efforts of having students emailing spreadsheets with pre-defined templates (because ofthe live interactive nature of Google Sheets), the lack of anonymity of individuals and groupswas viewed as a significant drawback.The “Importrange” function built into Google Sheets allows defined information to be passedfrom one spreadsheet to another, allowing the sheet creator (in this case, the instructor) to specifythe workflow of information. Google Sheets also allows the “owner” to turn on and off sharingof worksheets (Figure 1). Using these two features, an instructor can create an individualworksheet for each student, where the information from each is consolidated into a singleinstructor worksheet that only that person can view (Figure 2 and 3
. The aim of these models is to highlight the differencebetween Computer Science and Programming, to show the relevance of Computer Science inrecent advances in various fields, and to inspire students to appreciate Computer Science andthe role of algorithms in our daily lives. The modules will cover various topics about the role ofCS in cyber warfare, understanding biology, electronic voting, etc. In subsequent work, thesemodules will be launched as part of a mixed methods study to determine their effectiveness ascompared to a control group not learning through these models and the impact of those moduleson the retention rates of Computer Science majors.1. IntroductionThe President’s Council of Advisors on Science and Technology’s (PCAST
finding lower-cost routers with the capability of running it can bechallenging. Cisco’s integrated services or multiservice routers are designed for branch officeapplications and some support IOS images with MPLS capability.Generally, MPLS first became available for certain 3600- and 2800- series branch routersstarting with IOS version 12.4(1). These routers are now obsolete though the 2800 is stillsupported into 2016. Presently Cisco’s branch router product line has moved to 3900-, and 2900-series. Determining an appropriate combination of platform and IOS feature set can be done bycontacting Cisco representatives or by using the online Cisco Feature Navigator8. The navigatorpermits searching by combinations of router platform, image release
students do not need to study the underlying theory before class to understandthe algorithms. This methodology is aimed to explode the abilities of those with kinestheticlearning (others with a preference for other style of learning can make use of the videos,textbook, or the instructor’s lecture notes).3 It has the beneficial side effect of lettingstudents to socialize with their fellows by requiring them to get in touch and talk to eachother, and giving them the opportunity to learn their fellow’s names. It also avoids studentsto fall asleep in class, since they have to stand up and move to specific positions during thesimulations. Even though similar proposals exist in the literature,5, 6, 1, 4 some of them are nottailored to courses in data
]. Typically, we wouldwe would just read the introduction, examine the diagrams and review the conclusion. The mainbody of text was only read if clarifications or in-depth information was needed. Not only did thissave time but also, as most of our employers were not native speakers of English, focusing oninfographics and less on text reduced misunderstandings [1].After moving to academia, I found that students were unaware of the writing style that is used intoday’s high-paced industries. While many schools offer writing intensive programs [3] andsome guidance on the use of graphs and charts [4], students do not receive enough instruction onhow to develop and integrate infographics [12] within their documentation. This is particularlytrue of the many
perceptions overthree offerings. Specifically, throughout this study we investigated three research questions: 1. What are the differences in engineering students’ ethical reasoning changes when their mode of participation includes an in-class discussion-based lecture format compared to being completely restricted to online material delivery and interaction? 2. What are the differences in engineering students’ perceived effectiveness of an ethics course when participating in a hybrid versus a completely online format? 3. Are there any differences in the correlations between ethical reasoning changes and course perceptions between the hybrid and online groups?Study OverviewThis multiphase research study27 proceeded in three
-item by line-item, and placed in a containingcategory. No additional containing categories were required during this follow on phase,indicating that categorical saturation was achieved. Four top level categories were added tothe 37 containers; effectively creating an hierarchical taxonomy for REILs.1 IntroductionThis paper presents a remote laboratory information taxonomy. Development of taxonomiesis a common human intellectual activity; a taxonomy within some given domain organizesand clarifies the domain content and provides a common framework that supports andfacilitates reasoning and communication about the domain in question. In this paper, theinformation taxonomy that is presented was developed to support reasoning about
Physics Department at Kansas State University. Page 26.496.1 c American Society for Engineering Education, 2015 Developing and Piloting a Quantitative Assessment Tool for Cybersecurity Courses Scott Bell1 , Eleanor Sayre2 , and Eugene Vasserman2 1 Northwest Missouri State University 2 Kansas State UniversityAbstractThe rapid growth of the Internet over the past two decades has led to a proliferation ofnetwork-capable computing devices
potential limitations of the system, as well as suggestions for improvement. Introduction Technologies are foundations of modern societies and software plays an essential role in technologies. Recognizing the importance of software, computer science has become an integral part of general education in USA [1]. Developing high quality software is a complex process and many tools are involved, for example, version control, debugging, performance profile, test coverage, memory access violation, and resource utilization. As an analogy, these tools are instruments in an airplane; these instruments provide crucial information about the condition and status of the plane. The speedometer informs a
graduation. These relate to the knowledge, skills, and behaviors that students acquire asthey progress through the program1. Criterion 3 of computing programs includes a set of ninegeneral outcomes that all computing baccalaureate graduates should possess. The nine generalstudent outcomes of computing programs along with two additional computer science outcomesare listed in Table 1. One aspect of the enhanced ABET criteria (2000) in engineering andtechnology is “an understanding of professional responsibility”. In “Embedding ABET’s studentoutcomes for professional skills” section we will walk through ABET’s four professional skillscommunication, teamwork, ethics and contemporary issues, and professional development(previously known as lifelong
skills are essential for career development. However, in typicaluniversity settings, undergraduate students take different courses and work on different projects indifferent teams each semester. As a result, students lack opportunities to work on multi-yearprojects and develop the skills essential for long-term planning. To remedy this situation, ourdepartment has created elective courses that allow students from all years (first-year students tograduate students) to work on research projects under the supervision of faculty members and thementorship of senior graduate students. These projects provide the opportunities for students tolearn many skills essential in workplace, such as (1) understanding how projects are designed andmanaged; (2
, fluid mechanics, homework problems, content analysis,textbooks, writing promptsIntroductionAs assessments of learning outcomes are increasingly emphasized through accreditationrequirements (e.g., via ABET) and other quality assurance initiatives, written communication isone area that engineering instructors often find challenging to incorporate and assess.1 This isparticularly true in large core courses at the sophomore and junior levels. Yet it has also beenfound that technical writing is best taught during the learning of technical material.2This study is part of a larger ongoing project to understand and expand the incorporation ofwriting in large-lecture engineering courses, including investigation of faculty perspectives andtextbook
lives, theopportunities for careers are expanding rapidly. A major challenge of this field is the trainingand education of a new generation of skilled workers. This paper studies different approachesthat are used by different institutions of higher education to integrate nanotechnology conceptsinto their curriculum.IntroductionNanotechnology is the science, engineering, and technology that deals with various structures ofmatter that have dimensions on the order of a billionth of a meter. Nanotechnology is the abilityto observe, manipulate, measure, and manufacture things at the nanoscale, which is about 1 to100 nanometers. While the word nanotechnology is new and was introduced in the late 1970s,the existence of functional devices and
from the robust FruityWifi package. Wireshark filters, captures, andanalyzes network packets, such as hypertext transfer protocol secure (HTTPS) requests. SSLstripstrips the secure connection and convert HTTPS to hypertext transfer protocol (HTTP), gainingaccess to sensitive information such as login credentials. This simple to implement yet powerfulproject, demonstrates the ease of hiding and discreetly deploying a Raspberry Pi on a vulnerablewireless network to sniff network packets that is considered protected behind firewalls, whilemaintaining a safe distance and anonymity from the target.IntroductionThe Raspberry Pi, see figure 1, is a miniature and affordable computer created by the RaspberryPi Foundation, an educational charity based in
images on a computer. Both provide good Graphic UserInterface (GUI) design and have been intensively used for learners to build, configure, andtroubleshoot networks in a virtualized network environment. In this paper, PT and GNS3 will becompared from the perspectives of capability and complexity. Strengths and weaknesses of eachwill be discussed. In addition, networks will be built in order to illustrate the points of ourdiscussion.1. IntroductionAs technological advances continue to further integrate different aspects of our lives, it becomesincreasingly difficult to not depend on technology on a day to day basis. All of the smart devices,gadgets and gizmos converge at a central point that provides connectivity between them - thenetwork. With
need for automated and scalableassessment mechanisms, to assess large numbers of students without a proportionateincrease in costs. There are four main approaches to this kind of assessment:autograding, constructed-response analysis, automated essay scoring, and peer review.This paper examines the current status of these approaches, and surveys new research oncombinations of these approaches to produce more reliable grading.Keywords: scalable assessment, autograding, constructed-response analysis, automatedessay scoring, peer review, self-review1. IntroductionLimited resources to adequately assess student work are a major problem in highereducation. A 2012 New York Times article [1] on automated essay scoring contains thefollowing anecdote
college upper level management to quickly evaluate theuniversity’s performance by looking at the index score. The upper management can thendrill down and see which KPI’s were responsible for the change in monthly performance.Richland used these metrics until 2007, but the structure of their dashboard had evolved,adding visual cues in the form of traffic lights to allow for faster analysis10. Table 1. Richland College Data Dashboard9 Page 26.312.5In the year 2000, The University of California (UC) realized that it would need to makechanges to its business architecture to accommodate its projected influx of futureenrollments. Since the
host and across different hostsusing container-based virtualization technology. Afterward, we will evaluate and compare theperformance of such implementation with a cluster built on physical machine.1 IntroductionThe practical exercises included in laboratory-based course play an important role in engineeringand science educations. Many academic institutes developed the laboratory-based courses to helpstudents to accelerate their learning in different types of laboratories such as real, simulation, oronline [1]. Especially in Information Technology education, hands-on exercises through thelaboratory became an essential component of the course because it provides students with anopportunity to learn and observe how to apply the concepts
the level of IPv6 readiness ofinternational universities is largely unknown. Secondly, the quality or “effectiveness” ofuniversities that have IPv6 web services enabled is also unknown. This study addresses thesetwo challenges by providing the first known published assessment of the IPv6 enablement ofuniversities within a global scope.Though the need to become ready for IPv6 implementation may not be on the forefront of auniversity’s list of priorities, the effects of not becoming IPv6 ready can have negativeimplementations much sooner than administrators may anticipate. A university’s adoption ofIPv6 can affect the institution’s teaching, research, innovation, and budget.1 Partneringinstitutions and research facilities that are already IPv6
programs fail to engage 21st century learners, ignoring the plethora of resourcesand techniques made available by advanced technology.1 GalvanizeU offers programs that are industry relevant. Developed in partnership with theUniversity of New Haven (UNH), GalvanizeU’s data science program is based in Silicon Valley,California (San Francisco). GalvanizeU/UNH will infuse a new breed of diverse, creative andinterdisciplinary talent into the field of data science. This paper describes the innovative way in which GalvanizeU/UNH’s curriculum isdesigned to address the needs of students, educators, employers, and stakeholders, combininglearner-centered pedagogy, industry partnerships, and a commitment to continuous improvement.The first program
, experiment, evaluate, iterate, and innovate [1].Computer science education research has generally focused on engagement [2], [3] compellingdomains for learning computing [4]–[9], and specific pedagogical strategies[10], [11]. However,as a nation we have yet to make major strides in developing computing literacy as a core 21stcentury STEM skill for tackling multidisciplinary problems [12]. Computing is seen as uncooland approaches to teaching it may be uninspiring [13]. Yet demand for computer scientists in thejob market remains robust: over 1.4 million computing-related jobs are estimated to be availablenationally in 2018, with US universities only meeting a third of that demand in degreeproduction [12].Music, a ubiquitous part of human culture with
. c American Society for Engineering Education, 2016 Integrating Software Testing into Computer Science Curriculum Using WReSTT-CyLE and Learning Objects Yujian Fu1, Nelson Barnes1, and Peter Clarke2 1 Alabama A&M University 4900 Meridian Street Normal AL 35762 2 Florida International University 11200 SW 8th Street Miami, FL 33199 Telephone: (305) 348-2440Abstract
two semesters. Figure 1. Cynefin Complex Domain (used with permission Cognitive Edge Pte Ltd http://cognitive-edge.com/ as published in Essential Scrum: A Practical Guide to the Most Popular Agile Process1) Page 26.809.2Many projects can be partitioned into domains according to their complexity and uniqueness.The Cynefin framework partitions projects into five domains based on their complexity: Simple,Complicated, Complex, Chaotic, and Disorder. In the Simple domain the correct solution isobvious and generally undisputed. Best practices and continuous business process improvementmethodologies
Data Mining for Adverse Event Detection and Action RecommendationAbstractMany real-life data mining applications use sequence data modeling, in which data isrepresented as a sequence. A temporal sequence is a finite ordered list of events (t1,e1),(t2,e2), …,(tn,en) where ti represents time and ei represents the event taking place at time ti.ei takes place before ei+1 for 1≤ i ≤ n-1. This model can be used in data mining, calledsequence data mining, to predict certain event that may take place at a specific time.Sequence data mining has a wide range of applications. This data mining technique canbe used for prediction of adverse events and can recommend appropriate actions to betaken as needed. In aviation safety, the
engineering discipline and 2more projects for out-of-discipline choices. At the same time, each faculty member shares theirlist of projects, each specifying the maximum number of students required from each discipline.Once all the input is collected, discipline managers (DM’s) from each of the engineeringdepartments manually sorted students according to the preferences and project constraints.Figure 1 attempts to visually capture the existing assignment approach.Figure 1. The existing approach involved faculty pitches where faculty members described their project’s needs (left) and students submitted their preferences via paper-based formed (right
theperspective of the Internet, focusing on quantitative analysis of metrics measuring levels ofdeployment, traffic, and performance3,10-13.Our study extends that of Czyz et al. who employed a broad approach to measuring IPv6deployment, assembling a breadth of observations and comparing datasets against each other.Their findings provided a better understanding of the systemic state of IPv6 deployment throughthe use of multiple measured metrics and datasets, each focused on one or more aspects of IPv6adoption3.MethodologySince our goal was to extend the research of Czyz et al. we focus on using the same or similarmetrics and methods as closely as possible. Specific details on each metric is discussed in thesections that follow for each metric. Table 1
understanding."The approach is even more challenging to implement in the SMT (Science, Mathematics, andTechnology) fields at minority-serving institutions requiring trained faculty.This paper describes in detail our efforts to implement CBI in the Computer Science curriculumin general, and Computer Graphics (CG) and Software Engineering (SWE) in particular. Theeffort is part of an NSF grant awarded to UT Pan Am and UT Brownsville (both are now part ofthe newly merged university of UT Rio Grande Valley). The CG and SWE courses were selectedbecause of the initial high enrollment but the low retention rate. The paper documents the effortsthat have been made in specific areas of the newly implemented courses. These include: 1. The process of identifying
-based course, multiple-projectis intended to be designed to train the following research skills of students: (1) knowing currentwork in field, (2) recognizing research problems, (3) critical thinking, (4) problem-resolving, (5)research methods, (6) critical reviewing, and (7) documenting and reporting.2. The On-going Multiple-project-based PedagogyThe Department of Electrical and Computer Engineering in our school offers track concentration onthe Robotics and Mechatronics program. A variety of practical research and development projectsare crucial features of the Robotics and Mechatronics program. Therefore, ComputationalIntelligence course with on-going practical R&D project is a great opportunity for students toenhance their research
student may be appropriate. All students wishingto take this course must also submit an Ethics Agreement to reinforce the ethics expected of acybersecurity professional. An example of a cybersecurity course Ethics Agreement can befound in Appendix A.Learning OutcomesThe Social Engineering course learning outcomes include the following: 1. Explain the various techniques that can be used to complete Social Engineering exploits. 2. Develop an understanding of the psychology of human interaction and how it can be exploited for gain. 3. Learn what technical controls, trainings, and processes can be used to help defend and establish security in-depth to protect against Social Engineering. 4. Overcome uncomfortable feelings such as
-year-old became one of the first uncontained computerviruses 1 to be found in the wild. Some were created as proof of concept, showing whattheoretically can be done by outside software. The use of viruses gradually developed to read,destroy, or even steal data. These functions have become a key part of cyber-crime, and arecontinually on the rise today. The malicious intent of these programs gave rise to the termmalicious software, otherwise known as malware.According to Verizon’s 2014 Data Breach Investigations Report, 63,437 security incidents werereported in the year 2013, and 1,367 of those incidents resulted in a confirmed data breach 2. The2014 US State of Cybercrime Survey claims that an average of 135 security incidents perorganization