Asee peer logo
Displaying results 31 - 60 of 154 in total
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Michael Porter, Alabama A&M University; Ralph (Phil) Bording, Alabama A&M University; Yujian Fu P.E., Alabama A&M University
Tagged Divisions
Computing and Information Technology
important that detailed information of acompany’s employees, vendors, and payment history are recorded in order for the business tooperate efficiently and comply with the law. The requirements for this system include: (1) theability to track employee information, such as salary, responsibilities, seniority and otherrelevant information, (2) the ability to track job applicants, including their contact information,resume, etc., (3) the ability to track vendors that the company purchases products or servicesfrom, as well as a history of any invoices that the company has received, and finally (4) theability to track payments that have been paid to both employees and vendors. With thecomplexity of the above system requirement, considering software
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Sami N. Rollins, University of San Francisco; Alark Joshi, University of San Francisco; Xornam Apedoe, University of San Francisco; Sophie Engle, University of San Francisco; Matthew Malensek; Gian Bruno, University of San Francisco
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Computer Science from the University of Nebraska at Omaha.Prof. Matthew MalensekMr. Gian Bruno, University of San Francisco American c Society for Engineering Education, 2021 Work in Progress: Understanding Professional Identity Development Among Computer Science StudentsIntroductionDespite growing enrollments in computing programs, retention, particularly of students fromhistorically marginalized and minoritized groups, remains a challenge [1]. Recent research hasdemonstrated that a stronger sense of disciplinary identity may contribute to increased persistencein STEM fields. A number of High-Impact Educational Practices (HIPs) [2] have been shown
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A. Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
from FIU.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women (specifically Black and His- panic women) in computer-related engineering fields.Prof. Zahra Hazari, Florida International University Zahra Hazari is an Associate Professor
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Vijay Anand, University of Missouri, St. Louis; Dmytro Kudriashov, EPAM Systems
Tagged Divisions
Computing and Information Technology
technology also brings new types of attacks which requires understanding of howexisting technology is exploited by malicious actors and what type of remedies can be taken to preventsuch attacks. This paper outlines the different aspects of cryptocurrency operation which is importantto understand modern cyber commerce.1 INTRODUCTION With the introduction of the first cryptocurrency in 2009, Bitcoin [8] immediately became a nicheinstrument for anonymous currency transactions. The underpinnings of the cryptocurrency is based onthe construct of a blockchain where blocks are added to an existing set of blocks by arriving at aconsensus. A block in such a structure will be accepted as part of an existing chain by this network ofusers when a miner
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Matthew A. Verleger (He/His/Him), Embry-Riddle Aeronautical University; Richard S. Stansbury, Embry-Riddle Aeronautical University; Mustafa Ilhan Akbas, Embry-Riddle Aeronautical University; Philip Craiger, Embry-Riddle Aeronautical University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
including cave diving in over 50 caves throughout the U.S. and Mexico, and several cave dives to 300 or more feet. American c Society for Engineering Education, 2021 Work-In-Progress: Developing Undergraduate Research Experiences in Unmanned Aircraft Systems (UAS) CybersecurityDuring the fall 2020 semester, nine students were recruited to participate in a UAS cybersecurity-focused undergraduate research experience. Three faculty members each identified a small topicarea for undergraduate students to pursue. The three areas are: 1. Small UAS (sUAS) Vulnerability and Threat Assessment and Mitigation 2. Effects of Cyber Attacks on Communication in UAS
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Mohsen M. Dorodchi, University of North Carolina at Charlotte; Alexandria Benedict, University of North Carolina at Charlotte; Audrey Rorrer; David K. Pugalee, University of North Carolina at Charlotte; Lijuan Cao, University of North Carolina Charlotte
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Broadening the Middle School Computational Thinking Interventions beyond Block Programming Mohsen Dorodchi, Alexandria Benedict, Audrey Rorrer, David K Pugalee, Lijuan Cao, Mary Lou MaherAbstractThe contributions of this research paper are as follows: 1) it builds on prior work done intransitioning teaching and learning of programming and computational thinking from block-basedprogramming to text-based programming languages, and 2) it infuses this model of programmingto teach computational thinking (CT) in middle school curriculum and studies the impact of theprofessional development (PD) on teachers. Our proposed curricular approach is based on therequest from our partner middle school teachers in
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Robin K. Hill, University of Wyoming
Tagged Divisions
Computing and Information Technology
theories.The SceneThe CourseOur class in “Ethics for the Computing Professional,” a one-credit required course for computerscience majors, is offered at the junior level and most often taken by seniors, and most often fullyenrolled. It aims to bring moral philosophy to the budding computer scientist. The coursesyllabus covers the usual subjects of privacy, security, intellectual property, cyberabuse and othersocial detriments, and professional codes, but also reaches farther into philosophy, to equipstudents with the vocabularly and methods of the humanities. We use Herman Tavani [1] as thenominal textbook. (I designate an older edition so that copies may be purchased cheaply, and alsoprovide extracts, compliant with Fair Use, in Course Reserves at
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women (specifically Black and His- panic women) in computer-related engineering fields. American c Society for Engineering Education, 2021
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
these processes relate, specifically, to a software venture. This paperpresents the overall instructional plan of the course and discusses each of the course’scomponents. The implementation of the project component is discussed, in particular, in detail.The design and implementation challenges that were encountered are discussed.This course was run in Spring of 2020 and started as an in-classroom course, later transitioningto an online course due to the COVID-19 pandemic. The outcomes of the course are discussed.Possible future enhancements are considered.1. IntroductionSoftware businesses have been responsible for tremendous growth and changes in society. Oncesmall startups, names like Google, Microsoft, PayPal and Facebook now are among the
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Anastasia Kurdia, Tulane University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
disciplines and hence organically produces a diverseenvironment of learners focused on interdisciplinary issues.Despite these distinct benefits, it is a relatively rare program as far as undergraduate computerscience programs are concerned. In this paper I describe the design of a coordinate major incomputer science program at Tulane University, discuss implementation details, and providepractical suggestions for implementing such a program in another university.1 IntroductionComputer science has grown into a discipline that focuses as much on solving problems in relatedareas as it does on its own research problems. While it is common to see interdisciplinary majorprograms and concentrations with fixed mainstream application areas (e.g
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Ida B. Ngambeki, Purdue University, West Lafayette; Marcus Rogers, Purdue University, West Lafayette; Sienna Jasmine Bates, Purdue University, West Lafayette; Megan Celeste Piper
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
paper then discussesthe alignment of the program with the NICE Framework and puts forth recommendations toimprove the alignment.IntroductionThe field of cybersecurity has become a very high in-demand profession. Recent estimatesindicate that the shortage of adequately educated and trained cybersecurity workers will continueinto the foreseeable future [1], [2]. This lack of adequately trained resources has severeimplications for national security and economic growth, as every business these days relies oncyber and its related infrastructure [3], [4]. This critical shortage has resulted in efforts fromvarious sectors (e.g., Government, Industry, Academia) being accelerated and given a highpriority for resources and funding [5]. There is now a
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Justin Limb; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing and Information Technology
. Robotic design is currentlynot yet well represented in undergraduate academic programs.In order to prepare our computer engineering students for the robot design experience which canbe considered as a complex embedded systems design, we offer two courses on embeddedsystems. However, these two courses on embedded systems design are not enough to teach thestudents the skills that they need. In order to satisfy the ABET requirements students incomputer engineering program are required to take a capstone course. The projects that studentsdo in this capstone course are embedded projects. This paper describes a robotic project that astudent has done in this capstone course.IntroductionWikipedia defines a robot as [1] “ a machine—especially one
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
used in the course are discussed. Finally, plans forfuture offerings of this course are reviewed.1. IntroductionThis paper presents the efforts undertaken to develop and the implementation of a flexiblelearning defensive security course. The course covers the CompTIA Security+ requirements andis based on the HyFlex delivery model which was originally developed at San Francisco StateUniversity.This paper discusses how a limited-flexibility model was transformed due to the COVID-19pandemic into a highly flexible delivery model. Specifically, the course went beyond simplyhaving lecture and laboratory components to offering a HyFlex Options Menu where studentsselect between several options for each area of the class. Students were offered the
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jia Zhu, Florida International University; Leila Zahedi, Florida International University; Monique S. Ross, Florida International University
Tagged Divisions
Computing and Information Technology
International University (FIU). Her research interests span the fields of educa- tional data mining, machine learning optimization, and data science. Leila also received an M.S. degree in Management of Advanced Information Systems, in addition to her B.S. and M.S. degrees in Computer Science.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #33523Experience in Moving Information and Computer Technology Courses On-lineDr. Peng Li, East Carolina University American c Society for Engineering Education, 2021Experience in Moving Information and Computer Technology Courses Online1. INTRODUCTIONThe COVID-19 pandemic brought tremendous challenges to higher education institutions. Manycolleges moved most or all courses online, at least temporarily. New technologies, such as highspeed internet and cloud computing, make it easier to deliver courses remotely. It is expectedthat the share of hybrid and online courses will grow [1] with
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Leslie Harvey III, University of Florida; Ashish Aggarwal, University of Florida
Tagged Divisions
Computing and Information Technology
students who submit-ted the quizzes and homeworks 24 hours prior to the submission deadline had significantly higherexam scores as compared to students who submitted during the last 24 hours. Additionally, we alsofound that this difference was only significant for students who did not have prior programmingexperience. This indicates that early submission of assignments can help students who do not haveprior programming experience in improving their overall course performance. By understandingthe major student interaction patterns, we believe that instructors and educators can better designlearning experiences for students in CS1 courses.1 Introduction Computer programming has historically been difficult for students to learn [1, 2]. As
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
D. Cenk Erdil, Sacred Heart University; Kevin N. Bowlyn, Sacred Heart University; Joshua Randall, Sacred Heart University
Tagged Divisions
Computing and Information Technology
continue to collect research data in subsequent cohorts in (cur-rently) Spring 2021 and (upcoming) Fall 2021 sections, our early studentresponses show that new design has improved overall course reviews, whileachieving curriculum guideline goals for common computer organization andarchitecture course design. In addition, course materials that include coreknowledge areas (KAs) have been kept intact, and student feedback showsthat they understand each KA at comparable levels to classical computerorganization and architecture course content.2 MethodIn typical computer organization and/or computer architecture courses,knowledge areas are composed of the following concepts [1]: • Digital logic • Digital systems • Machine level
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhaohong Wang, California State University, Chico; Jing Guo, California State University, Chico
Tagged Divisions
Computing and Information Technology
unrealistic. To address the problem, we developed a novel virtual lab environmentthat sheds light on computer networking by showing students components of typical computernetworks with both hosts and backbone infrastructure using Wireshark and Mininet. The tools weutilized are a packet sniffer and emulated networking testbed. Even though students do notphysically build a computer network as was done in the real lab, they still got insights into apacket’s journey from a source host through routers before getting to the destination host. Ourdata analyses provided the information about the perceptions of these tools for online computernetwork laboratory from students’ perspectives and its associated factors.1 IntroductionThe computer networking
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Mohammad Rafiq Muqri, DeVry University, Ontario, CA
Tagged Divisions
Computing and Information Technology
differential equations.Depending on the application in as to how you define a problem, for different people with theirpeculiar background, Matlab, Maple and Python may end up being 'best' for that application.Actually, often, one will find that a mixture of a symbolic package, and a numeric package (orlibrary), with a little glue programming, will be best. This is because for advanced applications,one probably really wants to do 1. symbolic model manipulation 2. symbolic model simplification 3. numeric model simulation 4. code generation (for efficiency)Some experts have reported that the premise of Matlab is numerical computing. Depending on theapplication, say if one just wants to numerically compute
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Elsa Q. Villa, University of Texas at El Paso; Ann C. Gates, University of Texas at El Paso; Sanga Kim, University of Texas at El Paso ; David S. Knight, University of Washington
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
degrees awarded each year [1]. As such, in 2006 a team of faculty from seven Hispanic-Serving Institutions (HSIs) formed the Computing Alliance for Hispanic Serving Institutions(CAHSI) to create a unified voice for consolidating the strengths, resources, and concerns of HSIsand other groups to address the shortage of computing professionals, especially Latinx. Over time,the number of CAHSI institutions grew; and, in 2018, CAHSI was awarded an INCLUDES grantfrom the National Science Foundation to maximize its national impact using a collective impactframework. For CAHSI INCLUDES to be a successful alliance, it must contribute to reducingthat gap, which is an economic and educational equity imperative [2].The national CAHSI INCLUDES Alliance has
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
overlooked by practitioners and researchers. Additionally, the platform has supportedworkshops organized across the country. Workshops are co-organized with organizations thatoperate large backbone networks connecting research centers and national laboratories, andcolleges and universities conducting teaching and research activities.1. IntroductionGeneral-purpose enterprise networks are capable of transporting basic data, e.g., emails,multimedia, and web content. However, these networks face many challenges when movingpetabytes (PBs) of scientific data, e.g., genomic, climate, imaging, and high-energy physics, [1].As a response, network architects have developed the concept of a Science Demilitarized Zone(Science DMZ or S-DMZ) [2] as parts of a
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Daqing Hou, Clarkson University; Yu Liu, Clarkson University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. I. I NTRODUCTIONHigh Performance Computing (HPC) stands at the forefront of engineering innovation [1, 2].With affordable and advanced HPC resources more readily accessible than ever before,computational simulation of complex physical phenomena is an increasingly attractive strategyto predict the physical behavior of diverse engineered systems [2], such as systems in nuclearsafety [3], outcome of cancer treatment [4], or multidimensional flight stresses on aircraft. Tomaintain the U.S.’s leadership position in HPC production and application [2], and to meet theneeds of the rapidly growing HPC market [5], American institutions of higher education mustproduce a sufficient supply of highly-trained HPC professionals. Sadly, at current rates
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing and Information Technology
effectively and also achieve intended outcome [1, 2]. Sometimes students like toperform additional experiments beyond their assigned tasks. It is usually difficult toaccommodate any extra time due to the lack of available resources to keep the laboratoriesopen. Additionally, laboratory facilities are often inaccessible to the students of otherdepartments within the same institution because of their geographical location. At the sametime too much laboratory equipment lies idle during most of its usable lifetime. Only aremote experimentation facility can provide cost effective and unlimited access toexperiments and maximize the utilization of available resources [3, 4, 5]. Moreover, this willallow inter-laboratory collaboration among universities and
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Yuzhong Shen, Old Dominion University; Anthony W. Dean, Old Dominion University; Rafael Landaeta, Old Dominion University
Tagged Divisions
Computing and Information Technology
animations to the vehiclecomponents and parts under diagnosis and maintenance.This project contains several major tasks: 1) 3D modeling of the vehicle, including all internaland external parts to be displayed in the AR application, 2) 3D printing of the vehicles that onlyrequires the external parts that requires conversion from the file format used in Task 1 andfurther optimization of the model for 3D printing, 3) software development in Unity that utilizesmobile devices and Vuforia to generate the AR application for vehicle maintenance andoperation, and 4) preliminary research on software and information architecture to supportefficient development of AR applications. This project is most relevant to the following ABEToutcomes: 1) an ability to
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
data for a planned multiple semester longer term project.This paper contains (1) motivation and goals for this work, (2) outcomes and learning objectives,(3) instructions on how to design this kind of assignment, (4) the video assignment write up, (5)the rubric for the video, (6) the rubric for peer feedback, and (7) the rubric for reflection. Thispaper focuses on the structure and instruments used during the course.About the CourseArtificial Intelligence (AI) is being used to tackle more and more of the real-world problemsaround us. EECS 4901 Special Topics: Introduction to Artificial Intelligence will introducestudents to the fundamentals of Artificial Intelligence (AI). During this course students will lookat various problems being solved
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Lina Battestilli, North Carolina State University; Sarah Korkes, North Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
found that it takes students more submission attempts in the auto-grader whenthey are given BT Apply/Analyze-type questions that contain some starter code. Studentscomplete the auto-graded assignments with fewer number of submissions when there is no-startercode and they have to write their solution from scratch, i.e. BT Create-type of questions.However, when writing code from scratch, the students’ code quality can suffer because thestudents are not required to actually understand the concept being tested and might be able to finda workaround to pass the tests of the auto-grader.IntroductionThe number of undergraduates seeking Computer Science (CS) degrees has nearly doubled inrecent years 1 . To manage large course enrollments, many CS
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Bonnie Achee, Southeastern Louisiana University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
impact of summer programs in increasing interest in STEMfields is significant [1], [2], [3], [4]. Additionally, [5], [6], [7] confirm that well organized,engaging and experiential summer camps are useful for targeted recruiting. With thisunderstanding, the Lion’s Code Camp began in summer 2019 as a face-to-face camp on the maincampus of Southeastern Louisiana University and utilized the suggestions of [8], on how toorganize and make the camp fun. The Lion’s Code Camp provides an enjoyable summer campexperience for high school students that challenges students academically in the foundationalconcepts of computer science and builds the skills of teamwork, public speaking and relationshipbuilding. The Alice [9] visual programming language was used
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Reza Sanati-Mehrizy, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Divisions
Computing and Information Technology
rules [2] can be included in this ER diagram inthe form of constraints [1]. However, including constraints in this graphical model are just areminder for the programmer to be considered during the database implementation but it is betterto have them included. The problem is that constraint is very rigid and the database becomesprogrammer dependent and there is no grantee that programmer will include them in hisimplementation.An alternative solution for this problem is to implement the constraints in the form of triggers.Trigger is a program and is more flexible than a constraint. Trigger has Event, Condition andAction (ECA) property. When an event take place and consequently a condition becomes true, thetrigger takes action automatically and
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Asuman Cagla Acun Sener, University of Louisville; Jeffrey Lloyd Hieb, University of Louisville; Olfa Nasraoui , University of Louisville
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-WIE. She is also on the leadership team of the Kentucky Girls STEM collaborative network. c American Society for Engineering Education, 2019 USING A DATA SCIENCE PIPELINE FOR COURSE DATA: A CASE STUDY ANALYZING HETEROGENEOUS STUDENT DATA IN TWO FLIPPED CLASSESAbstractThis study presents a data science methodology to integrate and explore disparate student datafrom an engineering-mathematics course. Our methodology is based on exploratory data miningand visualization for analyzing and visualizing raw student data from multiple data sources. Theexploratory analysis serves two purposes, 1) it supports the instructor's desire to gain insightsinto the implementation of a flipped
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Hugh Jack P. Eng. P.E., Western Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
this paper are available forother schools that would like to use and/or modify for their own purposes.[1]IntroductionAdministrative tasks like scheduling require substantial work doing iterations of menialtabulations, analysis, and revision. Most colleges and universities have software that helps withthese tasks, but it is not well suited to a technical curriculum with extensive prerequisites,laboratory/equipment/software constraints, and faculty availability. The result is a lot of manualprocessing of spreadsheets and timetables.At Western Carolina University (WCU) there are five residential undergraduate programs thatshare a number of courses. In addition, there are two undergraduate programs that are offeredoff-campus and a residential and