program are listed. Items (a) though (h) are more or less similarto Electronics Engineering Technology (EET) program and there is no need to cover them here.However, items (j) and (k) will be explained in detail. 2Courses in REET program include:(a)- COMMUNICATION SKILLS(b)- HUMANITIES, SOCIAL SCIENCES©- MATHEMATICS AND NATURAL SCIENCES(d)- PERSONAL AND PROFESSIONAL DEVELOPMENT(e)-TECH CORE COURSES(f)- AUTOMATION AND ELECTRICAL SYSTEMS(g)- INFORMATION SYSTEMS AND PROGRAMMING(h)- APPLICATION DEVELOPMENT(i)- TECHNOLOGY CAREER PREPARATION(j)- SENIOR PROJECT(k)-SPECIALIZED COURSESIn the following, specialized courses in REET program will be addressed.REET 100 Alternative Energy Technologies with LabThis
Paper ID #30661Cybersecurity Awareness and Training Through a Multidisciplinary OSINTCourse ProjectAlyssa Mendlein, Temple University Alyssa is a PhD student in the Department of Criminal Justice at Temple University. She earned a Bachelor of Arts in Psychology from Boston University and a Master of Philosophy in Criminological Research from the University of Cambridge. She is now working on an NSF CAREER grant for Dr. Aunshul Rege, exploring adversarial decision-making and cybersecurity education innovation.Ms. Thuy-Trinh Nguyen, Temple University Trinh is a PhD student in the Department of Criminal Justice at Temple
faculty perceived their experience, and how they performed comparedto other common course sections/topics. The last two sections include discussions of thechallenges we faced as well as the conclusion and future directions.Literature ReviewWhile highly technical courses in cybersecurity are essential for students training for a career inthe field, there exists a broader need for non-majors to understand the basics of cyber dangers andprotections from them. Although all of our students regularly use the internet and may besomewhat aware of dangers and security risks, most do not know how to protect themselves andact responsibly in many online situations [13].There are arguments that courses in computer science should be considered a core science
Engineering Education. He is Founding General Chair of the IEEE International Electro Information Technology Conferences. Hossein served as 2002/2003 ASEE ECE Division Chair. He was IEEE Education Society Membership Development Chair and now serves as MGA Vice President (2013/2014) and Van Valken- burg Early Career Teaching Award Chair. Dr. Mousavinezhad received Michigan State University ECE Department’s Distinguished Alumni Award, May 2009. He is recipient of ASEE ECE Division’s 2007 Meritorious Service Award, ASEE/NCS Distinguished Service Award, April 6, 2002, for significant and sustained leadership. In 1994 he received ASEE Zone II Outstanding Campus Representative Award. He is also a Senior Member of IEEE, has
- dedicated to innovation in traffic safety and public safety technology, as well as research in decision support systems, data analytics and cybersecurity. Throughout his career and through his work with CAPS, Dr. Parrish has obtained approximately 200 funded projects totaling approximately $100M from a variety of state and federal sponsors. Dr. Parrish has published in approxi- mately 100 refereed journals and conferences, and is internationally active in computer science education, having served as the Chair of the Computing Accreditation Commission of ABET, and currently is chair of a major effort to revise the computing accreditation criteria and to develop new accreditation criteria for cybersecurity. Dr. Parrish
graduate study and encouraged them to choose a career pathinvolving research. We observed that the students developed more intellectual confidenceas they were succeeded in hands-on experiences and application implementation. Theybenefited greatly when collaborating with other students who share their commitment toscience, mathematics, and engineering. The project also advanced the research skills of theundergraduate students and enhanced the research and employment opportunities for thesestudents. Shortly after joined this project, one student was offered an on-campus researchassistantship by the 1890 Land Grant Research Project III. And another student was invitedto a NASA summer student research fellowship.References:1. Columbus L. 80% Of
raisethe academic success level, guide students through their career path, as well as being a beneficial © American Society for Engineering Education, 2021 2021 ASEE Conferencefactor for the university/campus and those associated. Interaction among the associated membersplay a vital role in the overall operation of universities across the nation.In UML model, a system can be described with various types of diagrams from different leveland aspects of views. This leveled structures document the system in a set of systematicpredefined diagrams – class diagrams, state diagrams, use case diagrams, sequence diagrams,activity diagrams, and so on. Use Case Diagrams describes the sequence
Institute of Technology in Chicago. Dr. Rahman has worked as a chemical engineer at a urea fertilizer factory, after which he pursued a career as a software developer in the securities industry. He worked for 13 years at the Chicago Stock Exchange developing real-time trading software. Since receiving his Ph.D. in the year 2000, Dr. Rahman pursued a career as an educator and taught at Illinois Tech, University of West Georgia, and finally at Clayton State University. Dr. Rahman is passionate about teaching and cares about student learning. His research interests include computation linguistics, bioinformatics, and computer science education. American c
recommendations on how SEP-CyLE should be implemented in classrooms.The main contributions of this work are as follows: 1. The cyberlearning environment or tool that was developed with funding from the NSF was considered to be useful and user friendly by students who used the tool. 2. Gamification was considered by students to be motivating. 3. Students suggested that the tool should be used as an integral part of the course rather than as an add-on.1 IntroductionEmployment outlook for students with computer science degrees is very good. The United StatesDepartment of Labor Statistics has predicted a 24% rise in employment for software developersin just ten years from 2016 to 2026 [1]. A highly-compensated career with high demand that
and students were exposed toresearch collaborations in different STEM fields.Undergraduate research experiences have been shown to increase confidence, sense of belongingand prove a pathway to a scientific career for minority students, and the data indicate that mostof these students intend to continue on this path [20, 21, 22]. In addition to engaging students inresearch projects, the likelihood of women and minorities to continue in a scientific discipline isfurther increased if the problems have a valuable connection to society [23, 24]. Our real-worldproject topics were of high interest to the students who appreciated their practical, scientific andenvironmental importance. The cross-course disciplinary setup encouraged teamwork
complete in one academic year. It was understood by the companythat most of the students would be graduating and starting professional careers after thecompletion of their degrees. In the fall semester proposals were drafted and aggressive scheduleswere put together. By the winter break working prototypes of all three systems, mechanical,electrical and software, were demonstrated. It was the hope of the company to be ready tomanufacture at the conclusion of the spring semester. As with most student projects, issuesslowly started to materialize that would impede demonstrating a commercially ready solution inthe time frame desired by the company.By the end of the academic year, a fully functional software system was demonstrated. Theelectrical
Harden’s curriculum map different biological topics such as hypertension are nested inside amore general topic such as cardiovascular systems 14 .Graph-based methods and hierarchies quickly provide an overview of the curriculum but theydon’t often consider the paths that students take through the curriculum (as measured by studentlearning data) or the temporal aspects such as when in their academic careers students are takingeach course. Including student data is important because the intended curriculum is not alwaysfollowed by students as prescribed. In our review we found two examples that consider thecurriculum temporally. Trimm et al. show students’ risks of not graduating over the course of thecurriculum 26 . Plaza et al. compare
Association) 2020survey [11] respondents say their cybersecurity teams are understaffed and 56% of the (ISC)2[10] survey respondents accept their institution is at risk. According to various reports, about40% of junior-level and over 50% senior and manager level security jobs are vacant and CyberSecurity job postings took 8% longer to fill than other IT job postings overall. In a lot of cases,even the people who should know how to do this job and know how to run these systems do noteven exist. [12]One of the challenges faced in addressing cyber workforce issues is the well documentedshortage of STEMC (Science, Technology, Engineering, Mathematics, and Computing)graduates with technical proficiency [11]. While STEMC careers in academia and industry
Paper ID #32388Lovelace’s Program: A Challenging but Achievable Assignment forUndergraduate Students in Engineering and Computer ScienceDr. Erica Haugtvedt, South Dakota School of Mines and Technology Dr. Erica Haugtvedt is an assistant professor of English and Humanities at South Dakota School of Mines & Technology. She received her PhD in British nineteenth-century literature from Ohio State University in 2015.Dr. Duane L. Abata, South Dakota School of Mines and Technology Dr. Abata has worked in academia for over forty years at universities and with the Federal government around the country. He began his career at the
systems (integration and testing) and the reliability and maintainability of complex systems. He has been selected as both a NASA and an ONR Faculty Fellow. He regularly teaches courses in Ma- rine Engineering and in Maintained Systems. Most recently Dr. Dean was on the Headquarters Staff the American Society of Naval Engineers. He received his Ph.D. from the Department of Engineering Management and Systems Engineering, and a B.S. in Nuclear Engineering Technology, from the Batten College of Engineering and Technology at Old Dominion University. Additionally, Dr. Dean received an MBA from the College of William and Mary. Prior to is academic career Dr. Dean was Director of Operations and Business Development for Clark
Master’s Degree in Computer Science. The Bachelor ofScience in Computer Science program was one of the first Bachelor of Science programsimplemented at UVU in 1993. The program’s goal has been to provide a quality program thatmeets accreditation standards while providing the students with a skill set that allows them tosucceed in computing careers. The curriculum content for the Computer Science degree is basedon the 2001 ACM Curriculum Report. The Computer Science degree at UVU was accredited byAccreditation Board for Engineering and Technology (ABET) in 2002 and currently has morethan 1,200 students. Students in this program take core courses until the first semester of theirjunior year, when they begin choosing their electives for different
Technologists) project. Since September 2016, she co-leads the NSF STEM+C project, Curriculum and Assessment Design to Study the Development of Motivation and Computational Thinking for Middle School Students across Three Learning Contexts, that builds on TECHFIT. Professor Harriger’s current interests include outreach to K-12 to interest more students to pursue computing careers, applying IT skills to innovating fitness tools, and wearable computing.Suyash Agrawal, Purdue University Suyash Agrawal is currently pursuing M.S.(2019) in Computer Information Technology from Purdue University. He received his B.S.(2014) in Information Technology from JSSATE, Noida, India and then worked at Nokia as a software developer. His
and its design details is missing in the literature. 3. THE PROPOSED APPROACHIn the past, observing the shortcomings of the “top-down” approach missing technical designdetails, we taught the RTOS in a “from scratch” way by showing the internal design andimplementation of RTOS. The “from scratch” design is denoted as EOS. We wished to equipstudents with the ability of learning any new RTOS in their future career after understandingEOS. However, we still felt that the “from scratch” may be further improved by also showing acommercial RTOS. Our hypothesis was that the “from scratch” approach may miss thedeployable convenience of a commercial RTOS, and the “top-down” approach misses technicaldetails that the “from scratch” may
department which offers abachelor’s degree in Computer Science with two areas of specialization – Computer Science(traditional) and Computer Networking. It also offers a Software Engineering degree. TheBachelor of Science in Computer Science program was one of the first Bachelor of Scienceprograms implemented at UVU in 1993. The program’s goal has been to provide a qualityprogram that meets accreditation standards while providing the students with a skill set thatallows them to succeed in computing careers. The Computer Science degree at UVU isaccredited by Accreditation Board for Engineering and Technology (ABET) in 2002 andcurrently has more than 1200 students.Computer Engineering Program’s Senior Design Project CourseOur Senior Design Project
Engineering major could be taking classesconsistent with a Computer Engineering major and not bother to officially change major untilthe graduating semester. Changes of major early on in a student’s career can have little to noimpact on time to graduation if the majors involve have similar early requirements; forexample, the first two to three semesters for majors in the School of Engineering and ComputerScience all include “Introduction to the School, Major” classes, Calculus, Physics, Programming,Linear Algebra. Calculus and Physics are common to all ECS majors; while the “Introduction tothe Major”, Programming, and Linear Algebra classes differ, the policy is to accept thecompleted version as a replacement for the requirements in the new major due
in item wording,such as the addition of a neutral response option.6 A Retrospective Pre-Post Test (RPT)methodology [19] was used on six items to reduce rater bias and to increase evaluationefficiency for the classroom. Surveys asked participants to provide ratings of agreement pre-and-post taking the CTL course on statements related to their interest in a career in computerscience, plans to major in computer science, plans to earn a degree in computer science, andfeelings of belonging in both Intro CS and the CTL. Students in the CTL were also asked toprovide ratings of expertise in computer science both pre-and-post CTL. As all wereconcurrently taking Intro CS, ratings on these surveys reflect impact of the combination of IntroCS with the
, SamsungOdyssey and HTC Vive. This was done in order to test compatibility with multiple VR types, therationale for doing so shall be explained later in this paper. The lab experience was designedfollowing a real-world lab that UVU is creating for students to use once they have tested andgrown their abilities in VR. Upon completion of the VR lab, students were asked to test thevirtual reality experience. Before and after testing the VR etching lab students were givensurveys about their prior experience with VR as well as their thoughts on the VR etching lab.The results from which researchers will utilize to improve said lab and make any adjustmentsnecessary to increase its potential in helping students prepare for careers in the
. 727–752, Mar. 2010.[6] R. Mitchell and I.-R. Chen, “A survey of intrusion detection techniques for cyber-physical systems,” ACM Comput. Surv., vol. 46, no. 4, pp. 1–29, Mar. 2014.[7] D. H. Tobey, P. Pusey, and D. L. Burley, “Engaging learners in cybersecurity careers,” ACM Inroads, vol. 5, no. 1, pp. 53–56, Mar. 2014.[8] T. R. Flushman, M. Gondree, and Z. N. J. Peterson, “This is not a game: early observations on using alternate reality games for teaching security concepts to first-year undergraduates,” Proceedings of the 8th USENIX Conference on Cyber Security Experimentation and Test. USENIX Association, pp. 1–1, 2015.[9] D. Dasgupta, D. M. Ferebee, and Z. Michalewicz, “Applying Puzzle-Based
engineering, and mechanical engineering. These technologies bring a lot oflearning opportunities for technology students. If prepared with necessary skills, they can launcha successful career as an autonomous vehicle engineer. 17Bibliography[1] National Safety Council, "2017 Estimates Show Vehicle Fatalities Topped 40,000 for Second Straight Year," 17 January 2019. [Online]. Available: https://www.nsc.org/road-safety/safety- topics/fatality-estimates.[2] National Highway Traffic Safety Administration, "Critical Reasons for Crashes Investigated in the National Motor Vehicle Crash Causation Survey," National Highway Traffic Safety, Washington, DC, 2018.[3] L. Bell, "10 Benefits of Self
Internet and the usage of computer and mobileapplications, the need for cybersecurity professional and experts will continue to expand.Therefore, graduating students who have proper cybersecurity instruction becomes a necessity.This can be achieved by incorporating modern security analysis tools and engaging students inbuilding secure systems throughout the undergraduate curriculum. The primary goals are: 1) tohave more systems and products with fewer exploits and vulnerabilities, and 2) to increase thenumber of professional individuals who are interested in cybersecurity careers and have the propercybersecurity knowledge and training.One key challenge in implementing and designing cybersecurity exercises in classrooms is havingthe proper
Chair and Co-Chair for 12 international conferences. For recognition of my research activities, I have been invited to a number of international conferences as Invited Speaker, chaired panel discussions and numerous international conference sessions. I have served on more than 200 international conference program committees. Furthermore, I have published number of articles in peer- reviewed international journals and conferences. I am also an active member of ACM, ASEE, ASEE/PSW and CSAB.Mrs. Catrina Ann ShanasMs. Ashley Pratt, National University Ashley Pratt was born in Fontana, California and from an early age she had high expectations for herself. One of her first career aspirations was to be an astronaut, she
Paper ID #27110Board 27: Boardnotes 2.0 in Computer Networking: Organizing and Repre-senting Meaningful Technical Information Graphically for Improving Learn-ing CompetenciesDr. Vigyan Jackson Chandra, Eastern Kentucky University Vigyan (Vigs) J. Chandra, Ph.D., serves as a professor and coordinator of the the Computer Network Se- curity & Electronics Technology related programs offered within the department of Applied Engineering & Technology (AE&T at Eastern Kentucky University. He earned his master’s and doctoral degrees from the University of Kentucky in Electrical Engineering; a master’s in Career and Technical
c American Society for Engineering Education, 2018 Paper ID #22994is currently serving as the executive director of MnCyber. He is also the co-founder and executive memberof Minnesota Cyber Career Consortium (MNC3) whose mission is to address Minnesota’s cybersecurityworkforce needs and to help assist Minnesota businesses in handling cyber risks.Dr. Kaleem has established a solid track record in teaching and has received numerous awards includingthe best professor and the best course awards (cybersecurity) from various graduating cohorts. Dr. Kaleemis an advisory board member to various organizations as well as the faculty advisor for the
from multiple departments into a single stream.Creation of cybersecurity clusters provides opportunities for lateral collaborations among facultyacross departments. For example, students from computer science background may not getexposure to criminal law and justice, thereby not appreciate the value of digital forensics whenthey are merely exposed to forensic tools and techniques. Interdisciplinary degree programsprovide a holistic view of the cybersecurity space and also provide opportunities for students topursue niche career paths due to the exposure to such breadth and depth of topics. Theknowledge provided by faculty from varied disciplines also help students gain insights throughthe lens of each discipline.5. Observations and
succeeding in CS career [5], and the further they go, the moreThe gender parity in the field of computer science (CS) is evident insecure they feel. This anomaly only grows by indirectly forcingin education, workforce and research. This study, explores the women in CS to quit CS due to the struggles they encounter. Someintroductory computer science class in an attempt to understand the researchers have found female graduate students in CS to lack self-low retention of women in CS. As means to encourage the retention confidence when compared to men [5]. This stereotype also playsof women in this class in the department of computer science at the a role in pushing women away from CS at young ages [2]. ThisUniversity of Minnesota