Asee peer logo
Displaying results 31 - 60 of 132 in total
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Abdullah Azzouni, Oregon State University; Jennifer Parham-Mocello, Oregon State University
Tagged Divisions
Computing and Information Technology
implies both a temporal dimension, in which organizations are improving all thetime, and a spatial dimension, in which organizations are improving all of their departments,units or divisions. In order to accomplish CI, Deming proposes utilizing the Plan-Do-Check-Act(PDCA) cycle for improvement at any stage [2]. PDCA is a 4-step cycle that repeatscontinuously through which organizations create a plan, execute it, review the results, and finallymake any corrective action before starting again.While Deming’s work was mainly directed towards business, academia took notice. The terms“Continuous Improvement” and “Total Quality Management” started to show up in highereducation research papers by the late 1980’s and early 1990’s [3]. CI then found its
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Debra M. Duke, Virginia Commonwealth University; Mandayam Thirunarayanan, Florida International University; Abigail Byram, Virginia Commonwealth University; Peter J. Clarke, Florida International University
Tagged Divisions
Computing and Information Technology
Science.As SEP-CyLE continues to evolve and as more information is collected regarding itsimplementation in classrooms in educational institutions across the country, it is likely to becomea valuable tool that students and instructors can use to facilitate teaching and learning incomputer science courses.References[1] Bureau of Labor Statistics, United States Department of Labor , "Software Developers," 13 4 2018. [Online]. Available: https://www.bls.gov/ooh/computer-and-information- technology/software-developers.htm. [Accessed 4 2 2019].[2] D. F. Shell, L. Soh, A. E. Flanigan and M. S. Peteranetz, "Students' Initial Course Motivation and Their Achievement and Retention in College CS1 Courses," in Proceedings of the 47th ACM
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Sanish Rai, West Virginia University Institute of Technology
Tagged Divisions
Computing and Information Technology
behavior can be observed in a building environment.More specifically, the building environment is represented using vertex for nodes and connecting structureslike doors, stairs by links. The occupant in the model is represented using a variable o having state s, where o = ph, v position, id , g id , l from , s   staying  s =  moving inqueue  Here, ph represents the phase of the occupant which represents the environment condition of the building,vposition represents the current vertex the
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
., & LaVaque-Manty, D. (2007). Transforming science andengineering: Advancing academic women. University of Michigan Press.[6] Ceci, S. J., Williams, W. M., & Barnett, S. M. (2009). Women's underrepresentation in science:sociocultural and biological considerations. Psychological bulletin, 135(2), 218[7] Gaughan, M., & Bozeman, B. (2016). Using the prisms of gender and rank to interpret researchcollaboration power dynamics. Social Studies of Science, 46(4), 536-558.[8] Pereira, M. D. M. (2010). Higher Education Cutbacks and the Reshaping of EpistemicHierarchies: An Ethnography of the Case of Feminist Scholarship.Sociology, 44(2), 287–304.[9] Amâncio, L. (1993). Género: representações e identidades. Análise das representações
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Nikole Harper; Hasan Muqri; Brian Keith Wesr Sr.
Tagged Divisions
Computing and Information Technology
Statistical Graphic Interface Manipulation Specialties Curve Analysis s Moderate Custom Scope Tables, Menus & SySPSS Gradual Moderate Good ANOVA & ntax Medium Multivariate Versatility Analysis Broad Panel Data
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
”,“crossing the chasm”, “technological S curve”, and so forth. Figure 9. Word-cloud of peer interactions within study groups Figure 10. Distance between keywords of peer discussionsLessons Learned about Peer InstructionAt the conclusion of the course, multiple course participants were interviewed to solicit theirfeedback on the P2P platform. Some interesting lessons were learned in terms of how theplatform was used in practice.Generally speaking, student feedback was mostly positive. According to students, it was“fairly straightforward” to learn to use the platform, especially since a detailed user guidehad been provided. It was helpful to view the feedback of other students, which oftentimestriggered a student to
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Bin Cong, California State University at Fullerton; Christopher Ryu, California State University at Fullerton; Raman Menon Unnikrishnan, California State University at Fullerton
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Maturity Model (CMM) intosoftware engineering was developed by the Software Engineering Institute of CarnegieMellon University in 1987. The integrated version (CMMI) evolved from this early work.ABET’s Criteria 2000 was inexorably linked to the quality assurance fervor of the 1990’s[2-7]. However, the work involved in preparing for accreditation is enormous, and facultymembers do not always find the direct benefit of such work. As a result, some nontechnicalfaculty members have even resorted to excoriating the entire outcomes-based approach ofthe accreditation process publicly [8].The classroom instructors of many undergraduate courses are burdened with severalchallenges such as large class sizes, dwindling instructional support and the need to
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Te-shun Chou, East Carolina University; Tijjani Mohammed, East Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
$400K to ransomware hackers, 2019. Retrieved from: https://statescoop.com/georgia-county-paid-400k-to-ransomware-hackers/3. D. Kobialka, Regis University Cyberattack: What You Need to Know, 2019. Retrieved from: https://www.msspalert.com/cybersecurity-breaches-and-attacks/regis-university-cyberattack-what-you-need-to- know/4. Symantec, 10 cybersecurity facts and statistics for 2018, 2018. Retrieved from: https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that- you-should-know.html5. T. S. Chou, “Multi-Learning Techniques for Enhancing Student Engagement in Cyber Security Education,” American Society for Engineering Education (ASEE) Annual Conference and
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Merlinda Drini, Queensborough Community College of the City University of New York
Tagged Divisions
Computing and Information Technology
WNodes number 60 Mobility model Random-WaypointRouting protocol DSR Propagation model Rayleigh fadingMAC protocol 802.11 Carrier Frequency 2.4 GHzPacket size 512 bytes Speed 1-20 m/s - Only when channel quality was considered - When both, the channel quality and the residual power of the nodes were considered. (SP-DSR).The average end-to-end delay is the cumulative of all possible delays in the links and the nodes.Traditional DSR has higher delays, due to the buffering delays of route recoveries and theretransmission delays at the link layer. SP-DSR has the best end-to-end delay
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
.[2] Cyber Seek, “Cybersecurity Supply/Demand Heat Map,” Cyber Seek Website, 2019. [Online]. Available: https://www.cyberseek.org/heatmap.html. [Accessed: 03-Feb-2019].[3] M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A survey on automated dynamic malware-analysis techniques and tools,” ACM Comput. Surv., vol. 44, no. 2, pp. 1–42, Feb. 2012.[4] S. Kalra and S. K. Sood, “Elliptic curve cryptography,” in Proceedings of the International Conference on Advances in Computing and Artificial Intelligence - ACAI ’11, 2011, pp. 102–106.[5] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Weidong Kuang, University of Texas Rio Grande Valley; Abhijit Baul, University of Texas Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
future work. First, the currentsystem consists of three Python programs (or files), and the operation of the system requiressome command line inputs. It would be more convenient for a user (e.g. instructor) to use thesystem if the system could be integrated into a single application file with a Graphic UserInterface (GUI). Second, we will update the system for a more robust face recognition if acorresponding algorithm is available. Third, based on the survey, some students have a privacyconcern on face recognition. It is important to address this concern.References[1] B.K. Mohamed and C. Raghu, “Fingerprint attendance system for classroom needs,” IndiaConference (INDICON), Annual IEEE, 2012, pp. 433-438.[2] S. N. Shah and A. Abuzneid, “IoT based
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Emil H. Salib, James Madison University; John David Lester
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
authors senior capstone project partner and Paul Henriksenfor his diligence and effort in reviewing and editing this paper.References [1] M. C. et al., “Network virtualization in multi-tenant datacenters,” in 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’14)., 2014. [2] M. Casado, “Origins and evolution of openflow/sdn,” in Open Networking Summit, 2011. [3] M. Casado, “Keynote: Make sdn real,” in Open Networking Summit, 2017. [4] N. Mckeown, “How sdn will shape networking,” in Open Networking Summit, 2011. [5] S. Shenker, “The future of networking, and the past of protocols,” in Open Networking Summit, 2011. [6] J. H. Cox, J. Chung, S. Donovan, J. Ivey, R. J. Clark, G. Riley, and H. L. Owen, “Advancing software
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Computing and Information Technology
VeryDissatisfied Dissatisfied Satisfied Satisfied 1 2 3 4 5 Very Neutral VeryDissatisfied Dissatisfied Satisfied Satisfied 1 2 3 4 5 6 Extremely Very Somewhat Somewhat Very ExtremelyDissatisfied Dissatisfied Dissatisfied Satisfied Satisfied SatisfiedAPPENDIX B: Five–Point Likert Scale. Rubrics courtesy of W. S. U., Pullman, WA. 5 Has demonstrated excellence. Has analyzed important data precisely. Has provided documentation. Has answered key questions correctly. Evidence of
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
will go unreported. At this point, bad actors would be able tophysically traverse the home without fear of being recorded.Although the features offered by the Google Nest Hub Max are highly utilitarian, some featurescould pose serious threats once compromised. In regard to the broadcast function of the GoogleHome app, an intruder can trigger the devices in the house and gain control over them remotely.Consider another scenario where using the Google Home app to record reminders, could bedetrimental. In this case, the intruders can gain access to personal information, such as routineschedules of the person(s) in the house, without much difficulty. A similar scenario is thecapability of the Google Home application to set-up the hub for all the
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
Structures throughObjects, 7th Edition.Table 1. Cyber Security Modules with Lessons and Chapters to Cover Modules. Chapter to Module#. Implementation Approach Cover Module Lesson(s) Ch. 2. Java 4.1 Secure Variable Understanding how to write secure variable declarations is Fundamentals Declarations critical to producing overall secure code. Ch. 2. Java 1 Integer Errors Introduced with arithmetic operations. Students must be made Fundamentals familiar with how integer/floating-point division is handled. Ch. 3. Decision 5.1 Secure Division Similar to type conversion, while dividing by zero is primarily Structures a topic to be addressed
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Erica Haugtvedt, South Dakota School of Mines and Technology; Duane L. Abata, South Dakota School of Mines and Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
B6 1/42 B8 -1/30 B10 5/66 B12 -691/2730 B14 7/6 etc.To illustrate the usefulness of his formula, Bernoulli computed the value of s 10(1000) with littleeffort in less than “half a quarter of an hour” [Smith]. He computed s10(1000) = 91409924241424243424241924242500To achieve this end, he needed to find B0 up to B10. One can observe that the Bernoullinumbers were at one time of great value because they shortened calculations of severalmathematical functions when lengthy computations were done by
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhaohong Wang, California State University, Chico; Jing Guo, California State University, Chico
Tagged Divisions
Computing and Information Technology
their constructive comments that helped us improve the paper.References [1] R. L. S. De Oliveira, C. M. Schweitzer, A. A. Shinoda, and L. R. Prete, “Using mininet for emulation and prototyping software-defined networks,” in 2014 IEEE Colombian Conference on Communications and Computing (COLCOM). IEEE, 2014, pp. 1–6. [2] R. R. Fontes, S. Afzal, S. H. Brito, M. A. Santos, and C. E. Rothenberg, “Mininet-wifi: Emulating software-defined wireless networks,” in 2015 11th International Conference on Network and Service Management (CNSM). IEEE, 2015, pp. 384–389. [3] R. Ruslan, M. F. M. Fuzi, N. Ghazali et al., “Scalability analysis in mininet on software defined network using onos,” in 2020 Emerging Technology in Computing
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Eliezer Ochoa Jr.; Joshua David De Piano; Michael G. Milford; Alan Moses Galvan; Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
inception to completion. .The studentsdemonstrated an enhanced understanding of the alternative route for green energy with reneweddesign emphasis on Digital Parasitic applications that employs Thermoelectric GeneratorPeltier instead of traditional analog mechanization. We have collected no data to quantify if thisapproach will be satisfactory with all our capstone senior project students, since the newbatch of students have just started taking their senior project capstone course sequence.References[1] Callan, S. J., & Thomas, J. M., Environmental Economics and Management, Cengage Learning, 2012.[2] Mazidi, M. A., Causey, D., Mazidi, J. G., HCS12 Microcontrollers and Embedded Systems, using assembly and C with code warrior, Pearson
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
which random distribution suits best for their decision making, and how thedeparture of one node will become the arrival of the tandem nodes. Wa S AD Wa S D A Figure 3: A Tandem Queue model used for training students3.3. Input and Output Data ModelData models are vital to any simulation study. There are two significant parts of data that must beworked, understood, and documented: the inputs data and the outputs (or result). Each part needsto be studied, analyzed, and determined. The results need to be documented for the implementationof the model. Data models of the Healthcare Clinic of Figure 1 include:Input Data: • Arrival rate of the patients
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Geraghty Anne Ellis, Georgia Institute of Technology; Nicholas Mulka, Georgia Institute of Technology; Amit Shashikant Jariwala, Georgia Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
release at the endof the year, Single Sign-On (SSO) configuration was not yet complete primarily due to logisticaldifficulties between IT teams. The team decided to use the old site for one final semester tocomplete more in-depth testing and help ensure a smooth transition. SSO is a critical productionfeature because it enables students to log into these applications using their Georgia Tech logincredentials, providing seamless accessibility.Spring 2020’s focus was EM development (9) and preparing IDCD for release. SSO was set upand the beta IDCD app was released on the production tenant for the Summer 2020 capstonedesign students (10). Typically, only about 60 students participate in capstone design’s ME andInterdisciplinary summer offerings as
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
- stories-from-25-entrepreneurial-founders/ Microsoft Alumni Startup Stories https://www.microsoftalumni.com/s/1769/19/interior. aspx?pgid=1969&gid=2&cid=8024 Table 2. Lean Launchpad Video Links Material URL Planning Customer Discovery – Part 1 https://vimeo.com/groups/204136/videos/75308828 Planning Customer Discovery – Part 2 http://vimeo.com/groups/204136/videos/75184102 Planning Customer Discovery – Part 3 http://vimeo.com/groups/204136/videos/75603393 Interviews – Part 1 http://vimeo.com/groups/204136/videos/75535337 Interviews – Part 2 http://vimeo.com/groups/204136/videos/76172223 Interviews
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
overlooked by practitioners and researchers. Additionally, the platform has supportedworkshops organized across the country. Workshops are co-organized with organizations thatoperate large backbone networks connecting research centers and national laboratories, andcolleges and universities conducting teaching and research activities.1. IntroductionGeneral-purpose enterprise networks are capable of transporting basic data, e.g., emails,multimedia, and web content. However, these networks face many challenges when movingpetabytes (PBs) of scientific data, e.g., genomic, climate, imaging, and high-energy physics, [1].As a response, network architects have developed the concept of a Science Demilitarized Zone(Science DMZ or S-DMZ) [2] as parts of a
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Zhen Wu, University of Colorado, Boulder; Christopher Lynnly Hovey, University of Colorado, Boulder; Leisa D. Thompson, University of Virginia
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
“veryhigh” research activity based on the Carnegie Classifications, and offer doctoral degrees in CSor computer and information science. Overall institutional enrollments ranged from slightlyabove 3,000 undergraduate students to slightly above 39,000. Participating schools aregeographically located in the Eastern (n = 3), Midwestern (n = 1), Southwestern (n = 1), orPacific (n = 2) United States. At six of the seven schools, students declare their majors uponenrollment; at the remaining university, students declare majors at the end of their second yearof coursework. No other data about “population(s) served” (e.g., student demographics,socioeconomic status, etc.) were collected, apart from the change in participation of women andmen within the CS
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
trips. If networkintrusion attacks succeed to compromise IoV systems, intruders will control the autonomous vehiclescommunicating with the infrastructure, and this may lead to serious fatal consequences. Therefore,using an IDS to protect the IoV system is very crucial. In this project, students will use traditional IDSto protect the IoV system.REFERENCES[1] Cisco, "Cisco Visual Networking Index: Forecast and Trends, 2017–2022 White Paper," 2019.[2] IBM, "The demand for cybersecurity professionals is outstripping the supply of skilled workers," 2019.[3] T. Omar, S. Venkatesan and A. Amamra, "Development of Undergraduate Interdisciplinary Cybersecurity Program: A Literature Survey," in ASEE Annual Conference & Exposition, Salt
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
-surveys. TABLE II T O WHOM DO STUDENTS TURN FOR HELP WHILE STUDYING ? A S REPORTED BY STUDENTS BEFORE AND AFTER THEIR INTERNSHIPS . Resource Number (percent) of students report- Number (percent) of students report- ing typically consulting this resource ing typically consulting this resource (pre-survey) (post-survey) The class discussion board 47 (78%) 47 (78%) Your friends 49 (82%) 52 (87%) The instructor, TAs, and/or tutors 47 (78
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
-Champaign; Center for Information Assurance Education and Research (CIAER) [16]. 6. University of Pittsburgh; Laboratory for Education and Research on Security Assured Information Systems (LERSAIS) [17]. 7. Syracuse University; Center for Advanced Systems and Engineering (CASE) [18]. 8. George Mason University; Center for Secure Information Systems (CSIS) [19], Center for Assurance Research & Engineering (CARE) [20]. 9. University of California-Davis; Computer Security Lab (CSL) [21]. 10. University of Texas at San Antonio; Center for Education and Research in Information and Infrastructure Security (CERI²S) [22], Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) [23] & Center for
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
designed to prove.Understanding what fact(s) about the world a proof is trying to establish is a crucial first step,especially for a novice. It helps the student organize his thoughts and evaluate different possiblepaths if the end goal is clearly defined in his mind. In the same vein, understanding the purposeand value of education is a crucial first step towards long term success in Computer Science. If thestudent understands the long-term benefits, he or she is much more likely to devote the time andenergy needed to master complex technical skills.2.2 Strategies in Upper Level Undergraduate ClassesThe issues in the lower level classes all still apply but there is another issue that is unique to theupper level classes: the need to build on an
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
of papers implementing surveys started in 1994by Todd and Magleby et al. [4] that was followed up by Howe. S. et al. in 2010 [5] and 2015 [6],[7] respectively. The work from Howe, which can be found in the ASEE database, is more recentand relevant to this work. In 2015 Howe did both a qualitative and quantitative analysis ofsurvey results from 256 ABET accredited institutions executing Capstone projects in 464 distinctdepartments for a total of 522 respondents. This work looked at many aspects of the Capstoneexperience. One interesting reported observation was how various programs and institutionsvalued “process vs. product” in the final outcomes of a Capstone experience. Howe alsoexamined the number of semesters to complete, age of Capstone
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Pervasive,” J. Sci. Pract. Comput., vol. 1, no. 2, pp. 67–69, 2007.[2] Q. Bui, “Will Your Job Be Done By A Machine?,” Planet Money - The Economy Explained, 2015. [Online]. Available: http://www.npr.org/sections/money/2015/05/21/408234543/will-your-job-be-done-by-a- machine. [Accessed: 25-May-2015].[3] M. Weisser, “The Computer for the Twenty-First Century,” Sci. Am., vol. 3, no. 265, pp. 94–104, 1991.[4] S. Hambrusch, C. Hoffmann, J. T. Korb, M. Haugan, and A. L. Hosking, “A Multidisciplinary Approach Towards Computational Thinking for Science Majors,” ACM SIGCSE Bull., vol. 41, no. 1, p. 183, Mar. 2009.[5] P. B. Henderson, “Ubiquitous computational thinking,” Computer (Long. Beach. Calif)., vol. 42
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Awatif Amin, Johnson C. Smith University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
to evaluatethe impact of retention factors on larger private and public institutions. Machine Learning and datamining can be very rewarding as researchers can apply many different methods to institutions of all sizesand types as needed. The suggestion of establishing a centralized center supporting different kinds ofresearch to solve retention problems could impact the university’s marketing and recruitment activities aswell. Improved management of new, innovative, and existing resources could improve retention andallow for greater financial stability at Jonson C. Smith University.References[1] L. A. Spakman, W. S. Maulding and j. G. Roberts, "Non-cognitive predictors of student success in college.," College Student Journa, p. 46, Fall