analyze data for labreports, to learn linear algebra, to solve problems in mechanics, problems involving differentialequations, and writing a program to control a robot (embedded programming).In this paper based on the data collected from three programming courses (CS10, CS12, andCS20), we evaluate and recommend a programming language for the first course ofprogramming to our undergraduate engineering students. Python, C, and assembly languages areconsidered in this analysis. We also emphasis the importance of Malab for the senior engineeringcourses.1-InroductionPython is a high-level object-oriented programming language. It is designed to be easy toprogram. Guido van Rossum4,5,6 started the design of Python in 1980. Over the years, Python
Cybersecurity education.IntroductionPrepared cybersecurity workforce is necessary to fight against cyber-treats and preserve thecountry sovereignty [1]. It is estimated the workforce shortage in the U.S. public sector alone wasabout 20,000 - 30,000 per year. This shortage is both one of quantity and quality. “We not onlyhave a shortage of the highly technically skilled people required to operate and support systemswe have already deployed, we also face an even more desperate shortage of people who candesign secure systems, write safe computer code, and create the ever more sophisticated toolsneeded to prevent, detect, mitigate, and reconstitute systems after an attack” [2]. The Evans andReeder report notes that it is the consensus of the Commission
well as differential equations (which is a co-requisite.) Since Matlab/Mathcadprograms are available in our computer laboratory, these are used throughout the course. Thetextbook by Kamen & Heck [1] is used for the course and students can access the accompanyingtextbook website. It should be noted that some class examples use both Mathcad and Matlab butthe textbook uses Matlab only. In our program we also have a senior-level elective course onfilters using the software tool called WFilter accompanying the textbook [2]. As engineeringeducators teaching undergraduate, first year graduate courses we are all aware that these toolsshould be used at the right time, right place to help student understanding and learning. Usuallya problem is
, and the visual-spatial sketchpad.1 Sweller’s work in CLT also played an influential role inthe development of Mayer’s cognitive theory of multimedia learning, which provides insight intothe ways in which content and presentation style can overload students’ limited working memorycapacity.1 Cognitive overload is specific to the individual, and recent research suggests that oneof the main features of this overload involves the individual’s prior knowledge base.3Understanding human cognitive architecture allows for greater instructional efficacy. Specifically, the instructional delivery of course materials should differ for novice andexpert learners in order to maximize learning.1 Typically, novices are in need of morescaffolding, due to
Systems he worked with Cisco customers designing and deploying core Internet designs and technologies. In 2005 Mr. Smith earned a master’s degree in Computer Science from Colorado State and 1 year later left industry to teach engineering at Oklahoma Christian University. Mr. Smith’s emphasis is in first year student success, mentoring young engineers, and data communications. He consistently scores well in student feedback and enjoys regular strong relationships with his students and classes. c American Society for Engineering Education, 2016Developing an Android-based Layer 3 Switch as a senior projectAbstractA project-based course has been designed with a goal of developing an in-depth
program’s goal has been to provide a quality program thatmeets accreditation standards while providing the students with a skill set that allows them tosucceed in computing careers. The curriculum content for the Computer Science degree is basedon the 2008 ACM Curriculum Report. The Computer Science degree at UVU is accredited byAccreditation Board for Engineering and Technology (ABET) in 2002 and currently has morethan 850 students. The program also has an advisory board comprised of representatives of localindustry who assist in aligning the program to industry needs and helping to acquire industrysupport and resources.Table 1 and 2 shows the enrollment and graduation trends in the Computer Science program. Ascan be seen from the tables, the
. Most young kids and even some college students seem tobe unaware of what computer science means. These activities help them understand the depthand diversity a computer science undergraduate degree can entail.The paper will provide the details for each of these activities and the learning objectives. Theactivities included are:(1) Binary, Octal, and Hexadecimal Initial Keychains(2) Understanding Variables and Arrays with Paper Bags(3) Branching and Looping Statements with Starburst Candies(4) General Class Structure with Bags, Boxes, and a Bin(5) Dr. Doolittle’s Vet Office: Learning Classes with Stuffed Animals(6) Arrays with Tissue Boxes, DVD Sets, Paper Plates, and other Household Goods(7) Basic Networking, Message Passing, and Security with
overallorganizational success.Introduction: Information Technology (IT) is a fast-growing field interrelating many disciplinesto fulfill business computing and transactional processing needs. Information technologyencompasses hardware, software, and network communications software and hardware toprovide high quality services and products. The advancement of network telecommunicationsand related technologies has served as a catalyst to many organizations to advance the way toconduct business. More businesses now utilize web-based computing and transactionalprocessing. Adopting a prescribed process model is a major factor in the ability to save time andmoney within an organization [1][21][23]. Organizations could implement ITIL partially orfully without
selection structures,modestly beneficial in assessments using repetition structures, and of no benefit in assessmentsusing just sequence. Despite the learning benefit, a majority of students and instructors wereresistant to using case-studies in this course and thought that reading stories does not belong in aproblem-solving/computer programming course. Therefore, novel approaches to engage studentsand instructors in interdisciplinary thinking and practice are necessary.1. Student Stories as Contexts for Problem-Solving and Computer Programming CoursesThe PS course is required for all Computer Systems first-year majors, but it is also taken bystudents with other majors. In the first part of the PS course, students learn basic proceduralprogramming
also include socialactivities to show that college can be fun, too.The Computer and Information Technology department actively participates in these outreachprograms. A variety of activities designed by faculty, undergraduate, and graduate students havebeen used in these sessions over the past ten years. Some example sessions included the use ofthe following tools: 1. Web page development (static HTML to dynamic ASP.NET) 2. Social media tools through a Twitter-enabled game 3. Programming languages a. Alice b. Scratch c. Scratch 4 Arduino d. C# 4. Physical computing a. Arduino board b. Phoenix Contact Nanoline microcontrollerThe remainder of this paper will present the
in the city of Innopolis, Russia. The city was establishedin 2013 as a special zone with relaxed taxation for IT companies to foster the industry’s development.1 It wasplanned as a city with 100k+ population, which will be primarily represented by IT professionals. Innopolis University was established by major Russian IT companies to cover a shortage of IT engineers onthe Russian market. The university adheres to the Bologna process with broad adoption of best practices frompartner institutions (namely, Carnegie Mellon University). English is used as a primary teaching language. Asof 2015, tuition for all students is covered by grants awarded by founder companies. This grant system impliesa strict selection process, with only 2.5% of
our gamification platform,GamerCard, which was used for four semesters in an upper-level game design course at ourinstitution. We found that some gamification elements that are often thought to be motivatingfor participants had little to no effect on our course, while elements that specifically targetedmaking the student’s standing in the course more transparent were the most effective.1. IntroductionGamification is becoming an increasingly popular methodology for improving motivation andinterest in many domains [1]. Gamification involves the application of game mechanics to taskstypically considered to be void of fun. In the classroom, this often materializes as a set ofmechanics meant to motivate students to learn more effectively. For
project outcomesinto three different categories:1. Successful: Projects that are completed on-time and on-budget, with all features and functions as initially specified.2. Failed: Projects that are cancelled at some point during the development cycle.3. Challenged: Projects that are completed and operational but over-budget, over the time estimate, and/or offer fewer features and functions than originally specified.Analyses show high failure or challenged project rates with the root cause centered squarely onplanning, readiness, and assessment. Mandal and Pal clearly declare that their “research indicatesthat more than 50% of all Information Technology (IT) projects become runaways –overshooting their budgets and timetables while failing to
, access control, and secure protocols. c American Society for Engineering Education, 2016 Mobile Computing and Security Laboratory Development with Flip TeachingAbstract Android has reached over 1 million devices and occupies 85% of the market in 2014, according to a recent market report. Due to many advantages of the Android platform, such as open source, Google support, advanced software programmable framework in popular programming language Java, Android has been and will remain as the most popular mobile device operating system in market. Due to large popularity of user markets, research study of mobile computing is raising to a challenge level. In
corporations seeking to expand successfully. c American Society for Engineering Education, 2016 Architectural evaluation of Master Data Management (MDM): Literature Review Abstract: Architectural evaluation of MDM data models are influenced by technicalassessment, business requirements, and designers’ preferences. Therefore, selecting the rightmodel for an organization requires quantitative method with qualitative embedded design study.Greene [4] states that three purposes of quantitative study with embedded qualitative designinclude 1) triangulation, to guarantee or attain validation of data, or convergent validation; 2)complimentarily, to elucidate, clarify, or
software testing repository that provides educators and learners with online materials and socio-psychological supporting components. This project provides several learning and engagement strategies (LESs) such as gamification, collaborative learning,1 http://wrestt.cis.fiu.edu/social interaction and networking to improve students’ knowledge of software testing inprogramming courses ranging from CS1/CS2 to more advanced courses with aprogramming component. In this experimental study at Alabama A&M University(AAMU), through a two-year collaborative effort with Florida International University(FIU) [1], we present the data, results and analysis of using gamification in programmingrelated courses, as well as the way to improve
will be used to teach students to understand ethical issues andprofessional responsibility related to computer science and information systems. Moreover, theywill be discussed when teaching professional responsibility within technological, economic, andenvironmental points of view.INTRODUCTIONAs the amount of corporate and personal information continues to grow, and access to thatinformation by information technology (IT) professionals increases, ethics and value judgmentsby computer and information systems professionals becomes more important [4]. [1], definedthree factors which require further study of ethical behavior of IT professionals. These include agreater reliance on IT systems across business enterprises, increasing the future use of
phenomenon of leveragingsmartphone functionalities in a real-world organizational context are analyzed. As such, adescriptive linear-analytic interpretive case study research design was selected and employed[1]. The framework can also be applied to assessing the sharing of knowledge in a classroombetween students and professors using mobile computing devices such as smartphones. Thiscan be particularly helpful at engineering schools where classes are being turned “upside-down” with peer-led team learning workshops. This active-learning approach has led toincreased confidence, intellectual curiosity, and interest in teaching among students [2].Airlines that implement advanced mobile computing platforms such as smartphones areempowering their
efforts of having students emailing spreadsheets with pre-defined templates (because ofthe live interactive nature of Google Sheets), the lack of anonymity of individuals and groupswas viewed as a significant drawback.The “Importrange” function built into Google Sheets allows defined information to be passedfrom one spreadsheet to another, allowing the sheet creator (in this case, the instructor) to specifythe workflow of information. Google Sheets also allows the “owner” to turn on and off sharingof worksheets (Figure 1). Using these two features, an instructor can create an individualworksheet for each student, where the information from each is consolidated into a singleinstructor worksheet that only that person can view (Figure 2 and 3
. The aim of these models is to highlight the differencebetween Computer Science and Programming, to show the relevance of Computer Science inrecent advances in various fields, and to inspire students to appreciate Computer Science andthe role of algorithms in our daily lives. The modules will cover various topics about the role ofCS in cyber warfare, understanding biology, electronic voting, etc. In subsequent work, thesemodules will be launched as part of a mixed methods study to determine their effectiveness ascompared to a control group not learning through these models and the impact of those moduleson the retention rates of Computer Science majors.1. IntroductionThe President’s Council of Advisors on Science and Technology’s (PCAST
perceptions overthree offerings. Specifically, throughout this study we investigated three research questions: 1. What are the differences in engineering students’ ethical reasoning changes when their mode of participation includes an in-class discussion-based lecture format compared to being completely restricted to online material delivery and interaction? 2. What are the differences in engineering students’ perceived effectiveness of an ethics course when participating in a hybrid versus a completely online format? 3. Are there any differences in the correlations between ethical reasoning changes and course perceptions between the hybrid and online groups?Study OverviewThis multiphase research study27 proceeded in three
potential limitations of the system, as well as suggestions for improvement. Introduction Technologies are foundations of modern societies and software plays an essential role in technologies. Recognizing the importance of software, computer science has become an integral part of general education in USA [1]. Developing high quality software is a complex process and many tools are involved, for example, version control, debugging, performance profile, test coverage, memory access violation, and resource utilization. As an analogy, these tools are instruments in an airplane; these instruments provide crucial information about the condition and status of the plane. The speedometer informs a
graduation. These relate to the knowledge, skills, and behaviors that students acquire asthey progress through the program1. Criterion 3 of computing programs includes a set of ninegeneral outcomes that all computing baccalaureate graduates should possess. The nine generalstudent outcomes of computing programs along with two additional computer science outcomesare listed in Table 1. One aspect of the enhanced ABET criteria (2000) in engineering andtechnology is “an understanding of professional responsibility”. In “Embedding ABET’s studentoutcomes for professional skills” section we will walk through ABET’s four professional skillscommunication, teamwork, ethics and contemporary issues, and professional development(previously known as lifelong
skills are essential for career development. However, in typicaluniversity settings, undergraduate students take different courses and work on different projects indifferent teams each semester. As a result, students lack opportunities to work on multi-yearprojects and develop the skills essential for long-term planning. To remedy this situation, ourdepartment has created elective courses that allow students from all years (first-year students tograduate students) to work on research projects under the supervision of faculty members and thementorship of senior graduate students. These projects provide the opportunities for students tolearn many skills essential in workplace, such as (1) understanding how projects are designed andmanaged; (2
from the robust FruityWifi package. Wireshark filters, captures, andanalyzes network packets, such as hypertext transfer protocol secure (HTTPS) requests. SSLstripstrips the secure connection and convert HTTPS to hypertext transfer protocol (HTTP), gainingaccess to sensitive information such as login credentials. This simple to implement yet powerfulproject, demonstrates the ease of hiding and discreetly deploying a Raspberry Pi on a vulnerablewireless network to sniff network packets that is considered protected behind firewalls, whilemaintaining a safe distance and anonymity from the target.IntroductionThe Raspberry Pi, see figure 1, is a miniature and affordable computer created by the RaspberryPi Foundation, an educational charity based in
images on a computer. Both provide good Graphic UserInterface (GUI) design and have been intensively used for learners to build, configure, andtroubleshoot networks in a virtualized network environment. In this paper, PT and GNS3 will becompared from the perspectives of capability and complexity. Strengths and weaknesses of eachwill be discussed. In addition, networks will be built in order to illustrate the points of ourdiscussion.1. IntroductionAs technological advances continue to further integrate different aspects of our lives, it becomesincreasingly difficult to not depend on technology on a day to day basis. All of the smart devices,gadgets and gizmos converge at a central point that provides connectivity between them - thenetwork. With
host and across different hostsusing container-based virtualization technology. Afterward, we will evaluate and compare theperformance of such implementation with a cluster built on physical machine.1 IntroductionThe practical exercises included in laboratory-based course play an important role in engineeringand science educations. Many academic institutes developed the laboratory-based courses to helpstudents to accelerate their learning in different types of laboratories such as real, simulation, oronline [1]. Especially in Information Technology education, hands-on exercises through thelaboratory became an essential component of the course because it provides students with anopportunity to learn and observe how to apply the concepts
, experiment, evaluate, iterate, and innovate [1].Computer science education research has generally focused on engagement [2], [3] compellingdomains for learning computing [4]–[9], and specific pedagogical strategies[10], [11]. However,as a nation we have yet to make major strides in developing computing literacy as a core 21stcentury STEM skill for tackling multidisciplinary problems [12]. Computing is seen as uncooland approaches to teaching it may be uninspiring [13]. Yet demand for computer scientists in thejob market remains robust: over 1.4 million computing-related jobs are estimated to be availablenationally in 2018, with US universities only meeting a third of that demand in degreeproduction [12].Music, a ubiquitous part of human culture with
. c American Society for Engineering Education, 2016 Integrating Software Testing into Computer Science Curriculum Using WReSTT-CyLE and Learning Objects Yujian Fu1, Nelson Barnes1, and Peter Clarke2 1 Alabama A&M University 4900 Meridian Street Normal AL 35762 2 Florida International University 11200 SW 8th Street Miami, FL 33199 Telephone: (305) 348-2440Abstract
theperspective of the Internet, focusing on quantitative analysis of metrics measuring levels ofdeployment, traffic, and performance3,10-13.Our study extends that of Czyz et al. who employed a broad approach to measuring IPv6deployment, assembling a breadth of observations and comparing datasets against each other.Their findings provided a better understanding of the systemic state of IPv6 deployment throughthe use of multiple measured metrics and datasets, each focused on one or more aspects of IPv6adoption3.MethodologySince our goal was to extend the research of Czyz et al. we focus on using the same or similarmetrics and methods as closely as possible. Specific details on each metric is discussed in thesections that follow for each metric. Table 1