Asee peer logo
Displaying results 61 - 90 of 187 in total
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Francis Giraldeau, Polytechnique Montreal; Michel R. Dagenais, Ecole Polytechnique de Montreal; Hanifa Boucheneb, École Polytechnique de Montréal
Tagged Divisions
Computing & Information Technology
6e+07 6e+07 4e+07 4e+07 2e+07 2e+07 0 0 Time (s) Time (s) (a) Large heap allocation with fill (b) Large heap allocation without fill 7e+06 heap os 6e+06 5e+06
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
gained.References1. Bandura, A. (1982). Self-Efficacy Mechanism in Human Agency. American Pyschologist, 37(2), 122-147.2. Basawapatna, A., Repenning, A., & Koh, K. H. (2015). Closing The Cyberlearning Loop. Proceedings of the 46th ACM Technical Symposium on Computer Science Education - SIGCSE '15, (pp. 12-17).3. Bean, N., Weese, J. L., Feldhausen, R., & Bell, R. (2015). Starting From Scratch: Developing a Pre- Service Teacher Program in Computational Thinking. Frontiers in Education.4. Bell, R. S. (2014). Low Overhead Methods for Improving Capacity and Outcomes in Computer Science. Manhattan, KS: Kansas State University.5. Brennan, K., & Resnick, M. (2012). Using artifact-based interviews to study the
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Dennis K. Njeru, Utah Valley University and Novarad Corporation; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
more time, the system’sdesign could be further refined and the software algorithms’ capabilities increased. With theseimprovements, the hybrid system’s overall effectiveness and feasibility may become even moreappealing.AcknowledgementWe would like to thank Wendell A. Gibby, MD, for allowing us to use his medical facility,including medical equipment and access to medical personnel necessary for the successfulconduction of this undergraduate research project.References:1. L Li et al., "Assessment of the fetal thymus by two- and three-dimensional ultrasound during normal human gestation and in fetuses with congenital heart defects.," Ultrasound in Obstetrics and Gynecology, vol. 37, no. 4, pp. 404 - 409, 2011.2. E. Pavlova, D. Markov, S
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Cheryl Xu, Florida A&M University/Florida State University; Seyed Mousavinezhad, Idaho State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Manufacturing since 2010 and International Journal of Computational Materials Science and Surface Engineering since 2007.Dr. S. Hossein Mousavinezhad, Idaho State University is the principal investigator of the National Science Foundation’s research grant, National Wireless Re- search Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as Engineering Education. He is Founding General Chair of the IEEE International Electro Information
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Connie Justice, Indiana University-Purdue University, Indianapolis; Rushabh Vyas, Indiana University-Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
).Learner’sperceptionsofacybersecuritycompetitionasitrelates toknowledge,skills,andabilities(KSA’s).PaperpresentedattheNICE(NationalInitiativefor CybersecurityEducation)Conference,SanDiego,CA.Justice,C.,&Do,L.(2012).ITexperientiallearning:TheLivingLab.PaperpresentedattheFrontiersin EducationConference(FIE),2012.Kelly,S.(2014).Dnsmasq.Retrievedfromhttp://www.thekelleys.org.uk/dnsmasq/doc.htmlTheNationalInitiativeforCybersecurityEducation(NICE).(2015).Retrievedfrom http://csrc.nist.gov/nice/framework/Newhouse,B.K.,Scribner,B.,&Witte,G.(2016).NICECybersecurityWorkforceFramework(NCWF). DraftNISTSpecialPublication800-181.Pearce,M.,Zeadally,S.,&Hunt,R.(2013).Virtualization:Issues,securitythreats,andsolutions.ACM ComputingSurveys(CSUR),45(2
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alka R Harriger, Purdue University, West Lafayette; Mayari I. Serrano, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
://www.qualtrics.com/. [Accessed 1 February 2015].[3] S. Y. Lye and J. H. L. Koh, "Review on teaching and learning of computational thinking through programming: What is next for K-12?," vol. 41, pp. 51-61, 2014.[4] Phoenix Contact, [Online]. Available: https://www.phoenixcontact.com/nanoline. [Accessed 1 February 2015].[5] Phoenix Contact, "How to program nanoLine with flow chart programming - Phoenix Contact," 15 October 2009. [Online]. Available: https://www.youtube.com/watch?v=qXA2O47rqqw. [Accessed 1 February 2015].[6] National Center for Women in Computing, "By the Numbers," National Center for Women in Computing, Boulder, CO, 2014.[7] Y. Oh and S. Yang, "Defining exergames and exergaming," in Proceedings of Meaningful Play, East Lansing, MI
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, -; Mohd Abdelgadir Khairi, Najran University; Jinan Ziade, University of Phoenix
Tagged Divisions
Computing & Information Technology
FDM CDM y FDM CDM s liance ity FDM
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tian Qiu, Purdue University; Mengshi Feng, Purdue University; Sitian Lu, Purdue University; Zhuofan Li; Yudi Wu; Carla B. Zoltowski, Purdue University; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
. https://c9.io/ 4. Wu, L., Liang, G., Kui, S., & Wang, Q. 2011. CEclipse: An online IDE for program- ing in the cloud. In 2011 IEEE World Congress on Services, IEEE, pp. 45-52. 5. https://www.codecademy.com/ 6. http://cscircles.cemc.uwaterloo.ca/ 7. Pritchard, D. and Vasiga, T. 2013. CS circles: an inbrowser python course for begin- ners. In ACM Technical Symposium on Computer Science Education, pp. 591-596. 
 8. Guo, P. 2012. Online Python Tutor: Embeddable web-based program visualization for CS education. http://pythontutor.com/.9. Brusilovsky, P. and Sosnovsky, S. 2005. Individualized exercises for self-assessment of programming knowledge: An Evaluation of QuizPACK. ACM Journal of Educa- tional Resources in
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sreyoshi Bhaduri, Virginia Tech; Tamoghna Roy, Virginia Tech
Tagged Divisions
Computing & Information Technology
quantitiesof textual data by processing data sets in both time and resource efficient ways.One of the tasks that NLP is used for in analyzing textual data sets is that of stylometry.Stylometry can be understood as a linguistic analysis of use of words in terms of both choice andorder, which can help characterize traits of a single or group of author(s). Fox, Ehmoda, andCharniak (2012) describe the underlying principle behind work on authorship attribution to be aset of statistically quantifiable characteristics of the writing style reflected by the word/phrasechoices of individuals which make it easy to distinguish one author from the other. Stylometry isthus a type of quantitative or statistical analysis which helps identify and characterize
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Vukica M. Jovanovic, Old Dominion University; Megan McKittrick, Old Dominion University; Pilar Pazos, Old Dominion University; Daniel Richards, Old Dominion University; Julia Romberger
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
should consider using a genre-based approach to integrating writing into engineeringcurriculum if they are concerned with the integration of students into real, actual engineeringcommunities of practice.Acknowledgement The project presented in this paper was funded by the Old Dominion University’s QualityEnhancement Plan (QEP): as Interdisciplinary Writing (IDW) Project “Student Writing in theSTEM Disciplines: A Faculty Learning Community”19.References 1. Lang, J. D., Cruse, S.,McVey, F. D., & McMasters, J. (1999). Industry expectations of new engineers: A survey to assist curriculum designers. Journal of Engineering Education,88, 43-51. 2. Reave, L. (1999). Technical communication instruction in engineering schools: A
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
. In Presence: Teleoperators and Virtual Environments 6, 4(August 1997), 355-385.[3] Mellor, J.P., "Enhanced Reality Visualization in a Surgical Environment, A.I. Technical Report No. 1544," 1995.[4] Grimson, W. E. L., Ettinger, G. J., White, S. J. and Lozano-Perez, T. "An automatic registration method forframeless stereotaxy, image guided surgery, and enhanced reality," IEEE Transactions on Medical Imaging, vol. 15,pp. 129-140, 1996.[5] Schmalsteig, D., Fuhrmann, A., Hessina, G., Szalavari, Z., Encarnacao, L. M., Gervautz, M., Purgathofer, W.,"The Studierstube Augmented Reality Project," Presence, vol. II, pp. 33-54, February, 2002 2002.[6] Chastine, J.W., Brooks, J. C., Zhu, Y., Owen, G. S., Harrison, R. W., and I.T. Weber, "AMMP-Vis
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
underway.Bibliography1. Ayala, K. J. (1997). The 8051 Microcontroller: Architecture, Programming and Applications (2 ed.): West.2. Barnett, R., Cox, S., & O'Cull, L. (2003). Embedded C Programming and the Atmel AVR: Thomson, Delmar Learning.3. Barnett, R., Cox, S., & O'Cull, L. (2004). Embedded C Programming and the Microchip PIC: Thomson, Delmar Learning.4. Cady, F. M. (2008). Software and Hardware Engineering: Assembly and C Programming for then Freescale HS12 Microcontroller.5. Gaonkar, R. S. (2007). Fundamentals of Microcontrollers and Applications in Embedded Systems with the PIC18 Microcontroller Family): Thomson Delmar Learning.6. Peatman, J. B. (2003). Embedded Design with the PIC18F452
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Abdulbaset Abdulaziz Gaddah A.G., University of Umm Al-Qura; Shakil Akhtar, Clayton State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Transactions on Education, VOL. 50(4), November 2007.5. Atech, C. and Alicia Charpentier, A., “Sustaining Student Engagement in Learning Science”, The Clearing House: A Journal of Educational Strategies, Issues and Ideas, Vol. 87(6), pp. 259-263, 2014.6. Reyes, M., Brackett, M., Rivers, S., White, M., and Salovey, P., “Classroom Emotional Climate, Student Engagement, and Academic Achievement”, Journal of Educational Psychology, pp. 700-712, Vol. 104(3), 2012.7. Gavin Northey, G., Bucic, T., Chylinski, M., and Govind, R., “Increasing Student Engagement Using Asynchronous Learning”, Journal of Marketing Education, pp. 171-180, Vol. 37(3), 2015.8. Entwistle, N. “Conceptions of Learning and the Experience of Understanding: Thresholds
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Ali Salehnia, South Dakota State University; Shieva Salehnia
Tagged Divisions
Computing & Information Technology
Research Center Minneapolis, MN, USA 6. Parker, D.B., Swope, S., Baker, B. N. Ethical conflicts: in information and computer science, technology, and business. QED Information Sciences, Inc. Wellesley, MA, USA ©1990 7. Prior, M., S. Rogerson, and B. Fairweather (2002). “The Ethical Attitudes of Information systems Professional: Outcomes of an Initial Survey,” Telematics and Informatics (19), pp. 21-36. 8. Slater, D. (1991) “New Crop of IS Pros on Shaky Ground,” Computerworld, p. 90. SPA/BSA (1997). Software Publishers Association/Business Software Alliance joint commissioned study: 1996. Global Piracy Report, International Planning and Research, 1997. 9. Straub, S. “Computer abuse and security: Update on
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Michael E. Auer, CTI Villach; Danilo Garbi Zutin, Carinthia University of Applied Sciences; Amir Mujkanovic, CUAS
Tagged Divisions
Computing & Information Technology
. L. D. Feisel and A. J. Rosa, “The role of the laboratory in undergraduate engineering education,” Journal ofEngineering Education, vol. 94, no. 1, pp. 121–130, 2005.2. Ordua, Pablo and Irurzun, Jaime and Rodriguez-Gil, Luis and Garcia-Zubia, Javier and Gazzola, Fabricio andLpez-de-Ipia, Diego. Adding New Features to New and Existing Remote Experiments through their Integrationin WebLab-Deusto. International Journal of Online Engineering (iJOE), vol. 7, no. S2, Oct. 2011.3. Lowe, S. Murray, E. Lindsay, and D. Liu, Evolving remote laboratory architectures to leverage emerginginternet technologies. Learning Technologies, IEEE Transactions on, vol. 2, no. 4, pp. 289294, 2009
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Chris Foreman, Purdue University, West Lafayette; Matthew Turner, Purdue University (Statewide Technology); Karl Perusich, Purdue Statewide Technology DO NOT USE DUPE
Tagged Divisions
Computing & Information Technology
by a gift from the Intel Corporation through their UniversityProgram Office.References 1. David Goldman, “Hacker hits on U.S. power and nuclear targets spiked in 2012,” CNN Money, WWW, found at http://money.cnn.com/2013/01/09/technology/security/infrastructure-cyberattacks/index.html, retrieved Jan 2015, Jan 2013. 2. David E. Sanger and Eric Schmitt, “Rise Is Seen in Cyberattacks Targeting U.S. Infrastructure,” The New York Times New York Edition, pp. A8, July 27, 2012. 3. Cárdenas, A. A., Amin, S., Lin, Z.-S., Huang, Y.-L., Huang, C.-Y. and Sastry, S., “Attacks Against Process Control Systems: Risk Assessment, Detection, and Response,” ACM Symposium on Information Computer and Communications Security, pp
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Danilo Garbi Zutin, Carinthia University of Applied Sciences; Michael E. Auer, Carinthia University of Applied Sciences
Tagged Divisions
Computing & Information Technology
laboratory in undergraduate engineering education,” Journal ofEngineering Education, vol. 94, no. 1, pp. 121–130, 2005.3. E.D. Lindsay and M.C. Good, “Effects of Laboratory Access Modes upon Learning Outcomes,” IEEE Trans.Education, vol. 48, no. 4, pp. 619-631, Nov. 2005.4. V. J. Harward, J. A. del Alamo, S. R. Lerman P. H. Bailey, J. Carpenter, et. al., "The iLab Shared Architecture:A Web Services Infrastructure to Build Communities of Internet Accessible Laboratories," Proceedings of theIEEE , vol.96, no.6, pp.931-950, June 2008.5. P. Orduña, “Transitive and Scalable Federation Model for Remote Laboratories,” Doctoral Thesis, Univertityof Deusto, Bilbao, Spain, Apr. 2013. [Online]. Available:http://morelab.deusto.es/media/publications/theses/pablo
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Stephen J. Zilora, Rochester Institute of Technology (CAST); Jim Leone
Tagged Divisions
Computing & Information Technology
-446.4. DeMarco, T. 1982. Controlling software projects: management, measurement & estimation. Yourdon Press, New York, NY.5. Humphrey, W. S. (1988). Characterizing the software process: a maturity framework. Software, IEEE, 5, 2 (March/April, 1998), 73-79.6. Kaner, M., and Karni, R. 2004. A capability maturity model for knowledge-based decision-making. Information, Knowledge, Systems Management, 4, 4 (December, 2004), 225-252.7. Keller, K., and Mack, B. 2013. Maturity Profile Reports (March 2013). Retrieved May 17, 2013 from http://cmmiinstitute.com/assets/presentations/2013MarCMMI.pdf.8. Kitson, D., and Masters, S. 1992. Analysis of SEI Software Process Assessment Results 1987-1991, Technical Report
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Peng Li, East Carolina University; John M. Jones, East Carolina University; Kris Kareem Augustus, East Carolina University
Tagged Divisions
Computing & Information Technology
PC to teach computer networking and operating systems”, Proceedings of the 4th Conference on Information Technology Curriculum, Lafayette, Indiana, USA, 2003.2. A. Gaspar, S. Langevin, W. Armitage, R. Sekar, and T. Daniels, “The role of virtualization in computing education”, Proceedings of the 39th ACM SIGCSE Technical Symposium on Computer Science Education Portland, Oregon, USA, 2008.3. J. Ekstrom, M. Bailey, “Teaching Web Deployment with OS-virtualization”, Proceedings of 2009 ASEE Annual Conference and Exposition, Austin, Texas, USA, 2009.4. P. Li, “Integrating Virtualization Technology into Remote Lab: A Three- Year Experience”, Proceedings of 2009 ASEE Annual Conference and Exposition, Austin, Texas, USA
Conference Session
Curricular Issues in Computer-Oriented Programs
Collection
2011 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Paymon Sanati-Mehrizy, University of Pennsylvania; Ali Sanati-Mehrizy, Pennsylvania State University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
intends on attending Medical School.Ali Sanati-Mehrizy, Pennsylvania State University Ali Sanati-Mehrizy is a medical student at the Milton S. Hershey Medical Center at Pennsylvania State University. His research interests include the application of mobile computing in the sciences. Upon completion of medical school, he hopes to pursue a career in Internal Medicine/Pediatrics with a further specialization in Hematology-Oncology.Dr. Reza Sanati-Mehrizy, Utah Valley University Page 22.926.1 c American Society for Engineering Education, 2011 Integration of Mobile Computing into
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alak Bandyopadhyay, Alabama A&M University; Neema Simon Sumari, Alabama A&M University
Tagged Divisions
Computing & Information Technology
square meter movable solar cells panel mountedso that it was perpendicular to the Sun’s position through out the day. The fixed solar panel wasperpendicular to the Sun’s position only when the Sun was directly overhead.Two simulated locations for the experiment were selected, Morogoro, Tanzania and Huntsville,Alabama. Morogoro has a latitude of 6° 49′ 0″ S and a longitude of 37° 40′ 0″ E which is nearthe Equator. Huntsville, Alabama has a latitude of 34° 43′ 49″ N and a longitude of 86° 35′ 10″W and is located in the middle part of the Northern Hemisphere of the Earth.The four dates selected for the simulation were the Vernal Equinox March 20, 2011, SummerSolstice June 21, 2011, Autumnal Equinox September 23, 2011, and the Winter
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vamshi Krishna Bolly, Purdue University; John Springer, Purdue University, West Lafayette, IN, USA; J. Eric Dietz, Purdue University
Tagged Divisions
Computing & Information Technology
Proceedings of the ACM 14th international workshop on Data Warehousing and OLAP, on pages 101-104, ACM, October, 2011.2. S. Amjad, S. Neelakrishnan, and R. Rudramoorthy. “Review of design considerations and technological challenges for successful development and deployment of plug-in hybrid electric vehicles,” in Renewable and Sustainable Energy Reviews, 14(3), on pages 1104-1110, 2010.3. The Apache Software Foundation, “Apache Hadoop,” http://hadoop.apache.org, February, 2014.4. “A commercialization project of Energy Systems Network,” http://www.energysystemsnetwork.com/project-summary-benefits, April, 2012.5. “Why Think City?,” http://thinkev.leftbankcompanies.com/why-think-city, December, 2013.6. J. Shafer, S
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Hoda Baytiyeh, The American university of Beirut
Tagged Divisions
Computing & Information Technology
betweeneach variable and each factor. For items that were loaded under two factors, only thehighest loading was retained. The following variances were reported for the factors:factor1, σ2 = 38.62%; factor2, σ2 = 8.41%; factor3, σ2 = 6.73%; factor4, σ2 = 5.36%; andfactor5, σ2 = 4.81%.After evaluating the items loaded under each factor, factor1 was labelled CommunityInfluence (CI), factor2 Satisfaction (S), factor3 Service Quality (SQ), factor4 Learnability(L) and factor5 Technical Quality (TQ). Five new variables were computed on the basisof the means of the items falling under each factor. To compare the factors as rated byusers, one-way repeated measures ANOVA was applied to the five variables. Repeatedmeasures ANOVA indicated significant
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Jacob Haven Gosling; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
the types of cryptographic algorithms. In the beginning, aka the70’s, a cryptographic method was developed called the Data Encryption Standard (DES). Thisencryption algorithm consisted of a 54-bit key using the hardware that was available then. Thiswas more than enough encryption to protect files and communication. Technology quicklyadvanced and far surpassed the capabilities of the systems that were encrypted with DES. Thismethod is no longer considered an acceptable method of encryption. This is because it would betrivial for a mediocre computer by today’s standards to break this encryption.With the loss of integrity in the DES algorithm, a variant was conceived that used a three 56-bitnumbered key. This method is considered reasonably
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology; Reneta Davina Lansiquot, New York City College of Technology
Tagged Divisions
Computing & Information Technology
d faculty opiinion on the use of case studies. Studdent responsses andperformaance were segregated by instructor. Student S resp onses in the sections tauught by instruuctor#1 were not n availablee.5. Next StepsDue to the overall positive effect of the case studies on student flowcharting performance, wewill continue implementing case studies. We will revise the case studies, taking into accountstudent and faculty opinions. This should include, for example, shortening Mind Games, whichuses all basic procedural programming concepts—such as input, sequencing, selection (if/else),repetition (for and while loops), and output—as well as including additional student-createdstories in the
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Song Xing, California State University, Los Angeles; Wang Wei, Southeast University
Tagged Divisions
Computing & Information Technology
leastwe could identify the course title, instructor(s) of the course, and a list of main topics of thecourse. Most of the sites contain much richer contents than the aforementioned minimum amountof information. Among the additional information found on these sites include teachingschedules, topics discussed in the course, lecture notes, detailed homework and projectassignments, and any combinations of the above. In the end, information from a total of 38course websites is collected. Twenty-eight courses of the 38 total have been taught since 2007 (afive-year window through spring 2012). A list of these 28 course websites is in Appendix A.4. Course Titles, Goals, and ObjectivesCollectively the following different course titles are used in the
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Divisions
Computing & Information Technology
prepared and given resources necessary to run a successful workshop. ● Only evaluated or research-based practices that work with diverse students are presented. Evidence of effectiveness is provided for all recommended practices. ● Presented examples and resources are easily used and adapted without ongoing support or instruction. ● Inclusion of success stories by energetic high school teachers (local if possible) using recommended practices. ● Active learning components; e.g., group problem solving to facilitate workshop ice breaker activities. ● Sessions including: ○ Current conditions and need for computing in high school. ○ CS1-type course(s) that promotes more and diverse computing majors
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy; Jiawen Wang, University of Detroit Mercy; Wenbing Zhao, Cleveland State University; Lei Wang, Anhui Polytechnic University
Tagged Divisions
Computing & Information Technology
the requirements of self-reflection at the end of each small lab project.Perhaps this new component will be able to call up students’ metacognitive ability and find iteasier to form higher-level and conceptual understandings based on their actual experiencesusing ROS for robotics design.Acknowledgments: Anhui Provincial Natural Science Foundation (Grant no. 1708085ME129), NationalNatural Science Foundation of China (Grant no. 51305001).References 1. Subbian, V., Purdy, C. C., and Beyette, F. R., UnLecture: A Novel Active Learning Based Pedagogical Strategy for Engineering Courses, Proc. of the 2014 American Society for Engineering Education Annual Conference & Exposition, ASEE 2014.2. Rios, E. F., Khan, A. S., and Padgett, D
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Tatiana Teslenko, University of British Columbia, Vancouver
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
afirst-year course. We believe that the pedagogical process used in this course is transferable toother educational contexts.References: 1. Allen, D., Allenby, B., Bridges, M., Crittenden, J., Davidson, C., Hendrickson, C., Matthews, S., Murphy, C., and Pijawka, D. (2008), Benchmarking sustainable engineering education: Final report. EPA Grant X3-83235101-0. 2. Wiggins, J., McCormick, M., Bielefeldt, A., Swan, C., and Paterson, K. (2011), “Students and sustainability: Assessing students’ understanding of sustainability from service learning experiences”, paper presented at the 2011 Annual American Society of Engineering Educators (ASEE) Conference and Exposition, 26-29 June 2011, Vancouver, Canada
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy; Paymon Sanati-Mehrizy; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Paymon Sanati-Mehrizy Paymon Sanati-Mehrizy is currently a medical student at the Icahn School of Medicine at Mount Sinai. He completed his undergraduate studies in Biology from the University of Pennsylvania in May 2012. Currently, his research interests consist of higher education curricula, both with universities and medical schools.Dr. Reza Sanati-Mehrizy, Utah Valley University