study presents a data science methodology to integrate and explore disparate student datafrom an engineering-mathematics course. Our methodology is based on exploratory data miningand visualization for analyzing and visualizing raw student data from multiple data sources. Theexploratory analysis serves two purposes, 1) it supports the instructor's desire to gain insightsinto the implementation of a flipped
this paper are available forother schools that would like to use and/or modify for their own purposes.[1]IntroductionAdministrative tasks like scheduling require substantial work doing iterations of menialtabulations, analysis, and revision. Most colleges and universities have software that helps withthese tasks, but it is not well suited to a technical curriculum with extensive prerequisites,laboratory/equipment/software constraints, and faculty availability. The result is a lot of manualprocessing of spreadsheets and timetables.At Western Carolina University (WCU) there are five residential undergraduate programs thatshare a number of courses. In addition, there are two undergraduate programs that are offeredoff-campus and a residential and
and reliability at a possibly lower cost [2, 4].Wireless Sensor Network is an active area of research with various applications. Some of theapplications of WSNs includes homeland security, environmental monitoring, safety, health caresystem, monitoring of space assets for potential and human-made threats in space, ground-basedmonitoring of both land and water, intelligence gathering for defense, precision agriculture, ,civil structure monitoring, urban warfare, weather and climate analysis and prediction, battlefieldmonitoring and surveillance, exploration of the Solar System and beyond, monitoring of seismicacceleration, temperature, wind speed and GPS data [1, 4]. For each application area, there aredifferent technical issues that
Work-in-Progress: A Web-Based Tool to Assess Computational ThinkingAbstractWhen President Obama unveiled his plan to give all students in America the opportunity to learncomputer science [1], discussions about Computational Thinking (CT) began in earnest in manyorganizations across a wide range of disciplines. However, Jeannette Wing stated the importanceof CT for everyone a decade earlier in her landmark essay [2]. Since then, several people andorganizations have posted their own definition of CT, which presents a challenge in being able toassess CT understanding and awareness in people. In an effort to build consensus on how to bestassess CT, the authors have developed a web-based tool that will enable CT experts globally
receiving systems for electromagnetic wavescarrying information signals. In spring semester course they will also encounter applications ofdigital signal processing (DSP), for example digital filters, used in smartphones. This paper willfocus on the signal processing course.1. INTRODUCTION. In every engineering program there are courses with high mathematicalconcepts and abstractions. For example in electrical/computer programs courses such as controlsystems, electromagnetics, signal processing and communications, students have difficulty withconcepts such as transforms (Fourier, Laplace), bandwidth, signal-to-noise ratio, design ofvarious filters, convolution, and time/frequency domain representations of signals & systems. Inthe signal
recommendations on how SEP-CyLE should be implemented in classrooms.The main contributions of this work are as follows: 1. The cyberlearning environment or tool that was developed with funding from the NSF was considered to be useful and user friendly by students who used the tool. 2. Gamification was considered by students to be motivating. 3. Students suggested that the tool should be used as an integral part of the course rather than as an add-on.1 IntroductionEmployment outlook for students with computer science degrees is very good. The United StatesDepartment of Labor Statistics has predicted a 24% rise in employment for software developersin just ten years from 2016 to 2026 [1]. A highly-compensated career with high demand that
about different processes and things. ArduinoProgramming has introduced new features for writing codes that are deemed as user friendlywith unification of procedural and object-oriented portion of the language.Microcontroller and Subsystems OperationFigure 1 shows the Arduino sketch displaying the Parasitic Thermoelectric GeneratorComponent Diagram. The Arduino Uno micro-controller interfaces with 5V relay modulechannels switches and control components for applications such as 12V CPU Fans, 5Vvoltmeter, 5V low current Temperature Sensor, Grounding safety switch for 22V Peltier w/ 1Afuse load and Grounding safety switch for LM2596s Voltage regular. It is powered by a 12 VBattery that gets charged from a 22V max Peltier DC source
, using structured casestudy method, the study selects and analyses four typical cases conducted within Chinesecomputing education system, and subsequently extracts two paths named integrated path, andspecialized path for sustainable development of computing education. Differentcharacteristics of computing education models have been outlined and summarized as fourtypical paths which are underlying computing education. The concept of computingeducation is consequently refined and suggestions are put forward for various hierarchies likegovernment, university, and industry, to effectively improve the quality of talent cultivation incomputing education in China.1 IntroductionThe development of technology and society sparked reform and transformation
American Society for Engineering Education, 2019 Top Down and From Scratch - A hybrid Approach of Teaching Real Time Embedded Operating System Zhaohong Wang, Jing Guo California State University, Chico 1. INTRODUCTIONEmbedded system design and implementation is a key component in the undergraduate computerengineering curriculum. In an era of mobile and ubiquitous computing, a competent embeddeddevice should have a real-time operating system (RTOS) to make full use of its potentials and toaccommodate task needs. Deploying an RTOS also makes the programming job of embeddedsystem engineers easier. Instead of embedded system engineers writing their own code
activethroughout. Advantages and disadvantages of these two alternative patterns are explored, alongwith ideas for improving the latter algorithm. Some data is collected on a small cluster ofinexpensive consumer-grade hardware to explore the feasibility of this algorithm.Context The Fast Fourier Transform (FFT) is an algorithm for computing the Discrete FourierTransform (DFT) of a sequence of samples of a signal. The DFT of a signal in time or space is arepresentation of that signal in the frequency domain. The DFT is a useful tool in digital signalprocessing because it describes how a digital signal is made up of complex sinusoidal components.The 1-dimensional DFT of a signal y is defined aswhere N is the number of samples in the signal being
the growth of the Internet is nolonger in question. In fact, the last remnants of the global IPv4 address pools are already dryingup. As Table 1 shows, four of the five Regional Internet Registries (RIRs) have exhausted theirIPv4 address pools and are operating under exhaustion policies that restrict IPv4 addressallocations. Only the RIR for Africa, AFRINIC, has yet to reach full exhaustion. At the time ofwriting AFRINIC is allocating from its final /8 and has a projected exhaustion date of 09November 2019 [1].Table 1. Regional Internet Registry Last /8 Allocation Information. Last /8 Assignment RIR Description
among various process models and approaches were different, collectively, theyagreed in having a framework to embrace changes in IT/software and business process [41][42] .Information Technology Infrastructure Library (ITIL): In the early 1980s, the Britishgovernment pioneered ITIL, which later became one of the best-practice methods engagingpublic and private participants worldwide. ITIL earned its fame through a full sequence of stepsthe organizations could use to implement their IT processes to establish specific tasks such as“service desk, problem management, incident management, relationship management, andconfiguration management” [17, pp. 1-2]. Many organizations used ITIL as the acceptedframework; enabling IT managers utilize a series
as an agent in a givenenvironment, and the dynamic process of occupants is simulated over time to generate the complex andintriguing emergent behavior [1]. Graph-based models use the graph (node and edges) to represent thebuilding structure and model the occupancy dynamics using some flow or queuing network [2]. Whileagent-based simulation has the advantage of being able to represent each occupant’s behavior and decisionmaking in detail, computation cost increases proportionally with the number of agents and their agentsmaking it difficult to simulate large occupancy areas such as a game stadium, airports, rail terminals, etc.On the other hand, a graph-based model assumes occupants as a homogeneous mass and models their flowacross the graph
Education (NICE) Framework [1]. A list of secure coding practices wascompiled using two different resources: SEI CERT Coding Standard [2] and Open WebApplication Security Project (OWASP) [3]. The selected coding practices are applicable to C++and Java. Each secure coding practice is assigned a weight reflecting its importance and severity.We consider a set of 43 students’ programming assignments in C++ and Java, with all of thembeing anonymized for Personally Identifiable Information. Each assignment typically has differentcoding practices that are relevant, which is a result of the difference in requirements amongassignments. The problem description of each assignment is analyzed to determine the applicablesecure coding practices to each submitted
undesirable delays and network collision, increasingthe routing overhead.Routes in MANETs are selected using the shortest path metric, which is not a sufficientcondition to construct the best paths. Since the reliable data transmission is limited bydestructions due to physical properties of the channel: noise, path loss, multipath effect,interference, mobility, and limited transmission power, certain QoS will be required, to maintainthe routing.Related WorkIn [1], Novatnack at al. describe and analyze how the existing ad-hoc routing protocols, reactiveand proactive, differ in the mechanisms they use to select paths, detect broken links, and buffermessages during periods of link outage. But current routing protocols favor routing traffic basedon
?The focus of this paper is on experiences flipping an introductory database class. In particular,what are the best practices for holding students accountable for preparing for class? The authorhas employed online reading quizzes as well as guided study assignments. Examples ofassignments as well as multiple measures of student perceptions of learning are presented.1. Active LearningActive learning is constructivist rather than exposition-centered learning. Students areencouraged and supported in a learning process where they are directly engaged with and takeresponsibility for their own learning. The merits of active learning (as opposed to passivelylistening to a lecture) are well-documented. A meta-study by Freeman et al. (2014) examined225
[5] discusses how Data Mining is not just for computer science and should be offered inthe field of statistics. Romero and Ventura [2] studied an interdisciplinary field of educationalData Mining (EDM) and reviewed milestones, applications, tools and future insights within thisfield. Anderson et. al. proposed a four-year undergraduate program in predictive analytics,machine learning, and Data Mining implemented at the College of Charleston [4]. However, theydid not describe the details for any of these courses. Sanati-Mehrizy et. al., studied differentapproaches that have been taken by different institutions for integration of Data Mining conceptsinto undergraduate computer science program [1]. Their work motivated us to conduct our studyon
curiosity in exploring a topic supports learning that knowledge [1], building upon whatis taught in their academic program. Curiosity supports lifelong learning, one of the mostdesirable outcomes of higher education, by its role as an intrinsic reward [2]. Curiosity has alsobeen linked with workplace learning and job performance [3]. Given the short-term and long-term benefits curiosity can have on self-directed learning and job performance, it is important tobe able to identify whether students are exhibiting curiosity in the assignments that are submittedfor formative feedback.In recent years’ text mining has seen increasing focus on the investigation of sentiment [4],behavior analytics [5], linguistic understanding [6] improving product
. Thefindings presented in this paper may be used by interested parties in cybersecurity curriculum and coursedevelopment. IntroductionInformation and Communication Technologies (ICT) have become increasingly important for US. The2005 U.S. President's Information Technology Advisory Committee (PITAC) report Cybersecurity: ACrisis of Prioritization included statistics on attacks and vulnerabilities. Data from this report shows thatthe total number of attacks – including viruses, worms, cyber fraud, and insider attacks in corporations –is rising by over 20 percent annually, with many types of attacks doubling in number [1]. In Novemberand December 2015, ISACA and RSA Conference conducted a global survey of
presentation.Course Learning Outcomes: 1. Identify relevant topics from previous courses and then apply them to their project 2. Identify and specify design requirements from general problem descriptions 3. Communicate design ideas and information 4. Demonstrate creative thinking 5. Display information gathering skills 6. Demonstrate oral and written communication skillsTraits: Upon successful completion, students should have the following attitude(s)/traits: Confidence in their ability to design. Confidence in their ability to communicate technical information effectively.Our senior design course is structured as a collection of independent or group student projects.This capstone course is offered every semester
of student feedbackregarding the level of their interest in programming before and after robotic activities, thechallenges of programming a robot, and their overall rating of integrating robotic activities inprogramming classes are presented and discussed.IntroductionIntroductory computer programming is a core subject in the curriculum of computer sciencemajor. The subject is frequently taught in three different courses; namely, CS 0, CS 1, and CS 2.The topics covered in CS 0 are often related to various fundamental concepts in computing andcomputer algorithms. Many computer science programs place a particular emphasis on computeralgorithm in CS 0 to familiarize students with programming logic. In CS 1, students learn towrite computer
departments of computer science and engineering. Her interests focus on broadening participation in computer science and engineering through the exploration of: 1) race, gender, and identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women and minorities in computer-related engineering fields.Prof. Zahra Hazari, Florida International University Zahra Hazari is an Associate Professor in the Department of Teaching and Learning and the STEM Trans- formation Institute as well as an affiliate faculty member in the Department of Physics. Dr. Hazari’s research focuses on reforming physics
Information systems.IntroductionSeveral studies have pointed out the need to foster a diagnosis and an intervention concerninggender equality in academic contexts (1-14). Studies carried out by Amâncio (9-10) demonstratedthe existence of gender patterns in access and mobility processes to which are linked gender biasesand stereotypes that place women on the "margins" of knowledge production. Recent studiesdeveloped in Portugal (15) describe how women and men are socially perceived according toessentialist dichotomous principles, which favour the invisibility and devaluation of women.Legislation on the promotion of gender equality in educational institutions in Portugal is relativelyrecent compared to other European countries and it is the result of a
chance” at education. UVU has a high number of non-traditional students (age 25 or older – 34%), students with spouses (45%) and/or children underage 12 (20%) [1]. It also has the largest percentage of low-income (48%) and first-generation(38%) students of any of the universities in the state. These factors affect the overall graduationrate, which is low at 33% (nationally standardized IPEDS rate for completions within 150% oftime; UVU IR 2019) [1]. UVU’s students live at home or in off-campus housing, which makes itvery difficult to organize activities for student programs. Many students do not have time tospend much time outside of class on campus, leading some to feel little connection with otherstudents.New Engineering ProgramsTo meet one of
Framework of CT for Big E (CT-ENG)Computation thinking is a broad term that encompasses a set of concepts, techniquesand skills. In this section, the study will deconstruct and define CT in the context of“engineering with Big E” (CT-ENG) as follows: We firstly draw on multiply materialsincluding standard documents, reports, and other scholarly literature to identify thecore elements of CT-ENG. We then conduct face to face semi-structured in-depthinterviews with 19 professionals and 5 human resources executives from 11enterprises and institutes. After two rounds of revisions, we formulate a frameworkfor CT-ENG based on these four elements (See Fig.1): Digital Literacy: Understand the basic functions and terminology related to computer hardware
outside securityrisks, how to control internet access to and from their internal networks, and how to allow publicaccess to resources the company provides while preventing the public from accessing the internalnetworks [1]. To accomplish this, network architects usually divide the network into zones. Theuntrusted zone is for all incoming internet traffic which is untrusted by default, just before it goesthrough the network’s firewall. The trusted zone is for any traffic that is on the internal network.Any resources that the business provides for public consumption, like HTTP requests to thecompany’s webserver, does not need to be on the internal network for security purposes. In orderto accommodate that traffic a demilitarized zone is set up with
tune vulnerabilities in VM systems. In this paper, we present anautomatic security patch removal tool that can fine tune various Windows VM systems to preciselevels of vulnerabilities, and easily employed by students and educators alike. This tool cancreate virtual machines that simulate different security states in the Windows operating systemtimeline and gives a more realistic view of the ever-changing state of cybersecurity to thestudents pursuing an education in the field.1. IntroductionIn the current Internet-connected world, most companies, government agencies, and ordinarypeople heavily rely on the cyber world for information and data management, processing, andexchange. Information leakage and data breaches become increasingly damaging
and textually on class-laboratory worksheetsincreases engagement with the content. In addition, ways of memorizing the content may beintroduced visually, along with strategies that aid the long-term recall process.Keywords:boardnotes, diagrams, networking, switching, routing, electronics, systems, visual learning,illustrations, notesIntroductionIn the ever-increasing data-centric environments we live and work in, understanding andexpressing ideas visually as well as verbally is part of a critical skillset. Providing students withstructured opportunities for class and laboratory activities to sharpen these skills will allow themto better navigate their way in the workforce.According to [1] experts notice patterns and features in information
experience at Rockwell, Raytheon and Novell; and she has led her own consulting firm, created and taught in one of the first networking degree programs in Texas, and previously managed IT- related divisions and grants ranging $1-$20 million in community colleges in Texas and California. Prior to her current position, she was Vice President of Academic Affairs for Porterville College, responsible for all instruction at the college, and prior that she was a Dean at both Orange Coast College in California and at Collin College. Among other things, Ann is known for effectively bringing together business and industry using a stream- lined process to identify with them the knowledge, skills, and abilities (KSAs) they predict
safe, hazardfree environment where students can make mistakes without losing much time or costing theuniversity any money. This paper details the VR simulation Utah Valley University (UVU) iscreating in order to allow students to simulate the etching process. The further goals of this paperare to explain the rationale behind the creation of the simulation and its potential in the studentlearning of nanotechnology.IntroductionThe National Nanotechnology Initiative (NNI) defines nanotechnology as “ ...the understandingand control of matter at the nanoscale, at dimensions between approximately 1 and 100nanometers” [1]. As nanotechnology grew it became necessary to manipulate at the nanoscalevia multiple methods, one such method being