Integration (CMMI) is the culmination of an effort to define thestages that software organizations pass through as they gain better and better control overtheir processes. The effort was kicked off by the US Department of Defense and undertakenby the Software Engineering Institute (SEI) at Carnegie Mellon University. The originalproduct that most software developers are familiar with is CMM and it was designed tomeasure the process maturity of a software development organization.In the 1990’s, a veritable galaxy of quality frameworks emerged and CMM was divided intoversions for software development (SW-CMM) and versions for software engineering(SECM) and product development (IPD-CMM). Later in the decade, SEI began an effort tointegrate all of the
]. Big Data growth has accelerated thedevelopment of new smart technologies that can support the unique demands of big data. Smarttechnologies such as MapReduce/Hadoop, Spark, NoSQL, data virtualization, data lake, cloudcomputing, Artificial Intelligence (AI), Natural Language Processing (NLP) and MachineLearning (ML) have an impact on our daily lives and will continue to be an integral part of ourfuture [3]. They have transformed the way we practice medicine, communicate, processinformation and make business decisions [1]. The use of smart technologies are evident in manydomains including retail, finance, medical, engineering, government, penal, social media andcomputing [1] , [3]. Together Big Data and new smart technologies have given rise to
, various autonomous and semi-autonomous devices assist us in ourhome, work, and during travel [1], [2]. Some of these instruments can operate seamlessly,making us a step closer to achieve one of the digital age’s visions that identified by Weisser (see[3]). Incredible as it is, most people believe this is not the peak of technological advancementsand expect science and technology will continue to grow for an indefinite time. Nowadays, manybusinesses and industries prefer to utilize technology-integrated solutions when addressingproblems, which then shaped the expected skill set of next-generation professionals [4], [5] andinspired numerous state legislators [6]–[10] to integrate computer science (CS) problem-solvingapproaches in their respective K
; and an understanding of the complex societal, global, andprofessional contexts in which engineering is practiced” [4]. ABET’s accreditation standardsrecognize the fundamental importance of these skills, many of which are learning outcomestied to the humanities.Finally, this exercise introduces the story of Ada Lovelace as a female role model and founder ofcomputer science. Psychologist Penelope Lockwood’s suggests that women benefit fromoutstanding female role models more so than men, for whom the gender of the role modeldoes not have an impact [19]. We therefore suggest that using Ada Lovelace as an historicalrole model in engineering curriculum can help engineering and science students revise
cybersecurity education including the participation of women. She is an author or co-author of over 30 peer-reviewed journals and conference proceedings in these areas. She is a member of the IEEE Computer Society, ACM, ACM-W, Women in Cyber Security (WiCys), SWE(Society of Women Engineers), and NCWIT(National Center of Women in Technology).Brandon Earwood, Texas A&M University-San AntonioDr. Young Rae Kim, Texas A&M University-San Antonio Young Rae Kim, youngrae.kim@tamusa.edu, is an assistant professor of mathematics education in the Department of Curriculum and Instruction in the College of Education and Human Development at Texas A&M University-San Antonio. His research interests focus on how students
“ innovative curriculum.”Choosing specific keywords with more semantic meanings can be a double-edged sword. It mighthurt publication’s visibility, as suggested by the STP framework, unless the exact and specificterms are used in the scholarly literature search by the pertinent audience. To investigate this issuein the future, an in-depth nuanced analysis will be necessary and helpful. One approach to furtherthis work is to generate semantic-based clustering keyword lists. We also believe that manuallycoding keywords list into groups with related themes will benefit the nuanced analysis to evaluatefurther and validate the research foci.As to the keywords extraction from the abstracts, similar semantic-based issues remain. The cur-rent results reported
Paper ID #21287Applied Computing for Behavioral and Social Sciences (ACBSS) MinorDr. Farshid Marbouti, San Jose State University Farshid Marbouti is currently an Assistant Professor of General Engineering at San Jose State University. He completed his Ph.D. in Engineering Education at Purdue University. He has an M.A. in the Educational Technology and Learning Design and an M.S. and B.S. in Computer Engineering. His research interests are engineering design education, feedback, and using learning analytics to improve first-year engineering students’ success.Dr. Valerie A. Carr, San Jose State UniversityProf. Belle Wei
summary, this multi-staged project forced students to rethink their designs many timesconsidering the security level of the system. It showed them the importance of building a securesystem at the design stage. IoT and computer security cannot be an afterthought, it must be thefoundation of design.Additional stages can be designed and integrated to the current project depending on the coursethe knowledge level of students in the class.Results and DiscussionTo use this Raspberry Pi kit in classes, instructors need to be aware of students’ knowledge levelon Python programming and using GPIOs in Raspberry Pi. It is noticed that CS students lack somehardware skills in general, while engineering students lack some Python programming knowledge.It is
; • Potentially violate academic integrity by using paid-resources or soliciting help from online forums; and • Simultaneously enroll in an online school or MOOC of the same curriculum while enrolled in a face-to-face class.The high tech classroom and taped lectures are no longer unique to the FC model. If notfacilitated by the instructor, students will structure their learning in an online environment.Instructors should provide these resources to all class models to ensure that students are usinghigh quality material and not paying for it out of pocket—a significant concern for universitieswith low-income students. For example, instructors can provide recordings of modeledexamples, so students do not feel
mental models andconnecting the model to prior knowledge. They posit that the ability to extract key ideas fromnew material and integrate it into existing mental models leads to development of mastery overcomplex content.In the context of an undergraduate course on computer networking, topics such as configuring,securing, troubleshooting, and managing routing across subnetworks in the computer networkingarea require the student to develop a practical hands-on understanding of network models,protocols, hardware, cabling, subnetting, routing and switching. This encompasses a large set oftheoretical and practical competencies. While there are several resources available for learningabout these topics, according to [3, p. 9] commenting on the
andimplement the original are proposed. However, in case of difficulty to adopt the original designas in the currents case study. An updated design is suggested to overcome the complicationsescalated on the original design. The new design and its implementation is discussed in details.Partial integration of the system is presented due to the lack of full integration results to date.The benefits and drawbacks to students are highlighted to show the potential of the labenvironment to student success. Finally a summary for course curriculums are emphasized toshow the capabilities of the lab environment to introduce a successful learning experience.ReferencesAmazon®. (2017). Amazon EMR Product Details. Retrieved from https://aws.amazon.com/emr/details
security problems, balancing business concerns, technical issues and security. ▪ Effectively communicate technical information verbally, in writing, and in presentations. ▪ Use appropriate resources to stay abreast of the latest industry tools and techniques analyzing the impact on existing systems and applying to future situations. ▪ Explain the concepts of confidentiality, availability and integrity in Information Assurance, including physical, software, devices, policies and people. Analyze these factors in an existing system and design implementations.These concentration outcomes enable CAC of ABET learning outcomes for computer science andcybersecurity. Some of the practices that are used in these courses
at Reynolds Community College in Richmond, Virginia in 2009 and moved to VCU in August 2016. Debra has served on the advisory board for Lighthouse for Computer Science (LH4CS). The goal of the Lighthouse project is to improve computer science diversity through faculty professional development. In addition, she is a member of the Advisory Council for the Deep Run High School’s Center for Informa- tion Technology in Glen Allen, Virginia, where she provides program support and assists in curriculum development for their technology-based preparatory program for future computer scientists.Dr. Mandayam Thirunarayanan, Florida International University Mandayam Osuri Thirunarayanan is an associate professor in the School of
products.The widespread adoption of LDAP is due to its flexibility, scalability, and compatibility. A computer network related program named Computer Network & System Administration (CNSA) was introduced at MichiganTechnological University in 2003 [3]. The purpose of this program was to serve the needs of industry by educating and training studentsto succeed in the field areas of systems administration and network engineering, with an emphasis on network security. An integral partof the CNSA curriculum is a three credit hour course on Directory Services (DS). In the DS course, students are exposed to topics like planning, designing, implementing and troubleshooting various directory serviceproducts, including Microsoft Windows Active Directory
; connected communities, and securing cyber-physical systems [4,5], we are not aware that currently exist an educational model that integrates cyber security as partof STEM curriculum. The program’s goal is to broaden knowledge of our STEM graduates to beaware of cyber issues as engineers. The curriculum is shown in Figure 1, where 4 tracks areavailable for the student’s interest and major of study. The courses within each track are existingcourses with security content added to them. Figure 1: Cyber-informed engineering curriculum for STEM majors. Each track gives the students an opportunity to earn a security certificate as part of their undergraduate degree. The color of boxes has no special meaning.The introductory
Paper ID #33383Broadening the Middle School Computational Thinking Interventions Be-yondBlock ProgrammingDr. Mohsen M. Dorodchi, University of North Carolina at Charlotte Dr. Dorodchi has been teaching in the field of computing for over 30 years of which 20 years as an educator. He has taught the majority of the courses in the computer science and engineering curriculum over the past 20 years such as introductory programming, data structures, databases, software engineering, system programming, etc. He has been involved in a number of National Science Foundation supported grant projects including Scholarship for STEM
Engineering and Sciences (AES) department. Thecollege is part of a larger university and being an urban commuter campus, its mission is as muchon giving students real-world experiences as it is on providing a sound liberal arts education.With a setting in the largest city in the state, many opportunities arise for students to enhancetheir post-graduate skills with an extensive professional development curriculum. With over 25years of history supporting Capstone, faculty members in the AES department have formulatedseveral approaches to this professional development. From a more traditional approach ofhosting a semester long project where students are embedded with industry partners, toindividual or small group projects either with a faculty member or
to more advanced tools that will enable them to explore and experiment with networkarrangements where the integration of the physical and emulated devices are required. With theexercises as a starting point, we will rapidly be able to exercise more sophisticated applicationsfor a wide range of algorithms, such as OSPF and BGP. More importantly, we will be able toenhance the undergraduate curriculum to include programming assignments for the students todevelop their skills further in modifying and creating new applications and algorithms that wouldhave been nearly unattainable in the traditional networking environment.It should be noted that more research needs to be done on the overall effectiveness of hands-onlearning. The effectiveness of
Paper ID #31526The CAHSI INCLUDES Alliance: Realizing Collective ImpactDr. Elsa Q. Villa, University of Texas at El Paso Elsa Q. Villa, Ph.D., is a research assistant professor at The University of Texas at El Paso (UTEP) in the College of Education, and is Director of the Center for Education Research and Policy Studies (CERPS). Dr. Villa received her doctoral degree in curriculum and instruction from New Mexico State University; she received a Master of Science degree in Computer Science and a Master of Arts in Education from UTEP. She has led and co-led numerous grants from corporate foundations and state and
experience andprepare them for work. Like many engineering programs, students at Utah Valley University(UVU) complete their requirements for graduation with a semester long capstone design projectcourse. The intention of this course is to apply competencies gained during their first three yearstoward the solution of an embedded system design problem.Educational excellence requires exposing students to the current edge of research. To ensure thatstudent projects are along the same trajectory that the industry is moving, educators continuallyintroduce emerging techniques, practices, and applications into the curriculum. Advances inwireless sensors have opened new opportunities in healthcare systems. Sensor-based technologyhas invaded medical devices
are a number offactors that hinder acceptance of remote laboratories as a part of a curriculum. These are:Integration of a number of disciplines into remote experimentation design; Modularity indesigns; Readily available commercial products; Integration of learning management system;Maintenance and training; Administrative awareness and support; and Industry applications.The first part of the paper will discuss these issues and will highlight how we can moveforward in a coordinated manner so there will be a viable remote experimentationinfrastructure with a high degree of acceptance.Historically remote laboratories are developed by utilizing personal computers orworkstations as the main controller unit on the experiment side and a local
and Tagg’s learning paradigmarticle provides us with a valuable insight about the kind of change that is urgently needed inUniversity Higher Education (Barr & Tagg 1995). The author has previously utilized these ideasin several of his ASEE publications and presentations (Narayanan, 2007 & 2009).Assessment Scholars agree that Assessment is a process in which rich, usable, credible feedback froman act of teaching or curriculum comes to be reflected upon by an academic community, andthen is acted on by that community, a department or college, within its commitment to getsmarter and better at what it does (Marchese, 1997, page 93). The National Research Councilsays that High-quality Mathematics Assessment must focus on the
this course are offered with total enrollment varyingbetween 115 to 255, this number is expected to rise. This course has CS1 as a prerequisite so weexpect students to have some programming experience. We chose to use python in this course, asit is easy-to-use across many topics. It is a bonus that this allows us to introduce a language that isotherwise not a standard part of our lower-division curriculum.Our experience working with undergraduate research students helped inform our decisions abouttechnologies and approaches for this course. Mentoring undergraduate research students as theylearned python, git, and SQL helped reinforce the need for these topics in our curriculum andprovided an opportunity to try various tutorials, IDEs, and
[school anonymized for publication] change as a result of your internship? How will yourexperiences this summer shape your approach to next quarter and beyond?” at the end of their internship.This mixed-methods approach helps us track students’ motivations, perspectives, and plans for action andsituates their internship as an integral part of their CSE undergraduate education.B. Background 1) The role of motivation in learning: Motivation is critical to learning and leads one to pursueand continue to pursue an objective [1, Part II]. Importantly, motivation is believed to be an emergentphenomenon, meaning it can develop over time and be updated based on new experiences. As described in[2], self-efficacy theory [3] and situational interest
computing have facilitatedthe development of cloud computing services. Cloud computing is an approach for deliveringapplications and services, on demand, over a private or public network, by leveraging efficientresource pooling of virtual infrastructure. Using virtualization and cloud computing technologiesin education could help lessen hardware costs, increase the availability of resources, andaccelerate deployment of new curriculum material [4] - [8]. Some studies indicated that studentsconducting virtual labs performed as well as students using physical labs in a traditionalenvironment [9], [10].In a decentralized, individual approach, the virtual environment is hosted on students’ personalcomputers. Examples of software we used include VMware
," IEEE IT Professional, vol. 12, no. 1, pp. 14-23, 2010.[4] A. Andress, Surviving Security: How to Integrate People, Process, and Technology, Boca Raton, FL: Auerbach Publications, 2003.[5] S. A. a. L. S. Jane LeClair, "An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce," in InfoSecCD '13: Information Security Curriculum Development Conference (InfoSecCD '13), New York, NY, USA, 2013.[6] N. Swain, "A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA)," in American Society for Engineering Education, 2014.[7] L. H. R. H. Costis Toregas, "Exploring Ways to Give Engineering Cyber Security Students a Stronger Policy and Management
Networking Networking Women community since 2010, serving as mentor, fellowship co-chair, and workshop co-chair She was co-chair of the board of Networking Networking Women from 2016-2018.Prof. Alark Joshi, University of San Francisco Alark Joshi is an Associate Professor in the Department of Computer Science at the University of San Francisco. He was a co-PI on the IDoCode project at Boise State University that provided teacher train- ing, curriculum development, and policy changes in the State Board of Education in the state of Idaho. Currently, he is a co-PI on the S-STEM proposal focused on engaging students in the local community to enable successful outcomes for them with respect to increased self-identity, better
Officer (CISO)) since field certification may bethe only validation of such skills. Therefore, this work-in-process seeks to investigate the use ofa framework to examine the degree to industry employment skill variance, if any, betweenindustry and academic preparation and the perceived required skills that each group expects thegraduate to have mastered.Previous research used a systematic approach, such as DACUM, to integrate the perceptions ofpractitioners in the field with that of the academicians to establish the desired curriculum. Thisprocess is especially useful when the degree is designed to meet emerging new occupations orjob titles, such as the Chief Information Security Officer [2][3]. However, little research can befound that uses the
data framein the pre-program data was not collected from an identical frame in the post-program datacollection. In effect, this would bolster the representation of women in their programs notbecause more women were recruited, but because the set of units used for the data wereexpanded to include new, more gender-balanced sub-disciplines. However, because ES-UPrecommends creating these types of program expansions or features (“multiple pathways”) as away to increase women, variation in the data frame speaks to the benefits of using this strategy.Nonetheless, the authors were not able to identify if this had occurred among the seven schoolsused in the study.References[1] U.S. Department of Education, “Integrated Postsecondary Education Data
environment (ALOE) to provide a practical learning environmentthat facilitates developing many of the needed technical and soft skills without the inherentdifficulty and cost associated with radio frequency components and regulation. We define sixlearning stages that assimilate the standardization process and identify key learning objectivesfor each. We discuss our experiences when employing the proposed methodology at BarcelonaTech in Spain, compare the approach with an equivalent class at Virginia Tech in the US andmake the following observations: (1) The complexity of standards need to be abstracted andpresented in a form suitable for a given class. (2) Educating about cellular communicationsstandards is most effective when students are immersed