Asee peer logo
Displaying all 27 results
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joseph William Beckman, Purdue University; Melissa Jane Dark, Purdue University; Pratik Kashyap, Purdue University; Sumra Bari, Purdue University, School of Electrical and Computer Engineering; Samuel S. Wagstaff Jr, Purdue University; Yingjie Chen, Purdue Polytechnic Institute; Baijian Yang, Purdue Polytechnic Institute
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
is in biomedical signal and image processing.Ms. Sumra Bari, Purdue University, School of Electrical and Computer Engineering Sumra Bari received the Bachelor’s degree in Electrical Engineering in 2011 from the University of Engi- neering and Technology, Lahore, Pakistan and the Master’s degree in 2015 from Purdue University, West Lafayette, IN where she is currently working towards the Ph.D. degree in School of Electrical and Com- puter Engineering. Her research interests include functional neuroimaging, statistical biomedical imaging and signal processing and model based image processing.Prof. Samuel S. Wagstaff Jr, Purdue University Sam Wagstaff is a computer science professor at Purdue University. He works in
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Alireza Kavianpour, DeVry University, Pomona; Sogand Kavianpour; Javad Shakib, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Theory and Mechatronics.3.1 PID Control in a Robot Arm Figure 2: Robotic ArmConsider a robotic arm (Figure 2) with four joints:1: Turntable, 2: Bicep, 3: Forearm, 4: WristJoints are moved by a DC/Servo motor. The Robotic Arm controller consists offour PIDs (one per joint). 𝐾𝑝, 𝐾𝑖, 𝐾𝑑 for each PID loop is calculated separately.This process can be time-consuming. Alternatively, you can tune all four PID loopssubject to system-level requirements. MATLAB has the tools to calculate PIDvalues. The transfer function of a PID controller is found by taking the Laplacetransform.We can also define a PID controller in MATLAB directly using the transferfunction, for example: Kp = 1; Ki = 1; Kd = 1; C = Kp + Ki/s + Kd*s C
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Yosi Shibberu, Rose-Hulman Institute of Technology
Tagged Divisions
Computing & Information Technology
. Consumerproducts that depend on deep learning, products like Amazon’s Alexa and Google Home, are thetip of a new wave of innovation that will change the way consumers interact with products.Scientists and engineers with expertise in deep learning are already in short supply.Deep learning is based on an old technology — neural networks. In fact, some argue that deeplearning is simply a re-branding of neural networks, a technology that has been through several“hype-cycles 3 .” Neural networks date to as far back as the 1940’s and 1950’s. In 1957, FrankRosenblatt introduced the Perceptron, the forerunner of today’s modern neural networks. What isnew today is the availability of big data sets to train large and deep neural networks and theavailability of the
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Connie Justice, Indiana University Purdue University, Indianapolis; Nichole McFarland, Indiana University Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
. Chandra,D.G.&D.B.Malaya(2012).Roleofcloudcomputingineducation.Computing,ElectronicsandElectricalTechnologies(ICCEET),2012InternationalConferenceon,IEEE. Hartmann,S.B.,Braae,L.Q.N.,Pedersen,S.,&Khalid,S.(2016)."ThePotentialsofUsingCloudComputinginSchools:ASystematicLiteratureReview."TurkishOnlineJournalofEducationalTechnology. Kumar,R.,Gupta,N.,Charu,S.,Jain,K.,&Jangir,S.K.(2014)."OpensourcesolutionforcloudcomputingplatformusingOpenStack."InternationalJournalofComputerScienceandMobileComputing3(5):89-98. Pierce,G.L.andP.F.Cleary(2016)."TheK-12educationaltechnologyvaluechain:Appsforkids,toolsforteachersandleversforreform."EducationandInformationTechnologies21(4):863-880. Reidenberg,J.,Russell,N.C.,Kovnot,J.Norton
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Secil Caskurlu, Purdue University; Iryna Ashby, Purdue University; Marisa Exter, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
common ground. Acknowledgements The researchers would like to thank the Purdue Research Foundation for supporting thispublication and our research. 20Formal Education and Computing Professionals’ Needs References1 Zweben, S. (2014). Computing Degree and Enrollment Trends. Computing Research Association. Retrieved from cra.org/uploads/documents/resources/taulbee/CRA_Taulbee_CS_Degrees_and_Enrollme nt_2012-13.pdf2 Besterfield-Sacre, M., Cox, M., Borrego, M., Beddoes, K., & Zhu, J. (2014). Changing engineering education: Views of U.S
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
gained.References1. Bandura, A. (1982). Self-Efficacy Mechanism in Human Agency. American Pyschologist, 37(2), 122-147.2. Basawapatna, A., Repenning, A., & Koh, K. H. (2015). Closing The Cyberlearning Loop. Proceedings of the 46th ACM Technical Symposium on Computer Science Education - SIGCSE '15, (pp. 12-17).3. Bean, N., Weese, J. L., Feldhausen, R., & Bell, R. (2015). Starting From Scratch: Developing a Pre- Service Teacher Program in Computational Thinking. Frontiers in Education.4. Bell, R. S. (2014). Low Overhead Methods for Improving Capacity and Outcomes in Computer Science. Manhattan, KS: Kansas State University.5. Brennan, K., & Resnick, M. (2012). Using artifact-based interviews to study the
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Dennis K. Njeru, Utah Valley University and Novarad Corporation; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
more time, the system’sdesign could be further refined and the software algorithms’ capabilities increased. With theseimprovements, the hybrid system’s overall effectiveness and feasibility may become even moreappealing.AcknowledgementWe would like to thank Wendell A. Gibby, MD, for allowing us to use his medical facility,including medical equipment and access to medical personnel necessary for the successfulconduction of this undergraduate research project.References:1. L Li et al., "Assessment of the fetal thymus by two- and three-dimensional ultrasound during normal human gestation and in fetuses with congenital heart defects.," Ultrasound in Obstetrics and Gynecology, vol. 37, no. 4, pp. 404 - 409, 2011.2. E. Pavlova, D. Markov, S
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Cheryl Xu, Florida A&M University/Florida State University; Seyed Mousavinezhad, Idaho State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Manufacturing since 2010 and International Journal of Computational Materials Science and Surface Engineering since 2007.Dr. S. Hossein Mousavinezhad, Idaho State University is the principal investigator of the National Science Foundation’s research grant, National Wireless Re- search Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active member of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as Engineering Education. He is Founding General Chair of the IEEE International Electro Information
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Connie Justice, Indiana University-Purdue University, Indianapolis; Rushabh Vyas, Indiana University-Purdue University, Indianapolis
Tagged Divisions
Computing & Information Technology
).Learner’sperceptionsofacybersecuritycompetitionasitrelates toknowledge,skills,andabilities(KSA’s).PaperpresentedattheNICE(NationalInitiativefor CybersecurityEducation)Conference,SanDiego,CA.Justice,C.,&Do,L.(2012).ITexperientiallearning:TheLivingLab.PaperpresentedattheFrontiersin EducationConference(FIE),2012.Kelly,S.(2014).Dnsmasq.Retrievedfromhttp://www.thekelleys.org.uk/dnsmasq/doc.htmlTheNationalInitiativeforCybersecurityEducation(NICE).(2015).Retrievedfrom http://csrc.nist.gov/nice/framework/Newhouse,B.K.,Scribner,B.,&Witte,G.(2016).NICECybersecurityWorkforceFramework(NCWF). DraftNISTSpecialPublication800-181.Pearce,M.,Zeadally,S.,&Hunt,R.(2013).Virtualization:Issues,securitythreats,andsolutions.ACM ComputingSurveys(CSUR),45(2
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tian Qiu, Purdue University; Mengshi Feng, Purdue University; Sitian Lu, Purdue University; Zhuofan Li; Yudi Wu; Carla B. Zoltowski, Purdue University; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
. https://c9.io/ 4. Wu, L., Liang, G., Kui, S., & Wang, Q. 2011. CEclipse: An online IDE for program- ing in the cloud. In 2011 IEEE World Congress on Services, IEEE, pp. 45-52. 5. https://www.codecademy.com/ 6. http://cscircles.cemc.uwaterloo.ca/ 7. Pritchard, D. and Vasiga, T. 2013. CS circles: an inbrowser python course for begin- ners. In ACM Technical Symposium on Computer Science Education, pp. 591-596. 
 8. Guo, P. 2012. Online Python Tutor: Embeddable web-based program visualization for CS education. http://pythontutor.com/.9. Brusilovsky, P. and Sosnovsky, S. 2005. Individualized exercises for self-assessment of programming knowledge: An Evaluation of QuizPACK. ACM Journal of Educa- tional Resources in
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Sreyoshi Bhaduri, Virginia Tech; Tamoghna Roy, Virginia Tech
Tagged Divisions
Computing & Information Technology
quantitiesof textual data by processing data sets in both time and resource efficient ways.One of the tasks that NLP is used for in analyzing textual data sets is that of stylometry.Stylometry can be understood as a linguistic analysis of use of words in terms of both choice andorder, which can help characterize traits of a single or group of author(s). Fox, Ehmoda, andCharniak (2012) describe the underlying principle behind work on authorship attribution to be aset of statistically quantifiable characteristics of the writing style reflected by the word/phrasechoices of individuals which make it easy to distinguish one author from the other. Stylometry isthus a type of quantitative or statistical analysis which helps identify and characterize
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Mudasser Fraz Wyne, National University; Abdulbaset Abdulaziz Gaddah A.G., University of Umm Al-Qura; Shakil Akhtar, Clayton State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Transactions on Education, VOL. 50(4), November 2007.5. Atech, C. and Alicia Charpentier, A., “Sustaining Student Engagement in Learning Science”, The Clearing House: A Journal of Educational Strategies, Issues and Ideas, Vol. 87(6), pp. 259-263, 2014.6. Reyes, M., Brackett, M., Rivers, S., White, M., and Salovey, P., “Classroom Emotional Climate, Student Engagement, and Academic Achievement”, Journal of Educational Psychology, pp. 700-712, Vol. 104(3), 2012.7. Gavin Northey, G., Bucic, T., Chylinski, M., and Govind, R., “Increasing Student Engagement Using Asynchronous Learning”, Journal of Marketing Education, pp. 171-180, Vol. 37(3), 2015.8. Entwistle, N. “Conceptions of Learning and the Experience of Understanding: Thresholds
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Jacob Haven Gosling; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
the types of cryptographic algorithms. In the beginning, aka the70’s, a cryptographic method was developed called the Data Encryption Standard (DES). Thisencryption algorithm consisted of a 54-bit key using the hardware that was available then. Thiswas more than enough encryption to protect files and communication. Technology quicklyadvanced and far surpassed the capabilities of the systems that were encrypted with DES. Thismethod is no longer considered an acceptable method of encryption. This is because it would betrivial for a mediocre computer by today’s standards to break this encryption.With the loss of integrity in the DES algorithm, a variant was conceived that used a three 56-bitnumbered key. This method is considered reasonably
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, University of Detroit Mercy; Jiawen Wang, University of Detroit Mercy; Wenbing Zhao, Cleveland State University; Lei Wang, Anhui Polytechnic University
Tagged Divisions
Computing & Information Technology
the requirements of self-reflection at the end of each small lab project.Perhaps this new component will be able to call up students’ metacognitive ability and find iteasier to form higher-level and conceptual understandings based on their actual experiencesusing ROS for robotics design.Acknowledgments: Anhui Provincial Natural Science Foundation (Grant no. 1708085ME129), NationalNatural Science Foundation of China (Grant no. 51305001).References 1. Subbian, V., Purdy, C. C., and Beyette, F. R., UnLecture: A Novel Active Learning Based Pedagogical Strategy for Engineering Courses, Proc. of the 2014 American Society for Engineering Education Annual Conference & Exposition, ASEE 2014.2. Rios, E. F., Khan, A. S., and Padgett, D
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joshua B. Gross, Blackburn College
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
faculty themselves and the perceptions their institutions have of them. Givencurrent findings, we anticipate a large and concerning gap between the two sets of beliefs.AcknowledgementsThe author thanks Blackburn College's Faculty Research fund for sponsoring this research, andAnneliese Darow, Jalaa Hoblos, Kate Lockwood, and Laura Wiedlocher for their assistance.Bibliography[1] R. Starkman., (2016, April 28). "Stanford computer science launches a new masters ofeducation", in The Huffington Post [Online]. Available:http://www.huffingtonpost.com/ruth-starkman/stanford-computer-science_b_9713220.html[2] S. Zweben and B. Bizot, "2015 taulbee survey," in Computing Research News: CRA, 2016[3] J. Tims, S. Zweben, Y. Timanovsky, J. Chu Prey, "ACM NDC
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Lorri J Barnett, Purdue Polytechnic, Anderson; Dennis O. Owen, Purdue University
Tagged Divisions
Computing & Information Technology
may be transferred to other universities throughestablished transfer policies.University Faculty Involvement and CommitmentEach dual credit course is delivered with the same level of academic integrity as all other classesat Purdue University. Each course offered must be equivalent to the course taught on campus incontent, assignments, prerequisites, labs, exams, texts used, class size limitations, and otherpossible course requirements. The university identifies a faculty member from the appropriatedepartment to teach the course(s) and work in collaboration with the appropriate high schoolcurriculum coordinator.University faculty use a flipped course delivery model. Lecture and group projects are deliveredon Monday, Tuesday, and Wednesday
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Abdulwaheed Johnson, Pace University; Anthony Joseph, Pace University
Tagged Divisions
Computing & Information Technology
efficiency of transaction processing. Mobility refers tothe capability of mobile payment transactions to be carried out at any time and in any place. Easeof use is the ease with which transactions can be performed using mobile payment methods.Mobile payments are completed in a relatively short time when compared to other forms ofpayment, hence the speed attribution, and the security of mobile payments is also a benefit thatmakes mobile payments adoption particularly advantageous [1][4][5]. The ease-of-use, speed,and efficiency of transaction processing are factors that boost merchant adoption as well [2].“The acceptance of mobile payment method[s] by merchant[s] especially small and mid-sizedbusiness[es] (SMBs) has risen tremendously…[to] 21% of
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Javad Shakib, DeVry University, Pomona; James R. Lewis, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Applications, Prentice Hall, 2003.9. Joyce Van de Vegte, Fundamentals of Digital Signal Processing, Prentice Hall, 2002.10. Sanei, S., Chambers, J., EEG Signal Processing, John Wiley & Sons, Ltd, West Sussex, England, 2007.11. Greenfield, L., Geyer, J., Carney, P., Reading EEGs, Lippincott, 2010.12. ZhijunGu, NI Biomedical Start up Kit 3.0, July 2010, https://decibel.ni.com/content/docs/DOC-1264613. Biomedical Workbench 2013 Help, https://digital..ni.com/14. http://www.ni.com/white-paper/8599/en/Appendix A Bioinformatics Sample Lab: Nucleotides/Protein Data Search/IdentificationOne of the most common DNA format is FASTA. This format is the official format withinBLAST and NCBI searching, matching, and sequencing engine. FASTA is a text-based
Conference Session
Curricular Issues in Computing
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tony Andrew Lowe, Purdue University, West Lafayette (College of Engineering); Sean P. Brophy, Purdue University, West Lafayette (College of Engineering)
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
.[9] P. Guo, “Why scientists and engineers must learn programming,” Communications of the ACM, 2013. [Online]. Available: http://cacm.acm.org/blogs/blog-cacm/166115-why- scientists-and-engineers-must-learn-programming/fulltext. [Accessed: 02-Jul-2017].[10] J. M. Wing, “Computational thinking,” Commun. ACM, vol. 49, no. 3, pp. 33–35, 2006.[11] K. Lynch, A. Carbone, D. Arnott, and P. Jamieson, “Studio-Based Approach to Teaching Information Technology,” vol. 8, no. April 2013, pp. 75–79, 2002.[12] M. Woodley and S. N. Kamin, “Programming Studio : A Course for Improving Programming Skills in Undergraduates,” 1971.[13] R. A. Layton, M. L. Loughry, M. W. Ohland, and G. D. Ricco, “Design and validation of a web-based system
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Stephen Andrew Wilkerson P.E., York College of Pennsylvania; Jason Forsyth, York College of Pennsylvania; Cara Sperbeck, York College of Pennsylvania; Matthew Jones, York College of Pennsylvania; Patrick David Lynn, York College of Pennsylvannia
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
both air and ground. His team deployed a bomb finding robot named the LynchBot to Iraq late in 2004 and then again in 2006 deployed about a dozen more improved LynchBots to Iraq. His team also assisted in the deployment of 84 TACMAV systems in 2005. Around that time he volunteered as a science advisor and worked at the Rapid Equipping Force during the summer of 2005 where he was exposed to a number of unmanned systems technologies. His initial group composed of about 6 S&T grew to nearly 30 between 2003 and 2010 as he transitioned from a Branch head to an acting Division Chief. In 2010-2012 he again was selected to teach Mathematics at the United States Military Academy West Point. Upon returning to ARL’s
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Tae-Hoon Kim, Purdue University Northwest; Melissa Nicole Fitzgerald, Purdue University Northwest; Mithulesh Kurale, REU Student
Tagged Divisions
Computing & Information Technology
as such: iperf3 -s enablesserver mode, iperf3 -c enables client mode, -u changes default TCP testing to UDP testing, -k(followed by a number) sets the number of packets to send during the test. Following is theexample of TCP and UDP testing commands respectively. “iperf3 -c 192.168.42.1 -p 5021 -k5000” and “iperf3 -c 192.168.42.1 -p 5021 –u”. Iperf3 uses set of packet transmissions, 5000 forTCP and 159 for UDP, to measure the throughput, retransmission, and packet loss. Thethroughput is computed by use of predetermined fixed size of the Internet Control MessageProtocol (ICMP) packet and its round-trip time (RTT). Retransmission, only available in TCP, ismeasured by counting the resending packets due to any unsuccessful transmission such as
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Jennifer Leaf, Eastern Washington University; Robert E. Gerlick, Eastern Washington University; Donald C. Richter, Eastern Washington University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
] R. L. Brown, H. L. Helton, A. C. Williams, M. T. Shrove, M. Milošević and E. Jovanov, "Android Control Application for Nao Humanoid Robot," in Proc. of the International Conference on Frontiers in Education: Computer Science and Computer Engineering, 2013.[4] H. Ahn, H. Kim, Y. Oh and S. Oh, "Smartphone-Controlled Telerobotic Systems," in Cyber- Physical Systems, Networks, and Applications (CPSNA), 2014 IEEE International Conference on, Hong Kong, 2014.[5] I. Fette and A. Melnikov, "The WebSocket Protocol," [Online]. Available: https://tools.ietf.org/html/rfc6455. [Accessed 25 July 2016].[6] R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach and T. Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Gene Lee Fisher Ph.D., California Polytechnic State University, San Luis Obispo
Tagged Divisions
Computing & Information Technology
California that offer a computer sciencedegree [16]. Of those, only 4 are accredited by ABET [1]. This means that 8% of private 4-yearcomputer science degrees in California are accredited by ABET.There are presumably a wide range of reasons that a computer science program would choose toforgo ABET accreditation. A detailed discussion of these reasons is beyond the scope of thispaper. What is of note here is that a substantial fraction of 4-year California universities choosenot to be ABET accredited. Hence for whatever reason(s), non-accreditation is considered aviable option for those universities, either by explicit choice or for some other reason such asinsufficient resources to devote to ABET.Conspicuously missing from the list of ABET
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Stephany Coffman-Wolph, West Virginia University Institute of Technology
Tagged Divisions
Computing & Information Technology
activities on creating, implementing, and improving theactivities. In the future, the author plans to collect data on student opinions of these activitiesand analyze grades from exams/homework/labs to improve the student experience and maximizetheir learning.Bibliography[1] T. Bell, et al., “Computer Science Unplugged: School Students Doing Real Computing Without Computers,”Computing and Information Technology Research and Education, New Zealand (CITRENZ), vol. 13, no. 1, pp. 20-29, 2009.[2] T. Bell, et al., CS Unplugged: Computer Science without a Computer. www.csunplugged.org., 2015.[3] S. Coffman-Wolph, “Innovative Activities to Teach Computer Science Concepts Inside the Classroom and atOutreach Events”, Proceedings of the 123rd Annual ASEE
Conference Session
Potpourri
Collection
2017 ASEE Annual Conference & Exposition
Authors
Jacob Bailey, University of Illinois, Urbana-Champaign; Matthew West, University of Illinois, Urbana-Champaign; Craig Zilles, University of Illinois, Urbana-Champaign
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
the College of Engineering at the Universityof Illinois at Urbana-Champaign as part of the Strategic Instructional Initiatives Program (SIIP),as well as by the National Science Foundation (NSF) awards DUE- 1347722 andCMMI-1150490.References[1] J. R. Anderson. Learning and memory: An integrated approach. John Wiley and Sons, second edition, 2000.[2] A. de Palma, N. Picard, and P. Waddell. Discrete choice models with capacity constraints: An empirical analysis of the housing market of the greater Paris region. Journal of Urban Economics, 62(2):204–230, 2007. doi: 10.1016/j.jue.2007.02.007.[3] K. A. Lack. Current status of research on online learning in postsecondary education. Ithaka S+R, 2013.[4] H. L. Roediger and A. C. Butler
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Damla Turgut, University of Central Florida; Lisa Massi, University of Central Florida; Salih Safa Bacanli, University of Central Florida; Neda Hajiakhoond Bidoki, University of Central Florida
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, Assessment, & Data Adminis- tration in the College of Engineering & Computer Science at the University of Central Florida. She is Co-PI of 2 NSF-funded S-STEM programs and program evaluator for 2 NSF-funded REU programs. Her research interests include factors that impact student persistence, identity formation, and career develop- ment in the STEM fields.Salih Safa Bacanli, University of Central Florida Salih Safa Bacanli is PhD student at Department of Computer Science, University of Central Florida (UCF). He received his MS degree in Computer Science from UCF and BS degree in Computer Engi- neering from Bilkent University, Turkey. His research interests include opportunistic networking routing, wireless
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Vetria L. Byrd Ph.D., Purdue University; Camilo Vieira, Purdue University, West Lafayette (College of Engineering)
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
-surveys; however,participation in the survey is voluntary. Surveys are administered electronically and via email byUNC Charlotte under the direction of Dr. Audrey S. Rorrer. The pre-survey is provided duringthe first week of the program. The post-survey is provided during the last week of the program.Survey responses are collected and de-identified before being made available to the PI. The firstyear of the VisREU Site resulted in lackluster student participation—less than 4 studentscompleted surveys. Greater effort was made in 2015 to stress the importance of feedback. As aresult, 92% (11 out of 12) students completed pre-surveys, 67% (8 out of 12) completed post-surveys. The following sections present survey responses from 2015 VisREU Cohort