security issues in their software engineering careers.Students were asked to rank the learning objectives on a Likert scale of 1 to 5 where 1 was theworst ranking and 5 was the best ranking Generally, the results of the survey demonstratedstudents ranked the objectives well, with the lowest score for the objective about developing anaction plan for ethics indicating ways to improve the module in future course offering. Thehighest values were given to considering multiple viewpoints, indicating the mindset aspects ofthe project may have been successful.Based on the outcome and student feedback recommendations for future implementation of themodule in the curriculum is discussed.IntroductionThis paper describes a classroom module designed to develop
so the organization may effectively conduct cybersecurity work Strategic planning and policy Executive cyber leadership Program/project management and acquisition Protect and Defend Identifies, analyzes, and mitigates threats Cyber defense analysis to internal information technology (IT) Cyber defense infrastructure support systems and/or networks Incident response
computing. She is currently involved with an NSF-funded S-STEM project that awards scholarships to students studying computing at USF. The project implements a suite of community- building activities designed to improve scholars’ self-efficacy and develop computing identity. Sami also co-directed a project that developed system support and user-driven strategies for improving energy effi- ciency in residential buildings. Sami has served in a number of service roles at USF and in her professional community. She was chair of the Computer Science department at USF from 2013-2016. She also served on the editorial board of Sigmobile’s GetMobile Magazine from 2014-2018. She has been involved with the discipline-specific
ITinfrastructure hosting these endpoints thus limiting effective support.The ECU team leading the service enablement project needed a solution that will enable it and the projectstakeholders to have the visibility necessary to manage the assets, the infrastructure and the serviceinvolved in this offering. The goal is to gain this visibility and enable self-governance without requiringsignificant commitments from the IT teams at each of the locations, either in terms of configuration andpolicy changes or in terms of direct support. 4This problem statement spurred two cross-departmental projects: • The development of an Edge Computing platform
are encapsulated and modularized with friendly and easy-to-useinterfaces. AI curricula are developed based on constructivism, project-based learning andmultidisciplinary integration. Typical teaching cases, such as speech recognition, text recog-nition, image recognition, intelligent transportation, smart home, intelligent robots, etc.,which are used to enhance comprehension of AI concepts and applications, are also discussed. Keywords : AI Education, Innovation Capability, Constructivism, iSTREAM1. Introduction The radical and transformative technological revolution of artificial intelligence (AI) hasresulted in fundamentally new ways of science and engineering practice. Countries aroundthe world have released national strategies to
individuals who already are pursuing their careers in a given field. These three reasons forthe top ranking of data science as a career choice are: i) the overall shortage of data analyticstalent, ii) the ever-growing demands of “big data” on companies and other organizations, and iii)the aforementioned fact that facing the challenges of, and working with, the “big data” is nolonger limited to a handful of tech giants (and government agencies) [2]. While most expertpredictions and analyses project an-ever growing gap between all computer science andinformation technology related industry needs and job openings on one hand, and the producednumber of college graduates with prerequisite skills and degrees on the other, such projectionsfor data
and project management.Dr. Abdelfattah Amamra, California State Polytechnic University, Pomona Dr. Abdelfattah Amamra joins California State Polytechnic University, Pomona as an Assistant Professor in the Department of Computer in the College of Sciences. Prior to coming to CalPoly, Pomona he was an Assistant Professor at the University of Conncticut. Dr. Amamra received his Ph.D. from the University of Quebec, Montreal , Canada. His primary research interests are in the field of cybersecurity and machine learning. Specifically, he is interested in smartphone security, and IoT security. c American Society for Engineering Education, 2018 Development of Undergraduate Interdisciplinary
on computer systems and applications, networking, communication systems, along with digital, analog, and machine-control electronics. He is the recipient of the 2013 Golden Apple Award for Teaching Excellence at Eastern and has been nominated multiple times for the Critical Thinking Teacher of the Year Award. His professional interests include implementing active teaching and learning strategies, metacognition, integrating open-source software/hardware with online control, and deploying electrical and telecom technologies in community-based organizations. He is always seeking opportunities for collaborating on teaching, scholarly, and service projects, especially those aimed at improving students’ critical
Engineering Education, 2018 Short-format workshops build skills and confidence for researchers to work with data.AbstractTraining for data skills is more critical now than ever before. For many researchers in industryand academic environments, a lack of training in data management, munging, analysis andvisualization could lead to a lack of funding to support sustainable projects. Today’s researchersare often learning ‘as they go’ and need the flexibility of short, or self-paced learningexperiences. Research results in educational pedagogy, however, stress the importance of guidedinstruction and learner-instructor interaction, which contrasts the need for ‘just in time’ training.We’ve taken a distinctive approach to this
Security Officer for the Arkansas Office of Health Information Technology (OHIT). She worked with the team at OHIT to implement the State Health Alliance for Records Exchange (SHARE). Dr. Harrell has over 25 years’ experience with the technology field, serving as an educator, implementer, and manager. Dr. Harrell is a certified Project Manager and a Certified Public Manager. She has worked with the Arkansas State Cyber Security Office to ensure successful implementation of many State security projects, one of which received the George C. Askew Outstanding Project Award for Certified Public Managers. c American Society for Engineering Education, 2020 From degree to Chief Information
sites based on their research projects, thereis still a need to provide new PIs with guidance on the different aspects of an REU site such asidentifying resources that can assist in recruiting women and underrepresented minorityapplicants, providing training for graduate students acting as mentors, and strategies for keepinga mentoring connection to undergraduate researchers after they return to their home institutions.Currently, REU site preparation and orientation for new PIs is a face-to-face process thatrequires careful planning and significant travel costs. The REU PI Guide, a set of web-basedresources at https://www.vrac.iastate.edu/cise-reu-pi-resources/, was developed to share bestpractices of experienced PIs and build capacity within
security. Education inthe field of cybersecurity suffers from natural difficulties because of these factors. Any tool thatcan ease the way of students and educators alike to explore cybersecurity is vital to meeting thedemands of a more interconnected world than ever.Offering courses in cybersecurity is an effective way to educate about the theoretical aspects ofsecurity. However, a workshop of recognized experts run by ACM's education board determinedwithout a doubt that studying theory is not enough to prepare a potential cybersecurityprofessional (McGettrick, 2013). In the light of the shift of infrastructure from physical toelectronic control and the rising number and severity of cyber-attacks, the DETER project wascreated (Mirkovic, et al
Paper ID #33383Broadening the Middle School Computational Thinking Interventions Be-yondBlock ProgrammingDr. Mohsen M. Dorodchi, University of North Carolina at Charlotte Dr. Dorodchi has been teaching in the field of computing for over 30 years of which 20 years as an educator. He has taught the majority of the courses in the computer science and engineering curriculum over the past 20 years such as introductory programming, data structures, databases, software engineering, system programming, etc. He has been involved in a number of National Science Foundation supported grant projects including Scholarship for STEM
funding agencies. He is a member of the editorial board for a number of professional journals as well as an Editor-in-Chief of the International Journal of Online Engineering. Dr. Azad is active with remote laboratory field and is the President of the Global Online Laboratory Consortium (GOLC) as well as the Vice-President of the International Association of Online Engineering (IAOE). Dr. Azad is also active with few other professional organizations like- IEEE, IET, ASEE, ISA, and CLAWAR Association and served as Chair and Co-Chairs of numerous conferences and workshops. He was a program evaluator for the ABET and is active in evaluating research and development projects for various national and international funding
at Reynolds Community College in Richmond, Virginia in 2009 and moved to VCU in August 2016. Debra has served on the advisory board for Lighthouse for Computer Science (LH4CS). The goal of the Lighthouse project is to improve computer science diversity through faculty professional development. In addition, she is a member of the Advisory Council for the Deep Run High School’s Center for Informa- tion Technology in Glen Allen, Virginia, where she provides program support and assists in curriculum development for their technology-based preparatory program for future computer scientists.Dr. Mandayam Thirunarayanan, Florida International University Mandayam Osuri Thirunarayanan is an associate professor in the School of
nanotechnology fabrication. The virtual SEMis located in a room designated for measurement which also includes a virtual light microscope.Other rooms include a photolithography room, an etching room, and a room for thin filmdeposition. This paper focuses on the SEM module of the VR project.2.0 RationalThe goal of the SEM module is to enable students to become familiar with the features,capabilities, and controls of the SEM in a cost effective, safe, and interactive environment, priorto, or in the place of, using a real SEM. Benefits of using the VR SEM are listed below.Cost effectiveThe VR SEM can negate costs associated with SEM education in the following ways: • Reduces the high energy and material costs of running the SEM continually during
attend lectures in person on any given day.In addition to watching lectures, students complete one project-based homework assignmenteach week. These assignments involve reading, writing, solving and reasoning about a mini-project like single problem in MATLAB which are expected to be difficult. Due to theirdifficulty, students are able to collaborate with other students, attend office hours, and access theinternet for help throughout the week.The other course resources offered are standard among any introductory programming course:practice exams, office hours, and some additional content on the course’s online page. Thestructure of the exams is also fairly standard. About half of the exam involves solving problemsby writing out programmatic
Course SCHCybersecurity 3 Big Data Security 3Introduction to Databases 3 Network Security and Management 3Introduction to Operating Systems 3 Cryptography 3Introduction to Networks 3 Advanced Cybersecurity Elective 3Technical Communication 3 Junior Cybersecurity Design Project 3Semester Total 15 Semester Total 15 Year 4 Course SCH Course SCHStatistics
federal agencies, and has numerous publications in refereed journals and edited books. Her research interests include communities of practice, gender, transformative learning, and identity.Dr. Ann C. Gates, University of Texas at El Paso Dr. Ann Quiroz Gates is an AT&T Distinguished Professor and Chair of the Computer Science Depart- ment and past Associate VP of Research and Sponsored Projects at the University of Texas at El Paso. Gates directs the NSF-funded CyberShARE Center of Excellence that has a mission to advance interdis- ciplinary education and research. She served on the Naval Research Advisory Committee (2016-2018) and currently serves on the NSF CISE Advisory Committee on Education and
presented is the first iteration of a larger system. For this firstphase of the project, the system uses standard (draft) schedule report spreadsheets. These areprocessed to calculate individual faculty loads, detect conflicts, produce visual schedules, trackunstaffed courses, banked credit, etc. More importantly, the analysis uses information about thestructure of the curriculum to support cohort oriented scheduling.The project has been implemented in Matlab using Tables. Although other platforms might bebetter suited to this type of data analysis, the use of Matlab makes it easier to modify and extendin Engineering schools. This is in major part due to the widespread use of Matlab inUndergraduate and Graduate curriculum. The programs described in
, 2018Leveraging the power of Matlab, SPSS, EXCEL and Minitab for Statisticalanalysis and inferenceAbstractFor many undergraduate and graduate engineering technology students, data collectionand data analysis—including methodology, statistical analysis, and data preparation—is the most daunting and frustrating aspect of working on capstone senior projects andmaster’s theses. This paper provides an introduction to a number of statisticalconsiderations, specifically statistical hypotheses, statistical methods, appropriateanalytic techniques, and sample size justifications. Statistical analysis of data utilizingstatistical software packages, including MATLAB, SPSS, Minitab, EXCEL, and R,will be shown for scientific applications, quality assurance, corporate
the final project. This section will introduce the topics under each of the fourcategories as well as provide references to the teaching materials.It is possible for our departments to provide hardware to students, but that was not done in thispreliminary case. Thus, the course will require students to purchase their own hardware to build afinal project. To offset this cost, the class will rely on open source teaching materials whenavailable. Consequently, most of the referenced books are available for free and provide thenecessary technical content that is appropriate for our students’ level.Section 1: Background (Weeks 1-3)This section refreshes analytical and programming topics that are needed for EAI.In terms mathematical content, we will
interaction of assessment withlearning and teaching. As an integral part, assessment provides an opportunity for teachers and students alike toidentify areas of understanding and misunderstanding. With this knowledge, students andteachers can build on the understanding and seek to transform misunderstanding into significantlearning (N.R.C., 1993). Assessment as ‘learning’ is not a third-party research project orsomeone's questionnaire; it must be viewed as a community effort or nothing, driven by afaculty's own commitment to reflect, judge, and improve (Narayanan, 2007 & 2009). The author has tried to follow such a philosophy while gathering data for this project. Inthis presentation the author provides some guidelines for
chain iscreated (through the generation of a genesis/root block), no one has access to modify the genesisblock itself, however, participants can add additional blocks to the chain but not modify them oncemined or validated. There is no way to start over in the public blockchain implementation whichmakes teaching blockchain technology using public platforms extremely challenging. The mainreason is the abstract concept of the blockchain which presents a significant challenge to introduc-ing the blockchain technology in the undergraduate curriculum and demystifying the blockchainnetwork and its inner workings.In this project, two students and their advisor embarked on defining, designing, constructing, andconfiguring a Private Blockchain
labs. (The course was set up for students to complete pre-labs,2/3 of the homework assignments, class related activities, and one project with their teammates).The badges often helped as stress relief and occasionally rewarded students for “grit”. Thesebadges being a 0% column in the gradebook allow students to access and see their achievementswhenever they wanted. Additionally, they would receive a notification from the system when thebadge was “entered”. The idea behind this badge system is to encourage students to work hardand achieve various skills through the semester. The badges are like those often earned in a videogame. Although not all programming students are huge video game players, many of them are,and most have dabbled a little
base of Chinese Academy of Engineering. I studied information and computing science for my bachelor degree. And I became a PhD Candidate in Educational Economy and Management in Zhejiang University after my graduation. Engineering education, as one of the main research field in ICSTEP, has become my research topic since I have participated in several research projects of engineering education funded by Chinese Academy of Engineering and Ministry of Education.Prof. Wei Zhang, Zhejiang University 2015-Present Professor, Institute of China’s Science,Technology and Education Strategy, Zhejiang Uni- versity Associate director of Research Center on Science and Education Development Strategy, Zhejiang University 2012-2014
toproductive time. For example, people can work on a project, write an email, check kid’sschoolwork, make phone calls or text messages, read book or listen to podcast, or simply enjoythe ride.Second, traffic congestion will be reduced. One of the leading causes of traffic jams is selfishbehavior among drivers. If drivers space out and allow each other to move freely between laneson the highway, traffic would flow more smoothly. Self-driving cars can be programmed to 3space out automatically, and thus help reduce congestion. In addition, with traffic information,self-driving cars can calculate alternative and more efficient routes in real time.Third, drivers spend less time on parking. Self-driving cars
solve a problem. Reflection prompts can guide studentsto articulate a problem and develop their problem-solving skills [3].In a Data Structures and Algorithms courses we expect students to use their knowledge fromintroductory programming courses to implement data structures and algorithms for solvingproblems efficiently in terms of space and time complexity [4]. Assignments and projects in DataStructures and Algorithms require students to make decisions about what data structures to useand are challenging enough that jumping straight into coding is not an efficient way to solve theproblem. Students often have a hard time choosing the most efficient data structure, which maybe less familiar, rather than the data structures they are comfortable
determine which efforts are worth the scarce resources. More information about theSystemic Change Model, as well as links to free resources, can be found athttps://www.ncwit.org/project/extension-services-undergraduate-programs. Recruiting Components Messaging Media Activities Existing Influencers Programs &
for collaborating on teaching, scholarly and service projects, especially those aimed at improving students’ critical/creative and communication skills. c American Society for Engineering Education, 2019 Boardnotes 2.0 in Computer Networking: Organizing and Representing Meaningful Technical Information Graphically for Improving Learning CompetenciesAbstractThe field of computer information technologies in general, and more specifically that of networkswitching and routing, is filled with abstractions, abbreviations, and acronyms, along with anaccompanying assortment of implementation techniques frequently requiring customization.Bridging the divide between theory and