Asee peer logo
Displaying results 1 - 30 of 36 in total
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Irini Spyridakis, University of Washington
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
) communicating effectively, (4) recognizing ethical andprofessional responsibilities and considering the impact of engineering solutions, (5) functioningon a team in an inclusive environment, (6) analyzing and interpreting data, and (7) acquiring andapplying new knowledge [10].This paper describes the course module activities that help students succeed in completing theresearch report, the components of the research report, and grading checklists used by studentsfor creating successful deliverables and by instructors for grading guidance. This paper alsodescribes the assessment of students’ reports and student feedback in a reflection assignment.The paper ends with a discussion and conclusions.The Cross-Cultural Design Module and Cross-Cultural UI
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
data for a planned multiple semester longer term project.This paper contains (1) motivation and goals for this work, (2) outcomes and learning objectives,(3) instructions on how to design this kind of assignment, (4) the video assignment write up, (5)the rubric for the video, (6) the rubric for peer feedback, and (7) the rubric for reflection. Thispaper focuses on the structure and instruments used during the course.About the CourseArtificial Intelligence (AI) is being used to tackle more and more of the real-world problemsaround us. EECS 4901 Special Topics: Introduction to Artificial Intelligence will introducestudents to the fundamentals of Artificial Intelligence (AI). During this course students will lookat various problems being solved
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Work-in-Progress: Engaging First-Year Students in Programming 1 During COVID-19AbstractDuring the Fall 2020 semester, it became even more important than before to engage students inthe “classroom” whether that be in-person, online, or a hybrid model. This paper will introducevarious entrepreneurial mindset (EM) techniques to engage students that could be adapted to anyengineering course. All the techniques have suggestions for adapting to a fully online course aswell as working for an in-person or hybrid class. The first activity presented will be name signswith badges that will promote (1) setting, evaluating, and achieving goals, (2) self-reflection, (3)considering a problem from multiple viewpoints, and (4
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
reflecting on a Capstone experience with the purpose ofsuggestions for improving the experience. The contrast of the ACM literature and the ASEEliterature is that software projects tend to be more focused on design and verification, where theengineering papers tend to have more focus on process such as funding and project launch. Inboth the ACM and ASEE literature review it was most common for Capstone experiences tospan two semesters with some literature suggesting that going to a two-semester program wouldbe beneficial [11].In the literature, the following common question groups were observed, and informed theanalysis and narrative of the case studies in this work: • Project format: How are projects assigned? Are students working independently
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Mohsen M. Dorodchi, University of North Carolina at Charlotte; Alexandria Benedict, University of North Carolina at Charlotte; Audrey Rorrer; David K. Pugalee, University of North Carolina at Charlotte; Lijuan Cao, University of North Carolina Charlotte
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
into the school curriculum necessitates changes in policyincluding addressing significant issues around infrastructure, and providing teachers the resourcesthat develop a cogent understanding of computational thinking as well as relevant and appropriateexemplars of age appropriate cases [6]. Such focus would promote core concepts essential toeffective computational thinking development such as designing solutions to problems throughabstraction, automation, algorithmic thinking, data collection and data analysis; implementingdesigns; testing and debugging; modeling, running simulations, conducting systems analysis;reflecting on processes and communicating ideas; recognizing abstraction and moving betweenlevels; innovation, exploration and
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Hugh Jack P. Eng. P.E., Western Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
● Room (e.g. BL 266A) ● Instructor (e.g. “Jack H”)In the application, these columns are renamed to standard titles and new columns are added. Theprogram has been written in a modular format to allow easy substitution of titles. The outputspreadsheet is shown in Figure 2. In addition to renaming the columns, a few basic calculationshave been made. This includes changing the time from AM/PM to military formats. The timedurations have been calculated. This requires some correction for academic practices such as 50minutes = 1 hour and a 3-hour laboratory might be 2 hours and 45 minutes. It is worth notingthat the durations of ECET 452 and EE 311 are not an even or half and the times for thesecourses will need to be adjusted. The weight reflects
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Other programs reflecting Wei’s international reach include the college’s Poverty Alleviation/Service-Learning program and Engineers Without Borders. This global perspective is rooted in a vision of SJSU as a preeminent producer of forward-thinking problem-solvers. With this goal in mind, Wei has established the Silicon Valley Engineering Scholarship, a program that provides $5,000 of annual support for high-achieving students to pursue engineering careers. Wei is also a Principal Contributor to CSU (California State University) Engineering Academies, a statewide program that helps high schools better motivate and prepare students for the rigors of engineering education. Moreover, she supports the creation of high
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
in item wording,such as the addition of a neutral response option.6 A Retrospective Pre-Post Test (RPT)methodology [19] was used on six items to reduce rater bias and to increase evaluationefficiency for the classroom. Surveys asked participants to provide ratings of agreement pre-and-post taking the CTL course on statements related to their interest in a career in computerscience, plans to major in computer science, plans to earn a degree in computer science, andfeelings of belonging in both Intro CS and the CTL. Students in the CTL were also asked toprovide ratings of expertise in computer science both pre-and-post CTL. As all wereconcurrently taking Intro CS, ratings on these surveys reflect impact of the combination of IntroCS with the
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
NTP analogy, the telnet protocol offers a network administrator aquick way to set up a text-based console connection between a computer and a network deviceuses port 23. It can be shown visually as an individual (I) being able to establish a quick andconvenient connection with a network hardware device. The Network News Transfer Protocol(NNTP) uses port 119. It would seem like a problematic port number to memorize; however, ifone imagines looking at this number reflected in the mirror, it would be “911” -- which forreasons yet unclear to the author -- is what most news these days is. An open newspaper showsthe 119 port number with images and text regarding the news of the day. Email is an extensiveglobe-spanning system which can be shown by a
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-12 curriculums. As computational thinking (CT) coursesbecome common in K-12 education [11]–[18], some higher education institutions also startedoffering computational thinking courses to students from any majors [4], [19]. At its heart, thismovement reflects that computational thinking is everywhere and for everyone [20]. Various studies reported using text-based computer-programming- [13], [21]–[25], visualcomputer-programming [26]–[28], and puzzle instructional approaches [11], [29]–[31] to teachcomputational thinking. Most of these studies reported a positive impact on learning computingprinciples and an increase of interest in computer science in male and female students [12], [26],[28]. On the other hand, one study argues that
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Nextwe incorporate sklearn 40 so students can execute and explore the results of machine learningalgorithms. To prepare for machine learning content students watch bots videos 14 and they arealso assigned some ethics reflection prompts in response to Cathy O’Neil’s TED Talk 35 .The common thread across topics is the problem-solving heuristics shown in Figure 1. Weintroduce these early on and revisit them with each topic and explicitly point out when we areusing a strategy, or trying several of them, to solve a problem. For example we point out the useof concrete examples for solving encoding problems, developing algorithms, and initially usinghard-coded values in incremental web development. Another example is how students areexposed to
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhijiang Dong, Middle Tennessee State University; Joshua Lee Phillips, Middle Tennessee State University; Eric Oslund, Middle Tennessee State University; Chrisila Pettey, Middle Tennessee State University; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
(UndergraduateResearch Experience and Creative Activity) program to work on an extension to the summerresearch project during the academic year. Four participants from summer 2020 received a teamURECA grant ($4000) to continue working on an extension of their summer project for the2020-2021 academic year. While these post-summer activities were encouraging, they wereperformed by non-scholars and therefore may not be reflective of the potential positive impact ofthe summer research program on S-STEM scholars.4.3 Conference AttendanceSending college students, especially underrepresented students, to attend a professionalconference like the Grace Hopper Celebration of Women in Computing and the Richard TapiaCelebration of Diversity in Computing has become more and
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, no. 1 (2009): 4-10.[4] P. Li, "Virtual lab approaches for information and computer technology education," In OnlineLearning for STEM Subjects: International Examples of Technologies and Pedagogies in Use,M. Childs and R. Soetanto, Ed. Routledge, 2017, pp. 112-126.[5] K. M. Ala-Mutka, “A survey of automated assessment approaches for programmingassignments,” Computer Science Education, 15(2), pp. 83-102, 2005.[6] D. Kumar, "REFLECTIONS Tools from the education industry," ACM Inroads 9, no. 3, pp.22-24, 2018.[7] P. Li and L. Toderick, ”An Automatic Grading and Feedback System for E-Learning inInformation Technology Education,” Proceedings of 2015 ASEE Annual Conference &Exposition, Seattle, Washington. 10.18260/p.23518.[8] E. F. Gehringer
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
accreditation visit and the accreditation process in general.ABET assigns a team chair and typically one program evaluator per program being evaluatedwith a minimum of two program evaluators assigned for an initial accreditation visit. The teamchair and institution negotiate a visit date which is typically scheduled between September andDecember.Self-study. The institution then has until July 1 to complete and submit its self-study to ABET, akey aspect of the accreditation process. The institution generates a self-study report that addressesthe accreditation criteria directly and is the primary document used by the ABET team to evaluatethe program prior to their arrival on campus. It is intended to be a self-reflective document inwhich programs have
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
in both parts of the project.3.5 DeliverablesThe teams were required to produce mini-reports at the end of each part, in addition to an overallfinal report and presentation at the conclusion of the project. At the end of Part 1, teams had tosubmit a word document providing the answers to each of the clues, along with specificstrategies and steps they took to reach the answers. The teams also had to submit a worddocument at the conclusion of Part 2, including selfies in front of the target building and uniqueclue, alongside written descriptions of their physical observations and details about the uniqueclue. Final reports and presentations included consolidated versions of the mini-reports above, aswell as reflections about team challenges
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
to thefundamentals during all project phases and, especially, while conducting the analysis of theirmeasurements during the testing, revision and evaluation phases. The Virginia Tech class followsa top down approach, where the instructor provides a broad overview and the students analyzesome of the specifics of a standard trough different class assignments.The two classes consistently achieve the expected outcomes in terms of student performance,learning objectives, and instructor and class evaluations. We could observe a high student interestin 4G LTE, reflected by the students’ efforts in mastering the corresponding class assignmentsand project milestones. Interestingly, at Virginia Tech we observed that this motivation spillsover into
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A. Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, job candidates find them “subjective, arbitrary,unnecessarily stressful, non-inclusive –and at times– demeaning to their sense of self-worth andself-efficacy” [25]. Furthermore, candidates expressed concerns about the amount of timepreparation required, and the inherent bias that may give those with more free time an advantage.Others commented that the types of questions asked, and knowledge of data structures expectedto be known extemporaneously is not reflective of the tasks actually encountered in a computingposition.While these findings indeed revealed major concerns, the research did not consider the nuancesthat may arise from individual differences [11, 25]. On HackerRank, 95% of users were male, andthere was no information about the
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Bonnie Achee, Southeastern Louisiana University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. videos, virtual tours, websites) were offered surrounding that themeand awarded badges for participation/viewing, thus adding another element of gamification.Numerous questions in the CTF reflected the content offered. The CTF opened each day uponthe completion of the synchronous component and remained open until midnight. Figure 2 Sample Capture The Flag (CTF) CluesSynchronous DeliveryThe focus of the synchronous portion of the camp was to immerse the students in a “real world”simulation of a cyber crime there by introducing the concept of cyber security and developingthe skills of research and analysis, critical thinking, teamwork and written and oralcommunication which are
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
samples of Senior Design Projects which reflect common studentprojects.Wireless Sensor NetworksA wireless sensor network consists of many wireless-capable sensor devices workingcollaboratively to achieve a shared goal [4]. A WSN may have one or multiple base-stationswhich collect data from all sensory devices. These base-stations serve as the interface throughwhich the WSN interacts with the outside world [2]. The basic premise of a WSN is to performnetworked sensing using many relatively rudimentary sensors instead of utilizing the moreconventional approach of developing a few expensive and sophisticated sensing modules [2].The potential advantage of networked sensing over the conventional approach, can besummarized as greater coverage, accuracy
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
closely reflects the user experience when navigatingto dual-stack sites. Once the measurements are completed, they are sent to a central server forstorage and eventual analysis.The 197 IPv6 reachable domains were polled at 60-minute intervals for a period of 24 hoursfrom four network monitoring agents deployed in Toronto, New York City, and San Francisco.The use of multiple agent location vantage points helps avoid biases associated with anindividual location. The agents at each location were deployed in Virtual Machines (VMs)hosted by Digital Ocean. Each VM ran on CentOS 7.3 with 1 CPU, 512MB of memory, 20GB ofstorage on a Solid-State Drive (SSD), 1TB of transfer data, and was enabled for both IPv4 andIPv6. Digital Ocean was chosen as the
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
engaging students in interdisciplinary /multidisciplinaryundergraduate research activities. This goal is also fully aligned with the Universitymission that states "FVSU mission is to promote academic excellence for theimprovement of the quality of life for the people it serves"Statement of SignificanceFor the first time, the computer science program at FVSU is planning to conduct a majoreffort to improve and enhance programming knowledge and skills of its students whileprogressing through the program, enhance retention and graduation rates, and engagestudents in enrichment programs. The significance of this project is as follows: 1. Enhance the course curricula of all CS upper level courses (3xxx/4xxx) to reflect the most current
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Raja S. Kushalnagar, Gallaudet University; Gary W. Behm, Rochester Institute of Technology; Kevin T. Wolfe; Peter Yeung; Becca Dingman; Shareef Sayel Ali, Center on Access Technology ; Abraham Glasser, Rochester Institute of Technology; Claire Elizabeth Ryan
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
raised a hand and gives that person the floor. Aperson raises any hand and lowers it to obtain control of the captions until another person raises ahand. This form of control based on hand raising takes advantage of social dynamics - whensomeone motions with a hand, others know that person would like to speak or to add somethingto the conversation. It is a method which reflects physical-world experiences. These methodsprovide a more obvious indicator of who is speaking as shown in Figure 3.EvaluationFor the study, we recruited 15 participants through flyers and targeted emails on campus. Of the15 participants, 9 participants identified as deaf, and 6 participants identified as hard-of-hearing.There were 7 participants who identified as women
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Lina Battestilli, North Carolina State University; Sarah Korkes, North Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
addition, the data for number of minutesbetween the first and the last attempt did not reflect a consistent trend of one group taking moretime than the other. It is possible that these results are not the best metric of learning efficiency, Category Solution Explanation Expected This solution represents what we ex- numODD = 0; pected as a solution - a while loop that %Add your while loop here iterates through a range of numbers, n = 1 while n <= 7 checking if the current number is odd if rem(n,2) ˜=0 (and
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Franz J. Kurfess, California Polytechnic State University, San Luis Obispo; Maria Pantoja, California Polytechnic State University, San Luis Obispo; Irene Humer, California Polytechnic State University, San Luis Obispo
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. This exposed our students tocollaborators among different fields, with their own terminology, goals, work methods andpractical approaches. Our paper reports on the initial experiment during the Fall 2019 term,involving two sections of an Artificial Intelligence class and one section of a Deep Learningclass. We are planning to continue this collaboration in the future.Keywords: Collaborative Learning, Interdisciplinary, Inter-Class teamwork 1. IntroductionStudents at California Polytechnic State University, San Luis Obispo (Cal Poly) are exposed topractical, hands-on educational activities throughout their course of studies, reflected by theuniversity’s “Learn by Doing” motto. In the Computer Science, Software Engineering andComputer
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
than women in various areas ofthe industry, academia and business [1, 2]. The female computerscience students make less than 20% of the total undergraduatestudent population [1]. When it comes to graduate school only afraction of these undergraduates is pursuing graduate schoolleading to fewer female students in graduate school are researchingin computer science. This phenomenon is reflected in othercomputer science related fields such as computer engineering aswell [2]. For example only 30% of women are employed incomputer science. The ripple effect can be observed in making thesituation even worst by creating a very small pool of positivefemale role models for women in CS [3, 4, 12]. This results inmaking it harder for women in CS to succeed
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
University, North Carolina University, Michigan State University, Illinois Institute of Technology, Washington University in St. Louis, University of Illinois Collected Data Points: Prerequisites to the course, main topics covered, subtopics included, referenced materials, programs utilized, assessment standardsSince Data Science courses offered on online platforms reflect the current expectations of theindustry, we’ve included a small sample of Data Science courses offered by Coursera andfast.ai. Our approach for gathering data from these courses was the same as our approachtowards universities to keep our data consistent.The data points mentioned above were then used to create a
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
be extended over a longer period, what, on the otherhand, turned out to be beneficial, thus allowing greater internal dissemination of the projectThe working groups allowed to confirm the general unawareness of gender inequality at theuniversity. However, if at the beginning of the discussion, people argued that gender issues at theUniversity were almost irrelevant (since no problems had been reported), in the course of thedebate people started to reflect more about the subject, admitting several situations of inequalitydue to gender.The next challenge consisted in discussing possible solutions for the identified issues, which turnedout to be also very difficult, not only to find solutions but also to recognize good practices in
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
expressed in thispaper are those of the authors and do not necessarily reflect the views of the National ScienceFoundation.References 1. UVU Fact Book 2017, Office of Institutional Research. Online at https://www.uvu.edu/iri/documents/additional_resources/factbook17.pdf 2. NSF Scholarships in Science, Technology, Engineering, and Mathematics (S-STEM), Program Solicitation NSF 17-527. Online at https://www.nsf.gov/funding/pgm_summ.jsp?pims_id=5257&org=NSF . 3. Warnock, John (2019), Utah’s Engineering Initiative has boosted state’s high-tech boom, Salt Lake Tribune, January 21, 2019. Retrieved from https://www.sltrib.com/opinion/commentary/ 2019/01/31/john-warnock-utahs/ . 4. Utah System of Higher
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
question was phrased to be too general, the feedback would be short ofclarity. On the other hand, if the question was phrased to be too specific, it would trigger awide range of feedback (i.e., a normal distribution curve with a high deviation).According to the instructor, the P2P platform was somehow functionally coupled with thelearning management system (LMS). From time to time, students needed to visit the LMS towatch the lecture recordings to reflect the previous concepts during the self-study of newconcepts. Once students developed a routine habit of using the platform, it was also used bythe instructor to make important course announcements and conduct course surveys.Conclusion, Limitation, and Future WorkThis paper presents a new learning