Paper ID #15290Progress and Impact of LEAP: An NSF S-STEM Scholarship ProjectDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah Valley
, West Lafayette, IN. He is the current leader of A.C.C.E.S.S. team.Mr. Mrigank S. Jha, Purdue University, West Lafayette Mr. Jha works as a Web Developer for World Wide Technology in St Louis, Missouri. He graduated from Purdue University in December 2015, with a Bachelor’s Degree in Electrical Engineering. He worked as a front-end developer for A.C.C.E.S.S - Analysis of Code on Cloud as an Educational Service to Students.Mr. Pranav Marla, Purdue University Pranav Marla is an undergraduate student at the College of Science in Purdue University. He is pursuing a major in Computer Science, with a specialization in Machine Intelligence. He designed the entire backend of A.C.C.E.S.S.Mr. Kee Wook Lee, Purdue University
and concurrentinstructional groups will serve as the independent variables; while the dependent variables areengineering concept knowledge, FEA skills scores, and subjective cognitive load scores.Pre-Test: FEA Software Skill and Engineering Concepts Students will first complete a pre-test to identify their baseline FEA software skills andknowledge of FEM. Figure 1 shows an example of a sample pre-test question where thedeflection values need to be determined for an axially loaded steel plate, by means of FEM andFEA software utilizing beam elements.6 Figure 1. Pre-test sample question.6 Reprinted from Finite element analysis: theory and application with ANSYS, (p. 33), S., Moaveni, 2015, Pearson.Group 1: Simultaneous
Science Foundation (CNS #1138469, DRL#1417835, and DUE #1504293), the Scott Hudgens Family Foundation, and the Arthur M. BlankFamily Foundation.References[1] J. M. Wing, “Computational thinking and thinking about computing,” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, vol. 366, no. 1881, pp. 3717–3725, 2008.[2] M. Guzdial and E. Soloway, “Teaching the Nintendo generation to program,” Commun. ACM, vol. 45, no. 4, pp. 17–21, Apr. 2002.[3] A. Bruckman, M. Biggers, B. Ericson, T. McKlin, J. Dimond, B. DiSalvo, M. Hewner, L. Ni, and S. Yardi, “‘Georgia computes!’: improving the computing education pipeline,” in Proceedings of the 40th ACM technical symposium on Computer
dual-stack hostname, in random order. Figure 8 shows that over the two year period fromJanuary 2014 to December 2015 the number of users accessing Google.com over IPv6 increasedfrom around 2.5% to just over 9%.Figure 8. Percent of users accessing Google.com over IPv6IPv6 traffic volume (U1)The traffic volume metric (U1) is a measure of how much Internet traffic is over IPv6. To get asnapshot of Internet IPv6 traffic volume we used publicly available statistics from theAmsterdam Internet Exchange (AMS-IX) 20. The AMS-IX is one of the largest Internet exchangepoints (IXP) in the world and connects more than 776 autonomous systems worldwide. AMS-IXtracks the percentage of native IPv6 traffic using s-flow statistics.The average aggregated Internet
, "Using Mobile Phones in Education," in The 2nd IEEE International Workshop on Wireless and Mobile Technologies in Edcuation (WMTE'04), Washinton, DC, USA, 2004.[3] L. S. Vygotsky, "Interaction between learning and development," in Mind in society. The development of higher psychological processes, M. Cole, V. John-Steiner, S. Scribner and E. Souberman, Eds., Cambridge, MA, Harvard University Press, 1978, pp. 79-91.[4] K. R. Clark, Examining the effects of the flipped model of instruction on student engagement and performance in the secondary mathematics classroom: An action research study, Capella University, 2013.[5] F. C. Herreid and N. A. Schiller, "Case Study: Case Studies and the Flipped Classroom," Journal of College Science
their desired cloud together with number ofbenchmarks such as matrix multiplications with MPI and/or OpenMP to demonstrate thetransparency and portability of the provided solution.Bibliography1. Peter Mell, Tim Grance, "The NIST definition of cloud computing." 2011.2. Escalante, B. F. (2010). “Cloud Computing Fundamentals”. In Handbook of Cloud Computing. Springer3. Moustafa AbdelBaky, Manish Parashar, Kirk Jordan, Hyunjoo Kim, Hani Jamjoom, A Zon-Yin Shae, Gergina Pencheva, Vipin Sachdeva, James Sexton, Mary Wheeler, Mary F. Wheeler, "Enabling High-Performance Computing as a Service," Computer, vol. 45, no. 10, pp. 72-80, 2012.4. S. Azodolmolky, P. Wieder, R. Yahyapour, "Cloud computing networking: challenges and
tacit.Explicit knowledge is codified and captured in archives and databases in discrete words ornumbers. Tacit knowledge, on the other hand, provides the context for developing andunderstanding explicit knowledge [7]. Tacit knowledge is not codified and is, therefore,harder to communicate. The development of tacit knowledge is a continuous activity betweenindividuals sharing experiences for mutual understanding [6].Knowledge needs to be continuously created in order for it to be continuously shared.Nonaka [6] proposes that knowledge is created through the conversion between tacit andexplicit knowledge via four modes, referred to by the acronym SECI, in a continuous cycle:1) socialization (S) is creating tacit knowledge from other tacit knowledge through
://www.qualtrics.com/. [Accessed 1 February 2015].[3] S. Y. Lye and J. H. L. Koh, "Review on teaching and learning of computational thinking through programming: What is next for K-12?," vol. 41, pp. 51-61, 2014.[4] Phoenix Contact, [Online]. Available: https://www.phoenixcontact.com/nanoline. [Accessed 1 February 2015].[5] Phoenix Contact, "How to program nanoLine with flow chart programming - Phoenix Contact," 15 October 2009. [Online]. Available: https://www.youtube.com/watch?v=qXA2O47rqqw. [Accessed 1 February 2015].[6] National Center for Women in Computing, "By the Numbers," National Center for Women in Computing, Boulder, CO, 2014.[7] Y. Oh and S. Yang, "Defining exergames and exergaming," in Proceedings of Meaningful Play, East Lansing, MI
Research Center Minneapolis, MN, USA 6. Parker, D.B., Swope, S., Baker, B. N. Ethical conflicts: in information and computer science, technology, and business. QED Information Sciences, Inc. Wellesley, MA, USA ©1990 7. Prior, M., S. Rogerson, and B. Fairweather (2002). “The Ethical Attitudes of Information systems Professional: Outcomes of an Initial Survey,” Telematics and Informatics (19), pp. 21-36. 8. Slater, D. (1991) “New Crop of IS Pros on Shaky Ground,” Computerworld, p. 90. SPA/BSA (1997). Software Publishers Association/Business Software Alliance joint commissioned study: 1996. Global Piracy Report, International Planning and Research, 1997. 9. Straub, S. “Computer abuse and security: Update on
laboratory in undergraduate engineering education,” Journal ofEngineering Education, vol. 94, no. 1, pp. 121–130, 2005.3. E.D. Lindsay and M.C. Good, “Effects of Laboratory Access Modes upon Learning Outcomes,” IEEE Trans.Education, vol. 48, no. 4, pp. 619-631, Nov. 2005.4. V. J. Harward, J. A. del Alamo, S. R. Lerman P. H. Bailey, J. Carpenter, et. al., "The iLab Shared Architecture:A Web Services Infrastructure to Build Communities of Internet Accessible Laboratories," Proceedings of theIEEE , vol.96, no.6, pp.931-950, June 2008.5. P. Orduña, “Transitive and Scalable Federation Model for Remote Laboratories,” Doctoral Thesis, Univertityof Deusto, Bilbao, Spain, Apr. 2013. [Online]. Available:http://morelab.deusto.es/media/publications/theses/pablo
d faculty opiinion on the use of case studies. Studdent responsses andperformaance were segregated by instructor. Student S resp onses in the sections tauught by instruuctor#1 were not n availablee.5. Next StepsDue to the overall positive effect of the case studies on student flowcharting performance, wewill continue implementing case studies. We will revise the case studies, taking into accountstudent and faculty opinions. This should include, for example, shortening Mind Games, whichuses all basic procedural programming concepts—such as input, sequencing, selection (if/else),repetition (for and while loops), and output—as well as including additional student-createdstories in the
of Testing Tools in SE Courses," in the 42nd ACM Technical Symposium on Computer Science Education (SIGCSE '11)., New York, NY, USA, 2011. [8] A. P. Rovai, M. K. Ponton and M. J. Wighting, "A Comparative Analysis of Student Motivation in Traditional Classroom and E-Learning Courses," International Journal on E-Learning, vol. 6, no. 3, pp. 413-432, 2007. [9] A. Goswami, G. S. Walia and S. Aburardeh, "Using a Web-Based Testing Tool Repository in Programming Course: An Empirical Study," in the 2014 International Conference on Frontiers in Education: Computer Science and Computer Enginee, 2014. [10] S. Wolfe and R. Flewitt, "New technologies, new multimodal practices and young children’s metacognitive," Cambridge Journal
). Computational Thinking : A Digital Age Skill for Everyone. Learning & Leading with Technology, 5191, 20-23.3. Barr, V., & Stephenson, C. (2011). Bringing Computational Thinking to K-12: What is Involved and What is the Role of the Computer Science Education Community ? ACM Inroads, 2(1), 48-54.4. Bean, N., Weese, J. L., Feldhausen, R., & Bell, R. (2015). Starting From Scratch: Developing a Pre-Service Teacher Program in Computational Thinking. Frontiers in Education.5. Bell, R. S. (2014). Low Overhead Methods for Improving Capacity and Outcomes in Computer Science. Manhattan, KS: Kansas State University.6. Bennett, V., Ioannidou, A., Repenning, A., Kyu Han, K., & Basawapatna, A. (2011
graph for path testing testingb. TachoTestThis test has been done to test the consistency between the expected moving distance and theactual moving using the EV3’s default odometer data. This test purposed to find the drift in theEV3 servo motors. The code snippet is depicted in the following figure. Fig 10: Tacho Test for Robot Control System © American Society for Engineering Education, 2016 2016 ASEE Southeast Section ConferenceAll the test tests cases are written using Robotium and JUnit. The main class of Robotium Solo is used for testing which offers
) Increasing Persistence of College Students in STEM, Science, Vol. 341.7. Beyer, S. (2014). Why are women underrepresented in Computer Science? Gender differences in stereotypes, self-efficacy, values, and interests and predictors of future CS course-taking and grades. Computer Science Education, 24(2/3), 153-192.8. Patitsas, E., Craig, Michelle, and Easterbrook, S. (2015). Scaling up Women in Computing Initiatives: What Can We Learn from a Public Policy Perspective? ICER ’15, August 09 - 13, 2015, Omaha, NE, USA.9. National Research Council. A Framework for K-12 Science Education: Practices, Crosscutting Concepts, and Core Ideas. Washington, DC: The National Academies Press, 2012.10. National
: Binary, Octal, and Hexadecimal Initial Keychains Materials: Pony Beads in 2 colors (binary), 8 colors (octal), and 16 colors (hexadecimal) 3 pieces of Cord cut at approximately 10 inches for each participant 1 Keyring for each participant ASCII Table(s) showing binary, octal, and hexadecimal Prep: Purchase pony beads Place each color of bead in a separate container with a tag or sign to designate the number it represents. Using containers with easily removable and
Manufacturing since 2010 and International Journal of Computational Materials Science and Surface Engineering since 2007.Dr. S. Hossein Mousavinezhad, Idaho State University Dr. Mousavinezhad was the principal investigator of the National Science Foundation’s recent research grant, National Wireless Research Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as Engineer- ing Education. He is Founding General Chair of the IEEE
= = 𝑅𝐶𝑠 + 1 1 1 𝑠 + 𝑅𝐶 𝑠+ 1 𝑠 + 1000 𝑅𝐶 10𝑘Ω ∗ 0.1µ𝐹The following four lines of codes can be used to find the Bode plot:num = [1000];den = [1, 1000];TF = tf(num,den)bode(TF)1000/(s+1000) Bode Diagram 0 -5 -10 -15 Magnitude (dB) -20 -25 -30 -35 -40 0 Phase (deg
showcased in the course website.IV. Pre-Lesson Quiz a. You just downloaded the popular Angry Birds game. As you play the game (on your phone, or in the lab, or on your computer), try to figure out how the game is implemented. What are the variables you change as you push the bird up or down, left or right?V. Test Your Mettle Quiz a. You shoot a dart at a speed of 10 m/s with an angle of 50. What is the time for impact. b. What is the maximum height and what is the maximum range for the dart in question a. c. You shoot a dart at a speed of 10 m/s with an angle of 45. What is the time for impact. d. What is the maximum height and what is the maximum range for the dart in question c. e
Constituent, 2014.[15] Fu, Y. and Clarke, P., “Gamification based Cyber Enabled Learning Environment for Software Testing” submitted to the 123rd American Society for Engineering Education (ASEE) - Software Engineering Constituent, 2016.[16] A. Goswami, G. S. Walia and S. Aburardeh, "Using a Web-Based Testing Tool Repository in Programming Course: An Empirical Study," in the 2014 International Conference on Frontiers in Education: Computer Science and Computer Enginee, 2014.[17] Drupal Community. Drupal, 2016. http://drupal.org/.[18] Mening, R., “Building a Simple Drupal Website”, Websitesetup.org. November 2013. Available from http://websitesetup.org/build-website-drupal/.[19] Rovai, A.P.. Blended learning and sense of community
Learning: Perceptions of EPICS Alumni,” Journal of Engineering Education, 105: 43–69. doi: 10.1002/jee.20107 9. E.J. Coyle, J.V. Krogmeier, R.T. Abler, A. Johnson, S. Marshall and B.E. Gilchrist, 2014. “The Vertically- Integrated Projects (VIP) Program – Leveraging Faculty Research Interests to Transform Undergraduate STEM Education,” Proceedings of the Transforming Institutions: 21st Century Undergraduate STEM Education Conference,10. Gediminas Adomavicius, Alexander Tuzhilin, 2001. "Using Data Mining Methods to Build Customer Profiles", Computer, vol.34, no. 2, pp. 74-82, February, doi:10.1109/2.90117011. Xindong Wu; Xingquan Zhu; Gong-Qing Wu; Wei Ding, 2014. "Data mining with big data," in Knowledge and
curriculum owners within universities decide toadopt any of the recommendations made in this paper, the software industry will benefit for yearsto come.References1. The CHAOS Manifesto, 2013: Think Big, Act Small, 2013, The Standish Report International.2. Al-Ahmad, W., et al., A taxonomy of an IT project failure: Root Causes. International Management Review, 2009. 5(1): p. 93.3. Fabriek, M., et al. Reasons for Success and Failure in Offshore Software Development Projects. in ECIS. 2008.4. Mandal, A. and S. Pal, Identifying the Reasons for Software Project Failure and Some of their Proposed Remedial through BRIDGE Process Models.5. Jagtiani, L.J. and N. Lewis, The Impact of Big Data on the Management of Business Software Technology Projects
SingaporeMillennium Foundation, under the project code: M4061449, and in part by an Instructionaldevelopment grant from the University of California, Santa Barbara. The authors also thank Dr.George Michaels, Executive Director, Instructional Development, University of California,Santa Barbara for his assistance in the development of the website.References:[1] Drupal.org, (2016). Drupal - Open Source CMS | Drupal.org. Available at https://www.drupal.org/[2] W3techs.com, (2016). Usage Statistics and Market Share of Content Management Systems for Websites, January 2016. Available at http://w3techs.com/technologies/overview/content_management/all[3] Patel, S.K.; Rathod, V.R.; Parikh, S., "Joomla, Drupal and WordPress - A statistical
–246. doi:10.1016/j.jsis.2004.08.0025. Basu, A., & Jarnagin, C. (2008, March 10). How to tap IT’s hidden potential. The Wall Street Journal. Retrieved from http://online.wsj.com/article/SB120467900166211989.html6. Brehob, K. (2001). Usability glossary. Retrieved from http://www.usabilityfirst.com7. Creswell, J. W. (2012). Educational research: Planning, conducting, and evaluating quantitative and qualitative research (4th ed.). Upper Saddle River, NJ: Pearson.8. Iqbal, M., Nieves, M., & Taylor, S. (2007). Service strategy. London, England: Stationery Office Books.9. Irvine, B., & Probst, J. (2007). ITIL: A factor for all purchases. Summit, 10(6), 8-9. Retrieved from http://www.summitconnects.com
process was adjusted to put a stronger emphasis on motivation issues and technicalbackground of candidates. The biggest limitation of the analysis conducted is the small number of observations. Currently, in splitting afew hundred students according to certain aspects, we get buckets of only a few dozen people. At this rate, a fewoutliers in a bucket might create a visible anomaly. We hope to get a statistically significant amount of data bymonitoring students performance and admission metrics over the course of 2-3 years.References[1] T. Stanko, Innopolis University – a new IT resource for Russia, Proceedings of the International Conference on Interactive Collaborative Learning (ICL), Kazan, Russia September 25 – 27, 2013[2] Irina S
answer and also fields that keep track of how many timesthe question appeared in tests and how many times it was answered correctly. SLOATrelation has records of tests. Each test has up to 10 questions, as pilot study. For example,q1 indicates which question is picked and q1c filed is true if it is answered correctly. Theoverall design of the relations was based on the hierarchical relationship among the mainentities of the application. In our design a course is allowed to have one or moreobjectives. Associated with each course objective is one or more multiple choicequestion(s). Multiple choice questions have 4 options for possible answers. Anassessment test for a given course consists of a collection of questions, one question foreach
-implemented emulation of the computer system andexecutes the program as a physical machine. The purpose of virtualization is to execute theprogram in different environments from the host machine. Two techniques are developed andavailable, hardware virtualization and abstract virtual machine. Since the hardware virtualizationvirtually creates one or more separate physical space environment(s) isolated from the hostmachine, it is preferred and widely adopted. In this paper, we will focus on and compare thesetwo virtualization approaches.3.1 Hypervisor-based virtual machineHypervisor-based virtual machine is a software and/or hardware implementation to create andrun separate virtual environments different from host machine. The type-1 hypervisor
value,that of the application layer’s Instant Messenger application (used to create LL3P packets). Eachpacket has a unique identifier (2 bytes long), and a 1 byte Time To Live field which must bedecremented as the packet is forwarded through the network. The payload is variable sized and a1’s complement checksum is calculated over the packet using a method similar to IP’s method ofzeroing out the checksum field and placing the resulting checksum in the checksum field.Accordingly, when the TTL field changes the checksum must also change. LL3P Frame Structure Offset 0 1 2 3 4 5 Source LL3P 0x00