Asee peer logo
Displaying results 61 - 90 of 94 in total
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Joseph Alan Nygate, Rochester Institute of Technology (CAST); Richard Cliver, Rochester Institute of Technology (CAST)
Tagged Divisions
Computing & Information Technology
, draw conclusionsor make predictions.Bibliography 1. Krum, R (2013), Cool Infographics : Effective Communication with Data Visualization and Design, John Wiley & Sons 2. Lankow, J., Crooks, R., & Ritchie, J., (2012), Infographics : The Power of Visual Storytelling, John Wiley & Sons 3. Lerner, N. (2007). Laboratory lessons for writing and science. Written Communication, 24 (3), 191-222. 4. Leydens, J., Olds, B. (2007). Publishing in scientific and engineering contexts: A course for graduate students, IEEE Transactions on Professional Communication, 50 (1), 45-56. 5. Locke, D. (1992). Science as writing. New Haven, CT. Yale University Press. 6. McCabe, J. (2007). Network Analysis
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Peng Li, East Carolina University; Lee Toderick, East Carolina University
Tagged Divisions
Computing & Information Technology
University to meet the needs ofthe growing number of face-to-face and distance education students6. Laboratory experiments areuseful in teaching students skills needed for employment, and to reinforce theoretical conceptsintroduced during lectures. However, the students sometimes do not receive timely feedbackbecause it is extremely time-consuming for the instructors to grade the hands-on exercises. Thestudents usually do not have the opportunities to fix the mistakes they made in previous labs dueto lack of timely feedback. These challenges were addressed by the creation of an automatedgrading and feedback system, called BroadReach Extended, for locally designed hands-onexercises in Information Technology (IT) courses. By introducing the automatic
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said
Tagged Divisions
Computing & Information Technology
, the secondresearch question helped to understand the effect of leadership support on selecting and adoptinga prescribed process model.Data Collection: The survey method is “The method in which field workers or interviewersobtain quantitative data in a study of people outside of the experimental laboratory” [12]. Forthe purpose for this study, a survey was a simple, easy, and clear method for respondents tosupply the data. The questionnaire administration took place electronically using an onlinewebsite. Brehob [6] defined a questionnaire as “A form that people fill out, used to obtaindemographic information and views and interests of those questioned” (p. 1, para. 1).Kirakowski [13] defined a questionnaire structurally as “A method for
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Araceli Martinez Ortiz, Texas State University - San Marcos; Mina Guirguis, Texas State University
Tagged Divisions
Computing & Information Technology
control with research contributions in the areas of Cyber-Physical Systems (CPS), Networks and Computing Systems, and Mobile Cloud Computing. His research work has been published in over forty refereed papers, posters and journals, and one book chapter. Guirguis’ research and educational activities are funded with over $2.9M in grants from the NSF, DoD, AFOSR, IEEE, Cisco and Texas State. Guirguis received the NSF CAREER award in 2012. Guirguis has been a visiting faculty researcher at the Air Force Research Laboratory (AFRL) in the sum- mers of 2012 and 2013. During the academic year 2014/2015 he joined the Mobile and Pervasive Com- puting Group in the ECE Dept. at UT Austin. Guirguis has a wide range of
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jason St. John, Purdue University, West Lafayette; Thomas J. Hacker, Purdue University, West Lafayette; Raymond A Hansen, Purdue University; Natasha N. Nikolaidis, Purdue University; Robert M Trinkle, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
to the authors’institution. Due to limited laboratory space at TECSUP, the authors’ institution is able to send12 students at most.TECSUP offers a three year degree program, which does not qualify as a bachelor’s degree perWorld Education Services 3 , but the authors are working with TECSUP to develop anarticulation agreement so that Peruvian students who finish the program at TECSUP can enrollat the authors’ institution and get a bachelor’s degree from the authors’ department.3.3 Ireland and SpainThe authors’ institution is part of a three-way partnership with peer institutions in Ireland—theDublin Institute of Technology—and Spain—Universitat Politècnica de Catalunya—which isbuilt on the idea of sustainability of innovation. The authors
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeremy Webb, Department of Mechanical and Biomedical Engineering Boise State University; Inanc Senocak, Boise State University; Dazhi Yang, Boise State University
Tagged Divisions
Computing & Information Technology
Turbulence Research (jointly operated by NASA Ames Research Center and Stanford University) and at the Los Alamos National Laboratory, where he worked on large eddy simulation of atmospheric boundary layer flows and source inversion of atmospheric dispersion events, respectively. His research interests include computational fluid dynamics (CFD), wind energy forecasting, parallel computing with GPUs, cavitation and multiphase flows, turbu- lence modeling, atmospheric transport and dispersion, and inverse problems.Dr. Dazhi Yang, Boise State University Dazhi Yang is an Assistant Professor in the Educational Technology Department at Boise State University. Prior to coming to Boise State, she was a postdoctoral researcher and
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Vicky L. Smith, Indiana University Purdue University, Indianapolis; Eugenia Fernandez, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
2013 0–4 Admission Type New/Transfer Admission Status Direct/University College Class Standing Freshman/Sophomore/Junior/Senior Gender Male/Female Math Level Pre-college Algebra/College Algebra /Calculus CIT 10600 Using a Personal Computer Completed? Yes/No CIT 11200 Information Technology Fundamentals Yes/No CIT 12000 Quantitative Analysis I Yes/No CIT 14000 Programming Constructs Laboratory Yes/No CIT 21200 Web Site Design Yes/No CIT 21400 Introduction
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Brian Joseph Lane
Tagged Divisions
Computing & Information Technology
and enhancing their quality of education.Highly recommend this approach to attracting and retaining students to the embeddedcomputing, and wireless networking.All developed source code and curriculum material is available for use. Besides the author, thestudent coauthor is also very positive about the laboratory outcome and appreciates the enhancedunderstanding of wireless sensor networks and wireless API for Bluetooth and Zigbeeapplications. With proper mentoring, capable tutelage, and guidance, these burgeoning andtalented young students will contribute to the best practices in implementing future smart phone Page 24.234.11applications
Conference Session
Information and Network Security
Collection
2011 ASEE Annual Conference & Exposition
Authors
Peng Li, East Carolina University; John M. Jones, East Carolina University; Kris Kareem Augustus, East Carolina University
Tagged Divisions
Computing & Information Technology
, 2009.5. S. Averitt, M. Bugaev, A. Peeler, H. Shaffer, E. Sills, S. Stein, J. Thompson and M. Vouk, “Virtual Computing Laboratory (VCL)”, Proceedings of the International Conference on the Virtual Computing Initiative, Research Triangle Park, North Carolina, USA, 2007.6. P. Li, L. Toderick, & J. Noles, “Provisioning virtualized datacenters through Virtual Computing Lab”, Proceedings of 2010 ASEE/IEEE Frontiers in Education Conference, Arlington, Virginia, USA, 2010.7. X. Wang, G. C. Hembroff, and R. Yedica, “Using VMware VCenter lab manager in undergraduate education for system administration and network security”, Proceedings of the 2010 ACM SIGITE Conference, 43-52, Midland, Michigan, USA. 2010
Conference Session
Information and Network Security
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alak Bandyopadhyay, Alabama A&M University; Neema Simon Sumari, Alabama A&M University
Tagged Divisions
Computing & Information Technology
solar cells by changing position of solar panels and software development forencryption and decryption of data that enables data transfer securely via internet.There has been lot of work published in the area of solar tracking and some of them arediscussed in this section. Work by Chong et al.2 found that by using a Sun-tracking formula, theywere able to track the Sun’s position accurately and it was cost effective. They also found thatwhile using light sensors (a closed loop system) gave a much better tracking accuracy, thesystem will lose its position if the Sun is blocked by clouds. There conclusion was that a Sun-tracking formula overall gave a significant improvement in the tracking accuracy.The National Renewable Energy Laboratory (NREL
Conference Session
Information Systems and Computing Potpourri
Collection
2011 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Interface, Second Edition, Morgan Kaufman Publishers, 19984- J. W. Stewart and C.Y. Wang, Digital Electronics Laboratory Experiments using the Xilinix XC95108 CPLD,Prentice Hall, 20055- Foundation series software, XILINIX Student Edition 4.2i, 20066- B. Parhami, Computer Architecture From Microprocessors to Supercomputers, Oxford University Press, 20057- AppendixThis section includes solution to the homework.A- Control.vhd Page 22.144.9-- control module (simulates SPIM control module) library Synopsys, IEEE;use Synopsys.attributes.all;use IEEE.STD_LOGIC_1164.all;entity control is port( signal Op : in std_logic_vector(5 downto 0
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona; Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
16,000 different line items under a'microcontroller' search.Selecting the ideal MCU and DT for a particular project could be a time-consuming and tedious Page 24.1012.2task for an undergraduate student or the course designer and faculty mentor3. This is aggravated bythe fact that students are usually only familiar with the MCU, DB and IDE they have used duringtheir undergraduate classroom and lab experience. The students are challenged not just by thedesign, but by the integration of these various types of technology.There are other challenges in the curriculum too. A student takes a digital circuits and systemscourse with its laboratory
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Damla Turgut, University of Central Florida; Lisa Massi, University of Central Florida; Salih Safa Bacanli, University of Central Florida; Neda Hajiakhoond Bidoki, University of Central Florida
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
of female and male studentswith representation from underserved groups. Half of the participants were sophomores, andthe other half primarily juniors and one senior.The program covered the expenses of the participating students including travel expense,meal allowance, housing, and stipend. REU students lived in university-affiliated housing,and the work was done in the various research laboratories associated with the project. Theprimary activity of the program was for each of the students to complete a research projectunder the supervision of a faculty. Each student was paired with a faculty mentor and workedon research projects ranging from software design, security and privacy, hardware fabricationto the study of the social implications
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Pat Smith, Oklahoma Christian University of Science and Arts
Tagged Divisions
Computing & Information Technology
happy to provide further information upon request including samplesof lab and lecture activities.Bibliography[1] – Feisel, L., Rosa, A., (2005) The Role of the Laboratory in Undergraduate Engineering Education, Journal ofEngineering Education, January, 2005.[3] – Comer, D, (2004), Network Systems Design Using Network Processors, Pearson Prentice Hall.[4] - Giladi, R., (2008), Network Processors, Morgan Kaufmann[5] – IEEE, Software Engineering Body of Knowledge (SWEBOK). https://www.computer.org/web/swebok/v3[6] – Cisco Systems, Inc., Internetworking Design Basics, Chapter 2.http://www.cisco.com/cpress/cc/td/cpress/ccie/ndcs798/nd2002.htm#33232
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Sarah A. Cunha; Dale C. Rowe, Brigham Young University
Tagged Divisions
Computing & Information Technology
Paper ID #17151A Call to Arms: Defending Against Point of Sale MalwareMs. Sarah A. Cunha Sarah Cunha is a student at Brigham Young University studying Information Technology with an em- phasis in Cyber Security. She is originally from Dos Palos, California. She has participated in multiple Collegiate Cyber Defense Competitions and Capture the Flag events and currently is employed as a Re- search Assistant in the BYU Cyber Security Research Laboratory. Sarah is an active member of the BYU Red Team which has participated in several penetration tests for departments on campus, and businesses in the local area. Sarah has
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Bushra Tawfiq Chowdhury, Virginia Tech; Sam Blanchard, Virginia Polytechnic Institute and State University; Kirk W Cameron; Aditya Johri, George Mason University
Tagged Divisions
Computing & Information Technology
: Balanced designs for deeper learning in an online computer science course for middle school students. 2014, Stanford University.[6] Lahtinen, E., K. Ala-Mutka, and H.-M. Järvinen. A study of the difficulties of novice programmers. in ACM SIGCSE Bulletin. 2005. ACM.[7] Streveler, R.A., et al., Learning conceptual knowledge in the engineering sciences: Overview and future research directions. Journal of Engineering Education, 2008. 97(3): p. 279-294.[8] Barney, B., Introduction to parallel computing. Lawrence Livermore National Laboratory, 2010. 6(13): p. 10.[9] Nevison, C.H., Parallel Computing for Undergraduates. National Science Foundation and Colgate
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Gretchen G. Achenbach, National Center for Women & IT; Leslie G. Cintron PhD, University of Virginia; J McGrath Cohoon, University of Virginia; Philip Michael Sadler, Harvard Smithsonian Center for Astrophysics; Gerhard Sonnert, Harvard University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
co-authored the first integrated computer and laboratory introductory calculus course in 1975. He has taught middle school mathematics, engineering, and science and both undergraduate science and graduate teaching courses at Harvard. His research interests include assessment of students’ misconceptions and how they change with instruction, K-12 curriculum development, the transition to college of students who wish to purse STEM careers, pre-college engineering, and the professional development of teachers. Dr. Sadler has won the Journal of Research in Science Teaching Award, the American Institute of Physics Computers in Physics Prize, the American Astronomical Society Education Prize, and the American Association
Conference Session
Communication Across the Divisions III: Writing as Social–Technical Integration
Collection
2015 ASEE Annual Conference & Exposition
Authors
Vukica M. Jovanovic, Old Dominion University; Megan McKittrick, Old Dominion University; Pilar Pazos, Old Dominion University; Daniel Richards, Old Dominion University; Julia Romberger
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology, Liberal Education/Engineering & Society
their design course or to record a blinking LED circuit to showthem that they properly programmed and wired an electrical circuit. These videos are especiallyimportant in distance education.Analytical Writing Explanation of equations: Faculty members participating in the workshop noted thatstudents generally have difficulty articulating how they solved a specific problem using equationsor why they selected a specific equation. This problem is apparent in laboratory reports but alsoin capstone/senior design technical reports. Explicit argumentation of the rationale for theselection the equation and how it was used to solve the problem was identified as an importantgenre during the workshop. Chart or diagram with explanation and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
&MUniversity (FAMU) [5]. The NSF Course, Curriculum, and Laboratory Improvement(CCLI) Phase I project had the following objectives: (a) create learning materials ontesting tools, (b) increase the number of students who have access to testing tool tutorials,and (c) train instructors on how to use testing tools and WReSTT in the classroom.WReSTT-CyLE is a NSF Transforming Undergraduate Education in Science (TUES) IIproject that aims to provide a cyberlearning environment that facilitates the improvementof students’ conceptual understanding and practical skills in software testing. The maingoals of this project are to create new learning materials and develop faculty expertise tosignificantly increase the number of undergraduate students that
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
computer science courses since 1992. His areas of expertise are computer architecture, networking, database systems, computing platforms and languages. As the director of Infrastructure, Telecommunications, and Networking (ITNet), and later as the Chief Technol- ogy Officer, at UT Brownsville, he implemented state of the art networking using campus wide fiber ring with redundant links to facilities. He established diskless computer labs to provide uniform computing platform across campus, and modernized classrooms to make them congenial to online learning. He was the PI on NSF funded BCEIL (Beowulf-based Curriculum Enrichment Integrated Laboratory) grant and Co-PI on NSF funded MCALL (Multimedia based Computer Assisted
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
attitude development in introductory computer science. In Proceeding of the 44th ACM Technical Symposium on Computer Science Education, SIGCSE ’13, 2013.11 Eric Drever. Using Semi-Structured Interviews in Small-Scale Research. A Teacher’s Guide. ERIC, 1995.12 Heidi Fencl and Karen Scheel. Engaging students: An examination of the effects of teaching strategies on self-efficacy and course climate in a nonmajors physics course. Journal of College Science Teaching, 35(1):20, 2005.13 Jack R Fraenkel and Norman E Wallen. How to design and evaluate research in education.14 John M. D. Hill, Curtis A. Carver, Jr., Jeffrey W. Humphries, and Udo W. Pooch. Using an isolated network laboratory to teach advanced networks and security. In Proceedings
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
ofaccomplishment and empowerment.Augmented Reality (AR) enables virtual objects to be embedded into the physical world in realtime, and its applications are almost limitless. In the past, this technology has been confined tospecialized laboratories, primarily because the equipment necessary to support these kinds ofenvironments was prohibitively expensive. In addition, developing meaningful AR applicationsrequired a broad, yet deep, set of computing skills. As such, initial experimentation was reservedexclusively for advanced graduate research. Similar to other paradigms, these constraints arebeing removed, providing educators an opportunity to introduce AR at the undergraduate level.AR environments encompass many educational approaches that have been
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
they ”walk” through virtual spatial audio environments. In the past, she has collaborated with the Naval Submarine Medical Research Laboratory, to investigate using spatial audio in sonar applications.Mr. Phillip Wendell Hall Jr, Clemson University Phillip Hall is a Human-Centered Computing Doctoral Student in the School of Computing at Clemson University. He received his bachelors from North Carolina Agricultural and Technical State University in Computer Science. His research interests include educational technology systems & database systems. Currently Phillip is a part of Human-Centered Computing lab at Clemson University where he is in his second year as a graduate student.Dr. Sekou L Remy, Division of
Conference Session
IT-based Instructional Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Alexander A. Kist, University of Southern Queensland
Tagged Divisions
Computing & Information Technology
] Access downlink bandwidth [bit/s]Figure 1: Download time (course web page) Figure 2: Download time (lecture recording) versusversus access bandwidth. access bandwidth.The second set of results introduce objective performance measures and subjective userperceived performance for a Remote Access Laboratory activity that involves writing and testinga short script that controls a hardware relay. Details of the experiments are outside the scope ofthis paper and are discuss in another article.6 Figure 3 depicts the Mean Opinion Score of testsubjects (excellent = 5; good = 4; fair = 3; poor = 2; bad = 1) versus RTT. Figure 4 depictsrelative task duration versus RTT, for the same
Conference Session
Innovations in Computing Education
Collection
2012 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
, buttranslating that idea into actions requires planning. So before you can write any code, you haveto take the time to explore the possible techniques and technologies. The core infrastructure of aniOS app is built from objects in the UIKit framework. There are some resources that must bepresent in all iOS apps. Most apps include images, sounds, and other types of resources forpresenting the app’s content, but the App store may also require some specific resources. Youmay like to refer to iOS App Programming Guide 11 for further details.ResultsSo far we have used this series of modular smart phone laboratory exercises only on two sets ofstudents. The first experimental set of students have given us some limited feedback. Overall thestudent critique was
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Automation Systems5. Dr. Rajender Thusu, PhD, Frost & Sullivan, June 1, 2010, http://www.sensorsmag.com/networking- communications/wireless-sensor/wireless-sensor-use-is-expanding-industrial-applications-7212, Wireless Sensor Use Is Expanding in Industrial Applications.6. Mareca Hatler, September/October 2012: Industrial Wireless Sensor Networks: Trends and developments, http://www.isa.org/InTechTemplate.cfm?template=/ContentManagement/ContentDisplay.cfm&ContentID=908 24,7. Marko Paavola , Control Engineering Laboratory, Report A No 33, December 2007 ,Wireless Technologies in Process Automation - A Review and an Application Example.8. Daniele Puccinelli and Martin Haenggi, IEEE Circuits and Systems Magazine, Third
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Jacob Haven Gosling; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
, and created a laboratory with state-of-art field programmable gatearray (FPGA) hardware boards and development stations tailored for the study of efficientsoftware, hardware, and combined hardware-software implementations. They offer thefollowing three courses on security16: • Cryptography I- Introduction to Cryptography • Cryptography II – Advanced Cryptography Algorithms • Hardware and Software Design for Cryptographic ApplicationsThey have introduced their students to cross-disciplinary areas by successfully addingperformance considerations to an existing cryptography course, developed and taught a hardwareand software design course. They are working on developing a new course on softwaresecurity16.Modules for Embedded
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Wei Zheng, Jackson State University; Jianjun Yin, Jackson State University; Yanhua Cao, Jackson State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Northwest Missouri State University; Eugene Vasserman, Kansas State University; Eleanor C Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
Elliott Tew. Becoming experts: measuring attitude development in introductory computer science. In Proceeding of the 44th ACM technical symposium on Computer science education, pages 183–188. ACM, 2013.17 Arlene Fink and Mark S. Litwin. How to measure survey reliability and validity, volume 7. Sage, 1995.18 John Hill, Curtis A. Carver Jr., Jeffrey W. Humphries, and Udo W. Pooch. Using an isolated network laboratory to teach advanced networks and security. In ACM SIGCSE Bulletin, volume 33, pages 36–40. ACM, 2001.19 Robert W. Lent, Steven D. Brown, and Kevin C. Larkin. Self-efficacy in the prediction of academic performance and perceived career options. Journal of counseling psychology, 33(3):265, 1986.20 Celia Paulsen, Ernest McDuffie
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University; Nelson Barnes Jr, Alabama A&M University
Tagged Divisions
Computing & Information Technology
various types offormats, one of the latest of which spawned from the web and information technology and is theso-called learning object, the cyber equivalent of earlier shareable resources for education andtraining. The types of educational formats, such as lecture handouts, textbooks, and presentationslides, can all be considered as learning modules. A large variety of topics can be displayed andpresented in learning objects (LOs). In addition, the interactive learning bound to LOs can be Proceedings of the 2016 ASEE Annual Conferencerealized by programming for assignments, cases, models, virtual laboratory experiments,simulations, and many other electronic resources for education and training. Many thousands