Paper ID #15290Progress and Impact of LEAP: An NSF S-STEM Scholarship ProjectDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah Valley
is in biomedical signal and image processing.Ms. Sumra Bari, Purdue University, School of Electrical and Computer Engineering Sumra Bari received the Bachelor’s degree in Electrical Engineering in 2011 from the University of Engi- neering and Technology, Lahore, Pakistan and the Master’s degree in 2015 from Purdue University, West Lafayette, IN where she is currently working towards the Ph.D. degree in School of Electrical and Com- puter Engineering. Her research interests include functional neuroimaging, statistical biomedical imaging and signal processing and model based image processing.Prof. Samuel S. Wagstaff Jr, Purdue University Sam Wagstaff is a computer science professor at Purdue University. He works in
, Page 26.328.4Helping other people, Having others working under my supervision, Having job security,Working with people rather than objects, Inventing new things, Developing new knowledge andskills, Having lots of family time, Having lots of time for myself/friends, Making my owndecisions, Having an easy job, Having an exciting job, Making use of my talents/abilities,Working in an area with lots of job opportunities. Characteristics were rated on a scale of 1 to 6,where 1 = Not at all important and 6 = Very important. (For more information on the PRiSEproject and survey methodology, see 26, 27)Occupational DataThe most recent available occupational statistics were obtained from the U. S. Bureau of LaborStatistics (BLS). These include 2013
Science Foundation (CNS #1138469, DRL#1417835, and DUE #1504293), the Scott Hudgens Family Foundation, and the Arthur M. BlankFamily Foundation.References[1] J. M. Wing, “Computational thinking and thinking about computing,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 366, no. 1881, pp. 3717–3725, 2008.[2] M. Guzdial and E. Soloway, “Teaching the Nintendo generation to program,” Commun. ACM, vol. 45, no. 4, pp. 17–21, Apr. 2002.[3] A. Bruckman, M. Biggers, B. Ericson, T. McKlin, J. Dimond, B. DiSalvo, M. Hewner, L. Ni, and S. Yardi, “‘Georgia computes!’: improving the computing education pipeline,” in Proceedings of the 40th ACM technical symposium on Computer
effective way for educators to battle this challenge. This paper describes a tool,SHAvisual, which addresses this issue for the secure hash algorithm (SHA). SHA is a family ofcryptographic hash functions that the National Institute of Standards and Technology beganpublishing in the early 1960’s. SHAvisual is designed to help students learn and instructorsteach the SHA-512 algorithm. It consists of three major components: Demo Mode, PracticeMode and Full Mode. A separate global view window helps highlight the current procedure inthe algorithm pipeline. The Demo Mode provides a simplified SHA-512 visualization and isuseful for the instructor to demonstrate important operations in the classroom. The PracticeMode is designed for students to learn the
sstudents andd/or very baddperformaance of otherrs. Figure 2 shows s the peercent of stuudents who pperformed well (i.e. whoobtained >= 7 in the assessmentss) in the diffeerent program mming conccept assessm ments. The figgureillustrates why computer program mming coursses are gatew way courses with low paassing gradess: inmost con nceptual cateegories less than t 50% of students perrformed at an adequate llevel.4.2 Explo oratory Facto or AnalysisTo furtheer understandd the nature of students’ understandiing of computer program
their desired cloud together with number ofbenchmarks such as matrix multiplications with MPI and/or OpenMP to demonstrate thetransparency and portability of the provided solution.Bibliography1. Peter Mell, Tim Grance, "The NIST definition of cloud computing." 2011.2. Escalante, B. F. (2010). “Cloud Computing Fundamentals”. In Handbook of Cloud Computing. Springer3. Moustafa AbdelBaky, Manish Parashar, Kirk Jordan, Hyunjoo Kim, Hani Jamjoom, A Zon-Yin Shae, Gergina Pencheva, Vipin Sachdeva, James Sexton, Mary Wheeler, Mary F. Wheeler, "Enabling High-Performance Computing as a Service," Computer, vol. 45, no. 10, pp. 72-80, 2012.4. S. Azodolmolky, P. Wieder, R. Yahyapour, "Cloud computing networking: challenges and
. 179-187, 1962. [2] S. A. Dudani, K. J. Breeding, and R. B. McGhee, “Aircraft identification by moment Invariants,” IEEE Transactions on Computers C-26, pp. 39-45, 1977. [3] M. R. Teague, “Image Analysis via the General Theory of Moments,” J. Opt. Soc. Am. Vol. 70, No. 8, pp. 920-930, 1980. 13 Page 26.10.14 [4] F. Alt, “Digital Pattern Recognition by moments,” Optical Character Recognition G.L. Fischer et al. Eds., Spartan, Washington, D.C., pp. 240-258, 1962. [5] R. Y. Wong and E. L. Hall, “Scene Matching with Invariant Moments,” Computer Graphics and Image Processing No. 8, pp. 16-24, 1978. [6] C. H
common ground. Acknowledgements The researchers would like to thank the Purdue Research Foundation for supporting thispublication and our research. 20Formal Education and Computing Professionals’ Needs References1 Zweben, S. (2014). Computing Degree and Enrollment Trends. Computing Research Association. Retrieved from cra.org/uploads/documents/resources/taulbee/CRA_Taulbee_CS_Degrees_and_Enrollme nt_2012-13.pdf2 Besterfield-Sacre, M., Cox, M., Borrego, M., Beddoes, K., & Zhu, J. (2014). Changing engineering education: Views of U.S
applications, which are designed for end-users and delivered over the web. Therefore, Cloud Consumers are able to use online applications. In this level of service model, Cloud Consumers need to be authorized to use provided online applications [3].NIST has published its Cloud Computing Reference Architecture in the Special Publication SP500-292. In the presented Architecture, NIST tries to provide an easy way of understanding theoperational intricacies in Cloud Computing [2]. There are five different parts in the NIST CloudComputing Reference Architecture, which are Cloud Consumer, Cloud Provider, Cloud Auditor,Cloud Broker, Cloud Carrier [4].Chandramouli, R., Iorga, M., and Chokhani, S. (2014) discussed cryptographic key managementissues
gained.References1. Bandura, A. (1982). Self-Efficacy Mechanism in Human Agency. American Pyschologist, 37(2), 122-147.2. Basawapatna, A., Repenning, A., & Koh, K. H. (2015). Closing The Cyberlearning Loop. Proceedings of the 46th ACM Technical Symposium on Computer Science Education - SIGCSE '15, (pp. 12-17).3. Bean, N., Weese, J. L., Feldhausen, R., & Bell, R. (2015). Starting From Scratch: Developing a Pre- Service Teacher Program in Computational Thinking. Frontiers in Education.4. Bell, R. S. (2014). Low Overhead Methods for Improving Capacity and Outcomes in Computer Science. Manhattan, KS: Kansas State University.5. Brennan, K., & Resnick, M. (2012). Using artifact-based interviews to study the
more time, the system’sdesign could be further refined and the software algorithms’ capabilities increased. With theseimprovements, the hybrid system’s overall effectiveness and feasibility may become even moreappealing.AcknowledgementWe would like to thank Wendell A. Gibby, MD, for allowing us to use his medical facility,including medical equipment and access to medical personnel necessary for the successfulconduction of this undergraduate research project.References:1. L Li et al., "Assessment of the fetal thymus by two- and three-dimensional ultrasound during normal human gestation and in fetuses with congenital heart defects.," Ultrasound in Obstetrics and Gynecology, vol. 37, no. 4, pp. 404 - 409, 2011.2. E. Pavlova, D. Markov, S
Manufacturing since 2010 and International Journal of Computational Materials Science and Surface Engineering since 2007.Dr. S. Hossein Mousavinezhad, Idaho State University is the principal investigator of the National Science Foundation’s research grant, National Wireless Re- search Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as Engineering Education. He is Founding General Chair of the IEEE International Electro Information
://www.qualtrics.com/. [Accessed 1 February 2015].[3] S. Y. Lye and J. H. L. Koh, "Review on teaching and learning of computational thinking through programming: What is next for K-12?," vol. 41, pp. 51-61, 2014.[4] Phoenix Contact, [Online]. Available: https://www.phoenixcontact.com/nanoline. [Accessed 1 February 2015].[5] Phoenix Contact, "How to program nanoLine with flow chart programming - Phoenix Contact," 15 October 2009. [Online]. Available: https://www.youtube.com/watch?v=qXA2O47rqqw. [Accessed 1 February 2015].[6] National Center for Women in Computing, "By the Numbers," National Center for Women in Computing, Boulder, CO, 2014.[7] Y. Oh and S. Yang, "Defining exergames and exergaming," in Proceedings of Meaningful Play, East Lansing, MI
should consider using a genre-based approach to integrating writing into engineeringcurriculum if they are concerned with the integration of students into real, actual engineeringcommunities of practice.Acknowledgement The project presented in this paper was funded by the Old Dominion University’s QualityEnhancement Plan (QEP): as Interdisciplinary Writing (IDW) Project “Student Writing in theSTEM Disciplines: A Faculty Learning Community”19.References 1. Lang, J. D., Cruse, S.,McVey, F. D., & McMasters, J. (1999). Industry expectations of new engineers: A survey to assist curriculum designers. Journal of Engineering Education,88, 43-51. 2. Reave, L. (1999). Technical communication instruction in engineering schools: A
Transactions on Education, VOL. 50(4), November 2007.5. Atech, C. and Alicia Charpentier, A., “Sustaining Student Engagement in Learning Science”, The Clearing House: A Journal of Educational Strategies, Issues and Ideas, Vol. 87(6), pp. 259-263, 2014.6. Reyes, M., Brackett, M., Rivers, S., White, M., and Salovey, P., “Classroom Emotional Climate, Student Engagement, and Academic Achievement”, Journal of Educational Psychology, pp. 700-712, Vol. 104(3), 2012.7. Gavin Northey, G., Bucic, T., Chylinski, M., and Govind, R., “Increasing Student Engagement Using Asynchronous Learning”, Journal of Marketing Education, pp. 171-180, Vol. 37(3), 2015.8. Entwistle, N. “Conceptions of Learning and the Experience of Understanding: Thresholds
. He is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. His research interests are varied and involve pediatric hematology and oncology as well as higher education curricula, both with universities and medical schools.Paymon Sanati-Mehrizy Paymon Sanati-Mehrizy is currently a medical student at the Icahn School of Medicine at Mount Sinai. He completed his undergraduate studies in Biology from the University of Pennsylvania in May 2012. Currently, his research interests consist of higher education curricula, both with universities and medical schools.Dr. Reza Sanati-Mehrizy, Utah Valley University
of Testing Tools in SE Courses," in the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE '11)., New York, NY, USA, 2011. [8] A. P. Rovai, M. K. Ponton and M. J. Wighting, "A Comparative Analysis of Student Motivation in Traditional Classroom and E-Learning Courses," International Journal on E-Learning, vol. 6, no. 3, pp. 413-432, 2007. [9] A. Goswami, G. S. Walia and S. Aburardeh, "Using a Web-Based Testing Tool Repository in Programming Course: An Empirical Study," in the 2014 International Conference on Frontiers in Education: Computer Science and Computer Enginee, 2014. [10] S. Wolfe and R. Flewitt, "New technologies, new multimodal practices and young children’s metacognitive," Cambridge Journal
graph for path testing testingb. TachoTestThis test has been done to test the consistency between the expected moving distance and theactual moving using the EV3’s default odometer data. This test purposed to find the drift in theEV3 servo motors. The code snippet is depicted in the following figure. Fig 10: Tacho Test for Robot Control System © American Society for Engineering Education, 2016 2016 ASEE Southeast Section ConferenceAll the test tests cases are written using Robotium and JUnit. The main class of Robotium Solo is used for testing which offers
faculty themselves and the perceptions their institutions have of them. Givencurrent findings, we anticipate a large and concerning gap between the two sets of beliefs.AcknowledgementsThe author thanks Blackburn College's Faculty Research fund for sponsoring this research, andAnneliese Darow, Jalaa Hoblos, Kate Lockwood, and Laura Wiedlocher for their assistance.Bibliography[1] R. Starkman., (2016, April 28). "Stanford computer science launches a new masters ofeducation", in The Huffington Post [Online]. Available:http://www.huffingtonpost.com/ruth-starkman/stanford-computer-science_b_9713220.html[2] S. Zweben and B. Bizot, "2015 taulbee survey," in Computing Research News: CRA, 2016[3] J. Tims, S. Zweben, Y. Timanovsky, J. Chu Prey, "ACM NDC
Applications, Prentice Hall, 2003.9. Joyce Van de Vegte, Fundamentals of Digital Signal Processing, Prentice Hall, 2002.10. Sanei, S., Chambers, J., EEG Signal Processing, John Wiley & Sons, Ltd, West Sussex, England, 2007.11. Greenfield, L., Geyer, J., Carney, P., Reading EEGs, Lippincott, 2010.12. ZhijunGu, NI Biomedical Start up Kit 3.0, July 2010, https://decibel.ni.com/content/docs/DOC-1264613. Biomedical Workbench 2013 Help, https://digital..ni.com/14. http://www.ni.com/white-paper/8599/en/Appendix A Bioinformatics Sample Lab: Nucleotides/Protein Data Search/IdentificationOne of the most common DNA format is FASTA. This format is the official format withinBLAST and NCBI searching, matching, and sequencing engine. FASTA is a text-based
information on migration patterns of the Black Tip Shark. And yet the web is a fairly young technology Page 26.1358.6 emerging in the early 1990’s out of efforts at the European Center for Nuclear Research (CERN). Figure 2 – Top App (Marine Debris) splash screen It is at CERN that Tim Berners-Lee first assembled the components necessary for the realizationof the web; a browser (client), a server, a protocol for client/server communication (HTTP) and alanguage for presenting information (HTML) 10. Since then the growth of the web has beennothing short of explosive. The rapid growth itself caused one of the inherent
showcased in the course website.IV. Pre-Lesson Quiz a. You just downloaded the popular Angry Birds game. As you play the game (on your phone, or in the lab, or on your computer), try to figure out how the game is implemented. What are the variables you change as you push the bird up or down, left or right?V. Test Your Mettle Quiz a. You shoot a dart at a speed of 10 m/s with an angle of 50. What is the time for impact. b. What is the maximum height and what is the maximum range for the dart in question a. c. You shoot a dart at a speed of 10 m/s with an angle of 45. What is the time for impact. d. What is the maximum height and what is the maximum range for the dart in question c. e
.[9] P. Guo, “Why scientists and engineers must learn programming,” Communications of the ACM, 2013. [Online]. Available: http://cacm.acm.org/blogs/blog-cacm/166115-why- scientists-and-engineers-must-learn-programming/fulltext. [Accessed: 02-Jul-2017].[10] J. M. Wing, “Computational thinking,” Commun. ACM, vol. 49, no. 3, pp. 33–35, 2006.[11] K. Lynch, A. Carbone, D. Arnott, and P. Jamieson, “Studio-Based Approach to Teaching Information Technology,” vol. 8, no. April 2013, pp. 75–79, 2002.[12] M. Woodley and S. N. Kamin, “Programming Studio : A Course for Improving Programming Skills in Undergraduates,” 1971.[13] R. A. Layton, M. L. Loughry, M. W. Ohland, and G. D. Ricco, “Design and validation of a web-based system
both air and ground. His team deployed a bomb finding robot named the LynchBot to Iraq late in 2004 and then again in 2006 deployed about a dozen more improved LynchBots to Iraq. His team also assisted in the deployment of 84 TACMAV systems in 2005. Around that time he volunteered as a science advisor and worked at the Rapid Equipping Force during the summer of 2005 where he was exposed to a number of unmanned systems technologies. His initial group composed of about 6 S&T grew to nearly 30 between 2003 and 2010 as he transitioned from a Branch head to an acting Division Chief. In 2010-2012 he again was selected to teach Mathematics at the United States Military Academy West Point. Upon returning to ARL’s
] R. L. Brown, H. L. Helton, A. C. Williams, M. T. Shrove, M. Milošević and E. Jovanov, "Android Control Application for Nao Humanoid Robot," in Proc. of the International Conference on Frontiers in Education: Computer Science and Computer Engineering, 2013.[4] H. Ahn, H. Kim, Y. Oh and S. Oh, "Smartphone-Controlled Telerobotic Systems," in Cyber- Physical Systems, Networks, and Applications (CPSNA), 2014 IEEE International Conference on, Hong Kong, 2014.[5] I. Fette and A. Melnikov, "The WebSocket Protocol," [Online]. Available: https://tools.ietf.org/html/rfc6455. [Accessed 25 July 2016].[6] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach and T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1
machines and basic computer organization. In Proceedings of the 16th Annual Joint Conference on Innovation and Technology in Computer Science Education, ITiCSE ’11, pp. 335–335, New York, NY, USA, 2011. ACM.6. Sivilotti, P. A. G. and Pike, S. M. The suitability of kinesthetic learning activities for teaching distributed algorithms. SIGCSE Bull., 39(1):362–366, March 2007. Page 26.1373.8
process was adjusted to put a stronger emphasis on motivation issues and technicalbackground of candidates. The biggest limitation of the analysis conducted is the small number of observations. Currently, in splitting afew hundred students according to certain aspects, we get buckets of only a few dozen people. At this rate, a fewoutliers in a bucket might create a visible anomaly. We hope to get a statistically significant amount of data bymonitoring students performance and admission metrics over the course of 2-3 years.References[1] T. Stanko, Innopolis University – a new IT resource for Russia, Proceedings of the International Conference on Interactive Collaborative Learning (ICL), Kazan, Russia September 25 – 27, 2013[2] Irina S