Asee peer logo
Displaying results 31 - 37 of 37 in total
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
associated, Bias/Variance Classification Tree based approaches, Neural Networks, Bayes Classifier, Classification modeling, Discriminative Classifications Ethics Privacy, Security, Data Leaks, Biases, Confidentiality, Societal consequences Error measure Evaluation of Models, Confusion Matrices, ROC Graph Association Rules Association Rule Mining, Patterns in frequent
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Nikole Harper; Hasan Muqri; Brian Keith Wesr Sr.
Tagged Divisions
Computing and Information Technology
1 0 0 Signal 3 2 1 1 Processing Electronics 2 3 1 1 Power Systems 5 7 2 4 Computer 4 5 1 1 Systems Control Systems 7 6 1 1 Communication 6 4 2 2 s Ethics 8 6 2 4 Total
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, they are suitable for thecosine similarity algorithm. Lastly, the text-based messages posted by students in their studygroups are analyzed and compared based on the measure of TF-IDF (i.e., term frequency-inverse document frequency). TF-IDF is broadly used by the content-based recommendersystems to compare the similarity between two pieces of textual contents [17-18]. The morefrequently two students use the same set of keywords, the more similar they are considered. Itshould be noted that, in consideration of ethics, the content analysis of group discussions canbe disabled in practice. The instructor is enabled to select whether he/she prefers to place themost similar/different students in the same study group.Figure 7 illustrates the system
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephen Michael MacNeil, University of California, San Diego; Mohsen M. Dorodchi, University of North Carolina at Charlotte; Erfan Al-Hossami, University of North Carolina at Charlotte; Aileen Benedict, University of North Carolina at Charlotte; Devansh Desai, University of North Carolina at Charlotte; Mohammad Javad Mahzoon, Core Compete Inc.
Tagged Divisions
Computing and Information Technology
courses that everystudent in the major is expected to take. As a result, these nodes are larger in the visualizationbecause more students take them. Because these courses represent the foundational aspects of thecurriculum, core courses are often spread across the curriculum and are very carefully sequencedthrough the use of prerequisites. This expectation is confirmed in Figure 7.What was surprising about this constellation is that one of the core courses was taken very late inthe curriculum (circled in red). By hovering on this node, we saw that the course is about theimpact computers have on society. A topics course about ethics and trends in computing, studentsmay take this course later in the curriculum to offset some of their more time
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Florida-Georgia Louis Stokes Alliance for Minority Participation (FGLSAMP). She is a past adviser of the Women in Computer Science (WICS) student club. From 2008 to 2010, Ms. Solis was a programmer analyst at the Department of the Attorney General in Hawaii, a member of the team revamping the State Juvenile Justice Information System. Her research and instructional Interests include programming languages, computer ethics and student success and development.Dr. Deepa Chari, Florida International UniversityZahra Taheri Zahra Taheri has studied psychology and her interests focus on human development, women and minori- ties in STEM. c American Society for Engineering Education, 2019Exploring
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
○ Secure coding practices, ethical hacking and threat modeling ○ Security architecture ○ Security concepts related to DNS, routing, authentication, VPN, proxy services and DDOS mitigation technologies ○ TCP/IP, computer networking, routing and switching ○ Windows, UNIX and Linux operating systemsWhile the previously listed set of skills are key to organizations looking to fill the CISO position,many organizations included certain certifications they deemed crucial for the CISO position.The next section examines the certifications most organizations indicated as important for theCISO position.Value of IT certifications to the IT security industry to obtain gainful employmentThere are three
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A. Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
research and instructional Interests include programming languages, computer ethics and student success and development. American c Society for Engineering Education, 2021 Uneven Playing Field: Examining Preparation for Technical Interviews in Computing and the Role of Cultural ExperiencesAbstractWhile starting a career may be challenging in any field, in computing the process tends to beaggravated by requirements of digital portfolios and technical interviews that necessitate codingextemporaneously. During the programming components, candidates are expected to offer asolution, while also giving consideration to the choice of algorithm and its time complexity.Although