of UCLA Extension’s Entertainment Studies & Performing Arts department, helping coordinate academic projects and special events, and later as a program representative, managing domestic and international custom-designed sem- inar programs. For several years during his tenure at UCLA Extension, Mark also served as a co-instructor for the capstone online class ”The Business of Hollywood,” which employed a unique role-playing ele- ment to explore strategies of film financing and negotiation. Before joining UCLA Extension, Mark was a development executive at an independent feature film production company, Echo Lake Productions. He has also worked as a freelance script analyst for Silver Pictures. Mark holds a BA
touches upon the existing attempts at buildingsuch a near-world lab for academic research and teaching purposes and their challenges. TheSCADA laboratory we designed and the research findings we present will be either used todevelop new courses or supplement the existing courses in the undergraduate and graduatecurriculum with fairly enough number of hands-on activities. Moreover, our paper highlights thechallenges, limitations and the methodologies in the project to achieve these goals. Thecross-disciplinary design of the lab allows students from various programs with specific goals touse the lab for their studies.Related WorkThe SCADA systems have been target of attacks particularly in the last two decades with theadvancements in technology. As
DIGITAL THERMOELECTRIC-GENERATOR BASED POWER SYSTEMAbstractThis paper is an attempt to report the modeling, design and build analysis of thermoelectricmodule (TEM) with realistic conditions for electrical power generation. It gives an insight tostatic and dynamic modeling with temperature dependent parametric variations and computationof various TEM parameters for modeling power generators.This paper demonstrates the undergraduate engineering technology student-driven research atour university in this arena. It depicts the application of the multi-agent approach which allowedthe student team to take full control of the project from inception to completion. The teamdeveloped and built a microprocessor based prototype thermo
services. Course topics include designing, implementing, administrating and troubleshooting variousdirectory service products in an enterprise environment, as well as application integration using directory services, i.e., email and single-sign-on. Virtual machines are used to set up lab test bed. The lab assignments and semester project are designed to further students’ knowledge ofdirectory services and gain “hands-on” experience. An assessment of the course is also discussed.1. INTRODUCTION A directory service is a repository that stores and organizes information about users and network resources. The information can beused by other applications and services to manage users' access to resources. Directories are highly optimized for reading and
browsing capabilities via TOR (The Onion Router), LAMP (Linux, Apache, MySQL, PHPor Python or Perl) server, Virtual Private Network (VPN) server, and protected browsing viaproxy service. The main goal of this educational project is to leverage the total holisticintegration of open source hardware and software to provide an affordable and portable solutionthat could be promptly deployed in case of an emergency, as a part of an incident response plan(IRP), or in case it is needed for testing purposes. Implementing this project provides valuablehands-on security experience and best practices in network architecture and configuration.Additional security features, both in hardware and software, were added to the single-boardcomputers to add additional
solution to fully grasp the overall concept. After presenting the materials to students,continual review with students is also essential. This reviewal process requires exploring use-cases for the programming mechanisms presented as solutions to the security issues discussed. Inaddition to the security modules presented in lectures, students were given a hands-on approachto understanding the concepts through Model-Eliciting Activities (MEAs). MEAs are open-ended, problem-solving activities in which groups of three to four students work to solve realisticcomplex problems in a classroom setting. The semester project related to encryption anddecryption was implemented into the course as an MEA.To assess the effectiveness of incorporating security
model.Decision makers expect concurrent executions of business and integration of new ITtechnologies help to alleviate the business requirements and meet their business goals andobjectives. Introduction: Project management is critical to IT development and helps to keep ITprojects on track through each cycle. A Wall Street Journal report stated recent researchrevealed managing IT projects well could significantly improve a firm’s profits and improve ITinvestments [3]. IT project management is often a process used to keep the project withintechnical limitations, within the allowed budget, and within a deterministic schedule [38].The Standish Group’s “CHAOS Summary 2009” showed the project success rate had decreased,with the data revealing a
Paper ID #34368From UML Design to Implementation of a Reliable Student Information Sys-temBriana Marie BaileyDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects
proper skills to operateand manage their networks. Broadband wireless networks and big data systems are twoimportant technologies that current STEM students need to learn, comprehend and master tosatisfy the market needs. Design and implementation of an academic big-data system andbroadband wireless testbed for instruction and research purposes is a difficult task. In this work,challenges facing the design and implementation of a mobile networks and big-data lab areevaluated. This work aims at providing a comprehensive reporting about an experience gainedfrom designing and implementing an academic lab of big-data system used for broadbandwireless networks traffic analysis and management. Challenges facing the project team duringthe
aninterdisciplinary team of faculty at San José State University (SJSU). The minor degreecomprises four courses: Python programming, algorithms and data structures, R programming,and culminating projects. The first ACBSS cohort started in Fall 2016 with 32 students, and thesecond cohort in Fall 2017 reached its capacity of 40 students, 62% of whom are female and35% are underrepresented minority students. Considering ACBSS students’ interest in humanbehavior and society, pedagogical approaches using relevant examples and projects have beendeveloped and integrated throughout the program. Preliminary assessments show that studentsappreciated learning programming skills with which to expand their career opportunities whilegaining confidence in studying technical
Paper ID #23289Crafting the Future of Computing Education in CC2020: A WorkshopDr. Stephen T Frezza, Gannon University Deacon Steve Frezza, PSEM is a professor of Software Engineering and chair of the Computer and In- formation Science department at Gannon University in Erie, PA. His research interests include Global Software Engineering, Affective Domain Learning, Engineering Education Research, as well as Philos- ophy of Engineering and Engineering Education. He is regularly involved in supporting the regional entrepreneurial ecosystem, as well as projects that serve the regional community. He is an active member
Paper ID #34315Integrating Cybersecurity Concepts Across Undergraduate Computer Sci-enceand Information Systems CurriculumDr. Uma Kannan Dr. Uma Kannan is Assistant Professor of Computer Information Systems in the College of Business Administration at Alabama State University, where she has taught since 2017. She received her Ph.D. degree in Cybersecurity from Auburn University in 2017. She specialized in Cybersecurity, particularly on the prediction and modelling of insidious cyber-attack patterns on host network layers. She also actively involved in core computing courses teaching and project development since 1992 in
-organizes university-wide innovative cyber security research, development and training initiatives. He is also an Associate Professor at the department of Information Systems and Cyber Security specializing in operational cyber security and data science as applicable to national security challenges. Previously, he was a senior research scientist at Carnegie Mellon University (CMU) where he contributed to federally-funded projects related to critical infrastructure security and worked closely with the Software Engineering Institute (SEI). He is also a permanent research scientist at the National Cyber Forensic and Training Alliance (NCFTA) of Canada; an international organization which focuses on the investigation of
team, and Kali Linux. In this paper, we provideexamples on how students’ knowledge of CPS security changes over the course of the program,how students are supported in and out of the classroom towards advancing their knowledge in thisfield. We also highlight the impact that project-based and team coordinated learning can have onincreasing students’ understanding of the fundamentals of CPS security.IntroductionA recent study by Cybersecurity Ventures [1], a respected publisher of cybersecurity content,predicts that 3.5 million cybersecurity jobs around the world will be unfilled by 2021. In the UnitedStates, the demand for professionals with cybersecurity expertise is outpacing all other occupations[2]. These reports, along with many others
computational thinkingskills. This study first proposes a framework of computational thinking in the contextof engineering (CT-ENG), using qualitative content analysis on industry interviews.The authors then introduce the program of the Robotics Class of Zhejiang Universityin China, providing an integrative approach to teaching computational thinkingeffectively. The Robotics Class engages students in project-based computing-aidedengineering activities throughout the four-year bachelor’s program, and improvestheir computational thinking skills through engineering engagement. The findings inthis study could have some implications for non-CS engineering majors to promotecomputing education and equip students with computational thinking at digital era.Key
student enthusiasm at the end of their internship to enhance the ensuing continuation of their academic experience.A. Introduction Demand for undergraduate Computer Science and Engineering (CSE) education continues to grow,driven by persistent need for professionals with technical skills. In addition to core technical knowledge,students embarking on a career in CSE must be ready to combine theory and practice in a context wherethe underlying technology continually changes, projects are large-scale and collaborative, and professionalresponsibility and ethics-based decision-making are critical when products are adopted widely. Manystudents seek hands-on industry internship experiences to complement their in-class instruction andprepare for these
Leadership and Policy Studies at Virginia Tech.Prof. Stephen H Edwards, Virginia Tech Stephen H. Edwards is a Professor and the Associate Department Head for Undergraduate Studies in the Department of Computer Science at Virginia Tech, where he has been teaching since 1996. He received his B.S. in electrical engineering from Caltech, and M.S. and Ph.D. degrees in computer and informa- tion science from The Ohio State University. His research interests include computer science education, software testing, software engineering, and programming languages. He is the project lead for Web-CAT, the most widely used open-source automated grading system in the world. Web-CAT is known for al- lowing instructors to grade students
smart home hub devices to provide added security protections or intrusionprevention functionality. This smart home lab can also facilitate the creation of assignments fordifferent courses at Purdue University. For example, we can execute various scenarios using thedevices in our lab, create forensic images of control devices and assign these images to students toperform forensic analyses to determine various events. We describe four possible threat scenariosbelow.One case study of a potential threat vector and how students could engage with it using an activelearning project is the investigation of the smart plug device. Using the IoT lab, students would beable to investigate what security measures exist to protect smart plugs from potential
Programming [10] Mining Programming, Projects, Reasonable Analytical written programming homework background, Discrete problems, Midterm Math and Calculus and Final, Final Project, Open note/open book exams Columbia University Machine Learning
paper willdescribe the program elements and explain the effects of these activities on our students withpreliminary outcome data and formative evaluation results about the program.1 IntroductionAccording to the 2020 report "STEM and the American Workforce" [1], STEM supports 67% ofU.S. jobs and 69% of the Nation's GDP. Computer occupations play a critical role in STEM.The U.S. Bureau of Labor Statistics projected that about 600,000 or 67% of all new jobs inSTEM between 2018 and 2028 would be in computing. Average annual openings in computeroccupations during the decade were projected to be about 450,000 [2]. Although the number ofstudents who graduated with a bachelor's degree in computer and information sciences in 2016was more than 70,000
by AI by studying software agents, problem solving bysearching, various ways to represent knowledge, and methods of learning. Additionally, thiscourse will discuss both the ethics and risks associated with the fields of AI. Topics coveredduring the course fall into 4 major categories: (1) Knowledge, Reasoning, Planning, andUncertain Knowledge, (2) Learning and Philosophical Foundations, (3) Communicating,Perceiving, and Acting, and (4) Ethics and Risks. Previously, the authors have used the “flipped”classroom concept in courses. The flipped classroom, when mastered and done well, has beendemonstrated to be beneficial to the students’ ability to learn material [1]. One of the goals forthis project is for students to help create a repository
Paper ID #25423Work in Progress: A Web-Based Tool to Assess Computational ThinkingProf. Alka R. Harriger, Purdue University Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she taught software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Real- ized through Information Technology) project. From 2013-2018, she co-led with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching Engineering Concepts to Harness Future Innovators and
courses complementing the primary major, and atwo-semester capstone project course; 10 courses worth 30 credit hours in total.Figure 1: Program outline. Shaded courses form a required core. Arrows to electives are notdrawn, different core courses are prerequisites for different electives.2.2 Core coursesThe goal of the core courses is to develop fundamental knowledge and skills. All core courseshave non-credit weekly labs associated with them.2.2.1 Introduction to Computer Science IIntroduction to Computer Science I (Intro I) course is designed for students with no priorbackground in computing. It has two central aims. The first aim is to enable the students todevelop computational solutions to practical problems: • Break a
problems. We also learned from the literature that women prefer to be more social and interact and work well in Figure 2. Total DFW of CS1511 (Men vs Women) teams. This project is based on these findings and attempts to develop a new approach grounded in research-based pedagogy. This new pedagogy involves two interventions to the traditional classroom teaching style- one, it replaces all the problems in the
engineeringclasses that compares lecture-homework-project teaching approaches to peer-to-peer active learn-ing when combined with design-based learning approaches. Although both approaches show thatstudent do show improved performance, the peer-to-peer active learning and design-based learningapproach received much greater interest, engagement, and intrinsic motivation. Dicheva et al. [5]present a survey of published empirical results on the applications of gamification in education.The authors further stated that although most of the papers surveyed showed promising resultsthere is still more research needed to determine the impact on student learning.Clarke et al. [9] describe how WReSTT (Web-Based Repository of Software Testing Tutorials)is used to
describes details of design and implementation of a lower-level(core-Tier1) computer organization and architecture course with online hands-on components as common learning environments. We use the followingpedagogical approaches for the revised course content: lead-learner, blendedcourse delivery, flipped classroom, and project-based learning. Online hands-on component of the course has been focused on using asingle-board computer, and associated hardware with the aim to providestudents contemporary skills in implementing computer orientation and ar-chitecture projects with related software components. We have collectedresearch data after the first two cohorts (in the same academic year, twoseparate sections of the same course). While we
recently, as Vice Chair of ACM SIGSOFT and General Chair of the 38th International Conference on Software Engineering. She has participated in many CRAW and ACM mentoring events; is a founding adviser of MSU Women in Computing, the MSU ACM-W Chapter; and co-led TechKobwa, a technology camp for secondary-school teachers and female students in Rwanda, for three summers. She was awarded the ACM SIGSOFT Distinguished Service Award in 2017.Ms. Michelle Slattery, Peak Research Michelle Slattery has more than 30 years’ experience as a professional evaluator working with diverse clients on complex project evaluations. Her business, Peak Research LLC, is celebrating 25 years of providing services to evaluate S-STEM, BPC, RED
administrative, operational, and educational tools from on-premise resources to hosted or Software as a Service (SaaS) offerings, K-12 and post-secondaryschool administrators are placing increasing demands on the network, applications used, andstaff supporting those applications. As the importance of the network’s role in day-to-dayeducation operations increases, new ways to measure how the network and services providedover the network are performing are needed.This paper will present the details of a multi-semester undergraduate research project to measurethe quantifiable benefits of shifting from a traditional network monitoring approach toapplication performance or user experience approach in a K-12 school system. This novelapproach aids school
model of Cybersecurity education; and this reformwill be based on our prior experience with the introduction of innovative teaching modules in a numberof science, mathematics, and engineering Technology courses, faculty student seminar series, working inteams, use of simulation and K-17 student competitions. EducationAlmost every career path open to a bachelor’s degree student encompasses some aspect of security.System administrators must be able to properly configure and maintain a system; programmers mustknow how to build secure software from the bottom up; web development personnel must understandthe risks involved and how to best reduce the potential impact of these risks; and project
afocus on hands-on education. This content is a major component of the CSET program thatsatisfies ABET ETAC Criteria. The Computer Science content of the program was enhanced andredesigned after Fall 2006 to meet ABET CAC Criteria.The CSET program is a mid-station between Computer Science and Computer EngineeringTechnology. The program is geared primarily to students that enjoy hands-on or Project-BasedLearning (PBL). Experiential learning effectively engages students 1,2 , supports technology andcollaboration 3,4,5,6 , reduces failure rates 7 , and exposes students to Science, Technology,Engineering and Mathematics (STEM) careers 8 .// The rest of this paper is structured as follows.ABET Student Outcome CriteriaBoth ETAC and CAC require