Asee peer logo
Displaying results 1 - 30 of 36 in total
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
temperature,light, and vibration.Educational excellence requires exposing students to the current edge of research. To ensure thatstudent projects are along the same trajectory that the industry is moving, educators mustcontinually introduce emerging techniques, practices, and applications into the curriculum. Thefield of wireless sensor networks is growing rapidly, and there is increasing interest in providingundergraduate students with a foundation in the area. It is crucial that the emerging field ofwireless sensor networks be integrated into the undergraduate computer science and engineeringcurricula. This paper presents the details of two WSN projects that our undergraduate computerengineering students have done in their senior capstone
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Luis Eduardo Paredes, Guru Labs, L.C.; Jacob Morris, Utah Valley University
Tagged Divisions
Computing and Information Technology
Tech Engineering Technician with Inovar. He received his BS de- gree in Computer Engineering from Utah Valley University. His research interests include microcontroller programming with real-life applications regarding the medical field and finding reliable, cost efficient re- placements for known and accepted devices. c American Society for Engineering Education, 2019 Design of a Bluetooth-Enabled Wireless Pulse OximeterAbstractCapstone courses play a crucial role in Computer Engineering (CE) curricula. The principlepurpose of a Capstone project course is to offer a summative opportunity for graduating seniorengineering students to apply their professional skills and knowledge in a single
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Education, 2019 How an NSF S-STEM LEAP Scholarship Program Can Inform a New Engineering ProgramAbstractIn Fall 2014, Utah Valley University was granted a Scholarships in STEM award from theNational Science Foundation. Entitled Strengthening Outcomes for Students in Engineering andComputer Science through Leadership, Engagement, Academic Mentoring, and Preparation(LEAP), the program is now in its fifth and final year. The goal of this project is to increase thegraduation rate for students in Computer Science and Engineering at UVU, an open enrollmentuniversity, and better prepare them for continued education and/or success in the STEMworkforce by providing scholarships to academically talented students with financial need
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
study cycles in Textitle Engineering and Engi- neering and Industrial Management, in the 1st cycle course of Design and Fashion Marketing, and also in the 2nd cycle courses of Fashion Design and Communication, Textile Chemistry, Advanced Textiles and Design and Marketing. Head research and research member of several R&D projects, has presented as main author or co-author many dozens of scientific journal papers and communications in international conferences. President of the Pedagogical Council of the School of Engineering since 2011 and Vice-Dean of School of EngineeringVictor F. A. Barros, University of Minho Victor F. A. Barros, Ing.-Paed IGIP (ORCID 0000-0002-7318-8257) is Researcher Fellow at Algoritmi
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Saeed Al-Haj, Ohio Northern University; Naeem Seliya Ph.D., Ohio Northern University; Collin Lee Kemner, Ohio Northern University
Tagged Divisions
Computing and Information Technology
. His general expertise and interests include: IoT and Network Technologies, iOS application development, and Secure programming. He has recently published his first ASEE paper and presented at the ASEE NCS Section in March 2019 with his senior capstone team, SoT (Secure of Things). c American Society for Engineering Education, 2019 Pedagogical Assessment of Secure Coding in Student ProgramsAbstractStudents in introductory Computer Science (CS) courses are required to submit severalprogramming assignments and/or projects. The submitted programs are largely assessed on theircorrectness to the given problem, and not against secure software coding practices. In ourexperience, student programs
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, Mississippi State University
Tagged Divisions
Computing and Information Technology
education, a variety of pedagogical considerations have beenimplemented and experimented, such as inquiry-based learning (Behrouzi and Kuchma, 2016),project-based learning (Khorbotly, 2015; Wang et. al., 2017; Zhao et. al., 2017; Luo, 2015),cooperative learning (Akili, 2012), active learning (Luo, 2015; Akili, 2014; Oliveira, 2015),divide-and-conquer learning (Kos and Miller, 2017; Sullivan-Green, et. al., 2017), student-centered learning (Grigg and Stephan, 2018), and problem-based method (Oliveira, 2015), etc.The project-based learning approach is one of the innovative methods promoted in engineeringeducation. Khorbotly developed and taught a computer vision curriculum in the undergraduateelectrical and computer engineering program using a
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
environments[28], [29]; however, it has been shown to present assessment challenges [30].While peer learning can take many forms, in the computational science disciplines andcybersecurity, it often will be conducted in a project- or problem-based learning (PBL)environment. In these environments, students are presented with (or may self-select) a problemor challenge to solve or a project (e.g., software development) to complete. The efficacy of PBLhas been demonstrated at multiple levels of education [31]–[36]. It has also been shown to beeffective in numerous disciplines. Examples of the effective use of PBL can be found incomputer science [37] and electrical [38] engineering. It has also been demonstrate to beeffective in non-STEM disciplines such as
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mark Dempsey, Collin County Community College ; Ann F Beheler, Collin County Community College
Tagged Divisions
Computing and Information Technology
of UCLA Extension’s Entertainment Studies & Performing Arts department, helping coordinate academic projects and special events, and later as a program representative, managing domestic and international custom-designed sem- inar programs. For several years during his tenure at UCLA Extension, Mark also served as a co-instructor for the capstone online class ”The Business of Hollywood,” which employed a unique role-playing ele- ment to explore strategies of film financing and negotiation. Before joining UCLA Extension, Mark was a development executive at an independent feature film production company, Echo Lake Productions. He has also worked as a freelance script analyst for Silver Pictures. Mark holds a BA
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Eliezer Ochoa Jr.; Joshua David De Piano; Michael G. Milford; Alan Moses Galvan; Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
DIGITAL THERMOELECTRIC-GENERATOR BASED POWER SYSTEMAbstractThis paper is an attempt to report the modeling, design and build analysis of thermoelectricmodule (TEM) with realistic conditions for electrical power generation. It gives an insight tostatic and dynamic modeling with temperature dependent parametric variations and computationof various TEM parameters for modeling power generators.This paper demonstrates the undergraduate engineering technology student-driven research atour university in this arena. It depicts the application of the multi-agent approach which allowedthe student team to take full control of the project from inception to completion. The teamdeveloped and built a microprocessor based prototype thermo
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
browsing capabilities via TOR (The Onion Router), LAMP (Linux, Apache, MySQL, PHPor Python or Perl) server, Virtual Private Network (VPN) server, and protected browsing viaproxy service. The main goal of this educational project is to leverage the total holisticintegration of open source hardware and software to provide an affordable and portable solutionthat could be promptly deployed in case of an emergency, as a part of an incident response plan(IRP), or in case it is needed for testing purposes. Implementing this project provides valuablehands-on security experience and best practices in network architecture and configuration.Additional security features, both in hardware and software, were added to the single-boardcomputers to add additional
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said, Davenport University; Ghaythah Abdullah Alqarna
Tagged Divisions
Computing and Information Technology
model.Decision makers expect concurrent executions of business and integration of new ITtechnologies help to alleviate the business requirements and meet their business goals andobjectives. Introduction: Project management is critical to IT development and helps to keep ITprojects on track through each cycle. A Wall Street Journal report stated recent researchrevealed managing IT projects well could significantly improve a firm’s profits and improve ITinvestments [3]. IT project management is often a process used to keep the project withintechnical limitations, within the allowed budget, and within a deterministic schedule [38].The Standish Group’s “CHAOS Summary 2009” showed the project success rate had decreased,with the data revealing a
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jingshan Wu, Zhejiang University; Yujie Wang, Zhejiang University; Hanbing Kong, Zhejiang University; Ling Zhu, Zhejiang University
Tagged Divisions
Computing and Information Technology
computational thinkingskills. This study first proposes a framework of computational thinking in the contextof engineering (CT-ENG), using qualitative content analysis on industry interviews.The authors then introduce the program of the Robotics Class of Zhejiang Universityin China, providing an integrative approach to teaching computational thinkingeffectively. The Robotics Class engages students in project-based computing-aidedengineering activities throughout the four-year bachelor’s program, and improvestheir computational thinking skills through engineering engagement. The findings inthis study could have some implications for non-CS engineering majors to promotecomputing education and equip students with computational thinking at digital era.Key
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Programming [10] Mining Programming, Projects, Reasonable Analytical written programming homework background, Discrete problems, Midterm Math and Calculus and Final, Final Project, Open note/open book exams Columbia University Machine Learning
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Alka R. Harriger, Purdue University; Suyash Agrawal, Purdue University; Arjun Shakdher, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #25423Work in Progress: A Web-Based Tool to Assess Computational ThinkingProf. Alka R. Harriger, Purdue University Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she taught software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Real- ized through Information Technology) project. From 2013-2018, she co-led with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching Engineering Concepts to Harness Future Innovators and
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Peter J. Clarke, Florida International University; Debra Lee Davis, Florida International University; Ingrid A. Buckley, Florida Gulf Coast University; Geoff Potvin, Florida International University; Mandayam Thirunarayanan, Florida International University; Edward L. Jones, Florida A&M University/Florida State University
Tagged Divisions
Computing and Information Technology
engineeringclasses that compares lecture-homework-project teaching approaches to peer-to-peer active learn-ing when combined with design-based learning approaches. Although both approaches show thatstudent do show improved performance, the peer-to-peer active learning and design-based learningapproach received much greater interest, engagement, and intrinsic motivation. Dicheva et al. [5]present a survey of published empirical results on the applications of gamification in education.The authors further stated that although most of the papers surveyed showed promising resultsthere is still more research needed to determine the impact on student learning.Clarke et al. [9] describe how WReSTT (Web-Based Repository of Software Testing Tutorials)is used to
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
model of Cybersecurity education; and this reformwill be based on our prior experience with the introduction of innovative teaching modules in a numberof science, mathematics, and engineering Technology courses, faculty student seminar series, working inteams, use of simulation and K-17 student competitions. EducationAlmost every career path open to a bachelor’s degree student encompasses some aspect of security.System administrators must be able to properly configure and maintain a system; programmers mustknow how to build secure software from the bottom up; web development personnel must understandthe risks involved and how to best reduce the potential impact of these risks; and project
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiaoyan Gong, Institute of Smart Education, Qingdao Academy of Intelligent Industries. ; Liang Zhao, Faculty of Information Technology, Beijing University of Technology; RenHao Tang, Faculty of Information Technology, Beijing University of Technology; YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology; Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy of Sciences; Jian He, Faculty of Information Technology, Beijing University of Technology; Fei-Yue Wang, National Key Laboratory of Management and Control for Complex Systems, Chinese Academy of Sciences; Ying Tang, Rowan University; Wanruo Shi, Beijing Normal University; Xiaojie Niu, Beijing Normal University; Xinzhu Wang, Beijing Normal University
Tagged Divisions
Computing and Information Technology
are encapsulated and modularized with friendly and easy-to-useinterfaces. AI curricula are developed based on constructivism, project-based learning andmultidisciplinary integration. Typical teaching cases, such as speech recognition, text recog-nition, image recognition, intelligent transportation, smart home, intelligent robots, etc.,which are used to enhance comprehension of AI concepts and applications, are also discussed. Keywords : AI Education, Innovation Capability, Constructivism, iSTREAM1. Introduction The radical and transformative technological revolution of artificial intelligence (AI) hasresulted in fundamentally new ways of science and engineering practice. Countries aroundthe world have released national strategies to
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Arati Banerjee, University of Central Florida; Damla Turgut, University of Central Florida; Cliff C Zou, University of Central Florida
Tagged Divisions
Computing and Information Technology
security. Education inthe field of cybersecurity suffers from natural difficulties because of these factors. Any tool thatcan ease the way of students and educators alike to explore cybersecurity is vital to meeting thedemands of a more interconnected world than ever.Offering courses in cybersecurity is an effective way to educate about the theoretical aspects ofsecurity. However, a workshop of recognized experts run by ACM's education board determinedwithout a doubt that studying theory is not enough to prepare a potential cybersecurityprofessional (McGettrick, 2013). In the light of the shift of infrastructure from physical toelectronic control and the rising number and severity of cyber-attacks, the DETER project wascreated (Mirkovic, et al
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Debra M. Duke, Virginia Commonwealth University; Mandayam Thirunarayanan, Florida International University; Abigail Byram, Virginia Commonwealth University; Peter J. Clarke, Florida International University
Tagged Divisions
Computing and Information Technology
at Reynolds Community College in Richmond, Virginia in 2009 and moved to VCU in August 2016. Debra has served on the advisory board for Lighthouse for Computer Science (LH4CS). The goal of the Lighthouse project is to improve computer science diversity through faculty professional development. In addition, she is a member of the Advisory Council for the Deep Run High School’s Center for Informa- tion Technology in Glen Allen, Virginia, where she provides program support and assists in curriculum development for their technology-based preparatory program for future computer scientists.Dr. Mandayam Thirunarayanan, Florida International University Mandayam Osuri Thirunarayanan is an associate professor in the School of
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Hugh Jack P. Eng. P.E., Western Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
presented is the first iteration of a larger system. For this firstphase of the project, the system uses standard (draft) schedule report spreadsheets. These areprocessed to calculate individual faculty loads, detect conflicts, produce visual schedules, trackunstaffed courses, banked credit, etc. More importantly, the analysis uses information about thestructure of the curriculum to support cohort oriented scheduling.The project has been implemented in Matlab using Tables. Although other platforms might bebetter suited to this type of data analysis, the use of Matlab makes it easier to modify and extendin Engineering schools. This is in major part due to the widespread use of Matlab inUndergraduate and Graduate curriculum. The programs described in
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Computing and Information Technology
interaction of assessment withlearning and teaching. As an integral part, assessment provides an opportunity for teachers and students alike toidentify areas of understanding and misunderstanding. With this knowledge, students andteachers can build on the understanding and seek to transform misunderstanding into significantlearning (N.R.C., 1993). Assessment as ‘learning’ is not a third-party research project orsomeone's questionnaire; it must be viewed as a community effort or nothing, driven by afaculty's own commitment to reflect, judge, and improve (Narayanan, 2007 & 2009). The author has tried to follow such a philosophy while gathering data for this project. Inthis presentation the author provides some guidelines for
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Zhengze Lyu, Zhejiang University; Wei Zhang, Zhejiang University; Yixue Zhuang, Zhejiang University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
base of Chinese Academy of Engineering. I studied information and computing science for my bachelor degree. And I became a PhD Candidate in Educational Economy and Management in Zhejiang University after my graduation. Engineering education, as one of the main research field in ICSTEP, has become my research topic since I have participated in several research projects of engineering education funded by Chinese Academy of Engineering and Ministry of Education.Prof. Wei Zhang, Zhejiang University 2015-Present Professor, Institute of China’s Science,Technology and Education Strategy, Zhejiang Uni- versity Associate director of Research Center on Science and Education Development Strategy, Zhejiang University 2012-2014
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rendong Bai, Eastern Kentucky University; Wutthigrai Boonsuk, Eastern Illinois University; Peter P. Liu
Tagged Divisions
Computing and Information Technology
toproductive time. For example, people can work on a project, write an email, check kid’sschoolwork, make phone calls or text messages, read book or listen to podcast, or simply enjoythe ride.Second, traffic congestion will be reduced. One of the leading causes of traffic jams is selfishbehavior among drivers. If drivers space out and allow each other to move freely between laneson the highway, traffic would flow more smoothly. Self-driving cars can be programmed to 3space out automatically, and thus help reduce congestion. In addition, with traffic information,self-driving cars can calculate alternative and more efficient routes in real time.Third, drivers spend less time on parking. Self-driving cars
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Divisions
Computing and Information Technology
for collaborating on teaching, scholarly and service projects, especially those aimed at improving students’ critical/creative and communication skills. c American Society for Engineering Education, 2019 Boardnotes 2.0 in Computer Networking: Organizing and Representing Meaningful Technical Information Graphically for Improving Learning CompetenciesAbstractThe field of computer information technologies in general, and more specifically that of networkswitching and routing, is filled with abstractions, abbreviations, and acronyms, along with anaccompanying assortment of implementation techniques frequently requiring customization.Bridging the divide between theory and
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Karen C. Davis, Miami University
Tagged Divisions
Computing and Information Technology
Paper ID #24915Creating Guided Study Exercises for a Flipped Database CourseDr. Karen C. Davis, Miami University Karen C. Davis is an Associate Professor in the Department of Computer Science and Software Engineer- ing at Miami University. Her research interests include database design, query processing and optimiza- tion, data warehousing, and computing education. She has published more than 50 papers, most of which are co-authored with her students. She has advised over 100 senior design project students and more than 40 MS/PhD theses/projects in the area of database systems. She was awarded the ASEE Sharon Keillor
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Naeem Seliya, Ohio Northern University; Heath Joseph LeBlanc, Ohio Northern University; J. Blake Hylton, Ohio Northern University; Ziad Youssfi, Ohio Northern University; Matthew Schweinefuss
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
marketing [7], andpedagogical improvements [8]. Our project focuses on a relatively unique area, i.e., curiositydetection in text. This paper presents preliminary, yet promising, results of empirically miningwords that demonstrate a curious disposition (of the students) in text data produced by studentsin response to thought-provoking and critical-thinking exercises. The success of our projectcould positively impact efforts to assess both curiosity and its impact on educational outcomes.For many decades, psychologists have wrestled with understanding the nature of curiosity.Recent work by Grossnickle [9] has provided a framework for understanding facets, factors anddimensions of the construct of curiosity that are relevant to the education audience
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
Tagged Divisions
Computing and Information Technology
of online modules infuture semesters. Students’ self-selected project topics indicate that in future semesters the topicsexplored in lecture should be expanded beyond cybersecurity issues to include social mediatopics, particularly cyberbullying body image issues.IntroductionCybersecurity is a growing concern for both the private sector and governments. It has enormousimplications for government security, economic prosperity and public safety. The number of databreaches in the education sector doubled during 2017, with only the financial and healthcaresectors having more breaches [3]. The cost of a data breach in U.S. education is higher than thecost in other sectors and countries [18]. Domains with “.edu” addresses are a high risk for
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
the growth of the Internet is nolonger in question. In fact, the last remnants of the global IPv4 address pools are already dryingup. As Table 1 shows, four of the five Regional Internet Registries (RIRs) have exhausted theirIPv4 address pools and are operating under exhaustion policies that restrict IPv4 addressallocations. Only the RIR for Africa, AFRINIC, has yet to reach full exhaustion. At the time ofwriting AFRINIC is allocating from its final /8 and has a projected exhaustion date of 09November 2019 [1].Table 1. Regional Internet Registry Last /8 Allocation Information. Last /8 Assignment RIR Description
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Computing Identity and Persistence Across Multiple Groups Using Structural Equation ModelingAbstractDespite the projected growth of computer and information technology occupations, manycomputing students fail to graduate. Studying students’ self-beliefs is one way to understandpersistence in a school setting. This paper explores how students' disciplinary identity sub-constructs including competence/performance, recognition, interest, and sense of belongingcontribute to academic persistence. A survey of 1,640 students as part of an NSF grant wasconducted at three South Florida metropolitan public universities. A quantitative analysis wasperformed which included a structural equation model (SEM) and a multigroup SEM. The
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Jianming Deng, Jinling Institute of Technology and Southeast University
Tagged Divisions
Computing and Information Technology
total number of hours is not specified by the school. Some schoolsdesignate some commonly recognized math courses as computer science courses, i.e., givingthem computer science course numbers. We took the liberty to move such courses to the mathcourse category. Examples include discrete math, probability and statistics, and modern algebra.In addition, some schools list the lab or project portion of the course separately from the course,while others do not. The hours listed in the table below follow whatever the schools listed. Itcould be slightly misleading in some cases, depending on whether or not the lab or projectportion of the courses is listed separately. Table 1 shows the four pieces of data from the eightschools. The credit hours as