Asee peer logo
Displaying all 15 results
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Justin L. Hess, Purdue University, West Lafayette; Lorraine G. Kisselburgh, Purdue University; Carla B. Zoltowski, Purdue University, West Lafayette; Andrew O. Brightman, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
mental processing coupled with dialogicinteraction with other learners, where the learner reflects on novel insights and perspectives. Wehave integrated these considerations into our course design. In the next section, we describe thepurpose of this investigation, followed by the course structure.Research PurposeThis paper presents findings from a comparative analysis of the learning outcomes ofengineering students who participated either completely online mode or in a hybrid-mode, whichincluded both online and in-class components. For both learning groups, we utilized the samepedagogy designed to enhance ethical reasoning (the SIRA framework).20 We implemented thispedagogical framework at the graduate-level and assessed student learning and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
student learning outcomes using WReSTT-CyLE and gamification.Access to resources (funding and otherwise) is often cited as the primary barrier totechnology adoption and the integration of software testing and programming skills. Therole of negative disposition towards educational technology and digital games, has notbeen fully considered as a contributing factor in the relatively slow pace of technologyadoption in higher education. The example of such slow adoption of technology inhigher education can be exhibited in many programming courses. Moreover, thesenegative dispositions towards technology may hold also reflect more than several decadesof dominant values informed by the naturalist and romantic beliefs about programming,student learning
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State College; Sanjeev Arora, Fort Valley State University; Nabil A. Yousif, Fort Valley State University; Xiangyan Zeng, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Georgia, is presently undergoing a major revision to reflect the most current trends inthe job market and the ABET computer science curriculum requirements. Additionally, thecurriculum redesign is needed to increase the program's appeal to students and employers. Theunderlying principle for this redesign is to provide more flexibility for students to take major andfree elective courses and lessen the emphasis on traditional mathematics requirements (such asCalculus II).Currently, the major area in curriculum of computer science at FVSU includes 60 credit hours ofwhich 9 hours are major electives and 6 hours free electives. The revised program will include33 credit hours in core curriculum of computer science, 12 credit hours in major electives
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yung-Hsiang Lu, Purdue University; Thomas J. Hacker, Purdue University, West Lafayette; Carla B. Zoltowski, Purdue University, West Lafayette; Jan P. Allebach, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
Research and the Microsoft Azure for Research Program.This project is supported in part by NSF ACI-1535108, CNS-0958487, and CNS-0855098. Any opinions,findings, and conclusions or recommendations in this materials are those of the authors and do notnecessarily reflect the views of the sponsors.References 1. Nanette Brown, Yuanfang Cai, Yuepu Guo, Rick Kazman, Miryung Kim, Philippe Kruchten, Erin Lim, Alan MacCormack, Robert Nord, Ipek Ozkaya, Raghvinder Sangwan, Carolyn Seaman, Kevin Sullivan, and Nico Zazworka. 2010. Managing technical debt in software-reliant systems. In Proceedings of the FSE/SDP workshop on Future of software engineering research, 47-52. DOI=10.1145/1882362.1882373 http://doi.acm.org/10.1145
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
who have decided topursue a computer science and engineering education.Retention of computer science and engineering students is a major problem at many institutionsof higher education. Retention issues have a big impact on the colleges and universities in avariety of areas such as academic affairs, student services, and even recruitment of newengineering students. Nowadays, graduation rates are published and lower rates reflect poorlyon an institution of higher education. Because of these reasons and more, colleges anduniversities have turned their attentions to finding new ways to retain the students that do enrollin their computer science and engineering programs.In order to increase the retention rate of our Computer Science, Computer
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mayari I. Serrano, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Baijian Yang, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
engage students inlearning and allow translation from conceptual knowledge to practice. We propose to use Model-Eliciting Activities (MEAs) to develop students’ representational fluency in the cybersecuritydomain. MEAs are activities that intent to simulate real-word client-driven scenarios. And thesuccess of these MEA activities rely on teamwork and the students’ abilities to apply concepts.Properly constructed and implemented MEAs can increase the use of: (1) student reflection toolsin assessments, and (2) learning technologies. MEAs require students to iteratively build, test andrefine their knowledge by encouraging students to build different forms of representations andconnect and translate among them [3]. These activities focus on
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Joshua Levi Weese, Kansas State University; Russell Feldhausen, Kansas State University; Nathan H. Bean
Tagged Divisions
Computing & Information Technology
(which is written using the Blocklylanguage) knew that they were using Blockly. From students who had previously attendedsome sort of STEM program before the institute, 70% of them had used Scratch. This showsthat most outreach programs in this geographic area highly favor the Scratch language. Withmore than 80% of students having used some programming language, it shows that all studentsare being exposed as much to computer programming at home or school as those whoparticipated in outreach programs. However, the low level of exposure is reflected in the self-efficacy in CT concepts. Students who had previously attended outreach programs improved more in CTconcepts such as algorithms, procedures, parallelization, data collection, and
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alka R Harriger, Purdue University, West Lafayette; Mayari I. Serrano, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
construct elements of a program, and a built-insimulator.4 The simulator allows the user to observe and test the behavior of the programthroughout execution by watching memory elements change in response to the environmentand/or user input/actions. Once the program has been thoroughly tested with the simulator, theIDE is used to download the program to the actual controller.Figure 2 shows the eight key symbols that may be used in a flowchart. As with traditionalflowcharts, the shape of a particular block denotes its function. For example, the two diamond-shaped symbols, compare and decision, reflect branch points in the program logic from whichthere are two exits
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Md Hossain Shuvo, Alabama A&M University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, demonstrate thecapability of mobile platform specially the Android platform which bear the testimony thatmobile platform can be made efficient in controlling robot.Preliminariesi. UMLUnified Modeling Language28 widely known as UML is a software engineering tool used formodeling software systems. Fundamentally it is used as a tool for analyzing, designing andimplementing software intensive systems. UML provides a visual representation of the systemwhich reflects the standard and interactive organization or system’s elements. From thebeginning till now, there are several versions of UML have been evolved and UML 2.0 is usedfor the modeling of our system. UML offers two types of system modeling, one is structural orstatic modeling which require the
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Ali Salehnia, South Dakota State University; Shieva Salehnia
Tagged Divisions
Computing & Information Technology
professional conduct,” “to accept responsibility in makingdecisions consistent with…[the] welfare of the public,” and to promptly disclose “factors thatmight endanger the public or the environment” (IEEE Code of Ethics, Section 1.1).As we believe that software developers are engineers and scientists, they should abide by suchguidelines, and produce reliable and safe products. Ethical issues play a big role in the analysisand development of software and application products. ]13], discuss the need for theinformation-systems person to receive training in ethical implications, and argue that theexistence of professional codes of practice is a clear indication that ethical neutrality is notpossible. They contend, "Self-reflection by systems analysis on
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Araceli Martinez Ortiz, Texas State University - San Marcos; Mina Guirguis, Texas State University
Tagged Divisions
Computing & Information Technology
9 different sessions of this class taught by 6 instructors. Two course modules were delivered to one session of CS1428 and the following week the students received the survey and the results were compared to the survey results from students who did not receive the modules (under the same instructor and different ones as well). All surveys were conducted within a10 day window around the end of November. In one module, the focus was on Computer Science big picture and the other focused on cyber warfare (as explained above in details). Another aspect that was not reflected in the results was the amount of interest the student developed from these modules. The students approached the faculty who delivered those modules after class and described
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Jinyi Zhang, Purdue University; Pan Fengjian, Purdue University, West Lafayette; Mrigank S. Jha, Purdue University, West Lafayette; Pranav Marla, Purdue University; Kee Wook Lee, Purdue University; David B Nelson, Purdue University, West Lafayette; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
  detection  tools,  such  as  Moss  [10], may  also  be  integrated  for  instructors  as they become necessary. Moreover,  besides record every single  operation  of  students  and   program  execution  settings,  it  is  possible  to  store  copies  of students’  code  to  understand  their  progress.  The  information  will  be  valuable  for  future  studies on how students learn and debug their programs.   Acknowledgement  We  want  to  thank  the  AWS  Cloud   Credits  for  Research  and  the  Microsoft  Azure  for   Research Program.  This  project  is  supported  in  part  by  NSF  ACI­1535108.  Any  opinions,  findings,  and  conclusions  or  recommendations  in  this  materials  are  those of the authors and do not necessarily reflect  the
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; John B. Southworth, East Carolina University
Tagged Divisions
Computing & Information Technology
test is not a reflection of the protocols themselves butrather a byproduct of implementations and possibly routing policies along the packet paths.Figure 9. Example output from v6Sonar showing the results of a performance test towww.google.com from six globally distributed monitoring agents. The test performed was HTTPGet of Web content.Discussion of findingsCzyz et al’s 2014 study provided a model for assessing IPv6 adoption through the first at largeempirical study of the state of IPv6 adoption by analyzing ten different datasets and producingresults on twelve adoption metrics. Their study provided qualitative and quantitative evidencethat IPv6 “is being used natively for production and at a rapidly-increasing rate” 3. In this studywe
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
results do not prove the superiority ofthe CBI compared to other traditional methodologies, the CBI approach did offer our students theframework and skills to bridge the gap between traditionally disparate sciences. The courseevaluations filled by students, and the reflective summary by the involved faculty, show manypositive improvements in attitude, independence, attendance, learning engagements, immersion,and mood. We also measured significant improvements in programming and problem solving,especially as it related to mathematics and physics, as well as in decision making.Some of the skills that CBI targeted were interpersonal skills, oral and verbal communications,and presentations.Acknowledgment:Part of this work was conducted while
Conference Session
Information and Network Security
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Di Ma, University of Michigan - Dearborn
Tagged Divisions
Computing & Information Technology
experience needs to blend into thecontext aware content. In addition, measurable goals and objectives that are challenge enough tostudents need to be counted.Standards. Standards of electronics and computer science curriculum and program goals must beinstilled and reflected to the projects. We need to consider the ABET requirement for thecomputer curriculum and program expectations. Overall, projects need to be developed byourselves to be authentic to students and local community. The research study is supported byNSF DUE program requirements are considered.In addition to the above project design issues, PBL carries the characteristics of pedagogicalunderpinnings.Innovation. Mobile computing is a new emerging area in computer science. Research