Asee peer logo
Displaying results 31 - 60 of 136 in total
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mark Dempsey, Collin County Community College ; Ann F Beheler, Collin County Community College
Tagged Divisions
Computing and Information Technology
of UCLA Extension’s Entertainment Studies & Performing Arts department, helping coordinate academic projects and special events, and later as a program representative, managing domestic and international custom-designed sem- inar programs. For several years during his tenure at UCLA Extension, Mark also served as a co-instructor for the capstone online class ”The Business of Hollywood,” which employed a unique role-playing ele- ment to explore strategies of film financing and negotiation. Before joining UCLA Extension, Mark was a development executive at an independent feature film production company, Echo Lake Productions. He has also worked as a freelance script analyst for Silver Pictures. Mark holds a BA
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Umit Karabiyik, Sam Houston State University; Naciye Celebi; Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Khaled Rabieh, Sam Houston State University
Tagged Divisions
Computing and Information Technology
touches upon the existing attempts at buildingsuch a near-world lab for academic research and teaching purposes and their challenges. TheSCADA laboratory we designed and the research findings we present will be either used todevelop new courses or supplement the existing courses in the undergraduate and graduatecurriculum with fairly enough number of hands-on activities. Moreover, our paper highlights thechallenges, limitations and the methodologies in the project to achieve these goals. Thecross-disciplinary design of the lab allows students from various programs with specific goals touse the lab for their studies.Related WorkThe SCADA systems have been target of attacks particularly in the last two decades with theadvancements in technology. As
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Eliezer Ochoa Jr.; Joshua David De Piano; Michael G. Milford; Alan Moses Galvan; Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
DIGITAL THERMOELECTRIC-GENERATOR BASED POWER SYSTEMAbstractThis paper is an attempt to report the modeling, design and build analysis of thermoelectricmodule (TEM) with realistic conditions for electrical power generation. It gives an insight tostatic and dynamic modeling with temperature dependent parametric variations and computationof various TEM parameters for modeling power generators.This paper demonstrates the undergraduate engineering technology student-driven research atour university in this arena. It depicts the application of the multi-agent approach which allowedthe student team to take full control of the project from inception to completion. The teamdeveloped and built a microprocessor based prototype thermo
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University
Tagged Divisions
Computing and Information Technology
services. Course topics include designing, implementing, administrating and troubleshooting variousdirectory service products in an enterprise environment, as well as application integration using directory services, i.e., email and single-sign-on. Virtual machines are used to set up lab test bed. The lab assignments and semester project are designed to further students’ knowledge ofdirectory services and gain “hands-on” experience. An assessment of the course is also discussed.1. INTRODUCTION A directory service is a repository that stores and organizes information about users and network resources. The information can beused by other applications and services to manage users' access to resources. Directories are highly optimized for reading and
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chafic Bousaba, Guilford College
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
browsing capabilities via TOR (The Onion Router), LAMP (Linux, Apache, MySQL, PHPor Python or Perl) server, Virtual Private Network (VPN) server, and protected browsing viaproxy service. The main goal of this educational project is to leverage the total holisticintegration of open source hardware and software to provide an affordable and portable solutionthat could be promptly deployed in case of an emergency, as a part of an incident response plan(IRP), or in case it is needed for testing purposes. Implementing this project provides valuablehands-on security experience and best practices in network architecture and configuration.Additional security features, both in hardware and software, were added to the single-boardcomputers to add additional
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
solution to fully grasp the overall concept. After presenting the materials to students,continual review with students is also essential. This reviewal process requires exploring use-cases for the programming mechanisms presented as solutions to the security issues discussed. Inaddition to the security modules presented in lectures, students were given a hands-on approachto understanding the concepts through Model-Eliciting Activities (MEAs). MEAs are open-ended, problem-solving activities in which groups of three to four students work to solve realisticcomplex problems in a classroom setting. The semester project related to encryption anddecryption was implemented into the course as an MEA.To assess the effectiveness of incorporating security
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said, Davenport University; Ghaythah Abdullah Alqarna
Tagged Divisions
Computing and Information Technology
model.Decision makers expect concurrent executions of business and integration of new ITtechnologies help to alleviate the business requirements and meet their business goals andobjectives. Introduction: Project management is critical to IT development and helps to keep ITprojects on track through each cycle. A Wall Street Journal report stated recent researchrevealed managing IT projects well could significantly improve a firm’s profits and improve ITinvestments [3]. IT project management is often a process used to keep the project withintechnical limitations, within the allowed budget, and within a deterministic schedule [38].The Standish Group’s “CHAOS Summary 2009” showed the project success rate had decreased,with the data revealing a
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Briana Marie Bailey; Yujian Fu P.E., Alabama A&M University
Tagged Divisions
Computing and Information Technology
Paper ID #34368From UML Design to Implementation of a Reliable Student Information Sys-temBriana Marie BaileyDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
proper skills to operateand manage their networks. Broadband wireless networks and big data systems are twoimportant technologies that current STEM students need to learn, comprehend and master tosatisfy the market needs. Design and implementation of an academic big-data system andbroadband wireless testbed for instruction and research purposes is a difficult task. In this work,challenges facing the design and implementation of a mobile networks and big-data lab areevaluated. This work aims at providing a comprehensive reporting about an experience gainedfrom designing and implementing an academic lab of big-data system used for broadbandwireless networks traffic analysis and management. Challenges facing the project team duringthe
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
aninterdisciplinary team of faculty at San José State University (SJSU). The minor degreecomprises four courses: Python programming, algorithms and data structures, R programming,and culminating projects. The first ACBSS cohort started in Fall 2016 with 32 students, and thesecond cohort in Fall 2017 reached its capacity of 40 students, 62% of whom are female and35% are underrepresented minority students. Considering ACBSS students’ interest in humanbehavior and society, pedagogical approaches using relevant examples and projects have beendeveloped and integrated throughout the program. Preliminary assessments show that studentsappreciated learning programming skills with which to expand their career opportunities whilegaining confidence in studying technical
Conference Session
Crafting the Future of Computing Education in CC2020
Collection
2018 ASEE Annual Conference & Exposition
Authors
Stephen T Frezza, Gannon University; Arnold Neville Pears, Uppsala University; Marisa Exter, Purdue University, West Lafayette (College of Engineering); Barry M. Lunt, Brigham Young University
Tagged Divisions
Computing and Information Technology, Software Engineering Division
Paper ID #23289Crafting the Future of Computing Education in CC2020: A WorkshopDr. Stephen T Frezza, Gannon University Deacon Steve Frezza, PSEM is a professor of Software Engineering and chair of the Computer and In- formation Science department at Gannon University in Erie, PA. His research interests include Global Software Engineering, Affective Domain Learning, Engineering Education Research, as well as Philos- ophy of Engineering and Engineering Education. He is regularly involved in supporting the regional entrepreneurial ecosystem, as well as projects that serve the regional community. He is an active member
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Uma Kannan; Rajendran Swamidurai, Alabama State University
Tagged Divisions
Computing and Information Technology
Paper ID #34315Integrating Cybersecurity Concepts Across Undergraduate Computer Sci-enceand Information Systems CurriculumDr. Uma Kannan Dr. Uma Kannan is Assistant Professor of Computer Information Systems in the College of Business Administration at Alabama State University, where she has taught since 2017. She received her Ph.D. degree in Cybersecurity from Auburn University in 2017. She specialized in Cybersecurity, particularly on the prediction and modelling of insidious cyber-attack patterns on host network layers. She also actively involved in core computing courses teaching and project development since 1992 in
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-organizes university-wide innovative cyber security research, development and training initiatives. He is also an Associate Professor at the department of Information Systems and Cyber Security specializing in operational cyber security and data science as applicable to national security challenges. Previously, he was a senior research scientist at Carnegie Mellon University (CMU) where he contributed to federally-funded projects related to critical infrastructure security and worked closely with the Software Engineering Institute (SEI). He is also a permanent research scientist at the National Cyber Forensic and Training Alliance (NCFTA) of Canada; an international organization which focuses on the investigation of
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
team, and Kali Linux. In this paper, we provideexamples on how students’ knowledge of CPS security changes over the course of the program,how students are supported in and out of the classroom towards advancing their knowledge in thisfield. We also highlight the impact that project-based and team coordinated learning can have onincreasing students’ understanding of the fundamentals of CPS security.IntroductionA recent study by Cybersecurity Ventures [1], a respected publisher of cybersecurity content,predicts that 3.5 million cybersecurity jobs around the world will be unfilled by 2021. In the UnitedStates, the demand for professionals with cybersecurity expertise is outpacing all other occupations[2]. These reports, along with many others
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jingshan Wu, Zhejiang University; Yujie Wang, Zhejiang University; Hanbing Kong, Zhejiang University; Ling Zhu, Zhejiang University
Tagged Divisions
Computing and Information Technology
computational thinkingskills. This study first proposes a framework of computational thinking in the contextof engineering (CT-ENG), using qualitative content analysis on industry interviews.The authors then introduce the program of the Robotics Class of Zhejiang Universityin China, providing an integrative approach to teaching computational thinkingeffectively. The Robotics Class engages students in project-based computing-aidedengineering activities throughout the four-year bachelor’s program, and improvestheir computational thinking skills through engineering engagement. The findings inthis study could have some implications for non-CS engineering majors to promotecomputing education and equip students with computational thinking at digital era.Key
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
student enthusiasm at the end of their internship to enhance the ensuing continuation of their academic experience.A. Introduction Demand for undergraduate Computer Science and Engineering (CSE) education continues to grow,driven by persistent need for professionals with technical skills. In addition to core technical knowledge,students embarking on a career in CSE must be ready to combine theory and practice in a context wherethe underlying technology continually changes, projects are large-scale and collaborative, and professionalresponsibility and ethics-based decision-making are critical when products are adopted widely. Manystudents seek hands-on industry internship experiences to complement their in-class instruction andprepare for these
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Leadership and Policy Studies at Virginia Tech.Prof. Stephen H Edwards, Virginia Tech Stephen H. Edwards is a Professor and the Associate Department Head for Undergraduate Studies in the Department of Computer Science at Virginia Tech, where he has been teaching since 1996. He received his B.S. in electrical engineering from Caltech, and M.S. and Ph.D. degrees in computer and informa- tion science from The Ohio State University. His research interests include computer science education, software testing, software engineering, and programming languages. He is the project lead for Web-CAT, the most widely used open-source automated grading system in the world. Web-CAT is known for al- lowing instructors to grade students
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
smart home hub devices to provide added security protections or intrusionprevention functionality. This smart home lab can also facilitate the creation of assignments fordifferent courses at Purdue University. For example, we can execute various scenarios using thedevices in our lab, create forensic images of control devices and assign these images to students toperform forensic analyses to determine various events. We describe four possible threat scenariosbelow.One case study of a potential threat vector and how students could engage with it using an activelearning project is the investigation of the smart plug device. Using the IoT lab, students would beable to investigate what security measures exist to protect smart plugs from potential
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Programming [10] Mining Programming, Projects, Reasonable Analytical written programming homework background, Discrete problems, Midterm Math and Calculus and Final, Final Project, Open note/open book exams Columbia University Machine Learning
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhijiang Dong, Middle Tennessee State University; Joshua Lee Phillips, Middle Tennessee State University; Eric Oslund, Middle Tennessee State University; Chrisila Pettey, Middle Tennessee State University; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
paper willdescribe the program elements and explain the effects of these activities on our students withpreliminary outcome data and formative evaluation results about the program.1 IntroductionAccording to the 2020 report "STEM and the American Workforce" [1], STEM supports 67% ofU.S. jobs and 69% of the Nation's GDP. Computer occupations play a critical role in STEM.The U.S. Bureau of Labor Statistics projected that about 600,000 or 67% of all new jobs inSTEM between 2018 and 2028 would be in computing. Average annual openings in computeroccupations during the decade were projected to be about 450,000 [2]. Although the number ofstudents who graduated with a bachelor's degree in computer and information sciences in 2016was more than 70,000
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
by AI by studying software agents, problem solving bysearching, various ways to represent knowledge, and methods of learning. Additionally, thiscourse will discuss both the ethics and risks associated with the fields of AI. Topics coveredduring the course fall into 4 major categories: (1) Knowledge, Reasoning, Planning, andUncertain Knowledge, (2) Learning and Philosophical Foundations, (3) Communicating,Perceiving, and Acting, and (4) Ethics and Risks. Previously, the authors have used the “flipped”classroom concept in courses. The flipped classroom, when mastered and done well, has beendemonstrated to be beneficial to the students’ ability to learn material [1]. One of the goals forthis project is for students to help create a repository
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Alka R. Harriger, Purdue University; Suyash Agrawal, Purdue University; Arjun Shakdher, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #25423Work in Progress: A Web-Based Tool to Assess Computational ThinkingProf. Alka R. Harriger, Purdue University Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she taught software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Real- ized through Information Technology) project. From 2013-2018, she co-led with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching Engineering Concepts to Harness Future Innovators and
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Anastasia Kurdia, Tulane University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
courses complementing the primary major, and atwo-semester capstone project course; 10 courses worth 30 credit hours in total.Figure 1: Program outline. Shaded courses form a required core. Arrows to electives are notdrawn, different core courses are prerequisites for different electives.2.2 Core coursesThe goal of the core courses is to develop fundamental knowledge and skills. All core courseshave non-credit weekly labs associated with them.2.2.1 Introduction to Computer Science IIntroduction to Computer Science I (Intro I) course is designed for students with no priorbackground in computing. It has two central aims. The first aim is to enable the students todevelop computational solutions to practical problems: • Break a
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
problems. We also learned from the literature that women prefer to be more social and interact and work well in Figure 2. Total DFW of CS1511 (Men vs Women) teams. This project is based on these findings and attempts to develop a new approach grounded in research-based pedagogy. This new pedagogy involves two interventions to the traditional classroom teaching style- one, it replaces all the problems in the
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Peter J. Clarke, Florida International University; Debra Lee Davis, Florida International University; Ingrid A. Buckley, Florida Gulf Coast University; Geoff Potvin, Florida International University; Mandayam Thirunarayanan, Florida International University; Edward L. Jones, Florida A&M University/Florida State University
Tagged Divisions
Computing and Information Technology
engineeringclasses that compares lecture-homework-project teaching approaches to peer-to-peer active learn-ing when combined with design-based learning approaches. Although both approaches show thatstudent do show improved performance, the peer-to-peer active learning and design-based learningapproach received much greater interest, engagement, and intrinsic motivation. Dicheva et al. [5]present a survey of published empirical results on the applications of gamification in education.The authors further stated that although most of the papers surveyed showed promising resultsthere is still more research needed to determine the impact on student learning.Clarke et al. [9] describe how WReSTT (Web-Based Repository of Software Testing Tutorials)is used to
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
D. Cenk Erdil, Sacred Heart University; Kevin N. Bowlyn, Sacred Heart University; Joshua Randall, Sacred Heart University
Tagged Divisions
Computing and Information Technology
describes details of design and implementation of a lower-level(core-Tier1) computer organization and architecture course with online hands-on components as common learning environments. We use the followingpedagogical approaches for the revised course content: lead-learner, blendedcourse delivery, flipped classroom, and project-based learning. Online hands-on component of the course has been focused on using asingle-board computer, and associated hardware with the aim to providestudents contemporary skills in implementing computer orientation and ar-chitecture projects with related software components. We have collectedresearch data after the first two cohorts (in the same academic year, twoseparate sections of the same course). While we
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
recently, as Vice Chair of ACM SIGSOFT and General Chair of the 38th International Conference on Software Engineering. She has participated in many CRAW and ACM mentoring events; is a founding adviser of MSU Women in Computing, the MSU ACM-W Chapter; and co-led TechKobwa, a technology camp for secondary-school teachers and female students in Rwanda, for three summers. She was awarded the ACM SIGSOFT Distinguished Service Award in 2017.Ms. Michelle Slattery, Peak Research Michelle Slattery has more than 30 years’ experience as a professional evaluator working with diverse clients on complex project evaluations. Her business, Peak Research LLC, is celebrating 25 years of providing services to evaluate S-STEM, BPC, RED
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu, Nephos6, Inc.
Tagged Divisions
Computing and Information Technology
administrative, operational, and educational tools from on-premise resources to hosted or Software as a Service (SaaS) offerings, K-12 and post-secondaryschool administrators are placing increasing demands on the network, applications used, andstaff supporting those applications. As the importance of the network’s role in day-to-dayeducation operations increases, new ways to measure how the network and services providedover the network are performing are needed.This paper will present the details of a multi-semester undergraduate research project to measurethe quantifiable benefits of shifting from a traditional network monitoring approach toapplication performance or user experience approach in a K-12 school system. This novelapproach aids school
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
model of Cybersecurity education; and this reformwill be based on our prior experience with the introduction of innovative teaching modules in a numberof science, mathematics, and engineering Technology courses, faculty student seminar series, working inteams, use of simulation and K-17 student competitions. EducationAlmost every career path open to a bachelor’s degree student encompasses some aspect of security.System administrators must be able to properly configure and maintain a system; programmers mustknow how to build secure software from the bottom up; web development personnel must understandthe risks involved and how to best reduce the potential impact of these risks; and project
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jared Oluoch, University of Toledo
Tagged Divisions
Computing and Information Technology
afocus on hands-on education. This content is a major component of the CSET program thatsatisfies ABET ETAC Criteria. The Computer Science content of the program was enhanced andredesigned after Fall 2006 to meet ABET CAC Criteria.The CSET program is a mid-station between Computer Science and Computer EngineeringTechnology. The program is geared primarily to students that enjoy hands-on or Project-BasedLearning (PBL). Experiential learning effectively engages students 1,2 , supports technology andcollaboration 3,4,5,6 , reduces failure rates 7 , and exposes students to Science, Technology,Engineering and Mathematics (STEM) careers 8 .// The rest of this paper is structured as follows.ABET Student Outcome CriteriaBoth ETAC and CAC require