University. She earned a Bachelor of Arts in Criminology, Law, and Society from the University of California, Irvine and a Master of Science from the California State University, Long Beach in Criminology and Criminal Justice. She is currently working on the NSF CAREER grant for Dr. Aunshul Rege, exploring adversarial decision-making and cybersecurity education innovation.Dr. Aunshul Rege, Temple University Dr. Rege is an Associate Professor with the Department of Criminal Justice at Temple University. Her National Science Foundation sponsored research projects address critical infrastructure and proactive cy- bersecurity, cyberadversarial decision-making and adaptations across intrusion chains, cyber and cyber
Paper ID #29143Deep Learning and Artificial Intelligence: Project Collaboration acrossClassesProf. Franz J Kurfess, California Polytechnic State University, San Luis Obispo Franz J. Kurfess is a professor in the Computer Science and Software Engineering Department, California Polytechnic State University, San Luis Obispo, where he teaches mostly courses in Artificial Intelligence, Human-Computer Interaction, and User-Centered Design. Before joining Cal Poly, he was with Con- cordia University in Montreal, Canada, the New Jersey Institute of Technology, the University of Ulm, Germany, the International Computer Science
Paper ID #30959Interdisciplinary Cybersecurity Projects Experience: Developing a MarketReady WorkforceDr. Tamer Omar, California State Polytechnic University, Pomona Tamer Omar is an Assistant professor with the Electrical and Computer Engineering Department at Cal- ifornia State Polytechnic University. Dr. Omar earned his Ph.D. from the Electrical Engineering depart- ment at Iowa State University, USA and his MBA with emphasis on MIS from the Arab Academy for Science and Technology, Egypt and his B.S. degree in Electrical Engineering from Ain Shams University, Egypt. Dr. Omar research interests include wireless networks
, they increase the number of years it takes to graduate aswell as reduce the likelihood that they will graduate at all. The Utah Department of Workforcejob forecasts and other job trends surveys indicate that while these students can earn strongsalaries without degrees, their careers will not advance as they would with degrees [4].Employers are also feeling the disadvantage of too few job candidates with the adequate trainingprovided by a baccalaureate degree [5]. The lack of adequate number of scholarships inComputer Science and Engineering programs is a significant inhibitor in graduating andenrolling more students.The LEAP Scholarship Program LEAP Project Goal and ObjectivesThe goal of the LEAP project was to increase the graduation
on projects focusing on digital thread and cyber security of manufacturing systems. She has funded research in broadening participation efforts of underrepresented students in STEM funded by U.S. Department of Education, focusing on com- puter science and cybersecurity pathways, and from Office of Naval Research, focusing on mechatronic pathways. She is part of the ONR projects related to the additive manufacturing training of active mili- tary. She is also part of the research team that has multiple projects funded from NSF focusing on veteran pathways and their success in engineering. She leads the team that delivers the summer program to nine graders that focus on broadening participation of underrepresented
for Engineering Education, 2020 Autonomous Vehicles in Computer Engineering ProgramAbstractThe area of autonomous vehicles design has undergone tremendous growth in recent years. Amajor contributor of this growth has been the advances in sensor design, computationalintelligence, and computer vision. The remarkable growth in autonomous vehicles design hasgiven rise to a demand for engineers with experience in designing and implementing thesesystems. Automotive companies are focusing significant research and development efforts onthese systems. They are recognizing the need for a large, well-trained workforce that canconduct these research and development projects. Autonomous vehicle
include teaching Computer Science courses and labs, utilizing technology to maximize student learning process, developing curriculum and labs, and supervis- ing undergraduate students projects. c American Society for Engineering Education, 2020 Improving Student Learning and Engagement in Cybersecurity Through Designing and Building Secure Internet of Things (IoT) SystemsCybersecurity education aims to bring the awareness of the importance of security and privacyissues to students. This will help students change how they think when they develop and implementcomputer applications to consider security problems while they design and test their products.As our life these days depends heavily on
developed for mobile devices (Android and iOS tabletsand phones) and it communicates with the JLTV’s OBD via Bluetooth. The AR application willcontain a simplistic user interface that reads diagnostic data from the JLTV, shows vehiclesensors, and allows users to create virtual dashboards to display various information. It will alsocontain interactive presentation and visualization of JLTV external and internal parts and 3Danimations for diagnostic and maintenance. The AR application will consist of two modes:Standalone Mode and AR Mode. Standalone Mode does not require a real vehicle and itcontains interactive 3D visualizations and animations for diagnostic and maintenance. The ARMode requires the presence of a vehicle and projects instructions and
ofenrollment and graduation, U.S. institutions will fall short of producing the needed HPCprofessionals [6]. Worse yet, groups largely untapped by this field, women and minorities,make up a significant portion of the nation’s growing talent pool [7], but are extremelyunderrepresented in HPC related disciplines.A Research Experiences for Undergraduates (REU) Site is an important mechanism to combatthe shortage of HPC professionals. The REU program by the U.S. National ScienceFoundation (NSF) supports active research participation by undergraduate students in any ofthe areas of research funded by the NSF. REU projects involve students in meaningful ways inongoing research programs or in research projects specifically designed for the REU program.As one
2020.There are some universities offering four years degree in the field of Renewable EnergyEngineering Technology (REET). In this paper author’s experience in teaching courses in REETprogram, typical student senior projects, and job market forecast for this field will be discussed.The assessment data for the REET senior project was analyzed. Several recommendations forimproving student’s outcomes are suggested.1- IntroductionWhy Study Alternative/Renewable Technologies?Alternative energy is referring to sources of energy that replace fuel sources without theundesired consequences. Fossil fuel burning produces pollution. Nuclear power is a commonalternative to fossil fuels however, radiation and the long-term containment cause great concernand
solution to fully grasp the overall concept. After presenting the materials to students,continual review with students is also essential. This reviewal process requires exploring use-cases for the programming mechanisms presented as solutions to the security issues discussed. Inaddition to the security modules presented in lectures, students were given a hands-on approachto understanding the concepts through Model-Eliciting Activities (MEAs). MEAs are open-ended, problem-solving activities in which groups of three to four students work to solve realisticcomplex problems in a classroom setting. The semester project related to encryption anddecryption was implemented into the course as an MEA.To assess the effectiveness of incorporating security
-organizes university-wide innovative cyber security research, development and training initiatives. He is also an Associate Professor at the department of Information Systems and Cyber Security specializing in operational cyber security and data science as applicable to national security challenges. Previously, he was a senior research scientist at Carnegie Mellon University (CMU) where he contributed to federally-funded projects related to critical infrastructure security and worked closely with the Software Engineering Institute (SEI). He is also a permanent research scientist at the National Cyber Forensic and Training Alliance (NCFTA) of Canada; an international organization which focuses on the investigation of
team, and Kali Linux. In this paper, we provideexamples on how students’ knowledge of CPS security changes over the course of the program,how students are supported in and out of the classroom towards advancing their knowledge in thisfield. We also highlight the impact that project-based and team coordinated learning can have onincreasing students’ understanding of the fundamentals of CPS security.IntroductionA recent study by Cybersecurity Ventures [1], a respected publisher of cybersecurity content,predicts that 3.5 million cybersecurity jobs around the world will be unfilled by 2021. In the UnitedStates, the demand for professionals with cybersecurity expertise is outpacing all other occupations[2]. These reports, along with many others
student enthusiasm at the end of their internship to enhance the ensuing continuation of their academic experience.A. Introduction Demand for undergraduate Computer Science and Engineering (CSE) education continues to grow,driven by persistent need for professionals with technical skills. In addition to core technical knowledge,students embarking on a career in CSE must be ready to combine theory and practice in a context wherethe underlying technology continually changes, projects are large-scale and collaborative, and professionalresponsibility and ethics-based decision-making are critical when products are adopted widely. Manystudents seek hands-on industry internship experiences to complement their in-class instruction andprepare for these
Leadership and Policy Studies at Virginia Tech.Prof. Stephen H Edwards, Virginia Tech Stephen H. Edwards is a Professor and the Associate Department Head for Undergraduate Studies in the Department of Computer Science at Virginia Tech, where he has been teaching since 1996. He received his B.S. in electrical engineering from Caltech, and M.S. and Ph.D. degrees in computer and informa- tion science from The Ohio State University. His research interests include computer science education, software testing, software engineering, and programming languages. He is the project lead for Web-CAT, the most widely used open-source automated grading system in the world. Web-CAT is known for al- lowing instructors to grade students
smart home hub devices to provide added security protections or intrusionprevention functionality. This smart home lab can also facilitate the creation of assignments fordifferent courses at Purdue University. For example, we can execute various scenarios using thedevices in our lab, create forensic images of control devices and assign these images to students toperform forensic analyses to determine various events. We describe four possible threat scenariosbelow.One case study of a potential threat vector and how students could engage with it using an activelearning project is the investigation of the smart plug device. Using the IoT lab, students would beable to investigate what security measures exist to protect smart plugs from potential
by AI by studying software agents, problem solving bysearching, various ways to represent knowledge, and methods of learning. Additionally, thiscourse will discuss both the ethics and risks associated with the fields of AI. Topics coveredduring the course fall into 4 major categories: (1) Knowledge, Reasoning, Planning, andUncertain Knowledge, (2) Learning and Philosophical Foundations, (3) Communicating,Perceiving, and Acting, and (4) Ethics and Risks. Previously, the authors have used the “flipped”classroom concept in courses. The flipped classroom, when mastered and done well, has beendemonstrated to be beneficial to the students’ ability to learn material [1]. One of the goals forthis project is for students to help create a repository
afocus on hands-on education. This content is a major component of the CSET program thatsatisfies ABET ETAC Criteria. The Computer Science content of the program was enhanced andredesigned after Fall 2006 to meet ABET CAC Criteria.The CSET program is a mid-station between Computer Science and Computer EngineeringTechnology. The program is geared primarily to students that enjoy hands-on or Project-BasedLearning (PBL). Experiential learning effectively engages students 1,2 , supports technology andcollaboration 3,4,5,6 , reduces failure rates 7 , and exposes students to Science, Technology,Engineering and Mathematics (STEM) careers 8 .// The rest of this paper is structured as follows.ABET Student Outcome CriteriaBoth ETAC and CAC require
security issues in their software engineering careers.Students were asked to rank the learning objectives on a Likert scale of 1 to 5 where 1 was theworst ranking and 5 was the best ranking Generally, the results of the survey demonstratedstudents ranked the objectives well, with the lowest score for the objective about developing anaction plan for ethics indicating ways to improve the module in future course offering. Thehighest values were given to considering multiple viewpoints, indicating the mindset aspects ofthe project may have been successful.Based on the outcome and student feedback recommendations for future implementation of themodule in the curriculum is discussed.IntroductionThis paper describes a classroom module designed to develop
ITinfrastructure hosting these endpoints thus limiting effective support.The ECU team leading the service enablement project needed a solution that will enable it and the projectstakeholders to have the visibility necessary to manage the assets, the infrastructure and the serviceinvolved in this offering. The goal is to gain this visibility and enable self-governance without requiringsignificant commitments from the IT teams at each of the locations, either in terms of configuration andpolicy changes or in terms of direct support. 4This problem statement spurred two cross-departmental projects: • The development of an Edge Computing platform
on computer systems and applications, networking, communication systems, along with digital, analog, and machine-control electronics. He is the recipient of the 2013 Golden Apple Award for Teaching Excellence at Eastern and has been nominated multiple times for the Critical Thinking Teacher of the Year Award. His professional interests include implementing active teaching and learning strategies, metacognition, integrating open-source software/hardware with online control, and deploying electrical and telecom technologies in community-based organizations. He is always seeking opportunities for collaborating on teaching, scholarly, and service projects, especially those aimed at improving students’ critical
Security Officer for the Arkansas Office of Health Information Technology (OHIT). She worked with the team at OHIT to implement the State Health Alliance for Records Exchange (SHARE). Dr. Harrell has over 25 years’ experience with the technology field, serving as an educator, implementer, and manager. Dr. Harrell is a certified Project Manager and a Certified Public Manager. She has worked with the Arkansas State Cyber Security Office to ensure successful implementation of many State security projects, one of which received the George C. Askew Outstanding Project Award for Certified Public Managers. c American Society for Engineering Education, 2020 From degree to Chief Information
funding agencies. He is a member of the editorial board for a number of professional journals as well as an Editor-in-Chief of the International Journal of Online Engineering. Dr. Azad is active with remote laboratory field and is the President of the Global Online Laboratory Consortium (GOLC) as well as the Vice-President of the International Association of Online Engineering (IAOE). Dr. Azad is also active with few other professional organizations like- IEEE, IET, ASEE, ISA, and CLAWAR Association and served as Chair and Co-Chairs of numerous conferences and workshops. He was a program evaluator for the ABET and is active in evaluating research and development projects for various national and international funding
attend lectures in person on any given day.In addition to watching lectures, students complete one project-based homework assignmenteach week. These assignments involve reading, writing, solving and reasoning about a mini-project like single problem in MATLAB which are expected to be difficult. Due to theirdifficulty, students are able to collaborate with other students, attend office hours, and access theinternet for help throughout the week.The other course resources offered are standard among any introductory programming course:practice exams, office hours, and some additional content on the course’s online page. Thestructure of the exams is also fairly standard. About half of the exam involves solving problemsby writing out programmatic
Course SCHCybersecurity 3 Big Data Security 3Introduction to Databases 3 Network Security and Management 3Introduction to Operating Systems 3 Cryptography 3Introduction to Networks 3 Advanced Cybersecurity Elective 3Technical Communication 3 Junior Cybersecurity Design Project 3Semester Total 15 Semester Total 15 Year 4 Course SCH Course SCHStatistics
federal agencies, and has numerous publications in refereed journals and edited books. Her research interests include communities of practice, gender, transformative learning, and identity.Dr. Ann C. Gates, University of Texas at El Paso Dr. Ann Quiroz Gates is an AT&T Distinguished Professor and Chair of the Computer Science Depart- ment and past Associate VP of Research and Sponsored Projects at the University of Texas at El Paso. Gates directs the NSF-funded CyberShARE Center of Excellence that has a mission to advance interdis- ciplinary education and research. She served on the Naval Research Advisory Committee (2016-2018) and currently serves on the NSF CISE Advisory Committee on Education and
-care provider. The walk-in setup, as opposed to outpatientappointment scheduling, gives multiple challenging potentials to develop what-if scenarios forstudents to further develop their simulation project even after their targeted lab assignment. Thegoal is to inspire students’ creativity and engage them in their learning experience. By providinguser friendly tools that support changing the model, students learn to deal with changing andexploiting scenarios in the case.We use a simple conceptual model with a few nurses, doctors, and staff to represent the clinic.Simplicity and real-world familiarity of this concept provides students with a jumpstart to takeownership of their simulation study. Soon, students realize the complexity of this case
attendance check, all students in the classare required to take pictures (10 pictures in our project for averaging) through the built-in webcamera. These pictures are used to generate the student face database as a reference for real-timeface recognition. To check the attendance of a student for the class, the computer takes facepictures of the student through the real-time video stream and employs deep learning neuralnetworks to predict whether the student matches anyone in the database, and (if yes) furtheridentifies the name of the student. The result of this face recognition will be used to update theattendance record in the format of an excel file. Fig.1 Architecture of the proposed attendance system2.2 Face Detection
postdoctoral researcher in the Design Lab at UC San Diego.Dr. Mohsen M Dorodchi, UNC, Charlotte Dr. Dorodchi has been teaching in the field of computing for over 30 years of which 20 years as educator. He has taught majority of the courses in the computer science and engineering curriculum over the past 20 years such as introductory programming, data structures, databases, software engineering, system programming, etc. He is involved in multiple NSF supported research projects including Learning and Predictive Analytics Research, Research Practitioner Partnership, Implementing Teaching Methods to help Students learn more efficiently in active learning, etc.Erfan Al-Hossami, University of North Carolina at Charlotte Erfan Al
gradedexams, projects, in-class problem-solving participation via clickers, homework assignments andexercise sets completed in Lab.This study focuses on the Lab, where students complete a series of auto-graded exercises (i.e.”exercise set”) on topics introduced within the last week in the course. Students were stratifiedinto nine Lab sections, each composed of 16 to 35 students. Each Lab Section was assigned toeither the control or the treatment group based on number of students and the time of day of theLab. Four Lab sections were assigned to the control group, totaling 131 students, and five labsections were assigned to the treatment group, totaling 133 students. From the control group 109students consented to this research and in the treatment