Asee peer logo
Displaying results 61 - 90 of 92 in total
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Reza Kamali-Sarvestani, Utah Valley University; Brian Durney, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
don't detract from the learning topicsFinally, we added other elements of fun that aren't directly related to learning but that don'tinterfere with learning. Adding music to the game isn't related to the learning topics, but itdoesn't interfere with them and it increases the sensation game pleasure. Likewise some of themore whimsical and fantastic elements of the game (such as talking magpies and some visualaspects of the museum rooms) add to a sense of fantasy and sensation.We haven't yet incorporated the game pleasures of fellowship and expression into the design ofMagnitude Museum, but those game pleasures can make the game more fun without interferingwith the educational aspects.Future workIn the future we plan to make a multiplayer version
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Jianming Deng, Jinling Institute of Technology and Southeast University
Tagged Divisions
Computing and Information Technology
, while other degrees are considered as applied majorswith which graduates are expected to go to industry right after school.According to [3], Chinese computing education can be divided into three major developmentperiods. The first period started in 1956, following a 12-year plan by the State Council of Chinaat the time. The 12-year plan identified computer as one of the six emerging areas of importance.A couple schools, including Tsinghua University and Harbin Institute of Technology, started thecomputing majors in 1956. By the end of 1950s, more than 10 colleges initiated computingmajors. The focus at the time was on designing and building computers, or computing devices. Afew sample courses of the time include Principles of Electric
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Awatif Amin, Johnson C. Smith University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
applied to the student retention problem. A data mining approach could be a mostworthwhile strategy for other practitioners and researchers planning to include many variablesalong with all levels of STEM students in the data set. Hendrix [19] found only one out of every2,352 dissertation abstracts included the search words “data mining” in a search of dissertationswith the key words “higher education” and “retention.”In this review, the relevant retention factors, organized in groups, concern students’ academicbackground, commitment behavior, and family background. Multiple variables within thesethree groups of factors are also part of the discussions.Method & ModelThe data mining method of analysis was a predictive classification process
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Elena Filatova, City University of New York; Deborah Hecht, Center for Advanced Study in Education
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
containing information about the victims (age, race, sec), date and time of the crime, etc.;motor vehicle collisions; Housing Preservation and Development (HPD) data set on buildings,units, and projects that began after January 1, 2014 and are counted towards the Housing NewYork plan; New York Air Quality data set; etc.After the completion of the project, the students wrote a report describing what they learned,what conclusions can be made based on this data. Student enthusiastically discussed theirfindings, and the semester concluded in a lively and productive discussion about the importanceof data analysis for the understanding of the city day-to-day life, problems. At the same time, thestudents learned about the importance of the broad and, at
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
/ in-class assignment and add a “gallery walk”allowing the students to see those solutions created by other teams.Future Work and Next StepsThis research is the preliminary stages with activities being piloted in the Fall 2020 semester.Next the author will be applying for an IRB, so the author can conduct preliminary researchduring the Fall 2021 term including gather student survey information, grades, course evaluationcomments, etc. The author plans to continue this research each fall for the next 5 years. Usingthis information gather, the authors will attempt to gain insight into the helpfulness of theseactivities grade-wise instead of only anecdotal.Available ResourcesAn information repository (i.e., “card”) is available on the Engineering
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
D. Cenk Erdil, Sacred Heart University; Kevin N. Bowlyn, Sacred Heart University; Joshua Randall, Sacred Heart University
Tagged Divisions
Computing and Information Technology
feedbackfrom students, we attribute this to the effect of COVID-19 measures, whereabout half of the students were not able to attend the classroom, and com-plete hands-on activities. However, overall student approval rates show de-sign projects overall increased overall student agreement, with regular bellcurve peaking around 8/10 (30% approval) which was well received. More-over, about 12% students were completely satisfied with the course (10/10).2021 semester, with expected fully in-class experiences after COVID-19 mea-sures are released after herd immunity is reached. We plan to follow-up ourresults after Spring 2021 and Fall 2021 semester data have been collected,with a comparison of the affects of online learning modalities, and will po
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Yuzhong Shen, Old Dominion University; Anthony W. Dean, Old Dominion University; Rafael Landaeta, Old Dominion University
Tagged Divisions
Computing and Information Technology
the real vehicles to be used in this project, e.g., a Ford SUV. Although many 3D vehicle models are available for purchase, they usually only contain the exterior of the vehicle and don’t have any internal parts of the vehicle. We plan to use 3D scanning to generate partial 3D models of some typical internal parts, e.g., engine and pump. c. Develop the Standalone Mode of the AR application that contains interactive visualizations and animations that illustrate a variety of vehicle maintenance and repair procedures. Interactive visualization guides the user through the troubleshooting or maintenance process, showing one step of instruction at a time with 3D animations that greatly improve user’s
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Alka R. Harriger, Purdue University; Suyash Agrawal, Purdue University; Arjun Shakdher, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Work-in-Progress: A Web-Based Tool to Assess Computational ThinkingAbstractWhen President Obama unveiled his plan to give all students in America the opportunity to learncomputer science [1], discussions about Computational Thinking (CT) began in earnest in manyorganizations across a wide range of disciplines. However, Jeannette Wing stated the importanceof CT for everyone a decade earlier in her landmark essay [2]. Since then, several people andorganizations have posted their own definition of CT, which presents a challenge in being able toassess CT understanding and awareness in people. In an effort to build consensus on how to bestassess CT, the authors have developed a web-based tool that will enable CT experts globally
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Eliezer Ochoa Jr.; Joshua David De Piano; Michael G. Milford; Alan Moses Galvan; Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
that ideainto actions requires planning. So before one can write any code, or design any system,one has to take the time to explore the possible techniques and technologies. The mainchallenge for non micro-controller based TEG systems is that the utilization efficiency ofthe energy is low, a large amount of the generated energy may be wasted. Hence there isa potential need for an energy management system which can acquire, store and deliverenergy efficiently, with minimum energy wastage. With proper mentoring, capable tutelage,and guidance, these burgeoning and talented young students will contribute to the bestpractices in implementing future system design and apps development.ResultsSo far we have used this series of modular design projects
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. The dream of an autonomous vehicle has been there for almost acentury. It can be said that the first “autonomous” vehicle was Stanford Cart which was built in1961. The automated car concept was evolved truly in 1980s with Carnegie Melon University’sNavLab and ALV projects which resulted in ALVINN which used a neural network to drive [8].The automotive industries are conducting significant research and development efforts in thearea of autonomous vehicles. The major automotive companies like Toyota, Ford, MercedesBenz, BMW, Volvo have announced their plans for creating an autonomous car. In the racetowards autonomous vehicles, Tesla and Waymo (from Google) are two of the most advancedcompanies. In 2014, Google introduced Google car with camera
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Divisions
Computing and Information Technology
complicated virtual environments. It is uncertain that the grant program will continue to offerfree credits in the future. Third, students create their own accounts and therefore usermanagement is a problem.In the future, we plan to develop more labs on commercial, public cloud systems and use VirtualPrivate Network (VPN) to connect students’ virtual machines with a central server to providebetter support and monitoring when needed. We are also considering integrating automaticassessment scripts through the central server on the public cloud to provide immediate feedback,which has been done successfully in some labs on our in-house, cloud-based systems.REFERENCES[1] D. Puthal, B. P. S. Sahoo, S. Mishra and S. Swain, "Cloud Computing Features, Issues
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu, Nephos6, Inc.
Tagged Divisions
Computing and Information Technology
district's IT resource portfolio. In that survey it was found that of the school districts whichreplied, "95% of districts rely on cloud services for a diverse range of functions including datamining related to student performance, support for classroom activities, student guidance, datahosting, as well as special services such as cafeteria payments and transportation planning." [4]This increased reliance on cloud services, coupled with limited IT staff and resources, makes itdifficult to monitor and support, with traditional network management tools, a portfolio ofofferings which are hosted outside the district's administrative domain and often spanningmultiple administrative domains on the way to and from the district [5]. Also, networkmanagement
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Luis Eduardo Paredes, Guru Labs, L.C.; Jacob Morris, Utah Valley University
Tagged Divisions
Computing and Information Technology
foreach student. At the end of the semester, they turn in a final written report and a finalpresentation which is evaluated by several faculties from the department. The following gradingrubric is used to assess these projects:Assessment of the ProjectsThe project final grade is calculated on a 100-point scale, with the maximum number of pointsfor each area of assessment as follows:Quality and rigor of research and research paper 25 pointsQuality of other deliverables (hardware design, integration,management plan, code, etc.) 15Degree to which project fulfills requirements specified inproject proposal 20Level of effort
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
homework, with quickfeedback. A final hurdle was that this was the author’s first time teaching Vibrations. Therefore,it was necessary to prioritize lesson plan preparation over delivery logistics. This precluded timeintensive efforts such as learning complicated software or prerecording lectures in an instructionallab environment.Mastery learning (or learner-centric) techniques introduced by Bloom in the 1970s and expandedby researchers over the last half century have an established track record for enhancing studentlearning.1–3 In particular, periodic formative assignments are necessary and should be designed sothat students reflect on mistakes and adjust their learning efforts as needed. Within the Vibrationscourse, the mechanisms for formative
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mudasser Fraz Wyne, National University; Catrina Ann Shanas; Ashley Pratt, National University; Sophie Nguyen, County of Los Angeles
Tagged Divisions
Computing and Information Technology
enhance the overall user experience. The future releases of the I-Tracker application shallinclude warranty tracking for customizable time frame settings for the timeframe widgets, a mobileapplication, and the professional appraisal/resale feature for the electronic devices under warranty.The final two features that we plan to add in a future release is the addition of a mobile applicationand the resale feature. The mobile application will allow the users to have access to all theinformation on the web application in the form of a mobile app, this will help the user enter newwarranties easier and allow the user to get notifications sent directly to their phone rather than justthe email. Lastly, the addition of the appraisal/resale feature allows
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
to develop and prototype a remote wireless network to collect environmentaldata in an extreme weather environment. The project consisted of mechanical design ofpackaging, electrical design of the system and sensors and the software design of the databasesand user interfaces. The main risk was the scale of the company; it was a small privately-ownedfirm with limited resources, very tight budgets, and thin operational margins. The companystated it needed to make the product commercially available after the end of the academic year tobe profitable. The company's business plan stressed rapid time to market and to provide ease ofuse of the system to the final customer. For a successful project from the company's perspective,a working solution
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
Conference Session
Computing and Information Technology Division Poster Session
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
M Abdullah Canbaz, Indiana University Kokomo; KeeJoh OHearon; Michael McKee, Indiana University Kokomo; Md Nour Hossain
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Attack no regulation for the implementation and creation of Vulnerabilities: Researchers have shown that IoT devices, these security and privacy breaches are IoT devices are extremely unguarded against inevitable[18], [19]. Minimizing these security malware attacks [13]–[15]. If they do not get breaches begins with education. Thus, it becomes an security updates frequently, IoTs can quickly important mission for the educational institutions to turn into infected zombie machines. Note that have a well-structured plan to prepare their students, - most of these devices
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Anastasia Kurdia, Tulane University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-Dusseau. Operating Systems: Three Easy Pieces. Arpaci-Dusseau Books, 1.00 edition, August 2018. [4] Chanyeol Yoo, Sam Lensgraf, Robert Fitch, Lee Clemon, and Ramgopal Mettu. Toward optimal fdm toolpath planning with monte carlo tree search. In Proceedings of the 2016 IEEE International Conference on Robotics and Automation (ICRA), Best Automation Paper Award, pages 4037–4043, 05 2016. doi: 10.1109/ICRA40945.2020.9196945. [5] Tyler Schlichenmeyer, Mei Wang, Carola Wenk, and J. Brown. Autofocus optimization for tracking tissue surface topography in large-area mosaicking structured illumination microscopy. Frontiers in Optics, FiO 2014, 10 2014. doi: 10.1364/FIO.2014.FM4F.3. [6] H. Kimbrell D. Tulman-T.S. Schlichenmeyer C
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vukica M. Jovanovic, Old Dominion University; Murat Kuzlu, Old Dominion University; Otilia Popescu, Old Dominion University; Abdul Rahman Badawi, Old Dominion University; Deborah Kay Marshall, Norfolk Public Schools; Salih Sarp, Old Dominion University; Spyridoula Tsouganatou, Old Dominion University; Petros J. Katsioloudis, Old Dominion University; Linda Vahala, Old Dominion University; Hongyi Michael Wu, Old Dominion University
Tagged Divisions
Computing and Information Technology
. Department of Commerce (see Figure 1a). All high schoolsin the Norfolk Public School system have students who reside in qualified opportunity zones (theirattendance zones are given in Figure 1b). Figure 1: Qualified Opportunity Zones in Norfolk, VA [15]Norfolk Public Schools Activities in Career and Technical EducationThe work plan will develop, assess, and improve the course curriculum and hands-on activities inthe area of computer science principles with Norfolk High Schools, Old Dominion University, andindustry partners for the Career and Technical Education (CTE) program. Figure 2 illustrates theComputer Science and Cybersecurity Pathway for the CTE Logical Model. One of the ways toengage more underrepresented students in STEM
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
fewcourses…they exclude anybody who’s not in their program. This is the only opportunity to dothis path with Python.Another student, who plans to pursue a career as a financial analyst, mentioned the experience ofher cousin as a motivator for enrolling in ACBSS courses. Specifically, she hoped to avoid thechallenges her cousin encountered while on the job due to a lack of programming skills:My cousin [works as a financial analyst] and they require you to have Python and R. She nevertook these classes and she struggles.Three focus group participants discussed the ways in which their perceptions of computingchanged since beginning the ACBSS course sequence. One student described how he initiallyviewed computing as focused mostly on syntax, but now
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
program.The authors are planning to extend this study in future work to include more universities especiallythose interested in offering interdisciplinary programs and study the technical content of thecybersecurity-related courses offered by their respective departments.6. References[1] Juniper Research©, "Cybercrime will Cost Businesses Over $2 Trillion by 2019," 2015. [Online]. Available: https://www.juniperresearch.com/press/press-releases/cybercrime- cost-businesses-over-2trillion.[2] SANS ICS, "Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case," 2016. [Online]. Available: https://ics.sans.org/media/E- ISAC_SANS_Ukraine_DUC_5.pdf.[3] J. B.-S. H. R. R. a. U. Lee, "Anatomy of the Information Security Workforce
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Karen C. Davis, Miami University
Tagged Divisions
Computing and Information Technology
flipped learning as well as particular applications in computerscience courses. Three guided studies for an introductory database course were illustrated,followed by multiple measures of student perception of the efficacy of guided studies. Theauthor concludes that the approach was effective for learning and valued by students.In future studies, the author plans to 1. track the completion rate of guided studies more closely to see how it relates to achievement of learning outcomes. The completion rate was tracked in the beginning of the semester, but tailed off toward the end because it did not seem necessary. 2. investigate the impact of flipping the course on achievement of learning outcomes by comparing test scores of
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Landon A. Braden; Scott Alexander Kaiser, Utah Valley University; Reza Kamali-Sarvestani, Utah Valley University; Afsaneh Minaie, Utah Valley University; Paul Weber, Utah Valley University
Tagged Divisions
Computing and Information Technology
components will enable a wide range ofcolleges and universities to train the next generation of nanotechnology engineers.AcknowledgementsThis project is supported by the National Science Foundation through the ATE program, AwardNo. ATE 1700695. Any opinions, findings, and recommendations expressed in this paper arethose of the authors and do not necessarily reflect the views of the National Science Foundation.References 1. Poole, Charles P., and Frank J. Owens, “Introduction to Nanotechnology”, Wiley, 2003. 2. R. Feynman,”There’s Plenty of Room at the Bottom”, Engineering and Science, 23(5): 22-36, 1960. 3. Mongillo, John, “Nanotechnology 101”, Greenwood Press, 2007. 4. The National Nanotechnology Initiative – Strategic Plan, December
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Caleb James O'Malley, University of Florida; Ashish Aggarwal, University of Florida
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
the lab course or have prior experience in orderto have a better chance of succeeding. Both prior programming experience and lab enrollmentprovide additional practice to students, which in turn increases ability in programming andperformance in the course overall.7. RecommendationsThe student’s ability to choose to take their programming course with or without lab grants thestudent more options when planning their college experience, allowing for a more effectivecourse load. For example, we find that students with prior programming experience who alsoenrolled in the lab did not perform much better than those with experience who did not enroll inlab. Therefore, if a student has prior knowledge in programming, they can be advised that the
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
) • Reservations attended: 3,589 (actual use of the platform) • Hours attended: 12,146.53Fig. 12. Use of the private cloud at the University of South Carolina between October 1, 2018 to September28, 2019. The platform was used to support academic classes, workshops, and research at the University ofSouth Carolina.The impact of this project is beyond cyberinfrastructure. While resources were placed forcyberinfrastructure courses, training workshops, and research, the Department of IntegratedInformation Technology (IIT) at the University of South Carolina is planning to extend the use ofthe platform to other areas, such as databases, programming, web systems, and others.Comparison between the private cloud and public clouds. Table 6 compares
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing and Information Technology
,” International Journal of Online Engineering, vol. 12, no. 9, pp. 14-21, 2016.[10] T. Tsiatsos, S. Douka, A. Mavridis, S. Tegos, A. Naddami, T. Zimmer and D. Geoffroy, “Evaluation Plan and Preliminary Evaluation of a Network of Remote Labs in the Maghrebian Countries,” International Journal of Online Engineering, vol. 10, no. 5. pp. 15-20, 2014.[11] I. Santana, M. Ferre, E. Izaguirre, R. Aracil and L. Hernandez, “Remote Laboratories for Education and Research Purposes in Automatic Control Systems,” IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp.547 – 556, 2013.[12] R. Heradio, L. Torre and S. Dormido, “Virtual and remote labs in control education: A survey,” Annual Reviews in Control, vol
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
portions of thebook itself. This multi-dimensional way of reading can be immensely helpful as we try toencourage students to create technological solutions for systems that may not even currentlyexist.AcknowledgementsThis paper features the work of undergraduate students Thomas Lopresto, Joshua Quire, andJohn Booker from Spring 2020 and Dakota Fannin from the Fall 2019 Network Switches &Routers course. Partial support for the educational resources related to the project was providedthrough the Quality Enhancement Plan (QEP) Leadership Grant funding at Eastern KentuckyUniversity and is kindly acknowledged. Thanks to the reviewers for their careful review of thedraft and suggestions for improvement.References[1] Ryan, R. M., & Deci, E. L
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
verify the suitability of the proposed implementation w.r.t. the project specifications, which are based on those defined in the standard, and b) Define Performance Tests to analyze the impact of the chosen techniques on the overall system performance.Along with defining those tests, the team develops a set of figures of merit (FOMs) for bothtypes of tests and uses those to quantitatively characterize the performance of the system w.r.t.the project requirements.Developing appropriate FOMs and test plans and analyzing how these are specified in thestandard is a very valuable educational experience. Regulated tests allow interactions among thestakeholders (device manufacturers, network operators, service providers, etc
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Alberto Cureg Cruz, California State University, Bakersfield; Antonio-Angel L. Medel, California State University Bakersfield; Anthony Chistoper Bianchi, California State University, Bakersfield; Vincent Wong On, California State University, Bakersfield; Melissa Danforth, California State University, Bakersfield
Tagged Divisions
Computing and Information Technology
instructorscaffolds with dialogue as needed. As a tertiary benefit, students become familiar with the pair-programming paradigm used in industry. The worksheet problems are a single arc where studentsconstruct a solution/algorithm (computational thinking [20]), rather than work backward from anexisting solution. The pairs are randomly assigned each day. Pairs are chosen carefully by theinstructor to avoid towers of knowledge [41] and ensure zone of proximal development [42]–[44]. The worksheets are graded and worth 25% of an overall grade. Adjusting the plan for theday based on JiTT was a time intensive process that significantly increased prep time for theinstructor by one to two hours before each lecture, in addition to the large one-time cost