Centre/University of Minho (Portugal) working on H2020 Project titled ”Gender Equality Plans for In- formation Sciences and Technology Research Institutions, EQUAL-IST”. He is Member of Intersociety Cooperation Committee, Standing Committee of the IEEE Education Society; Vice President of Brazilian Chapter of Association of Information Systems (BRAIS); Vice President of the Portuguese Chapter of the IEEE Women in Engineering (IEEE WiE); and Associate Editor of Directory of Open Access Journals (DOAJ). He is Editor-in-Chief of Brazilian Journal of Education, Technology and Society (BRAJETS) and Associate Editor of Journal of Information Systems and Technology Management (JISTEM). He is titled ”Engineering Educator
security practitioners indicate that their organization doesnot invest enough in security awareness training. Professionals in the field consider it imperative foracademic institutions to increase course development in computer security to make students bothknowledgeable and technologically prepared for future challenges in this field. Knowledge aboutongoing and planned activities will help the institutions to design and develop effective programsindividually and in collaboration with others. Universities are only beginning to catch up.The objective of this paper is to describe our experiences in the design and development of cybersecuritycourses and laboratory exercises for a cybersecurity concentration for our computer science majors
browsing capabilities via TOR (The Onion Router), LAMP (Linux, Apache, MySQL, PHPor Python or Perl) server, Virtual Private Network (VPN) server, and protected browsing viaproxy service. The main goal of this educational project is to leverage the total holisticintegration of open source hardware and software to provide an affordable and portable solutionthat could be promptly deployed in case of an emergency, as a part of an incident response plan(IRP), or in case it is needed for testing purposes. Implementing this project provides valuablehands-on security experience and best practices in network architecture and configuration.Additional security features, both in hardware and software, were added to the single-boardcomputers to add additional
suggestedbyState Council in its recently released “NewGeneration Artificial Intelligence Development Plan”[2], we should “gradually carry outnational intelligent education projects, set up AI courses in primary and secondary schools,gradually promote programming education, build AI disciplines and cultivate AI talents”. Therefore, it is necessary and urgent to set up AI courses especially in primary andsecondary schools. To this end, AI education systems and related teaching systems are indis-pensable. However only few AI education equipment are available at market such as ChengXiaoben of Makeblock and Abilix’s Oculus, which are affordable programming educationrobots learning systems, integrating more than 10 electronic modules such as sound sensors
the race of building ultimatelyautonomous vehicles. In this paper, we conduct a study on self-driving technology. Autonomouscars offer many benefits. The primary benefit is that they reduce accidents and save lives. Therehas been a long history of developing self-driving cars, from Stanford Cart in 1961 to Tesla andGoogle at present. The differences between Tesla and Google are mainly in two areas, computervision technology and human car control. Self-driving is challenging and requires a wide rangeof technologies, including learning the environment, tracking objects, localization, path planning, 1and control. We illustrate finding lane lines with computer vision and predicting the location
as astrategic partner, and executives’ IT knowledge as crucial to accept management change andalign business with IT. Research suggested 60% or more of chief executives in Great Britainbelieved their company’s information technology did not typically help to achieve their businessgoals and objectives, compared with 39% for IT directors [16]. Meanwhile, IT managerscriticized the executive members who did not understand technology for failing to support ITinvestments and projects [16].In a competitive environment, a new role for the CIO required him/her “to establish, implement,and communicate the strategic IT vision and plan, wedded to the overall business strategy, andensure that IT is used effectively to achieve overall business goals
nearly quadrupled from its fall 1993 enrollment of 10,500. UVU isnow the largest bachelor-degree granting institution in the state. While this institutional transitionhas been the result of much strategic planning, it has strained state and community resources andcontinues to create a number of challenges, particularly in the availability of scholarship funds.UVU has a dual mission – that of a comprehensive university offering bachelor’s degrees and afew master’s degrees, and that of a community college offering associate degrees andcertificates. As part of its community college mission, the institution maintains an open-enrollment policy. Student demographics are similar to those of a community college, withmany students seeking a “second
development background of computing education in China to form a morecomprehensive and clear understanding of it, and refine the path of the realization ofcomputing education through the structured case study.2 The development of computing education in ChinaThe training for computer science and technology professionals started in the United Statessince the 1950s. Later the training programs adopted by other countries including China, allreferred to the US system.In 1995, on the basis of extensive research, the Ministry of Education approved the plan forthe reform of educational contents and curriculum for computer science and technology. Theproject is undertaken by a team of teachers from 9 universities including Fudan University,Shanghai Jiaotong
educationalparadigm for engineering can no longer be adapt for the emergence of complexsystems and grand challenges. As a response, School of Engineering launched a newLong Range Plan “Engineering with a Big E: Integrated Engineering Education”(Moses, J., 1994), which is essentially the integration of engineering technologies andengineering science at first and the integration of STEM and non-STEM elements aswell (Kong H.B, 2011).The “Big E” strategy led to CDIO (Conceive, Design, Implement, Operate) approachin the Department of Aerospace Engineering (Crawley, 2001) and had a profoundinfluence on engineering education: Olin College of Engineering came up with“Engineering2.0” demanding new qualities for the next generation of problem solvers(Miller R.K., 2017
the courses includes: test plan creation, test case generation, program inspections,black-box testing, white-box testing, GUI testing, and the use of testing tools. The prerequisite forCEN4072 is the data structures course. The grading policy for the course is based on 2 midtermexams (25 % each), a group project (25%), attendance and class participation (5%) and a finalexam (20%). The course is structured as a lecture section with no lab component, and students areexpected to work on the project outside of class on their own time, with some in class question ses-sions. The textbook currently used in the course is “Foundations of Software Testing”’ by Mathur[21]. Other reading material includes class notes and tutorials on testing tools.The
coursetaught as a general education requirement and required for all students [16]. In the article,‘Planning for Computer Literacy’, Roger W. Haigh [10] discusses how colleges and universitieswould need to decide what computer literacy skills students would need for their careers andpersonal lives. Since then, universities have offered a variety of general education courses incomputer literacy and programming. Some existing courses that are part of the core focus onhighly technical skills, while others are aimed at educating students more generally. Recently,there has been a call for an expansion of computer literacy to include cyber literacy, safety, andsecurity [21, 22, 24]. Universities have begun to offer courses in cybersecurity
Paper ID #26746Board 28: Working with Business and Industry to Update Nationwide ITSkill StandardsMark Dempsey, Collin County Community College Mark Dempsey joined Collin College in 2012 as program manager for the National Convergence Tech- nology Center. In his current position as Assistant Director, he plans and manages the CTC’s special programs and events as well as provides administrative and operational support to the CTC’s Principal Investigator. Prior to Collin College, Mark worked for eight years at UCLA Extension, the continuing education division of UCLA. There, he worked first as an assistant to the director
and parallel concepts. Student progress against the planned timeline willallow us to obtain a measure of the student learning in simulation modeling and parallel programming. Wehope to complete these works by next year.CONCLUSIONIn this work, we parallelized the sampling step of the SMC algorithm and were able to achieve up to 25%speedup in the runtime when using a machine with 8 cores. Currently, the convenience of converting aserial program to parallel and availability of multicore machines makes it quite sensible that the firstapproach to make any algorithm efficient is to take advantage of parallel computing. In the future, we planto run experiments in multi-cluster machines. We also plan to consider modifying the algorithm so that itcan
Quality Enhancement Plan (QEP)critical thinking and reading initiatives at Eastern Kentucky University. Allowing students to beactive participants in their learning is a key driving force behind Boardnotes 2.0. It is aimed atinviting students to express their understanding in other modalities beyond text. Visual, verbal,and auditory expressions of our understanding allow others to view and hear it, allowing foreasier collaboration and growth. It keeps the content center stage while also allowing the light oftheir growing understanding of the discipline to shine. Learning gets a boost when students try toget the information out into the open and use it to solve problems, make decisions, reachpositions or conclusions, consider implications, apply
rest of the paper is structured as follows. Section 2 presents the details of the QuestionFormulation Technique and its use in our study. Section 3 presents our proposed approach for thespecific problem identified in our overall project. Section 4 presents and discusses the empiricaldata mining results obtained. Section 5 provides a summary of our paper with a plan for futurework.2. The Question Formulation TechniqueThe ability to formulate salient questions is a critical life skill that enables the student to moredeeply engage with the content being learned. Questions serve the purpose of making clear andconcrete that which is unknown or misunderstood by the student. By making the unknownconcrete, a pathway for exploration, engagement and
, while other degrees are considered as applied majorswith which graduates are expected to go to industry right after school.According to [3], Chinese computing education can be divided into three major developmentperiods. The first period started in 1956, following a 12-year plan by the State Council of Chinaat the time. The 12-year plan identified computer as one of the six emerging areas of importance.A couple schools, including Tsinghua University and Harbin Institute of Technology, started thecomputing majors in 1956. By the end of 1950s, more than 10 colleges initiated computingmajors. The focus at the time was on designing and building computers, or computing devices. Afew sample courses of the time include Principles of Electric
Work-in-Progress: A Web-Based Tool to Assess Computational ThinkingAbstractWhen President Obama unveiled his plan to give all students in America the opportunity to learncomputer science [1], discussions about Computational Thinking (CT) began in earnest in manyorganizations across a wide range of disciplines. However, Jeannette Wing stated the importanceof CT for everyone a decade earlier in her landmark essay [2]. Since then, several people andorganizations have posted their own definition of CT, which presents a challenge in being able toassess CT understanding and awareness in people. In an effort to build consensus on how to bestassess CT, the authors have developed a web-based tool that will enable CT experts globally
that ideainto actions requires planning. So before one can write any code, or design any system,one has to take the time to explore the possible techniques and technologies. The mainchallenge for non micro-controller based TEG systems is that the utilization efficiency ofthe energy is low, a large amount of the generated energy may be wasted. Hence there isa potential need for an energy management system which can acquire, store and deliverenergy efficiently, with minimum energy wastage. With proper mentoring, capable tutelage,and guidance, these burgeoning and talented young students will contribute to the bestpractices in implementing future system design and apps development.ResultsSo far we have used this series of modular design projects
foreach student. At the end of the semester, they turn in a final written report and a finalpresentation which is evaluated by several faculties from the department. The following gradingrubric is used to assess these projects:Assessment of the ProjectsThe project final grade is calculated on a 100-point scale, with the maximum number of pointsfor each area of assessment as follows:Quality and rigor of research and research paper 25 pointsQuality of other deliverables (hardware design, integration,management plan, code, etc.) 15Degree to which project fulfills requirements specified inproject proposal 20Level of effort
flipped learning as well as particular applications in computerscience courses. Three guided studies for an introductory database course were illustrated,followed by multiple measures of student perception of the efficacy of guided studies. Theauthor concludes that the approach was effective for learning and valued by students.In future studies, the author plans to 1. track the completion rate of guided studies more closely to see how it relates to achievement of learning outcomes. The completion rate was tracked in the beginning of the semester, but tailed off toward the end because it did not seem necessary. 2. investigate the impact of flipping the course on achievement of learning outcomes by comparing test scores of