temperature,light, and vibration.Educational excellence requires exposing students to the current edge of research. To ensure thatstudent projects are along the same trajectory that the industry is moving, educators mustcontinually introduce emerging techniques, practices, and applications into the curriculum. Thefield of wireless sensor networks is growing rapidly, and there is increasing interest in providingundergraduate students with a foundation in the area. It is crucial that the emerging field ofwireless sensor networks be integrated into the undergraduate computer science and engineeringcurricula. This paper presents the details of two WSN projects that our undergraduate computerengineering students have done in their senior capstone
Tech Engineering Technician with Inovar. He received his BS de- gree in Computer Engineering from Utah Valley University. His research interests include microcontroller programming with real-life applications regarding the medical field and finding reliable, cost efficient re- placements for known and accepted devices. c American Society for Engineering Education, 2019 Design of a Bluetooth-Enabled Wireless Pulse OximeterAbstractCapstone courses play a crucial role in Computer Engineering (CE) curricula. The principlepurpose of a Capstone project course is to offer a summative opportunity for graduating seniorengineering students to apply their professional skills and knowledge in a single
Education, 2019 How an NSF S-STEM LEAP Scholarship Program Can Inform a New Engineering ProgramAbstractIn Fall 2014, Utah Valley University was granted a Scholarships in STEM award from theNational Science Foundation. Entitled Strengthening Outcomes for Students in Engineering andComputer Science through Leadership, Engagement, Academic Mentoring, and Preparation(LEAP), the program is now in its fifth and final year. The goal of this project is to increase thegraduation rate for students in Computer Science and Engineering at UVU, an open enrollmentuniversity, and better prepare them for continued education and/or success in the STEMworkforce by providing scholarships to academically talented students with financial need
study cycles in Textitle Engineering and Engi- neering and Industrial Management, in the 1st cycle course of Design and Fashion Marketing, and also in the 2nd cycle courses of Fashion Design and Communication, Textile Chemistry, Advanced Textiles and Design and Marketing. Head research and research member of several R&D projects, has presented as main author or co-author many dozens of scientific journal papers and communications in international conferences. President of the Pedagogical Council of the School of Engineering since 2011 and Vice-Dean of School of EngineeringVictor F. A. Barros, University of Minho Victor F. A. Barros, Ing.-Paed IGIP (ORCID 0000-0002-7318-8257) is Researcher Fellow at Algoritmi
. His general expertise and interests include: IoT and Network Technologies, iOS application development, and Secure programming. He has recently published his first ASEE paper and presented at the ASEE NCS Section in March 2019 with his senior capstone team, SoT (Secure of Things). c American Society for Engineering Education, 2019 Pedagogical Assessment of Secure Coding in Student ProgramsAbstractStudents in introductory Computer Science (CS) courses are required to submit severalprogramming assignments and/or projects. The submitted programs are largely assessed on theircorrectness to the given problem, and not against secure software coding practices. In ourexperience, student programs
education, a variety of pedagogical considerations have beenimplemented and experimented, such as inquiry-based learning (Behrouzi and Kuchma, 2016),project-based learning (Khorbotly, 2015; Wang et. al., 2017; Zhao et. al., 2017; Luo, 2015),cooperative learning (Akili, 2012), active learning (Luo, 2015; Akili, 2014; Oliveira, 2015),divide-and-conquer learning (Kos and Miller, 2017; Sullivan-Green, et. al., 2017), student-centered learning (Grigg and Stephan, 2018), and problem-based method (Oliveira, 2015), etc.The project-based learning approach is one of the innovative methods promoted in engineeringeducation. Khorbotly developed and taught a computer vision curriculum in the undergraduateelectrical and computer engineering program using a
environments[28], [29]; however, it has been shown to present assessment challenges [30].While peer learning can take many forms, in the computational science disciplines andcybersecurity, it often will be conducted in a project- or problem-based learning (PBL)environment. In these environments, students are presented with (or may self-select) a problemor challenge to solve or a project (e.g., software development) to complete. The efficacy of PBLhas been demonstrated at multiple levels of education [31]–[36]. It has also been shown to beeffective in numerous disciplines. Examples of the effective use of PBL can be found incomputer science [37] and electrical [38] engineering. It has also been demonstrate to beeffective in non-STEM disciplines such as
of UCLA Extension’s Entertainment Studies & Performing Arts department, helping coordinate academic projects and special events, and later as a program representative, managing domestic and international custom-designed sem- inar programs. For several years during his tenure at UCLA Extension, Mark also served as a co-instructor for the capstone online class ”The Business of Hollywood,” which employed a unique role-playing ele- ment to explore strategies of film financing and negotiation. Before joining UCLA Extension, Mark was a development executive at an independent feature film production company, Echo Lake Productions. He has also worked as a freelance script analyst for Silver Pictures. Mark holds a BA
DIGITAL THERMOELECTRIC-GENERATOR BASED POWER SYSTEMAbstractThis paper is an attempt to report the modeling, design and build analysis of thermoelectricmodule (TEM) with realistic conditions for electrical power generation. It gives an insight tostatic and dynamic modeling with temperature dependent parametric variations and computationof various TEM parameters for modeling power generators.This paper demonstrates the undergraduate engineering technology student-driven research atour university in this arena. It depicts the application of the multi-agent approach which allowedthe student team to take full control of the project from inception to completion. The teamdeveloped and built a microprocessor based prototype thermo
browsing capabilities via TOR (The Onion Router), LAMP (Linux, Apache, MySQL, PHPor Python or Perl) server, Virtual Private Network (VPN) server, and protected browsing viaproxy service. The main goal of this educational project is to leverage the total holisticintegration of open source hardware and software to provide an affordable and portable solutionthat could be promptly deployed in case of an emergency, as a part of an incident response plan(IRP), or in case it is needed for testing purposes. Implementing this project provides valuablehands-on security experience and best practices in network architecture and configuration.Additional security features, both in hardware and software, were added to the single-boardcomputers to add additional
model.Decision makers expect concurrent executions of business and integration of new ITtechnologies help to alleviate the business requirements and meet their business goals andobjectives. Introduction: Project management is critical to IT development and helps to keep ITprojects on track through each cycle. A Wall Street Journal report stated recent researchrevealed managing IT projects well could significantly improve a firm’s profits and improve ITinvestments [3]. IT project management is often a process used to keep the project withintechnical limitations, within the allowed budget, and within a deterministic schedule [38].The Standish Group’s “CHAOS Summary 2009” showed the project success rate had decreased,with the data revealing a
computational thinkingskills. This study first proposes a framework of computational thinking in the contextof engineering (CT-ENG), using qualitative content analysis on industry interviews.The authors then introduce the program of the Robotics Class of Zhejiang Universityin China, providing an integrative approach to teaching computational thinkingeffectively. The Robotics Class engages students in project-based computing-aidedengineering activities throughout the four-year bachelor’s program, and improvestheir computational thinking skills through engineering engagement. The findings inthis study could have some implications for non-CS engineering majors to promotecomputing education and equip students with computational thinking at digital era.Key
Programming [10] Mining Programming, Projects, Reasonable Analytical written programming homework background, Discrete problems, Midterm Math and Calculus and Final, Final Project, Open note/open book exams Columbia University Machine Learning
Paper ID #25423Work in Progress: A Web-Based Tool to Assess Computational ThinkingProf. Alka R. Harriger, Purdue University Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she taught software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Real- ized through Information Technology) project. From 2013-2018, she co-led with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching Engineering Concepts to Harness Future Innovators and
engineeringclasses that compares lecture-homework-project teaching approaches to peer-to-peer active learn-ing when combined with design-based learning approaches. Although both approaches show thatstudent do show improved performance, the peer-to-peer active learning and design-based learningapproach received much greater interest, engagement, and intrinsic motivation. Dicheva et al. [5]present a survey of published empirical results on the applications of gamification in education.The authors further stated that although most of the papers surveyed showed promising resultsthere is still more research needed to determine the impact on student learning.Clarke et al. [9] describe how WReSTT (Web-Based Repository of Software Testing Tutorials)is used to
model of Cybersecurity education; and this reformwill be based on our prior experience with the introduction of innovative teaching modules in a numberof science, mathematics, and engineering Technology courses, faculty student seminar series, working inteams, use of simulation and K-17 student competitions. EducationAlmost every career path open to a bachelor’s degree student encompasses some aspect of security.System administrators must be able to properly configure and maintain a system; programmers mustknow how to build secure software from the bottom up; web development personnel must understandthe risks involved and how to best reduce the potential impact of these risks; and project
are encapsulated and modularized with friendly and easy-to-useinterfaces. AI curricula are developed based on constructivism, project-based learning andmultidisciplinary integration. Typical teaching cases, such as speech recognition, text recog-nition, image recognition, intelligent transportation, smart home, intelligent robots, etc.,which are used to enhance comprehension of AI concepts and applications, are also discussed. Keywords : AI Education, Innovation Capability, Constructivism, iSTREAM1. Introduction The radical and transformative technological revolution of artificial intelligence (AI) hasresulted in fundamentally new ways of science and engineering practice. Countries aroundthe world have released national strategies to
security. Education inthe field of cybersecurity suffers from natural difficulties because of these factors. Any tool thatcan ease the way of students and educators alike to explore cybersecurity is vital to meeting thedemands of a more interconnected world than ever.Offering courses in cybersecurity is an effective way to educate about the theoretical aspects ofsecurity. However, a workshop of recognized experts run by ACM's education board determinedwithout a doubt that studying theory is not enough to prepare a potential cybersecurityprofessional (McGettrick, 2013). In the light of the shift of infrastructure from physical toelectronic control and the rising number and severity of cyber-attacks, the DETER project wascreated (Mirkovic, et al
at Reynolds Community College in Richmond, Virginia in 2009 and moved to VCU in August 2016. Debra has served on the advisory board for Lighthouse for Computer Science (LH4CS). The goal of the Lighthouse project is to improve computer science diversity through faculty professional development. In addition, she is a member of the Advisory Council for the Deep Run High School’s Center for Informa- tion Technology in Glen Allen, Virginia, where she provides program support and assists in curriculum development for their technology-based preparatory program for future computer scientists.Dr. Mandayam Thirunarayanan, Florida International University Mandayam Osuri Thirunarayanan is an associate professor in the School of
presented is the first iteration of a larger system. For this firstphase of the project, the system uses standard (draft) schedule report spreadsheets. These areprocessed to calculate individual faculty loads, detect conflicts, produce visual schedules, trackunstaffed courses, banked credit, etc. More importantly, the analysis uses information about thestructure of the curriculum to support cohort oriented scheduling.The project has been implemented in Matlab using Tables. Although other platforms might bebetter suited to this type of data analysis, the use of Matlab makes it easier to modify and extendin Engineering schools. This is in major part due to the widespread use of Matlab inUndergraduate and Graduate curriculum. The programs described in
interaction of assessment withlearning and teaching. As an integral part, assessment provides an opportunity for teachers and students alike toidentify areas of understanding and misunderstanding. With this knowledge, students andteachers can build on the understanding and seek to transform misunderstanding into significantlearning (N.R.C., 1993). Assessment as ‘learning’ is not a third-party research project orsomeone's questionnaire; it must be viewed as a community effort or nothing, driven by afaculty's own commitment to reflect, judge, and improve (Narayanan, 2007 & 2009). The author has tried to follow such a philosophy while gathering data for this project. Inthis presentation the author provides some guidelines for
base of Chinese Academy of Engineering. I studied information and computing science for my bachelor degree. And I became a PhD Candidate in Educational Economy and Management in Zhejiang University after my graduation. Engineering education, as one of the main research field in ICSTEP, has become my research topic since I have participated in several research projects of engineering education funded by Chinese Academy of Engineering and Ministry of Education.Prof. Wei Zhang, Zhejiang University 2015-Present Professor, Institute of China’s Science,Technology and Education Strategy, Zhejiang Uni- versity Associate director of Research Center on Science and Education Development Strategy, Zhejiang University 2012-2014
toproductive time. For example, people can work on a project, write an email, check kid’sschoolwork, make phone calls or text messages, read book or listen to podcast, or simply enjoythe ride.Second, traffic congestion will be reduced. One of the leading causes of traffic jams is selfishbehavior among drivers. If drivers space out and allow each other to move freely between laneson the highway, traffic would flow more smoothly. Self-driving cars can be programmed to 3space out automatically, and thus help reduce congestion. In addition, with traffic information,self-driving cars can calculate alternative and more efficient routes in real time.Third, drivers spend less time on parking. Self-driving cars
for collaborating on teaching, scholarly and service projects, especially those aimed at improving students’ critical/creative and communication skills. c American Society for Engineering Education, 2019 Boardnotes 2.0 in Computer Networking: Organizing and Representing Meaningful Technical Information Graphically for Improving Learning CompetenciesAbstractThe field of computer information technologies in general, and more specifically that of networkswitching and routing, is filled with abstractions, abbreviations, and acronyms, along with anaccompanying assortment of implementation techniques frequently requiring customization.Bridging the divide between theory and
Paper ID #24915Creating Guided Study Exercises for a Flipped Database CourseDr. Karen C. Davis, Miami University Karen C. Davis is an Associate Professor in the Department of Computer Science and Software Engineer- ing at Miami University. Her research interests include database design, query processing and optimiza- tion, data warehousing, and computing education. She has published more than 50 papers, most of which are co-authored with her students. She has advised over 100 senior design project students and more than 40 MS/PhD theses/projects in the area of database systems. She was awarded the ASEE Sharon Keillor
marketing [7], andpedagogical improvements [8]. Our project focuses on a relatively unique area, i.e., curiositydetection in text. This paper presents preliminary, yet promising, results of empirically miningwords that demonstrate a curious disposition (of the students) in text data produced by studentsin response to thought-provoking and critical-thinking exercises. The success of our projectcould positively impact efforts to assess both curiosity and its impact on educational outcomes.For many decades, psychologists have wrestled with understanding the nature of curiosity.Recent work by Grossnickle [9] has provided a framework for understanding facets, factors anddimensions of the construct of curiosity that are relevant to the education audience
of online modules infuture semesters. Students’ self-selected project topics indicate that in future semesters the topicsexplored in lecture should be expanded beyond cybersecurity issues to include social mediatopics, particularly cyberbullying body image issues.IntroductionCybersecurity is a growing concern for both the private sector and governments. It has enormousimplications for government security, economic prosperity and public safety. The number of databreaches in the education sector doubled during 2017, with only the financial and healthcaresectors having more breaches [3]. The cost of a data breach in U.S. education is higher than thecost in other sectors and countries [18]. Domains with “.edu” addresses are a high risk for
the growth of the Internet is nolonger in question. In fact, the last remnants of the global IPv4 address pools are already dryingup. As Table 1 shows, four of the five Regional Internet Registries (RIRs) have exhausted theirIPv4 address pools and are operating under exhaustion policies that restrict IPv4 addressallocations. Only the RIR for Africa, AFRINIC, has yet to reach full exhaustion. At the time ofwriting AFRINIC is allocating from its final /8 and has a projected exhaustion date of 09November 2019 [1].Table 1. Regional Internet Registry Last /8 Allocation Information. Last /8 Assignment RIR Description
Computing Identity and Persistence Across Multiple Groups Using Structural Equation ModelingAbstractDespite the projected growth of computer and information technology occupations, manycomputing students fail to graduate. Studying students’ self-beliefs is one way to understandpersistence in a school setting. This paper explores how students' disciplinary identity sub-constructs including competence/performance, recognition, interest, and sense of belongingcontribute to academic persistence. A survey of 1,640 students as part of an NSF grant wasconducted at three South Florida metropolitan public universities. A quantitative analysis wasperformed which included a structural equation model (SEM) and a multigroup SEM. The
total number of hours is not specified by the school. Some schoolsdesignate some commonly recognized math courses as computer science courses, i.e., givingthem computer science course numbers. We took the liberty to move such courses to the mathcourse category. Examples include discrete math, probability and statistics, and modern algebra.In addition, some schools list the lab or project portion of the course separately from the course,while others do not. The hours listed in the table below follow whatever the schools listed. Itcould be slightly misleading in some cases, depending on whether or not the lab or projectportion of the courses is listed separately. Table 1 shows the four pieces of data from the eightschools. The credit hours as