aim to create extensions thatenhance student engagement during programming assignments.REFERENCES[1]. Abadi, Martın, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro,Greg S. Corrado et al. "TensorFlow: Large-scale machine learning on heterogeneous systems,software available from tensorflow. org (2015)." https://www. tensorflow. org (2015).[2]. Al-Gahmi, Abdulmalek, Yong Zhang, and Hugo Valle. "Jupyter in the Classroom: AnExperience Report." Proceedings of the 53rd ACM Technical Symposium on Computer ScienceEducation-Volume 1. 2022.[3] Atom. 2022. Atom Homepage. http://atom.io/.[4] Barba, Lorena A., Lecia J. Barker, Douglas S. Blank, Jed Brown, Allen B. Downey, TimothyGeorge, Lindsey J. Heagy et al. "Teaching and learning
performance incomputer-based learning environments: a meta-analysis,” Asia Pacific Education Review, vol.17, no. 2, pp. 187–202, Apr. 2016, doi: https://doi.org/10.1007/s12564-016-9426-9.[2] S. Doukakis and M.A. Papalaskari, “Scaffolding Technological Pedagogical ContentKnowledge (TPACK) in Computer Science Education through Learning Activity Creation,” in2019 4th SouthEast Europe Design Automation, Computer Engineering, Computer Networks andSocial Media Conference (SEEDACECNSM), pp. 1–5. doi:https://doi.org/10.1109/SEEDACECNSM.2019.8908467.[3] A. Devolder, J. van Braak, and J. Tondeur, “Supporting self-regulated learning in computer-based learning environments: systematic review of effects of scaffolding in the domain ofscience education,” Journal
, malicioussoftware, and cryptography. And for the topics that require improvement, we'll focus on enhancingthe supporting information and explanations for better outcomes.AcknowledgementThis material is based upon the work supported by the United States National Science Foundationunder Grant No. 1903419 and 1903423 through the Security and Trustworthy CyberspaceEducation (SaTC: EDU) program. Any opinions, findings, and conclusions, or recommendationsexpressed in this material are those of the author(s) and do not necessarily reflect the views of theNational Science Foundation. This study was approved by the Institutional Review Board (IRB)at Purdue University Northwest and the University of Toledo under protocol numbers IRB-2020-1119 and IRB-301407-UT
terms of grades did not show any statisticalsignificance, but the students choosing lightboard videos always indicated that they felt theylearned more from those videos. We are designing a study to track these students and see theirperformance in future courses that leverage the content from this course.References[1] Leonard, E. (2015). Great expectations: Students and video in higher education. Sage whitepaper. Retrieved November 25, 2016.[2] Pal, D., & Patra, S. (2021). University students’ perception of video-based learning in timesof COVID-19: A TAM/TTF perspective. International Journal of Human–Computer Interaction,37(10), 903-921.[3] Carmichael, M., Reid, A., & Karpicke, J. D. (2018). Assessing the impact of educationalvideo on
-temperaturemeasurement,” Computers and Electrical Engineering, (95), pp. 1-13, 2021.[6] J. Jones, “A Hands-on Introduction to Embedded Systems & IoT,” ASEE’s VirtualConference, June 22-26, 2020.[7] G. Mullett, “Teaching the Internet of Things (IoT) Using Universally Available RaspberryPis and Arduino Platforms,” 2016 ASEE Annual Conference and Exposition, New Orleans, LA,USA June 26-29, 2016.[8] K. Sangeethalakshmi, S. Preethi Angel, U. Preethi, S. Pavithra, and V. Shanmuga, “Patienthealth monitoring system using IoT,” Materials Today: Proceedings, Available online June 24,2021.[9] A. Moore, M. Mehrubeoglu, A. Mooney, and L. McLauchlan, “Application of IoT-basedSensing and Signal Processing for Rehabilitation,” Proc. of SPIE, April 2022.[10] L. McLauchlan
condition of rural education in the 50 States. Rural School and Community Trust. Washington D.C.: Rural School and Community Trust.[7] desJardins, M., & Martin, S. (2013, March). CE21-Maryland: The state of computer science education in Maryland high schools. In Proceeding of the 44th ACM Technical Symposium on Computer Science Education (pp. 711-716). ACM.[8] Grimes, L. E., Arrastía-Chisholm, M. A., & Bright, S. B. (219). How can they know what they don’t know? The beliefs and experiences of rural school counselors about STEM career advising. Theory & Practice in Rural Education, 9(1), 74-90.[9] U.S. Bureau of the Census. (2021). WV. https://www.census.gov/quickfacts/fact/table/WV/EDU635219[10] Code.org West
research plan that examines (a) potential changes instudents’ educational and career plans, (b) which elements of the APEX program most stronglyrelate to student outcomes, and (c) factors influencing instructor satisfaction with FLCs.The APEX program aims to deliver computing education to diverse community college students,better preparing them for today’s increasingly digital workplace. Continued expansion andassessment of the program will allow us to improve the experience of both students andinstructors, and to encourage nationwide adoption of embedding computing experiences intointroductory community college courses.References[1] R. W. Lent, S. Brown, and G. Hackett, “Toward a unifying social cognitive theory of career and academic
acceptance and adoption among engineering students.References[1] S. Dawson, L. Heathcote, and G. Poole, "Harnessing ICT potential: The adoption and analysis of ICT systems for enhancing the student learning experience," International Journal of Educational Management, vol. 24, no. 2, pp. 116-128, 2010.[2] K. Cook-Chennault and I. Villanueva, "Exploring perspectives and experiences of diverse learners' acceptance of online educational engineering games as learning tools in the classroom," ed: IEEE, 2020, pp. 1-9.[3] H. Taherdoost, "A review of technology acceptance and adoption models and theories," Procedia manufacturing, vol. 22, pp. 960-967, 2018.[4] A. Granić, "Educational Technology Adoption: A
Creativity, 41, 100888.[5] M. L. How, S. M. Cheah, Y. J. Chan, A. C. Khor, and E. M. P. Say, "Artificial Intelligence for Advancing Sustainable Development Goals (SDGs): An Inclusive Democratized Low-Code Approach," in The Ethics of Artificial Intelligence for the Sustainable Development Goals, pp. 145-165, Cham, Springer International Publishing, 2023.[6] J. Metrôlho, F. Ribeiro, P. Graça, A. Mourato, D. Figueiredo, and H. Vilarinho, "Aligning Software Engineering Teaching Strategies and Practices with Industrial Needs," Computation, vol. 10, p. 129, 2022.[7] Avishahar-Zeira and D. H. Lorenz, "Could No-Code Be Code? Toward a No-Code Programming Language for Citizen Developers," in Proceedings of the 2023 ACM SIGPLAN International
havetheir work shown here as an example of WheelsFX.7.0. Works Cited[1] A. S. Gillis, "object-oriented programming (OOP)," TechTarget, July 2021. [Online]. Available: https://www.techtarget.com/searchapparchitecture/definition/object-oriented- programming-OOP. [Accessed 26 December 2022].[2] "JavaTpoint," JavaTpoint, 2021. [Online]. Available: https://www.javatpoint.com/history- of-java. [Accessed 26 December 2022].[3] L. Yan, "Teaching Object-Oriented Programming with Games," in 2009 Sixth International Conference on Information Technology: New Generations, Las Vegas, 2009.[4] K. E. Sanders and A. Van Dam, Object-oriented Programming in Java: A Graphical Approach; Preliminary Edition, Pearson College Division, 2005.[5] W.-K. Chen
suggested thatengagement, value, and participation declined for many traditional on campus students whomoved to virtual coursework during the pandemic. Unlike those trends in face-to-face programs,the survey results suggest that for students already enrolled in the fully online BSIT program, thepandemic did not present a problem in terms of finishing coursework, and in some cases, evenencouraged students to take on additional courses they normally would not have.References[1] National Clearinghouse Student Research Center. Term Enrollment Estimates: A Covid 19 Supplement[2] E. Wester, L. Walsh, S. Arango-Caro, and K.L. Callis-Duehla, Student Engagement Declines in STEM Undergraduates Journal of Microbiology and Biology Education
/B split, where we randomlyassign the students with similar demographics to the control and the test group. This will enableus to compare performances on the same exam with or without anonymous grading. The authorsare applying for IRB approval for conducting the surveys and focus groups.AcknowledgmentsA part of the work is supported by the Hrabowski Innovation Fund Award, which supportsinitiatives to enhance teaching and learning at UMBC.References1. Addy, Tracie Marcella, et al. What inclusive instructors do: Principles and practices for excellence in college teaching. Stylus Publishing, LLC, 2021.2. Malouff, John M., Ashley J. Emmerton, and Nicola S. Schutte. "The risk of a halo bias as a reason to keep students anonymous during
first-year electrical engineering course," in IEEE 6th International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Hong Kong, China, 2017.[3] G. Messmer and K. Berkling, "Overcoming the Gap of Social Presence in Online Learning Communities at University," in World Engineering Education Forum/Global Engineering Deans Council (WEEF/GEDC), Madrid, Spain, 2021.[4] J. Banson and C. D. Hardin, "Assessing Student Participation and Engagement Using Discord," in 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), Los Alamitos, CA, USA, 2022.[5] A. M. Wiles and S. L. Simmons, "Establishment of an engaged and active learning community in the biology classroom and lab with
. Hayne, “Design of an Instructional Processor,” Supplement to: C. Roth and L. John, Digital Systems Design Using VHDL, Third Edition, Boston, MA: Cengage Learning, 2018. [Online]. Available: http://academic.cengage.com/resource_uploads/downloads/1305635140_559956.pdf.[3] RISC-V International. [Online]. Available: https://riscv.org/.[4] S. Harris, D. Chaver, L. Pinuel, O. Kindgren, and R. Owen, “RVfpga: Computer Architecture Course and MOOC using a RISC-V SoC Targeted to an FPGA and Simulation,” Proceedings ASEE Annual Conference and Exposition, Baltimore, MD, June 2023.[5] Grenoble Institute of Technology, “LeaRnV: RISC-V based SoC Platform for Research Development and Education.” 2020. [Online]. Available: https
audience. However, it is the opinion of the authors thatmodifying the current pedagogies for generation Alpha can add value to their educationalexperience and lead to graduating more well-rounded independent graduates.VI. References[1] Cheng, L., Ritzhaupt, A. D., & Antonenko, P. (2019). Effects of the flipped classroom instructional strategy on students’ learning outcomes: A meta-analysis. Educational Technology Research and Development, 67(4), 793-824.[2] Goedhart, N. S., Blignaut-van Westrhenen, N., Moser, C., & Zweekhorst, M. B. M. (2019). The flipped classroom: supporting a diverse group of students in their learning. Learning Environments Research, 22(2), 297-310.[3] Stöhr, C., Demazière, C., & Adawi, T. (2020). The
fruitful flipped classexperience. As future directions to this work, the author proposes to investigate the effect of usingdifferent motivators on video coverage as well as increasing the sample size for more indicativestatistical analyses.References[1] S. Freeman et al., “Active learning increases student performance in science, engineering, and mathematics,” Proc. Natl. Acad. Sci., vol. 111, no. 23, pp. 1–6, 2014.[2] C. E. Wieman, “Large-scale comparison of science teaching methods sends clear message,” Proc. Natl. Acad. Sci., vol. 111, no. 23, pp. 8319–8320, 2014.[3] M. Stains et al., “Anatomy of STEM teaching in North American universities,” Science (80-. )., vol. 359, no. 6383, pp. 1468–1470, 2018.[4] A. Dallal, M
, and conclusions or recommendations expressed in this materialare those of the authors and do not necessarily reflect the views of the National Science Founda-tion.References [1] S. Hansche, “Designing a security awareness program: Part 1”. Information systems security, vol. 9, no. 6, pp.1-9, 2001. [2] E. Crowley, “Information system security curricula development”. In Proc. 4th conference on Information technology curriculum. pp. 249-255, 2003. [3] J. Seberry, and J. Pieprzyk, “Cryptography: an introduction to computer security”. Prentice- Hall, Inc, 1989. [4] Cryptography in Digital Age, https://www.mckinsey.com/ /me- dia/mckinsey/business%20functions/risk/our%20insights
the local community (including rental housing, shopping and restaurants).References[1] Naveed, H., Khan, A. U., Qiu. S., Saqib, M., Anwar, S., Usman, M., Akhtar, N., Barnes, N.Mian, A. “A Comprehensive Overview of Large Language Models,”https://arxiv.org/pdf/2307.06435.pdf, retrieved March 19, 2024.[2] Terry, Owen Kichizo. The Chronicle of Higher Education, “I’m a Student. You Have NoIdea How Much We’re Using ChatGPT.” https://www.chronicle.com/article/im-a-student-you-have-no-idea-how-much-were-using-chatgpt, retrieved June 1, 2023.[3] Lo, L. “The CLEAR path: A framework for enhancing information literacy through promptengineering,” The Journal of Academic Librarianship, 49 (2023).[4] American Society for Engineering Education,https
Interest Group (SIG) Democratic Citizenship in Education of the American Educational Research Association (AERA) from 2016 to 2018. She has taught high school mathematics and holds a clear renewable teaching certificate in mathematics in the state of Georgia. She currently serves as a Co-Principal Investigator (Co-PI) of a National Science Foundation (NSF) S-STEM grant.Carlos Sac Mendoza, University of the District of Columbia ©American Society for Engineering Education, 2024 Developing Lafayette Park Minecraft World to Broaden Participation in ComputingAbstract. In this project, we developed Lafayette Park World, a Minecraft Education game andprogramming
. NLP, “RoBERTa sentiment analysis model,” https://huggingface.co/cardiffnlp/twitter-roberta-base-sentiment, Accessed: 2024. [2] M. E. Basiri, N. Ghasem-Aghaee, and A. Naghsh-Nilchi, “Exploiting reviewers’ comment histories for sentiment analysis,” Journal of Information Science, vol. 40, pp. 313 – 328, 2014. [3] Pankaj, P. Pandey, Muskan, and N. Soni, “Sentiment analysis on customer feedback data: Amazon product reviews,” in 2019 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COMITCon), 2019, pp. 320–322. [4] S. Kim and R. Calvo, “Sentiment-oriented summarisation of peer reviews,” 2011. [5] K. Wang and X. Wan, “Sentiment analysis of peer review texts for scholarly papers,” in The
. The user evaluation suggests its broad applicability in educational settings. Futureenhancements, guided by user feedback, are expected to further improve its interactivity andeducational effectiveness. The design and approach of the Virtual Lab provide a viable solutionfor the ongoing and future development of virtual laboratories in STEM education.References[1] T. de Jong, S. Sotiriou, and D. Gillet, “Innovations in STEM education: the Go-Lab federation of online labs,” Smart Learning Environments, vol. 1, no. 1, p. 3, Oct. 2014, doi: 10.1186/s40561-014-0003-6.[2] I.-E. Lasica, K. Katzis, M. Meletiou-Mavrotheris, and C. Dimopoulos, “STEM Education: Current and future trends in laboratory-based education,” Jun. 2016.[3] R. Radhamani
,” LACCEI, 2021.[12] Warren, S., Dong, X., Sobering, T.J., Yao, J., A Rapid Analysis and Signal ConditioningLaboratory (RASCL) Design Compatible with the National Instruments myDAQ Platform,” inProceedings of the 2011 ASEE Conference & Exposition, American Society for EngineeringEducation, 2011.[13] Yan, Y. Adams, R.D., Yanik, P.M., Jack, H., Ritenour, A. Karayaka, H. B., “BYOE:Individual Lab Kit Options for Analog and Digital Circuits Suitable for In-class or At-homeExperiments,” in Proceedings of the 2021 ASE Annual Conference, ASEE, 2021.[14] Lowe, Davit, et al. "LabShare: Towards a national approach to laboratory sharing."Proceedings of the 20th Annual Conference for the Australasian Association for EngineeringEducation. The School of
. Accessed: 2023-08-14. [9] P Braveman and S Gruskin. Defining equity in health. Journal of Epidemiology & Community Health, 57(4): 254–258, 2003. ISSN 0143-005X. doi: 10.1136/jech.57.4.254. URL https://jech.bmj.com/content/57/4/254.[10] Amy J. Ko, Anne Beitlers, Brett Wortzman, Matt Davidson, Alannah Oleson, Mara Kirdani-Ryan, Stefania Druga, and Jayne Everson. Critically conscious computing: Methods for secondary education, 2023. URL https://criticallyconsciouscomputing.org. Accessed: 2023-08-14.[11] Engineering National Academies of Sciences and Medicine. Advancing Antiracism, Diversity, Equity, and Inclusion in STEMM Organizations: Beyond Broadening Participation. The National Academies Press, Washington, DC, 2023
transportation of property ϕ. with no sourceConsider the source free 1D convection-diffusion equation in the form d d dϕ (ρϕu) = Γ 0≤x≤1 (30) dx dx dxwhich represents the transport of the property ϕ through convection and diffusion inone-dimensional domain shown in Figure 10. The boundary conditions are: ϕ(x = 0) = ϕ0 = 1and ϕ(x = L) = ϕL = 0.Solve this equation numerically using the Finite Volume Method and the following parameters:u = 0.1 m/s, L = 1.0 m, ρ = 1.0 kg/m3 , Γ = 0.1 kg/m.s. Compare the results against the exactsolution of
tutoring frameworks,” in Proceedings of the 5th Annual ACM Conference on Learning at Scale, L at S 2018, Jun. 2018. doi: 10.1145/3231644.3231671.[7] H. Fake and N. Dabbagh, “Personalized Learning Within Online Workforce Learning Environments: Exploring Implementations, Obstacles, Opportunities, and Perspectives of Workforce Leaders,” Technology, Knowledge and Learning, vol. 25, no. 4, pp. 789–809, Dec. 2020, doi: 10.1007/s10758-020-09441-x.[8] G. Conole, “MOOCs as disruptive technologies: strategies for enhancing the learner experience and quality of MOOCs,” Revista de Educación a Distancia (RED), no. 50, Jul. 2016, doi: 10.6018/red/50/2.[9] A. Pears et al., “A Survey of Literature on the Teaching
: Deep Learning with Python by Francois Chollet Robotics: Modelling, Planning and Control by Bruno Siciliano Artificial Intelligence: A Modern Approach by Stuart Russell and Peter Norvig Reinforcement Learning: An Introduction by Richard S. Sutton and Andrew G. Barto IV. Computing and Simulation PlatformWe have used Keras and Gazebo as computing and simulation platform. Keras is an open-sourcesoftware library that provides a Python interface for artificial neural networks. Gazebo is anopen-source software platform for which anyone can develop a plug-in with model components V. Learning Outcomes and AssessmentThe learning outcomes of the course EGR 391 are as the following: 1. Understand the meaning, purpose
, backup and restore operations, and disaster recovery tasks. • Troubleshooting: Troubleshoot capacity, automation, connectivity, and security issues related to cloud implementations.Certification and Course Integration Methodologies:With the set of certifications decided, we set out to identify the course(s) that are best to integratethe certification skill set in. In this paper, we present our methodologies as they apply to theNetwork+, which we used as the pilot project. We will report and disseminate results for othercertifications as they are completed.Course Material RevampingWith most of the faculty in the new Cyber Security Program coming from Computer Sciencebackground, it was imperative that we revamp the current course
proposes a focus on the process of problem-solving and does not want to limitthe process to particular kinds of problems but to those that "influences one's adaptivefunctioning in the real-life social environment" (and engineering problems are some of those.)D'Zurilla et al.'s model uses the term social Problem-Solving for such problems. The modeldevelops the concepts of "problem-solving," "problem," and "solution," specifying that problem-solving "refers to the process of finding a solution." In contrast, "solution" refers to "carrying outthose solutions in the actual problematic situations." The model comprises "problem orientation"and "problem-solving skills." Through these components, they developed the Social Problem-Solving Inventory, which
] S. E. Chang, “Computer anxiety and perception of task complexity in learning programming-related skills,” Comput Human Behav, vol. 21, no. 5, pp. 713–728, Sep. 2005, doi: 10.1016/j.chb.2004.02.021.[6] T. James and A. Magana, “Evaluating Self-paced Computational Notebooks vs. Instructor-Led Online Lectures for Introductory Computer Programming,” in 2023 ASEE Annual Conference & Exposition Proceedings, ASEE Conferences, 2023. doi: 10.18260/1-2--43422.[7] J. Goopio and C. Cheung, “The MOOC dropout phenomenon and retention strategies,” Journal of Teaching in Travel and Tourism, vol. 21, no. 2, pp. 177–197, 2021, doi: 10.1080/15313220.2020.1809050.AppendixAll content for the long lesson course