don't detract from the learning topicsFinally, we added other elements of fun that aren't directly related to learning but that don'tinterfere with learning. Adding music to the game isn't related to the learning topics, but itdoesn't interfere with them and it increases the sensation game pleasure. Likewise some of themore whimsical and fantastic elements of the game (such as talking magpies and some visualaspects of the museum rooms) add to a sense of fantasy and sensation.We haven't yet incorporated the game pleasures of fellowship and expression into the design ofMagnitude Museum, but those game pleasures can make the game more fun without interferingwith the educational aspects.Future workIn the future we plan to make a multiplayer version
, while other degrees are considered as applied majorswith which graduates are expected to go to industry right after school.According to [3], Chinese computing education can be divided into three major developmentperiods. The first period started in 1956, following a 12-year plan by the State Council of Chinaat the time. The 12-year plan identified computer as one of the six emerging areas of importance.A couple schools, including Tsinghua University and Harbin Institute of Technology, started thecomputing majors in 1956. By the end of 1950s, more than 10 colleges initiated computingmajors. The focus at the time was on designing and building computers, or computing devices. Afew sample courses of the time include Principles of Electric
applied to the student retention problem. A data mining approach could be a mostworthwhile strategy for other practitioners and researchers planning to include many variablesalong with all levels of STEM students in the data set. Hendrix [19] found only one out of every2,352 dissertation abstracts included the search words “data mining” in a search of dissertationswith the key words “higher education” and “retention.”In this review, the relevant retention factors, organized in groups, concern students’ academicbackground, commitment behavior, and family background. Multiple variables within thesethree groups of factors are also part of the discussions.Method & ModelThe data mining method of analysis was a predictive classification process
containing information about the victims (age, race, sec), date and time of the crime, etc.;motor vehicle collisions; Housing Preservation and Development (HPD) data set on buildings,units, and projects that began after January 1, 2014 and are counted towards the Housing NewYork plan; New York Air Quality data set; etc.After the completion of the project, the students wrote a report describing what they learned,what conclusions can be made based on this data. Student enthusiastically discussed theirfindings, and the semester concluded in a lively and productive discussion about the importanceof data analysis for the understanding of the city day-to-day life, problems. At the same time, thestudents learned about the importance of the broad and, at
/ in-class assignment and add a “gallery walk”allowing the students to see those solutions created by other teams.Future Work and Next StepsThis research is the preliminary stages with activities being piloted in the Fall 2020 semester.Next the author will be applying for an IRB, so the author can conduct preliminary researchduring the Fall 2021 term including gather student survey information, grades, course evaluationcomments, etc. The author plans to continue this research each fall for the next 5 years. Usingthis information gather, the authors will attempt to gain insight into the helpfulness of theseactivities grade-wise instead of only anecdotal.Available ResourcesAn information repository (i.e., “card”) is available on the Engineering
feedbackfrom students, we attribute this to the effect of COVID-19 measures, whereabout half of the students were not able to attend the classroom, and com-plete hands-on activities. However, overall student approval rates show de-sign projects overall increased overall student agreement, with regular bellcurve peaking around 8/10 (30% approval) which was well received. More-over, about 12% students were completely satisfied with the course (10/10).2021 semester, with expected fully in-class experiences after COVID-19 mea-sures are released after herd immunity is reached. We plan to follow-up ourresults after Spring 2021 and Fall 2021 semester data have been collected,with a comparison of the affects of online learning modalities, and will po
the real vehicles to be used in this project, e.g., a Ford SUV. Although many 3D vehicle models are available for purchase, they usually only contain the exterior of the vehicle and don’t have any internal parts of the vehicle. We plan to use 3D scanning to generate partial 3D models of some typical internal parts, e.g., engine and pump. c. Develop the Standalone Mode of the AR application that contains interactive visualizations and animations that illustrate a variety of vehicle maintenance and repair procedures. Interactive visualization guides the user through the troubleshooting or maintenance process, showing one step of instruction at a time with 3D animations that greatly improve user’s
Work-in-Progress: A Web-Based Tool to Assess Computational ThinkingAbstractWhen President Obama unveiled his plan to give all students in America the opportunity to learncomputer science [1], discussions about Computational Thinking (CT) began in earnest in manyorganizations across a wide range of disciplines. However, Jeannette Wing stated the importanceof CT for everyone a decade earlier in her landmark essay [2]. Since then, several people andorganizations have posted their own definition of CT, which presents a challenge in being able toassess CT understanding and awareness in people. In an effort to build consensus on how to bestassess CT, the authors have developed a web-based tool that will enable CT experts globally
that ideainto actions requires planning. So before one can write any code, or design any system,one has to take the time to explore the possible techniques and technologies. The mainchallenge for non micro-controller based TEG systems is that the utilization efficiency ofthe energy is low, a large amount of the generated energy may be wasted. Hence there isa potential need for an energy management system which can acquire, store and deliverenergy efficiently, with minimum energy wastage. With proper mentoring, capable tutelage,and guidance, these burgeoning and talented young students will contribute to the bestpractices in implementing future system design and apps development.ResultsSo far we have used this series of modular design projects
. The dream of an autonomous vehicle has been there for almost acentury. It can be said that the first “autonomous” vehicle was Stanford Cart which was built in1961. The automated car concept was evolved truly in 1980s with Carnegie Melon University’sNavLab and ALV projects which resulted in ALVINN which used a neural network to drive [8].The automotive industries are conducting significant research and development efforts in thearea of autonomous vehicles. The major automotive companies like Toyota, Ford, MercedesBenz, BMW, Volvo have announced their plans for creating an autonomous car. In the racetowards autonomous vehicles, Tesla and Waymo (from Google) are two of the most advancedcompanies. In 2014, Google introduced Google car with camera
complicated virtual environments. It is uncertain that the grant program will continue to offerfree credits in the future. Third, students create their own accounts and therefore usermanagement is a problem.In the future, we plan to develop more labs on commercial, public cloud systems and use VirtualPrivate Network (VPN) to connect students’ virtual machines with a central server to providebetter support and monitoring when needed. We are also considering integrating automaticassessment scripts through the central server on the public cloud to provide immediate feedback,which has been done successfully in some labs on our in-house, cloud-based systems.REFERENCES[1] D. Puthal, B. P. S. Sahoo, S. Mishra and S. Swain, "Cloud Computing Features, Issues
district's IT resource portfolio. In that survey it was found that of the school districts whichreplied, "95% of districts rely on cloud services for a diverse range of functions including datamining related to student performance, support for classroom activities, student guidance, datahosting, as well as special services such as cafeteria payments and transportation planning." [4]This increased reliance on cloud services, coupled with limited IT staff and resources, makes itdifficult to monitor and support, with traditional network management tools, a portfolio ofofferings which are hosted outside the district's administrative domain and often spanningmultiple administrative domains on the way to and from the district [5]. Also, networkmanagement
foreach student. At the end of the semester, they turn in a final written report and a finalpresentation which is evaluated by several faculties from the department. The following gradingrubric is used to assess these projects:Assessment of the ProjectsThe project final grade is calculated on a 100-point scale, with the maximum number of pointsfor each area of assessment as follows:Quality and rigor of research and research paper 25 pointsQuality of other deliverables (hardware design, integration,management plan, code, etc.) 15Degree to which project fulfills requirements specified inproject proposal 20Level of effort
homework, with quickfeedback. A final hurdle was that this was the author’s first time teaching Vibrations. Therefore,it was necessary to prioritize lesson plan preparation over delivery logistics. This precluded timeintensive efforts such as learning complicated software or prerecording lectures in an instructionallab environment.Mastery learning (or learner-centric) techniques introduced by Bloom in the 1970s and expandedby researchers over the last half century have an established track record for enhancing studentlearning.1–3 In particular, periodic formative assignments are necessary and should be designed sothat students reflect on mistakes and adjust their learning efforts as needed. Within the Vibrationscourse, the mechanisms for formative
enhance the overall user experience. The future releases of the I-Tracker application shallinclude warranty tracking for customizable time frame settings for the timeframe widgets, a mobileapplication, and the professional appraisal/resale feature for the electronic devices under warranty.The final two features that we plan to add in a future release is the addition of a mobile applicationand the resale feature. The mobile application will allow the users to have access to all theinformation on the web application in the form of a mobile app, this will help the user enter newwarranties easier and allow the user to get notifications sent directly to their phone rather than justthe email. Lastly, the addition of the appraisal/resale feature allows
to develop and prototype a remote wireless network to collect environmentaldata in an extreme weather environment. The project consisted of mechanical design ofpackaging, electrical design of the system and sensors and the software design of the databasesand user interfaces. The main risk was the scale of the company; it was a small privately-ownedfirm with limited resources, very tight budgets, and thin operational margins. The companystated it needed to make the product commercially available after the end of the academic year tobe profitable. The company's business plan stressed rapid time to market and to provide ease ofuse of the system to the final customer. For a successful project from the company's perspective,a working solution
Attack no regulation for the implementation and creation of Vulnerabilities: Researchers have shown that IoT devices, these security and privacy breaches are IoT devices are extremely unguarded against inevitable[18], [19]. Minimizing these security malware attacks [13]–[15]. If they do not get breaches begins with education. Thus, it becomes an security updates frequently, IoTs can quickly important mission for the educational institutions to turn into infected zombie machines. Note that have a well-structured plan to prepare their students, - most of these devices
-Dusseau. Operating Systems: Three Easy Pieces. Arpaci-Dusseau Books, 1.00 edition, August 2018. [4] Chanyeol Yoo, Sam Lensgraf, Robert Fitch, Lee Clemon, and Ramgopal Mettu. Toward optimal fdm toolpath planning with monte carlo tree search. In Proceedings of the 2016 IEEE International Conference on Robotics and Automation (ICRA), Best Automation Paper Award, pages 4037–4043, 05 2016. doi: 10.1109/ICRA40945.2020.9196945. [5] Tyler Schlichenmeyer, Mei Wang, Carola Wenk, and J. Brown. Autofocus optimization for tracking tissue surface topography in large-area mosaicking structured illumination microscopy. Frontiers in Optics, FiO 2014, 10 2014. doi: 10.1364/FIO.2014.FM4F.3. [6] H. Kimbrell D. Tulman-T.S. Schlichenmeyer C
. Department of Commerce (see Figure 1a). All high schoolsin the Norfolk Public School system have students who reside in qualified opportunity zones (theirattendance zones are given in Figure 1b). Figure 1: Qualified Opportunity Zones in Norfolk, VA [15]Norfolk Public Schools Activities in Career and Technical EducationThe work plan will develop, assess, and improve the course curriculum and hands-on activities inthe area of computer science principles with Norfolk High Schools, Old Dominion University, andindustry partners for the Career and Technical Education (CTE) program. Figure 2 illustrates theComputer Science and Cybersecurity Pathway for the CTE Logical Model. One of the ways toengage more underrepresented students in STEM
fewcourses…they exclude anybody who’s not in their program. This is the only opportunity to dothis path with Python.Another student, who plans to pursue a career as a financial analyst, mentioned the experience ofher cousin as a motivator for enrolling in ACBSS courses. Specifically, she hoped to avoid thechallenges her cousin encountered while on the job due to a lack of programming skills:My cousin [works as a financial analyst] and they require you to have Python and R. She nevertook these classes and she struggles.Three focus group participants discussed the ways in which their perceptions of computingchanged since beginning the ACBSS course sequence. One student described how he initiallyviewed computing as focused mostly on syntax, but now
program.The authors are planning to extend this study in future work to include more universities especiallythose interested in offering interdisciplinary programs and study the technical content of thecybersecurity-related courses offered by their respective departments.6. References[1] Juniper Research©, "Cybercrime will Cost Businesses Over $2 Trillion by 2019," 2015. [Online]. Available: https://www.juniperresearch.com/press/press-releases/cybercrime- cost-businesses-over-2trillion.[2] SANS ICS, "Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case," 2016. [Online]. Available: https://ics.sans.org/media/E- ISAC_SANS_Ukraine_DUC_5.pdf.[3] J. B.-S. H. R. R. a. U. Lee, "Anatomy of the Information Security Workforce
flipped learning as well as particular applications in computerscience courses. Three guided studies for an introductory database course were illustrated,followed by multiple measures of student perception of the efficacy of guided studies. Theauthor concludes that the approach was effective for learning and valued by students.In future studies, the author plans to 1. track the completion rate of guided studies more closely to see how it relates to achievement of learning outcomes. The completion rate was tracked in the beginning of the semester, but tailed off toward the end because it did not seem necessary. 2. investigate the impact of flipping the course on achievement of learning outcomes by comparing test scores of
components will enable a wide range ofcolleges and universities to train the next generation of nanotechnology engineers.AcknowledgementsThis project is supported by the National Science Foundation through the ATE program, AwardNo. ATE 1700695. Any opinions, findings, and recommendations expressed in this paper arethose of the authors and do not necessarily reflect the views of the National Science Foundation.References 1. Poole, Charles P., and Frank J. Owens, “Introduction to Nanotechnology”, Wiley, 2003. 2. R. Feynman,”There’s Plenty of Room at the Bottom”, Engineering and Science, 23(5): 22-36, 1960. 3. Mongillo, John, “Nanotechnology 101”, Greenwood Press, 2007. 4. The National Nanotechnology Initiative – Strategic Plan, December
the lab course or have prior experience in orderto have a better chance of succeeding. Both prior programming experience and lab enrollmentprovide additional practice to students, which in turn increases ability in programming andperformance in the course overall.7. RecommendationsThe student’s ability to choose to take their programming course with or without lab grants thestudent more options when planning their college experience, allowing for a more effectivecourse load. For example, we find that students with prior programming experience who alsoenrolled in the lab did not perform much better than those with experience who did not enroll inlab. Therefore, if a student has prior knowledge in programming, they can be advised that the
) • Reservations attended: 3,589 (actual use of the platform) • Hours attended: 12,146.53Fig. 12. Use of the private cloud at the University of South Carolina between October 1, 2018 to September28, 2019. The platform was used to support academic classes, workshops, and research at the University ofSouth Carolina.The impact of this project is beyond cyberinfrastructure. While resources were placed forcyberinfrastructure courses, training workshops, and research, the Department of IntegratedInformation Technology (IIT) at the University of South Carolina is planning to extend the use ofthe platform to other areas, such as databases, programming, web systems, and others.Comparison between the private cloud and public clouds. Table 6 compares
,” International Journal of Online Engineering, vol. 12, no. 9, pp. 14-21, 2016.[10] T. Tsiatsos, S. Douka, A. Mavridis, S. Tegos, A. Naddami, T. Zimmer and D. Geoffroy, “Evaluation Plan and Preliminary Evaluation of a Network of Remote Labs in the Maghrebian Countries,” International Journal of Online Engineering, vol. 10, no. 5. pp. 15-20, 2014.[11] I. Santana, M. Ferre, E. Izaguirre, R. Aracil and L. Hernandez, “Remote Laboratories for Education and Research Purposes in Automatic Control Systems,” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp.547 – 556, 2013.[12] R. Heradio, L. Torre and S. Dormido, “Virtual and remote labs in control education: A survey,” Annual Reviews in Control, vol
portions of thebook itself. This multi-dimensional way of reading can be immensely helpful as we try toencourage students to create technological solutions for systems that may not even currentlyexist.AcknowledgementsThis paper features the work of undergraduate students Thomas Lopresto, Joshua Quire, andJohn Booker from Spring 2020 and Dakota Fannin from the Fall 2019 Network Switches &Routers course. Partial support for the educational resources related to the project was providedthrough the Quality Enhancement Plan (QEP) Leadership Grant funding at Eastern KentuckyUniversity and is kindly acknowledged. Thanks to the reviewers for their careful review of thedraft and suggestions for improvement.References[1] Ryan, R. M., & Deci, E. L
verify the suitability of the proposed implementation w.r.t. the project specifications, which are based on those defined in the standard, and b) Define Performance Tests to analyze the impact of the chosen techniques on the overall system performance.Along with defining those tests, the team develops a set of figures of merit (FOMs) for bothtypes of tests and uses those to quantitatively characterize the performance of the system w.r.t.the project requirements.Developing appropriate FOMs and test plans and analyzing how these are specified in thestandard is a very valuable educational experience. Regulated tests allow interactions among thestakeholders (device manufacturers, network operators, service providers, etc
instructorscaffolds with dialogue as needed. As a tertiary benefit, students become familiar with the pair-programming paradigm used in industry. The worksheet problems are a single arc where studentsconstruct a solution/algorithm (computational thinking [20]), rather than work backward from anexisting solution. The pairs are randomly assigned each day. Pairs are chosen carefully by theinstructor to avoid towers of knowledge [41] and ensure zone of proximal development [42]–[44]. The worksheets are graded and worth 25% of an overall grade. Adjusting the plan for theday based on JiTT was a time intensive process that significantly increased prep time for theinstructor by one to two hours before each lecture, in addition to the large one-time cost