Asee peer logo
Displaying all 3 results
Collection
2018 St.Lawrence Section Meeting
Authors
Tabitha L. Sprau Coulter
regardless of the task they are trying to accomplish [3]. According to the Felder-Silvermanmodel, there are multiple dimensions of learning styles. Each of the dimensions consists of twoopposite categories or learning styles: active vs reflective, sensing vs intuitive, visual vs verbal,inductive vs deductive, and sequential vs global [2]. One outcome of these early studies was thedocumentation of the learning styles preferences of undergraduate engineering students. Earlyengineering education research helped in identifying learning style preferences, while attemptingto address the gap between preferred learning styles and actually teaching styles being employedin engineering courses. Table 1 shows initial attempts to align learning styles
Collection
2018 St.Lawrence Section Meeting
Authors
Jikai Du
Buffalo Undergraduate Summer Research Program BackgroundThe program supports eight weeks of full-time research, scholarly, and creative activities eachsummer. Program fellowships provide a student stipend and support for travel, supplies, and/orequipment if necessary. The program is designed for frequent face-to-face interactions betweenthe student and a faculty mentor. The student is expected to devote a minimum of eight weeks offull-time scholarly activity. The program starts in May (after spring semester) and ends in August (before the next fallsemester). Before research begins, each student completes a “Pre-Research Reflection” andforwards to an assigned mentor; the mentor will review the student’s response and meet with thestudent to
Collection
2018 St.Lawrence Section Meeting
Authors
Mohamed Alshaer; Paul Cotae
enable the community to expand and build on priorwork. To expand the applicability of cybersecurity, the field needs to enlarge and improve itsworkforce. Currently, professionals in this area of study are either researchers or workers thataccumulate several specialization courses, instead of a degree that focuses primarily on networksecurity; thus, it reflects on the number of young students who have interest in academic supportto pursue degrees in this path. Social Network Analysis (SNA) has already proven to be an effective technique to analyzeinteraction in a network topology. Using SNA, the nodes (clusters) and ties (relationships) innetworks can be visualized and analyzed using quantitative measures and graphicalrepresentations to