Asee peer logo
Displaying results 1 - 30 of 237 in total
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Jacob Haven Gosling; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
poses a problemfor everyone with a traditional system. The problem is that if someone were to have and use areal quantum computer, there would be no way to keep them from cracking all of our traditionalsecurity methods. Overnight all the methods that are currently considered to be secure wouldbecome superfluous. So, the advent of quantum computing both has its exciting possibilities andterrifying consequences6.The fundamental principle that is utilized in the basic form of quantum cryptology andcomputing is that of qubits. Qubits are quantum bits. Like in traditional computer’s bits, qubitscan be either a 1, 0, or both. The state of being both a 1 and a 0 is known as superposition. Thisis what makes the theory of quantum computing seem so fast
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Huanmei Wu, Indiana University-Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
. This study provides guidance on DSA related program development and curriculum design. It also provides the potential trainees in DSA with the current market needs and the required knowledge for their future career.1. Introduction: There is rapid growth massive data generation and data collections from manyfields, such as web-based social informatics, search engines, satellite data, health sciences,biology, and biomedical informatics. The data is not huge in size but also complicated withvarious data types and uncertainties. It is an important and challenge to extract valuableinformation from the large data volume. Applied Data Science and Analytics (DSA) has beenemerging developing discipline, which applies modern, data
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Secil Caskurlu, Purdue University; Iryna Ashby, Purdue University; Marisa Exter, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
knowledge and skills, such as communications and interpersonal skills, businessstrategy and applications, team/organization and management, general problem solving andcritical thinking, as well as self-regulated lifelong learning skills3, 4, 14, 16-18. Employers report thatemployees are not well prepared in terms of global knowledge, writing, critical thinking,adaptability, self-knowledge, oral communication, or quantitative reasoning19. However, thequestion remains: how to effectively design the curriculum to ensure that both discipline-specificand cross-disciplinary skills are sufficiently covered? To address this question, we need toexplore the issue from multiple angles: (1) gaps in education perceived by faculty, (2) gaps ineducation perceived
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Sogand Kavianpour; Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Electronic Engineering Technology (EET) program called“Embedded Microprocessors System”.1- IntroductionThere are a number of strategies for correcting output errors. In order to measurethe error, you need to know both the current measurement and the correctmeasurement. The correct measurement is known as the set point. Obtaining thecurrent measurement involves a sensor. Typically, a sensor's job is to receive aninput. A motion sensor on an alarm system receives an input when the infraredbeam is broken. This causes the controller to sound the alarm. Most systemscorrect errors using feedback: the output of the system is fed back into the sensoras an input. The sensor measures the current state of its own system. The currentstate is also known as the
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joshua B. Gross, Blackburn College
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
continuesunabated due to years of massive growth in undergraduate CS enrollment, the ability to servestudents is constrained by the limited group of faculty who are qualified and committed toeducation; hiring of these faculty is failing. Demand is so great that Stanford has introduced anew MS in Computer Science Education (which requires a prior PhD in a non-computingdiscipline), and this program began a year earlier than anticipated [1].The field needs to understand those responsible for lighting the fires. This research characterizesrecent hiring of instructional faculty at all levels of higher education through two studies: ananalysis of twenty years of job advertisement messages on a listserv for the CS educationcommunity, and a survey of department or
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tae-Hoon Kim, Purdue University Northwest; Melissa Nicole Fitzgerald, Purdue University Northwest; Mithulesh Kurale, REU Student
Tagged Divisions
Computing & Information Technology
improve the performance between pair of nodes.1. IntroductionRecently, wireless network is very popular due to its many advantages including mobility, cost,easy deployment, etc. In addition, it has been developed and applied to lots of application such assensor network, ad hoc network, LAN, vehicular network, body network, IoT, etc. One of thedriving forces of such a rapid growth in wireless network is a convenience in installation. Sincewireless network creates the connectivity without wire, network connectivity can be easilyestablished in the most of environment conditions to create or extend the network. For example,instead of installing the cable over the mountain or river, install the antennas to create one ormulti-hop wireless connection
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Dennis K. Njeru, Utah Valley University and Novarad Corporation; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
imperative that the apparatus that held the probe be able toautomatically adjust the probe’s altitude as it traversed the changing contours of the abdomenwhile capturing 2D ultrasound images. It was also crucial that the system continuously align theprobe in a perpendicular fashion with the abdomen’s surface to ensure maximum contact whichyields minimal signal attenuation. Fig 1. 3D components created via CADThe prototype is shown in Figure 1 and final assembly in Figure 2. The probe is firmly heldinside the probe holder (blue part) and the holder is free to move freely inside its housing (redpart). The green part is attached to the middle shaft of an X-Y plotter. The holder is attached tothe arch, which is itself
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tony Andrew Lowe, Purdue University, West Lafayette (College of Engineering); Sean P. Brophy, Purdue University, West Lafayette (College of Engineering)
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
other” [1], or for this paper the “ringer” based on self-reported prior learning. The ringer is intended to support the team through early programmingchallenges. In addition to the professor and teaching assistants, having a peer mentor can yieldhigher satisfaction and confidence in learners [2]. Our analysis evaluates learning outcomes asstudent progress through the term, comparing performance based on the performance and priorknowledge reported by the ringer. The major research questions investigate the role of the ringerin the success of the team, as well looking to see if teams that include a low performing studenthave any common characteristics. Findings include data from 2013, 2014, and 2015 with trendsapparent in each of the years across
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Vetria L. Byrd Ph.D., Purdue University; Camilo Vieira, Purdue University, West Lafayette (College of Engineering)
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Experiences Purdue UniversityAbstractEvidence of the importance of visualization can be seen in the role visualization continues toplay in informed decision making [1-4], data analysis [5], explanations of complex data sets [6-8], detection of trends and patterns [9], and storytelling [10-12]. The need to diversify a fieldwith such far-reaching influence is imperative [13]. Visualization is the process of transformingraw, complex data into a visual representation that provides insight. In order to prepare the nextgeneration of researchers and scientists to make transformative and innovative discoveries in adata-driven world, exposure to the process, tools and techniques of data visualization must beginearly. Many
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Jacob Bailey, University of Illinois, Urbana-Champaign; Matthew West, University of Illinois, Urbana-Champaign; Craig Zilles, University of Illinois, Urbana-Champaign
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
able to forecastdemand, and thus it is important to understand what drives student preferences for particularscheduling time slots. Measuring these preferences can be challenging, however, for at least thefollowing three reasons. (1) Revealed preferences (what students actually choose) can differsignificantly from stated preferences (what they say they will want at a future time), requiring theuse of actual scheduling data to infer preferences or utilities. (2) The utility that students derivefrom particular choices is multifactorial, so that in a computer-based testing facility, for example,students may prefer to take their exam mid-afternoon, but they may also prefer to take it as closeto the end of the exam period as possible, and it can be
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Abdulwaheed Johnson, Pace University; Anthony Joseph, Pace University
Tagged Divisions
Computing & Information Technology
population [1] [14]. The mobiledevice has become almost universal to everyone and can provide services which make themespecially suitable for use as an electronic payment method. The current payment landscape isgradually shifting to mobile payment technologies, an increasing trend that utilizes cloud andmobile technologies in carrying out financial transactions over end users’ smart mobile devices[2]. Mobile payments can be seen as a venture for investors and service providers because of theavailable benefits [1]. Hence, the drive towards mobile payments adoption is an expectedphenomenon.There is an increasing call for mobile payment adoption, as it transparently secures transactionsand contributes to assurance of trust to the end user [3]. However
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy; Jiawen Wang, University of Detroit Mercy; Wenbing Zhao, Cleveland State University; Lei Wang, Anhui Polytechnic University
Tagged Divisions
Computing & Information Technology
helping students to learn ROS efficiently and meaningfully in the real world of engineeringprojects. Preliminary assessment of this multi-lab-driven learning method for providing roboticseducation supports its effectiveness.1. IntroductionWith the continued advances in autonomous robotics over the several decades, it is becomingincreasingly vital that the development of a new curriculum on Robot Operating System (ROS)in a university be well aligned to technology advancements and applications [1,2,15]. The ROShas drawn attention from the field of robotics over the last several years [15]. The primaryobjective of ROS is to provide an open source, configurable, and unified programmingframework utilized for controlling robots in a variety of
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Damla Turgut, University of Central Florida; Lisa Massi, University of Central Florida; Salih Safa Bacanli, University of Central Florida; Neda Hajiakhoond Bidoki, University of Central Florida
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
contributions to the IoT research projects;discuss implications of our evaluation results; and share lessons learned. This paper may beespecially interesting to faculty thinking about submitting a NSF REU CISE proposal andnewly awarded PIs.IntroductionWireless sensor network technologies, or IoT, is a revolutionary, interdisciplinary field withmany challenges for researchers (Gubbi, Buyya, Marusic & Palaniswami, 2013). “Internet ofThings (IoT) is all about physical items talking to each other, machine-to-machinecommunications and person-to-computer communications” (Kelly, Suryadevara &Mukhopadhyay, 2013, p.1). The emerging field of IoT is characterized by a tight integrationbetween the physical components, software, wireless networking as well
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tamer Omar, East Carolina University; Philip J. Lunsford II, East Carolina University
Tagged Divisions
Computing & Information Technology
DE sections of the same course are totally different.The way of assessing the different experience for both types of students was examined by authorsin (Almatrafi, Khondkar, & Aditya, 2015)1. The results in this study shows that there is acorrelation between the students’ use of the learning management system (LMS), in this caseBlackboard, and their success in the course. The authors in (Saliah-Hassane, et al., 2011) showtheir proposed virtual lab environment based on the concept of software as service4. The authorsaim to eliminate the need for university acquisition of facilities and local laboratories to host,manage and maintain the environment. A comparison between different virtualizationenvironments is discussed by authors in (Li
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tian Qiu, Purdue University; Mengshi Feng, Purdue University; Sitian Lu, Purdue University; Zhuofan Li; Yudi Wu; Carla B. Zoltowski, Purdue University; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
materials. The evaluation results suggestthat this system is helpful to both students and instructors.2. Related WorkRecognizing the importance of software development, computer science has become an inte-gral part of general education in USA [1]. Our system integrates many useful tools and helpsstudents learn. Figure 1 shows the architecture of the system. The main components includea web server, a file system, a database, an execution container, and analysis engines. Theanalysis tools are integrated into the execution container. This system used Docker for thecontainer. Figure 1 System Architecture2.1 Web Integrated Development EnvironmentWeb integrated development environment (WIDE), such as Cloud9 [2] and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Jennifer Leaf, Eastern Washington University; Robert E. Gerlick, Eastern Washington University; Donald C. Richter, Eastern Washington University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
robot. A proof-of-conceptarchitecture and implementation using an Android tablet app is presented. Finally, the alternativetechnologies and potential next steps for future enhancement are discussed.IntroductionThe NAO robot [1], created by SoftBank Robotics (formerly Aldebaran Robotics), is a humanoidrobot with a rich set of features, including a vision system, text-to-speech system, speech andfacial recognition, touch sensors on its head, hands, and feet, and 25 degrees of freedom to moveits head, arms, and legs. It can be programmed using a drag-and-drop GUI software packagecalled Choregraphe [2], or via the Python or C++ programming languages using softwaredevelopment kits (SDKs) provided by SoftBank. The SDKs permit a software developer
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Gene Lee Fisher Ph.D., California Polytechnic State University, San Luis Obispo
Tagged Divisions
Computing & Information Technology
-ical alternative is a Computer Science degree program with no ABET accreditation at all. On theopposite end of the spectrum is the ABET status quo, with a fully accredited degree program. Ateach alternative level of the spectrum, the paper discusses the pros and cons relevant to that level.Where appropriate, the paper makes concrete experience-based suggestions for how specificaspects of the accreditation process could be improved.1. IntroductionABET (the Accreditation Board for Engineering and Technology) is a large and very well knownagency for the accreditation of post-secondary degrees. At present, ABET accredits approxi-mately 3,700 programs at over 750 colleges and universities in 30 countries [3]. Computer sci-ence and software
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Connie Justice, Indiana University Purdue University, Indianapolis; Nichole McFarland, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
networking for all three nodes as well as DHCP agents.The Network Node deployed several processes between all nodes. All nodes worked together tomaintain the smooth operation of the secure cloud.ProblemDue to the shortage of funding in K-12 school systems, most schools have a lack of IT resourcesto securely store and share information needed for students, parents, and teachers that requireaccess to networks.PurposeThe goal of this project was to create a secure cloud solution for K-12 school systems so that theschool systems could store data in a central repository and make use of collaborative resources ina secure manner, and allow K-12 schools within the state to utilize the cloud storage solution.MethodThe method used in this project was to 1
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
exploration as a theme, and the other used micro controllers as thefoundation for activities. The goals of this research are as follows: 1. Develop effectivecurricula for improving student self-efficacy in CT, 2. Develop a reliable and effective wayof measuring student self-efficacy in CT, and 3. Enforce the notion that CT is not problemsolving (PS), but a component of cognition.Background and Related Work“Computational thinking involves solving problems, designing systems, and understandinghuman behavior, by drawing on the concepts fundamental to computer science”26. However,computational thinking (CT) is not intended to be equated to computer science; rather theessence of CT comes from thinking like a computer scientist when faced with problems
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Danai Chasaki, Villanova University
Tagged Divisions
Computing & Information Technology
students in this major is critical. The Computingfield offers a unique opportunity for exciting industry-sponsored mini-projects that involvehands-on experience and link the applicability of computing skills to the industry world.Technical understanding is essential to engineering. But engineers find success and personalfulfillment when they couple these skills with a mindset to create extraordinary value for others.Our mini-project aims at providing an immersive experiential learning experience that introducesstudents to engineering entrepreneurial-minded principles[1] (EML). In this paper, we discuss the design of a seven week long lab offered in the beginning ofthe freshman year, where students get real world experience on cyber
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sushma Sanga, Bosch Inc; Ali Eydgahi, Eastern Michigan University
Tagged Divisions
Computing & Information Technology
avoid identity-theft.IntroductionIdentity-theft means stealing someone’s personal information and using it without theirpermission. The list of consumer complaints received by the Federal Trade Commission in2011 [1] indicates that for the 12th year in a row, identity-theft complaints are in the top of thelist. Among 1.8 million complaints that were filed in 2011, 279,156 or 15% were identity-theftcomplaints. Nearly 25% of the identity-theft complaints were related to tax or wage-relatedfraud [1]. In December 2010, the United States Bureau of Justice Statistics announced that about11.7 million people were the victims of identity theft, which constitutes five percent of peopleage 16 or older in the U.S. [2]. In 2007, identity-theft was on the
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Stephany Coffman-Wolph, West Virginia University Institute of Technology
Tagged Divisions
Computing & Information Technology
not require a computer lab, are extremely cost-effective, and require minimum preparation.Additionally, the activities are easy to do with a variety of age groups and various number ofstudents and are specifically designed not to require students to have any prior computerexperience. The main goal is to introduce various computer science topics using fun physicalactivities and everyday experiences that are familiar. The paper will provide the instructions foreach of the activities and the learning objectives. The activities included are: (1) Loops withMusic, (2) Network Topology and Problem Solving, (3) Linked List with Yarn and Paper Bags,(4) Sorting Algorithms with Paper Bags, and (5) Recursion Introduction: Simple Tower of Hanoiwith
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Yosi Shibberu, Rose-Hulman Institute of Technology
Tagged Divisions
Computing & Information Technology
seen in recent years in speech and imagerecognition. A growing number of companies are investing heavily in deep learning. The numberof successful applications of deep learning is growing rapidly.Deep learning is a special type of machine learning that can take advantage of the growingavailability of big data and the increasing computing power of GPUs (Graphical ProcessingUnits). The potential of deep learning in engineering applications is currently under investigation.For example, Cheon et al. 1 replace a PID motor controller with a deep learning based controllerand Sanchez et al. 2 use deep learning to learn optimal feedback controllers. The automobileindustry is investing heavily in applications of deep learning to autonomous vehicles
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Abdulbaset Abdulaziz Gaddah A.G., University of Umm Al-Qura; Shakil Akhtar, Clayton State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
of low enrollment and even more serious problem of high dropout in bothprograms. Researchers of science, technology, engineering and math, also known as STEM, [1]propose that one of the problem for student’s retention and recruitment in STEM program is thatthey are not able to associate themselves to this area. Institute of Electrical and ElectronicEngineers (IEEE) and the Association for Computing Machinery (ACM) support engagementamong school and university students [8]. A pilot study reported in [9] of beginner studentsindicates that students in Computer Science and other related fields reason, engage and relate tothe knowledge content of the discipline.In [2] authors present a model named Supporting Collaboration and Adaptation in a
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Parameswari Ramanathan, Indiana University-Purdue University, Indianapolis; Eugenia Fernandez, Indiana University-Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
and independent study courses wereexcluded. In spring 2016, there was a total of 1111 students in the sampling frame. A sample sizeof 10 % of this population was considered to have sufficient statistical power to derive theresults.The stratified random sampling method was used to select the participants with the strata basedon course level (e.g. 100, 200, 300 & 400-level courses). The sample was randomly selectedacross the four strata so as to be proportional to the number of students enrolled in each stratum(course level). Table 1 shows the percentage of students selected from each course level resultingin the sample size of 111. Table 1. Participant Sampling Plan Course Number of
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joseph William Beckman, Purdue University; Melissa Jane Dark, Purdue University; Pratik Kashyap, Purdue University; Sumra Bari, Purdue University, School of Electrical and Computer Engineering; Samuel S. Wagstaff Jr, Purdue University; Yingjie Chen, Purdue Polytechnic Institute; Baijian Yang, Purdue Polytechnic Institute
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
fluency, design fluency, cognitiveflexibility (the mental ability to think about multiple concepts), planning, response inhibition,handling novel situations, working memory, reasoning, problem solving, and abstract thinking(Alvarez, Emory and Emory 2006; Lezak, Howieson, and Loring, 2004; Monsell, 2003). Normanand Shallice (1980) outline five types of situations where routine activation of behavior wouldnot be sufficient for optimal performance: 1. Those that involve planning or decision making 2. Those that involve error correction or troubleshooting 3. Situations where responses are not well-rehearsed or contain novel sequences of actions 4. Dangerous or technically difficult situations 5. Situations that
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Debra Lee Davis, Florida International University, School of Computing and Information Sciences
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Paper ID #20134Combining Active Learning Approaches for Improving Computing CourseOutcomes at Minority-Majority InstitutionsDr. Debra Lee Davis, Florida International University, School of Computing and Information Sciences Dr. Debra Davis is an Instructor in the School of Computing and Information Sciences at Florida Interna- tional University. Her research interests emphasize interdisciplinary topics including understanding and improving: (1) Computer Science education, including increasing participation of women; (2) educational applications and techniques for online STEM learning; and (3) complex human-machine interactions
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Javad Shakib, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
enrollment. It will open new horizons and expand the breadth offaculty and student involvement in research and development.1. BackgroundIn this paper, we will describe how we gradually attempted to achieve our goal. We developedthis teaching module, which incorporates well-selected signal processing, bioinformatics,biomedical imaging, signal processing, and instrumentation topics, which make extensive use ofMATLAB, Simulink, Python, Bio-perl, and LabVIEW tools. This teaching module includes adetailed description of associated core lab exercises, student responses, and recommendations.This low-cost program consists of a series of theory modules coupled with a hands-on laboratorycomponent using readily available test equipment and graphical
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Cheryl Xu, Florida A&M University/Florida State University; Seyed Mousavinezhad, Idaho State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
and Professor at Western Michigan University, Kalamazoo, Michigan. He has been an invited keynote speaker for national and international conferences. He has been a Program Evaluator for ABET Electrical/Computer Engineering, Computer Science and Engineering programs in the US and for international programs. c American Society for Engineering Education, 2017 COMPUTING in CIRCUITS and SYSTEMSAbstract. Many engineering and computing programs offer an introductory course on electriccircuits analysis. Typically this is a three (3) credit hours lecture course, in some schoolsaccompanied by a 1 credit laboratory section. In our school the first circuit course is offeredwithout a laboratory
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Lorri J Barnett, Purdue Polytechnic, Anderson; Dennis O. Owen, Purdue University
Tagged Divisions
Computing & Information Technology
opportunities, scheduling, universityfaculty involvement and commitment, success factors, and K-12 outreach and recruitingoutcomes.IntroductionDual credit programs, in which students take high school courses for both high school andcollege credit, have been in existence for over 30 years and continue to grow. According to theCenter for Education and Data Research, more than two million students participate annually indual-credit programs, and these programs have become the second most popular collegepreparatory program nationally, after Advanced Placement. (Cowan & Goldhaber, p. 425)[1]Purdue University realizes the importance of early contact and collaborative relationships withhigh schools in an effort to attract and retain future students to our