and techniques ofvisualization should begin early; consequently, the idea for a summer research experience forundergraduates in visualization was born. The goal of the research site is consistent with the goalof the NSF-REU program: to provide promising undergraduate students with a complete,mentored research experience, to better prepare these students for graduate school orprofessional pursuits and encourage them to pursue a career in science [15]. The impact ofundergraduate research experiences have been well documented [16], [17], [18], [19]. Facultymembers generally agree that there are significant educational benefits to the undergraduateresearch experience [20], [21]. Students are thought to develop expertise in a specific area
-level Instructional Course Modules Designed to Inspire Computer Science InterestAbstractRecent research regarding university student perceptions of “Computer Science” as a field ofstudy and their motivation to pursue such studies as a career opportunity reveal studentmisconceptions and lack of motivation. Many students report that they regard the study ofcomputer science as narrowly equivalent to “programming”. Moreover, many are notconsistently provided the opportunity to realize the true impact of the field within their entry-level courses since these early courses tend to focus on programming and syntax skilldevelopment. It is not until they are in their upper-level courses that they gain a broaderunderstanding and by
focus on language processing. MapReduce Design Patterns [16] is an advanced topics book that is focused on MapReduce patterns. The text is a very useful source for users and students who are already familiar with basic MapReduce concepts. NOSQL books Mahout in Action [17] describes a framework for machine learning implemented using Hadoop. It is focused on the technical details of different algorithms and methods. Cassandra: The Definitive Guide [18] and Cassandra High Performance Cookbook [19] describe the Cassandra database management system. The first book gives a detailed overview of Cassandra, and the second text provides practical solutions to common tasks and problems. NoSQL Distilled [20] is primarily a concept book
. Presentations are based onresearch-backed results and cover a variety of recruiting and classroom practices designed toreduce the impact of negative stereotypes and help with successful student outcomes. Pastparticipants report they have implemented practices suggested in the workshops and that doingso has increased their enrollment and the diversity of their classrooms. Page 23.1132.14The Tapestry Workshops program has demonstrated that a large benefit may be gained from therelatively small investment of a three-day workshop. High school computer science teachers areeager to learn how best to attract and retain more and more diverse students. By giving
Paper ID #17059The Impact of STEM Experiences on Student Self-Efficacy in ComputationalThinkingJoshua Levi Weese, Kansas State University Josh Weese is a PhD candidate in the department of Computer Science at Kansas State University. Fo- cusing on education research, this experience comes from work as a graduate teaching assistant, various outreach programs, and time spent as a NSF GK-12 fellow. His downtime is spent in outreach programs aimed toward enriching local K-12 students’ experience in STEM, especially in computer science and sensor technologies.Russell Feldhausen, Kansas State UniversityMr. Nathan H. Bean
of Physics Teachers’ Millikan Medal. He holds five patents and begun three companies. Materials and curricula developed by Dr. Sadler are used by an estimated fifteen million students every year.Dr. Gerhard Sonnert, Harvard University Gerhard Sonnert is a Research Associate at the Harvard-Smithsonian Center for Astrophysics and an As- sociate of the Harvard Physics Department. He received master’s and doctorate degrees in sociology from the University of Erlangen, Germany, and a Master’s in Public Administration from Harvard University. One of his major research interests has been the impact of gender on science careers. This research has resulted in two books (both authored with the assistance of Gerald Holton
/Distance delivery at the ME Department at VT. In 2010, with an education grant from Nuclear Regulatory Com- mission (NRC) she completed the online design of the Graduate nuclear engineering certificate program. In 2011, the new education grant from NRC, allowed initiating the design of two new nuclear graduate courses for the Master program. She maintains research and publishing tracks in nascent interdisciplinary trust concepts, eLearning, and innovative teaching, learning in fields of statistics and research methods, engineering, medical fields, and assessment methods.Prof. Clifford A. Shaffer, Virginia Tech Dr. Shaffer received his PhD in Computer Science from University of Maryland, College Park in 1986
management, information management and security, object including oriented programming, computer architecture, systems architecture, operating systems, and networking. 10. Demonstrate the ability to analyze computing and information security requirements and risks, and apply the appropriate tools and techniques to protect organizational data assets in an ethically responsible manner. 11. Demonstrate the ability to apply best practices and standards for information technology applications. 12. Demonstrate the ability to assist in the creation and execution of an effective project plan. 13. Demonstrate a commitment to professional development and to continue to engage in lifelong learning.Capstone Course
, Proceedings of the American Society of Engineering Education Annual Conference and Exposition, June 2002, Montreal, Canada. [3] Council of Chief State School Officers, and National Governors Association Center for Best Practices. "Common Core State Standards." Common Core State Standards Initiative. Web. 03 Jan. 2013. http://www.corestandards.org/. [4] National Research Council, National Science Teachers Association, American Association for the Advancement of Science, and Achieve. "The Next Generation Science Standards. "The Next Generation Science Standards. Web. 03 Jan. 2013. . [5] T Corbett, K., Tims, H., Turner, G., Nelson, J., Utilizing the Engineering Design Process to Create a Framework
course. Students will developa detailed and practical understanding of network system and protocol implementations. Anancillary goal is to reinforce certain software engineering principles in the area of codegeneration (as highlighted section 3 of the Software Engineering Body of Knowledge [4].Lectures provide instruction in 3 main topic areas including (1) A model for Large-scaleNetwork Architecture Design [5]; (2) Network System Architectures and Design [2] [3]; and (3)Software Engineering Topics as they impact the development of the router.The primary goal of the labs is to provide students with an opportunity to begin the week’s workwith the instructor present to answer questions and clarify the week’s development requirements.The three
Education and Computing Professionals’ Needs18 National Academy of Engineering (NAE). (2004). The engineer of 2020: Visions of engineering in the new century. Washington, DC: National Academy of Engineering. Available from http://www.nap.edu/openbook.php?record_id=10999&page=1019 Kuh, G. D. (2008). High-impact educational practices: What they are, who has access to them, and why they matter. Report from the Association of American Colleges and Universities.20 Lester, S. (1999). An introduction to phenomenological research. Stan Lester Developments, 1- 4.21 Groenewald, T. (2004). A phenomenological research design illustrated. International Journal of Qualitative Methods, 3(1). Article 4
D.E. Leidner, Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues. MIS Quarterly, 2001. 25(1): p. 107-136.8. Brown, J.S. and P. Duguid, Knowledge and Organization: A Social-practice Perspective. Organization Science, 2001. 12(2): p. 198-213.9. Choi, S.Y., H. Lee, and Y. Yoo, The impact of information technology and transactive memory systems on knowledge sharing, application, and team performance: A field study. Management Information Systems Quarterly, 2010. 34(4): p. 855-870.10. Moran, P. and S. Ghoshal, Value Creation by Firms, in Academy of Management Best Paper Proceedings, Dosier, Editor. 1996, In J, B, Keys& L. N.: Georgia Southern University.11
dashboards werechosen as the solution. A survey of the executives using any form of dashboard for theiroperations found that more than 70 percent agreed dashboards had a positive impact ontheir decision making process, largely due to the efficient access of information14. Figure 2. Oklahoma State Regents Dashboard15 Page 26.312.7 Figure 3. UT Productivity Dashboard16Proper Dashboard Implementation PracticesBased on data visualization, and industry best practices in data dashboardimplementation, successful dashboard design and implementation in higher education isattainable. In this section, the comparison of
designed for easy integration into existing courses for students in variousprograms. For example, a course in information assurance could include the topics for CISstudents to acquaint these students with aspects of ICS. Likewise, a course in industrial controlcould include the topics for engineering students to acquaint these students with principles ofcyber-security. These courses would be recommended at the senior or graduate level in order tobest accommodate alternative thinking and application. The modules advance the mutual Page 26.573.3understanding of ICS cyber-security concepts so that when encountered in industrial settings,both
Paper ID #12420Towards an integrated Hardware And SOftware Book (HASOB)Prof. Mohamed Abdelrahman, Texas A&M University-Kingsville Dr. Abdelrahman is currently the Associate Vice President for Research and Graduate Studies and a Professor of Electrical Engineering at Texas A&M University Kingsville. Dr. Abdelrahman has a diverse educational and research background. His research expertise is in the design of intelligent measurement systems, sensor fusion and control systems. He has been active in research with over 80 papers published in refereed journals and conferences. He has been the principal investigator on
(NASA) has documented these activities with a growing list of the use of GPSapplications in 32 academic and industry fields at their GPS Application Exchange web site.1Additional case studies2 in multiple career fields have been published by Environmental SystemsResearch Institute, Inc. (ESRI), a major commercial provider of GIS systems.Recognizing the opportunity to enhance the capability of students to carry out research projects,the Center for Multidisciplinary Studies at the Rochester Institute of Technology has developedsix graduate and undergraduate courses in Geospatial Technologies. These courses are availableto all students across the Institute. The related courses titled Introduction to GIS, Geospatial DataAnalysis, and Geodatabase
impact of computing on individuals, organizations,and society(h) Recognition of the need for and an ability to engage in continuing professional development(i) An ability to use current techniques, skills, and tools necessary for computing practice.(j) An ability to apply mathematical foundations, algorithmic principles, and computer science theory inthe modeling and design of computer-based systems in a way that demonstrates comprehension of thetradeoffs involved in design choices(k) An ability to apply design and development principles in the construction of softwaresystems of varying complexity Performance indicators are a means to focus on specific expectations of a program. Theyfacilitate the curriculum delivery strategies, and assessment
Science with an emphasis in Database Engineering. He is currently employed at Lucid Software Inc.Dr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a professor of Computer Engineering at Utah Valley University. Her research interests include gender issues in the academic sciences and engineering elds, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, and Databases.Dr. Ali Sanati-Mehrizy Dr. Ali Sanati-Mehrizy is a graduate of the Milton S. Hershey Pennsylvania State University College of Medicine. He completed his undergraduate studies in Biology from the University of Utah. In July 2013, he will begin a Pediatrics residency at the UMDNJ-Newark University Hospital. His research interests
Paper ID #15901Android-Based Remote Robot Control SystemDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects.Mr. Md Hossain Shuvo, Alabama A&M University Graduate Student, Dept. of
Texas at Brownsville. After graduation, he was employed at sev- eral corporations including Pixera, a digital multimedia processing company in Cupertino, CA, 3COM, a networking and communication company in Schaumberg, IL, and Mercantec, an E-Commerce company in Naperville, IL. He has more than 40 publications in the field, and has served as a reviewer/moderator for several scientific and educational journals and conferences. He joined UTB in the Spring of 2000. His areas of interest include Imaging, Visualization and Animation, Networking and Cyber Security, Web Design, Computer Graphics, and Linguistics.Prof. Fitratullah Khan, University of Texas - Rio Grande Valley Professor Fitratullah Khan has been teaching
interconnect networks. As MPLS has evolved it has replaced traditional widearea network (WAN) protocols such as Frame Relay and ATM1. MPLS can be used to provideLayer 3 VPNs, seamless Layer 2 interconnection, or advanced routing to optimize traffic paths.In order to understand the significance and details that make MPLS the protocol of choice formost service providers, it is best to examine it under operation.MPLS networks can be difficult to implement in academic labs. Cost, resource availability andknowledge are obstacles that often prohibit students from building networks to research and toinvestigate practical network scenarios. Simulators can be used to experiment with networkconcepts; however, they are no substitute for working with actual
computer engineering or for students from theinformation science and linguistics science. These courses concentrate on the technical aspects ofinformation retrieval. For example, the computer science courses mostly deal with informationprocessing and search over the web while a linguistic or information science course may discussmore the language aspect and information science aspect. There is also a segment of coursesdesigned for general audience who are the end users of information retrieval systems. Thesecourses discuss more on the user interface, human factors, and social impact of the web searchtechnologies.We believe the information presented in the paper will help design, implementation, or revisionof courses on the subject of information
structure assignments in a given context so that writing can besuccessfully embedded into existing curricula and appreciated by students in quantitativedisciplines as a critical part of their thinking process. Hence, there needs to be a more structuredapproach in educational design that relates to the “writing in the disciplines” (WID) approach,wherein faculty provide students a clear, discipline-informed framework for writing that seesdisciplinary differences in writing practices through the lens of genre. In this way, students receiveinsight into genres that will likely be part of their future workplace. The main genesis of rhetorical genre studies (RGS) was the work of Carolyn Miller, whowas the first to frame genre as a social action
. and Tharp, R. (2002) “Standards For Pedagogy: Research, Theory and Practice”, Learning for life in the21st century: Sociocultural perspectives on the future of education. G. Wells & G. Claxton (Eds.) Oxford:Blackwell, 2002 (pp. 181-194).5 Whtten, J. and Bentley, L., (2007) “Systems Analysis and Design Methods”, Information Systems Building Block,McGraw-Hill/Irwin, pp. 44 – 59.6 Lee, D. M. S., Trauth, E. M., & Farwell, D. (1995). Critical skills and knowledge requirements of professionals:A joint academic/industry investigation. MIS Quarterly, 19(3), 313-340.7 Donna M. Grant, Alisha D. Malloy, Marianne C. Murphy, Jovanna Foreman, and Rowena A. Robinson , (2010)“Real World Project: Integrating The Classroom, External Business
Paper ID #14106Automated Identification of Terminological Dissonance in IT and adjacentfieldsMs. Jessica Richards, BYU Graduate student in Information Technology with a background of interdisciplinary work between com- puting and media fields. Highly interested in streamlining the collaborating of technical and creative minds.Joseph J Ekstrom, Brigham Young University Dr. Ekstrom spent more than 30 years in industry as a software developer, technical manager, and en- trepreneur. In 2001 he helped initiate the IT program at BYU. He was the Program Chair of the Informa- tion Technology program from 2007-2013. His research
readiness levels of students in learningenvironments by integrating best practices that can address these issues in the context of SEcourse work.We create a clear case for change within the SE education pedagogy, and a research method toachieve the objective is outlined. The SE course curricula, current standards, and intendedlearning outcomes are examined which enables us to outline the changes required.Recommendations and suggested methods to help close the gaps are outlined.IntroductionMany industrial and academic oriented studies have examined software developmentperformance over the last 30 years. Theoretic and practice oriented experts recognize that severalreasons exist for the sub-optimal performance. While much of the failure can be
is part of an ongoing teaching and research project that leverages our collaborative teaching in smart phone app development. We plan to leverage this in generalizing the course offering so other interdisciplinary groups’ efforts are facilitated.Dr. Diana Mitsova, Florida Atlantic University Diana Mitsova has a background in research design, statistical and spatial analysis, as well as environ- mental planning and modeling using geographic information systems, and interactive computer simula- tion. Her primary area of research involves the impact of urban development on ecosystems and other environmentally sensitive areas.Her recent publications focus on the impact of climate-related stressors on coastal
security aspects of SCADA/ICS that are more closely related to their coreobjectives. We propose an educational model in which all computing disciplines follow a morestructured awareness of SCADA/ICS security issues. Electrical and Computer Engineering(ECE) students should use best design practices to securely develop embedded hardware. ISYSstudents should be aware of the business impacts involved in security failures of SCADA/ICSenvironments and policies. Computer Science will be responsible for developing securesoftware. IT should be responsible for developing secure systems, and using theoretical andexperiential training in developing a secure system from end to end.There are a number of tools to assist in this development. Some of the tools
College of Physicians and Surgeons of Columbia University. In 2000, he joined New York City College of Technology, City University of New York (CUNY) where he is a Professor in the Department of Computer Systems Technology. Since 2005, he has been a member of the doctoral faculty at the CUNY Graduate Center. His research interests include computer science and engineering education and the use of computational models to understand and solve problems in biology. Page 24.1334.1 c American Society for Engineering Education, 2014 Using Interdisciplinary Game-based Learning to
outline a graduate-level curriculum for social engineering education, which can be used to teach aspiring offensivecybersecurity analysts the best methods to test the security of an organization’s human element,as well as teach aspiring security professionals about best practices and policies that they can useto protect the resources they are responsible for.IntroductionModern cybersecurity is seeing a spike in attention. Recent vulnerabilities and exploits haveprompted industry professionals to spend a greater amount on cybersecurity measures, frompowerful and comprehensive authentication systems to the most thorough and comprehensivefirewall and anti-virus systems. However, there is a simple fact that cannot be negated by anyamount of money or