Asee peer logo
Displaying all 7 results
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
data for a planned multiple semester longer term project.This paper contains (1) motivation and goals for this work, (2) outcomes and learning objectives,(3) instructions on how to design this kind of assignment, (4) the video assignment write up, (5)the rubric for the video, (6) the rubric for peer feedback, and (7) the rubric for reflection. Thispaper focuses on the structure and instruments used during the course.About the CourseArtificial Intelligence (AI) is being used to tackle more and more of the real-world problemsaround us. EECS 4901 Special Topics: Introduction to Artificial Intelligence will introducestudents to the fundamentals of Artificial Intelligence (AI). During this course students will lookat various problems being solved
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
NTP analogy, the telnet protocol offers a network administrator aquick way to set up a text-based console connection between a computer and a network deviceuses port 23. It can be shown visually as an individual (I) being able to establish a quick andconvenient connection with a network hardware device. The Network News Transfer Protocol(NNTP) uses port 119. It would seem like a problematic port number to memorize; however, ifone imagines looking at this number reflected in the mirror, it would be “911” -- which forreasons yet unclear to the author -- is what most news these days is. An open newspaper showsthe 119 port number with images and text regarding the news of the day. Email is an extensiveglobe-spanning system which can be shown by a
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Nextwe incorporate sklearn 40 so students can execute and explore the results of machine learningalgorithms. To prepare for machine learning content students watch bots videos 14 and they arealso assigned some ethics reflection prompts in response to Cathy O’Neil’s TED Talk 35 .The common thread across topics is the problem-solving heuristics shown in Figure 1. Weintroduce these early on and revisit them with each topic and explicitly point out when we areusing a strategy, or trying several of them, to solve a problem. For example we point out the useof concrete examples for solving encoding problems, developing algorithms, and initially usinghard-coded values in incremental web development. Another example is how students areexposed to
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
in both parts of the project.3.5 DeliverablesThe teams were required to produce mini-reports at the end of each part, in addition to an overallfinal report and presentation at the conclusion of the project. At the end of Part 1, teams had tosubmit a word document providing the answers to each of the clues, along with specificstrategies and steps they took to reach the answers. The teams also had to submit a worddocument at the conclusion of Part 2, including selfies in front of the target building and uniqueclue, alongside written descriptions of their physical observations and details about the uniqueclue. Final reports and presentations included consolidated versions of the mini-reports above, aswell as reflections about team challenges
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Lina Battestilli, North Carolina State University; Sarah Korkes, North Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
addition, the data for number of minutesbetween the first and the last attempt did not reflect a consistent trend of one group taking moretime than the other. It is possible that these results are not the best metric of learning efficiency, Category Solution Explanation Expected This solution represents what we ex- numODD = 0; pected as a solution - a while loop that %Add your while loop here iterates through a range of numbers, n = 1 while n <= 7 checking if the current number is odd if rem(n,2) ˜=0 (and
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Franz J. Kurfess, California Polytechnic State University, San Luis Obispo; Maria Pantoja, California Polytechnic State University, San Luis Obispo; Irene Humer, California Polytechnic State University, San Luis Obispo
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. This exposed our students tocollaborators among different fields, with their own terminology, goals, work methods andpractical approaches. Our paper reports on the initial experiment during the Fall 2019 term,involving two sections of an Artificial Intelligence class and one section of a Deep Learningclass. We are planning to continue this collaboration in the future.Keywords: Collaborative Learning, Interdisciplinary, Inter-Class teamwork 1. IntroductionStudents at California Polytechnic State University, San Luis Obispo (Cal Poly) are exposed topractical, hands-on educational activities throughout their course of studies, reflected by theuniversity’s “Learn by Doing” motto. In the Computer Science, Software Engineering andComputer
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
or recommendations expressed inthis material are those of the authors and do not necessarily reflect the views of NSF.References[1] L. Farrell, “Science DMZ: The fast path for science data,” Sci. Node, May 2016. [Online]. Available: https://sciencenode.org/feature/sciencedmz-a-data-highway-system.php[2] E. Dart, L. Rotman, B. Tierney, M. Hester, J. Zurawski, “The science dmz: a network design pattern for data-intensive science,” in Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, Nov. 2013.[3] “NSF 2017 PI Workshop CI Engineer Breakout Survey.” [Online]. Available: http://www.thequilt.net/wp-content/uploads/NSF-2017-PI-Workshop-CI-Engineer- Survey_v4.pdf[4