Miss Sogand Kavianpour received her B.S. degree in Electrical & Computer Engineering from the Uni- versity of California, Irvine. She is currently working as a software developer.Dr. Javad Shakib, DeVry University, Pomona c American Society for Engineering Education, 2017 Student Projects and the Application of PID ControlThis paper considers the different application of PID Controls. Specifically, wewill take a look at how a group of students utilize this method in two differentapplications. Many of the Electrical Engineering students had a background inMechatronics and Control Theory, which was beneficial in understanding theapplications at hand. The first application included a robotic car. The
Paper ID #18994Entrepreneurial-Minded Learning in a Freshman Mini-project in Comput-ingDr. Danai Chasaki, Villanova University Danai Chasaki received a Diploma in Electrical and Computer Engineering from the National Technical University of Athens, Greece in 2006. She also received a M.S. and a Ph.D. degree in Electrical and Computer Engineering from the University of Massachusetts Amherst in 2009 and 2012 respectively. In 2012, she joined the Department of Electrical and Computer Engineering at Villanova University as an Assistant Professor. Before that, she was an Adjunct Instructor at Worcester Polytechnic Institute and
Paper ID #18615Computational Modeling and Interdisciplinary Projects for Engineering Tech-nology StudentsDr. Mohammad Rafiq Muqri, DeVry University, Pomona Dr. Mohammad R. Muqri is a Professor in College of Engineering and Information Sciences at DeVry University. He received his M.S.E.E. degree from University of Tennessee, Knoxville. His research interests include modeling and simulations, algorithmic computing, analog and digital signal processing.Dr. Javad Shakib, DeVry University, PomonaMr. James R. Lewis, DeVry University, Pomona c American Society for Engineering Education, 2017
Paper ID #19898A Student Project using Robotic Operating System (ROS) for UndergraduateResearchDr. Stephen Andrew Wilkerson P.E., York College of Pennsylvania Stephen Wilkerson (swilkerson@ycp.edu) received his PhD from Johns Hopkins University in 1990 in Mechanical Engineering. His Thesis and initial work was on underwater explosion bubble dynamics and ship and submarine whipping. After graduation he took a position with the US Army where he has been ever since. For the first decade with the Army he worked on notable programs to include the M829A1 and A2 that were first of a kind composite saboted munition. His travels
solutionto allowing students to perform a variety of simulations and validating new algorithms beforeimplementing them on an actual mobile robot, teaching ROS so that students can use itefficiently and effectively is a challenging task. Regular electrical engineering courses on ROSmay focus on theories but neglect hands-on experiences. Traditional lab-driven pedagogy mayprovide hands-on opportunities on ROS itself but may still not bring students close enough to theactual applications of ROS to their major robot projects in their electrical engineering education.In this paper, a technological content knowledge (TCK) based method is utilized to createlearning opportunities that allow students to construct their knowledge of the technology/tool(the T
- and post-surveys were statistically significant for the researchskills and knowledge construct, but not significant for self-efficacy, intentions towardgraduate school, attitudes toward the discipline of the assigned REU project, help seekingand coping behaviors, grit, scientific leadership, or scientific identity. A second evaluationwas conducted, comparing student and faculty mentor post-survey scores on the self-efficacyconstruct. The results were not statistically significant, suggesting that students and facultymentors had similar opinions on the ability of students to perform discrete research processesby the end of the REU. In this paper, we will describe the REU program recruitmentstrategy, structure, and activities; provide student
the collection of 2D images that are then translated to 3D byexternal reconstruction software.As with many computer engineering programs, students of the computer engineering program atUtah Valley University (UVU) conclude their degree programs with a semester capstone designexperience. The intent is for students to utilize competencies developed in the first three years ofthe curriculum in the solution of an embedded design problem. This paper summarizes theresult of an undergraduate capstone experience where the feasibility of utilizing ubiquitoustechnology (2D ultrasound) to mimic the functionality of enhanced but expensive 3D ultrasoundmachines is assessed.Capstone Projects at UVUThe goal of projects in our Capstone Design course is to
paper, we illustrate the use of an activity based teaching methodology by suggesting anincrease in students’ engagement through the use of specialized software tools in an introductorycybersecurity course. An activity based cybersecurity course enhancement is proposed to fosterstudent engagement. The proposed activities have shown promising results indicating enhancedlearning by the students. The methodology used in other Computer Science courses, is likely toenhance interest of students in other Computer Science (CS) and Information Technology (IT)program areas as well. We anticipate that enhanced learning in a cybersecurity course, inparticular, and CS and IT courses, in general, is expected by increasing students’ engagementthrough projects
. Visualization training is part of the core summer curriculum.Undergraduates, STEM and non-STEM majors, participate in the program. Results: The2014/2015 program cumulatively recruited a total of 22 participants: 11 (50%) female, 11 (50%)male; 4 (18%) of participants were from historically black colleges or universities (HBCU), 1(5%) from Hispanic serving institutions (HSI), 5 (23%) first-generation college students.Students were also recruited from institutions with limited research opportunities: 10 (45%) ofthe 2014/2015 cohort were from non-PhD granting institutions. The program provided diversityin content, projects and participant ethnicities: 6 (27%) African American, 1 (5%) Asian, 4(18%) Hispanic/Latino, 1 (5%) Native American/American Indian
simulation of a local traffic,student health center, or student cafeteria. This paper reflects experiments conducted by a groupof students, in a simulation technique course, who had six weeks to complete their term project onmodeling and simulation of the student cafeteria, called the Nest, an acronym for Falcon Nest.To accomplish their goal, students focused on reducing average time visitors spent in the system.They first measured and analyzed the popularity (i.e. visiting rate in time unit) of each food station,the arrival rate of the customers, and the number of workers in each station. An important objectivefor the students was how they could change the simulation model to come up with a workingsolution to the overcrowding faced during the peak
of Mechanical Engineering and Mechanical Engineering Technology at Eastern Washington University. He teaches courses in the areas of Robotics, Mechanics, Thermodynam- ics, Fluids, CAD, and Capstone Design.Dr. Donald C. Richter, Eastern Washington University DONALD C. RICHTER obtained his B. Sc. in Aeronautical and Astronautical Engineering from The Ohio State University, M.S. and Ph.D. in Engineering from the University of Arkansas. He holds a Professional Engineer certification and worked as an Engineer and Engineering Manger in industry for 20 years before teaching. His interests include project management, robotics /automation, Student Learning and Air Pollution Dispersion Modeling
Systems Security Professional, CISSP. She created the networking option and security option for CIT majors and a Network Security Certificate Program. She has also designed and modified many courses in networking and networking security. Professor Justice is noted for her creation of the Living Lab, an experiential learning environment where students gain real world experience running an IT business. Dr. Justice takes extreme pride and is a great innovator in the area of experiential learning and service. Experiential learning and service contributes to the integration of theory and application by creating an environment where the students learn by doing or apply their theory in service learning projects, practica
in service learning projects, practica, internships, games, and simulations. The Living Lab for CIT was created out of the need to provide a business environment for students to give them a taste of a ”real” IT environment. A secondary purpose is to provide service to internal and external clients. The Living Lab has served many internal and external clients. Dr. Justice has consulted for and managed IT departments in small and medium sized businesses. Her areas of research include: experiential and service learning, information and security risk assessment, risk management, digital forensics, network security, network and systems engineering, network and systems administration, and networking and security
new initiative at Purdue Polytechnic aimed to redesign undergraduate student experiences through offering a combination of deep liberal arts experiences with student-driven, hands-on project-based learning.Dr. Marisa Exter, Purdue University Marisa Exter is an Assistant Professor of Learning Design and Technology in the College of Education at Purdue University. Dr. Exter’s research aims to provide recommendations to improve or enhance university-level design and technology programs (such as Instructional Design, Computer Science, and Engineering). Some of her previous research has focused on software designers’ formal and non-formal educational experiences and use of precedent materials, and experienced
science project Apply statistical methods, regression techniques, and machine learning algorithms to make sense out of data sets both large and small Know what analyses are possible given a particular data set, including both the state of the art of the field and inherent limitations Fluently speak to disparate groups within an organization, from management to the IT director, to implement data analytics solution.3. Careers for DSA Students: We performed detailed investigations on the job market for DSAin the US. The summary information below is from two major job postings portal sites:indeed.com and monster.com.3.1. Job opportunities and requirements: The job market for DSA students is promising. TheDSA graduates can work
Paper ID #19888Concurrent Credit: K-12 Outreach, Recruiting, or Both?Prof. Lorri J Barnett, Purdue Polytechnic, Anderson Accomplished IT leader with experience in project management, strategic technology implementation, and professional development responsibilities – including curriculum development. Areas of expertise include database maintenance and implementation, IT systems, IP phone systems, healthcare training technology and professional development training for certified teaching staff, including technical writing responsibilities, payroll systems implementation, support, and administration. Proven ability to lead
amounts of programming areunder active development making deep learning increasingly accessible to a broader group ofstudents.At the graduate level, machine learning is normally considered a prerequisite for deep learning.However, a machine learning prerequisite for an undergraduate deep learning course wouldsignificantly reduce the number of students who can take the deep learning course. Theengineering curriculum in particular is already filled with a large number of required courses. Amore practical approach is to combine machine and deep learning in a single course thatemphasises areas of machine learning relevant to deep learning, but does not neglect fundamentalmachine learning concepts.A class project should be an important component of an
/absence of or to the extentof which that sub category was used ranging from zero to three. Repenning et al. measuredstudent’s learning of CT as patterns rather than concepts using Agent Sheets11. This led to anautomatic analysis tool using latent semantics to determine student growth in CT. Recently,the same group created a system entitled Real-Time Evaluation and Assessment ofComputational Thinking (REACT), a real-time assessment tool allowing teachers to getimmediate feedback on what students are struggling with or where they are succeeding2.Seiter developed the Progression of Early Computational Thinking model (PECT)20. ThePECT model combined evidence of programming concepts in Scratch projects with levels ofproficiency (basic, developing, and
coursework. Students fail in programming classes at rates starting at 20%[3], [4] up to 50% [5]. Pair Programming suggests grouping a student with a peer, employing the“two heads are better than one” philosophy shown to improve the output of projects [6] andperhaps learning outcomes [2]. Students placed in teams may also gain the benefits of peerprogramming, while also providing more authentic industry working conditions and supportingABET student outcome (d), working in multidisciplinary teams [7]. This paper looks at howusing teams in the Bauhaus studio model impacts student outcomes within a programming-centric Honor First Year Engineering (HFYE) course at a large Midwestern research University.We will start by looking at how teams are formulated
Paper ID #18916Online Programming System for Code Analysis and Activity TrackingTian Qiu, Purdue University Tian Qiu is a senior undergraduate in Computer Engineering and Mathematics-Computer Science.Mr. Mengshi Feng, Purdue University Mengshi Feng is a senior student at Purdue University. He is one of the team member in ACCESS project supervised by Yung-Hsiang Lu.Mr. Sitian Lu, Purdue University Sitian Lu is a junior studying Computer Engineering in Purdue University. He has been working on the online programming system (ACCESS) since later 2015. Sitian Lu has been studying in Purdue University for 3 years. He is also
Systems Security Project:This project has been funded in part by National Science Foundation to improve embeddedsystems security education for undergraduate students in the computing and engineeringprograms. They have developed the following eight online modules on embedded systemssecurity17: 1. General Introduction to Computer Security 2. Introduction to Cryptography 3. Embedded Systems Security 4. FPGA Security 5. RFID Security 6. SCADA Security 7. JAVA Security 8. Threat ModelingThese eight modules were offered in the following two software engineering courses: • Embedded Systems Programming • Software Project in Computer NetworksOffering of these modules in the
, retrieved 12 February 2017.[5] Larry Booth, Jon Preston, and Junfeng Qu, "Continuous program improvement: a project toautomate record-keeping for accreditation", In Proceedings of the 8th ACM SIGITE conferenceon Information technology education (SIGITE ’07). ACM, New York, NY, USA, 155-160, 2007.[6] Business Insider, "The 50 best computer-science and engineering schools in America",http://www.businessinsider.com/best-computer-science-engineering-schools-in-america-2015-7,retrieved 12 February 2017.[7] The California State University, "Search CSU Degrees", http://degrees.calstate.edu, retrieved12 February 2017.[8] Ernest L. Carey. "A quest for ABET accreditation: in retrospect", J. Comput. Sci. Coll. 19, 1,139-146, October 2003.[9] Computing
-ftcs-consumer-complaint-categories-again-2014[5] Beckers, J. J. & Schmidt, H. G. (2001). The structure of computer anxiety: A six-factor model. Computers in Human Behavior, 17(1), 35-49.[6] John Winterdyk. & Nikki Thompson. (2008). Student and Non-Student Perceptions and Awareness of Identity Theft. Canadian Journal of Criminology and Criminal Justice 50(2), 153-186. Project MUSE. Web. 5 Apr. 2013. http://muse.jhu.edu[7] Nachmias, D. & Nachmias, C. (1987). Research methods in the Social Sciences. New York: St. Martins Press.[8] Costello, A. B., & Osborne, J. W. (2005). Exploratory Factor Analysis: Four recommendations for getting the most from your analysis. Practical Assessment, Research, and Evaluation, 10(7
, purpose, intent, intention, aim, invention, excogitation, conception, project, contrive, experimentation, try out, initiation, founding, foundation, institution, origination, creation, introduction, instauration, real number, existent, tangible, actual, genuine, literal, substantial, material, veridical, very, really, rattle, 'issue', publishing, print, bring out, put out, release, write, introduce, pioneer, trailblazer, groundbreaker Ethics ethic, society, environment, ethical motive, moral, morality, moral philosophy, ethic, moral principle, value system, value orientation, ethical code, club
). Moreover, mobile commercepenetration is helping to spur mobile payment adoption [15].The concept of mobile payments was first developed by Coca-Cola in 1997, using a RadioFrequency-Identification (RFID) terminal. This spurred innovation of several other methods ofmobile payment over the years, such as PayPal which was founded by eBay in 1998, to replacethe existing payment methods [4]. However, end user acceptance of mobile payments has fallenshort of projections. Although some regions of the world have found more success in mobilepayments adoption than for example Japan, China, and Turkey, Asia Pacific in particular leadsthe mobile payment adoption charts, with the highest level of confidence in these transactions at65%, and in 2016 China