at the undergrad-uate curriculum level is slow and elementary [9], [10]. Few hands-on, lab-based teaching materialsexist in this area both for the undergraduate faculty members and the students. Seeing the value ofSDN through our recent study (Senior Capstone Project), we believe it is a great opportunity anda critical mission to identify and enhance the right tools and platforms that enable educators andstudents to teach, learn, and stay up-to-date on SDN. We also believe that it’s imperative to demon-strate how these tools may be effectively utilized and applied through the development and deliveryof fully tested hands-on labs and exercises to our undergraduate inter-networking classes.The paper is organized as follows. In section 2, we
Paper ID #24915Creating Guided Study Exercises for a Flipped Database CourseDr. Karen C. Davis, Miami University Karen C. Davis is an Associate Professor in the Department of Computer Science and Software Engineer- ing at Miami University. Her research interests include database design, query processing and optimiza- tion, data warehousing, and computing education. She has published more than 50 papers, most of which are co-authored with her students. She has advised over 100 senior design project students and more than 40 MS/PhD theses/projects in the area of database systems. She was awarded the ASEE Sharon Keillor
’ best knowledge, no existing tool isreadily available to support peer instruction in the flipped classroom. It should be noted thatthe P2P platform is different from the surveying/grouping tools that are built-in the learningmanagement system that are primarily intended to facilitate team formation for project-basedlearning.Key functions of the P2P platformFigure 1 illustrates a complete peer instruction process made possible by the P2P platform.Before every lecture in classroom, the instructor publishes a set of digitalized learningcontents on the platform based on what he/she thinks students need to learn, together with aset of content-related questions that are intended to solicit students’ feedback. Next,individual students are tasked to
case we could not locate such information [36]. We then performed data processing and endedwith n = 1,775 records for the next step in our analysis. We applied the following Python librariesand packages to process the data: • Pandas: an open-source data analysis and manipulation tool for Python [37]. We used version 1.1.0 in the analysis. • Numpy: an open-source project to enable numerical computing in Python [38]. We applied version 1.18.1. • lxml: a Python library for processing XML and HTML [39], and we used version 4.3.0 in data collection and processing. • Natural Language Toolkit (NLTK): a suite of open-source libraries for symbolic and sta- tistical natural language processing for English written in
marketing [7], andpedagogical improvements [8]. Our project focuses on a relatively unique area, i.e., curiositydetection in text. This paper presents preliminary, yet promising, results of empirically miningwords that demonstrate a curious disposition (of the students) in text data produced by studentsin response to thought-provoking and critical-thinking exercises. The success of our projectcould positively impact efforts to assess both curiosity and its impact on educational outcomes.For many decades, psychologists have wrestled with understanding the nature of curiosity.Recent work by Grossnickle [9] has provided a framework for understanding facets, factors anddimensions of the construct of curiosity that are relevant to the education audience
of online modules infuture semesters. Students’ self-selected project topics indicate that in future semesters the topicsexplored in lecture should be expanded beyond cybersecurity issues to include social mediatopics, particularly cyberbullying body image issues.IntroductionCybersecurity is a growing concern for both the private sector and governments. It has enormousimplications for government security, economic prosperity and public safety. The number of databreaches in the education sector doubled during 2017, with only the financial and healthcaresectors having more breaches [3]. The cost of a data breach in U.S. education is higher than thecost in other sectors and countries [18]. Domains with “.edu” addresses are a high risk for
security. He has served as the key technology person in all aspects of Global Academic Initiatives since its inception, with multiple projects that include more than 30 partner universities from more than 20 countries, and the Global Climate Change course including Brazil, China, India, Mexico and USA. American c Society for Engineering Education, 2021Lab Performance Evaluation via a Workshop SurveyAbstractWe implemented a unique learning system, Competitive Labs-as-a-Service (CLaaS), thatprovided comprehensive cybersecurity awareness education. The system included multipleidentical virtual learning environments. Each learner had his/her own learning environment
practice withinengineering education tend to extend only to other science disciplines [3, 1]. Lattuca et. al.’s2017 engineering education study found that a curricular emphasis on interdisciplinary topicsand skills (specifically including participating in non-engineering co-curricular activities andhumanitarian engineering projects), “significantly and positively relate to engineering students’reports of interdisciplinary skills” [4]. In this paper, we suggest an interdisciplinary computerprogramming exercise based on Ada Lovelace’s 1843 program for Charles Babbage’s AnalyticalEngine, thus promoting knowledge transfer between the humanities (history) and computerscience. Every student of computer science should be aware of the Bernoulli
installation instructions for students using different operating systemsor editors, which creates more time to teach programming concepts. Other examples of platformindependent, low bandwidth course resources are “How to Think Like a Computer Scientist:Interactive Edition” by the Runestone Interactive Project [17] and Trinket.io’s Hour of Pythontutorials [18]. Course materials were chosen to take advantage of high quality open educationalresources (OER) to reduce the costs for learners. NDSU’s Student Government created a grantprogram to encourage faculty to use OER [19] and created a joint committee with the NDSULibraries called the Open Resources Board (ORB) to advocate for the implementation andsustainability of open educational resources at both
their availability to prepare, including non-computing related jobs, caring for a familymember, or ongoing health issues. While we do consider the support mechanisms students mayleverage to overcome obstacles, in general, these results emphasize the larger issues in existinghiring structures, and demonstrate the importance of not treating students as a monolith. Thefindings from this work are intended to inform educators about how to better prepare students tosucceed on technical interviews, and to encourage industry to reform the process to make it moreequitable.1 IntroductionBetween 2019 and 2029, demand for workers in computing occupations are expected to surge28.8% [1]. For specific positions the projected rate is even higher, with 35.0
course is a critical component in the undergraduate computer scienceand engineering curriculum. In an era of mobile and ubiquitous computing, almost everyembedded device can connect online to make full use of its potentials and accommodate taskneeds. Hence, a good understanding of computer networking opens doors for many high-techjobs for computer science and engineering majors. Traditionally, computer networking coursesutilize switches and routers in the laboratory environment to give students hands-on projects toenhance their learning experience. However, due to the pandemic situation, many institutionshave switched to online learning. The computer networking class is not allowed to access thephysical networking equipment in the laboratories
the growth of the Internet is nolonger in question. In fact, the last remnants of the global IPv4 address pools are already dryingup. As Table 1 shows, four of the five Regional Internet Registries (RIRs) have exhausted theirIPv4 address pools and are operating under exhaustion policies that restrict IPv4 addressallocations. Only the RIR for Africa, AFRINIC, has yet to reach full exhaustion. At the time ofwriting AFRINIC is allocating from its final /8 and has a projected exhaustion date of 09November 2019 [1].Table 1. Regional Internet Registry Last /8 Allocation Information. Last /8 Assignment RIR Description
-care provider. The walk-in setup, as opposed to outpatientappointment scheduling, gives multiple challenging potentials to develop what-if scenarios forstudents to further develop their simulation project even after their targeted lab assignment. Thegoal is to inspire students’ creativity and engage them in their learning experience. By providinguser friendly tools that support changing the model, students learn to deal with changing andexploiting scenarios in the case.We use a simple conceptual model with a few nurses, doctors, and staff to represent the clinic.Simplicity and real-world familiarity of this concept provides students with a jumpstart to takeownership of their simulation study. Soon, students realize the complexity of this case
attendance check, all students in the classare required to take pictures (10 pictures in our project for averaging) through the built-in webcamera. These pictures are used to generate the student face database as a reference for real-timeface recognition. To check the attendance of a student for the class, the computer takes facepictures of the student through the real-time video stream and employs deep learning neuralnetworks to predict whether the student matches anyone in the database, and (if yes) furtheridentifies the name of the student. The result of this face recognition will be used to update theattendance record in the format of an excel file. Fig.1 Architecture of the proposed attendance system2.2 Face Detection
toinform students and educators on the hiring process and how to prepare for technical interviews.Moreover, this research serves to provide industry with evidence of the problems inherent withthe existing hiring system. Analysis of these results will be used to offer suggestions andguidelines that will enable a hiring process that can still achieve its target of finding qualifiedapplicants, but that does so in a manner more justly to all job seekers.1 IntroductionJobs in computing are expected to experience 11% growth over the next decade, which is agreater rise than the projected averages for other fields [1]. Although these positions may begaining momentum globally, unemployment remains a real concern for new graduates, asindustry adds barriers
key feature of this offering of this course. Students were giventhree immersion options: industry, research or entrepreneurial. Students divided into groupsbased upon the immersion option that they wanted to pursue as well as the topics that theyindicated interest in. Several project topics were suggested for each category and student groupswere free to propose their own.In the industry option, one group of students had an opportunity to explore the NDSU networkand its security. A second group helped a local business (which one of the students was workingat) to design a security testing exercise which was deployed by the company’s staff who reportedback (somewhat abstracted, for security purposes, results to the students). In both cases
postdoctoral researcher in the Design Lab at UC San Diego.Dr. Mohsen M Dorodchi, UNC, Charlotte Dr. Dorodchi has been teaching in the field of computing for over 30 years of which 20 years as educator. He has taught majority of the courses in the computer science and engineering curriculum over the past 20 years such as introductory programming, data structures, databases, software engineering, system programming, etc. He is involved in multiple NSF supported research projects including Learning and Predictive Analytics Research, Research Practitioner Partnership, Implementing Teaching Methods to help Students learn more efficiently in active learning, etc.Erfan Al-Hossami, University of North Carolina at Charlotte Erfan Al
Computing Identity and Persistence Across Multiple Groups Using Structural Equation ModelingAbstractDespite the projected growth of computer and information technology occupations, manycomputing students fail to graduate. Studying students’ self-beliefs is one way to understandpersistence in a school setting. This paper explores how students' disciplinary identity sub-constructs including competence/performance, recognition, interest, and sense of belongingcontribute to academic persistence. A survey of 1,640 students as part of an NSF grant wasconducted at three South Florida metropolitan public universities. A quantitative analysis wasperformed which included a structural equation model (SEM) and a multigroup SEM. The
total number of hours is not specified by the school. Some schoolsdesignate some commonly recognized math courses as computer science courses, i.e., givingthem computer science course numbers. We took the liberty to move such courses to the mathcourse category. Examples include discrete math, probability and statistics, and modern algebra.In addition, some schools list the lab or project portion of the course separately from the course,while others do not. The hours listed in the table below follow whatever the schools listed. Itcould be slightly misleading in some cases, depending on whether or not the lab or projectportion of the courses is listed separately. Table 1 shows the four pieces of data from the eightschools. The credit hours as
/methods, some of which may be more cost-effective than traditional in-persontools/methods. By adopting proper tools and strategies, we believe that the quality of learning inonline courses can be comparable to, if not better than, that of learning in in-person courses.REFERENCES[1] K. Parker, L. Amanda, and K. Moore, "The digital revolution and higher education: Collegepresidents, public differ on value of online learning," Pew Internet & American Life Project(2011).[2] C. W. Starr, B. Manaris, and R. H. Stalvey, "Bloom's taxonomy revisited: specifyingassessable learning objectives in computer science," ACM SIGCSE Bulletin 40, no. 1 (2008):261-265.[3] P. Li, "Exploring virtual environments in a decentralized lab," ACM SIGITE Research in IT6
have a student that does not have the assumed prerequisite knowledge.Elliott4 suggests a review of the prerequisite material before delving into new material, howeverthat is not always possible for upper-level classes with a lot of prerequisites because that wouldnot leave enough time to teach the new material.In Computer Science, upper level classes often have group projects following the pattern laid outin the classic book “The 7 Habits of Highly Effective People”2. In that book, Covey2 describes aprogression from dependence to independence, followed by interdependence. This closely mirrorsthe ideal path of a Computer Science student: they start in lower level classes being dependent onthe instructor and the textbook in order to acquire the
gradedexams, projects, in-class problem-solving participation via clickers, homework assignments andexercise sets completed in Lab.This study focuses on the Lab, where students complete a series of auto-graded exercises (i.e.”exercise set”) on topics introduced within the last week in the course. Students were stratifiedinto nine Lab sections, each composed of 16 to 35 students. Each Lab Section was assigned toeither the control or the treatment group based on number of students and the time of day of theLab. Four Lab sections were assigned to the control group, totaling 131 students, and five labsections were assigned to the treatment group, totaling 133 students. From the control group 109students consented to this research and in the treatment
book chapters and 12 edited volumes. Her research has been funded notably by NSF and NASA. Between 2004 and 2008, she has co-organized the yearly WebKDD workshops on User Profiling and Web Usage Mining at the ACM KDD conference. She has served on the program committee member, track chair, or senior program committee of several Data mining, Big Data, and Artificial Intelligence conferences, including ACM KDD, WWW, RecSys, IEEE Big Data, ICDM, SDM, AAAI, etc. In summer 2015, she served as Technical Mentor/Project Lead at the Data Science for Social Good Fellowship, in the Center for Data Science and Public Policy at the University of Chicago. She is a member of ACM, ACM SigKDD, senior member of IEEE and IEEE
- dedicated to innovation in traffic safety and public safety technology, as well as research in decision support systems, data analytics and cybersecurity. Throughout his career and through his work with CAPS, Dr. Parrish has obtained approximately 200 funded projects totaling approximately $100M from a variety of state and federal sponsors. Dr. Parrish has published in approxi- mately 100 refereed journals and conferences, and is internationally active in computer science education, having served as the Chair of the Computing Accreditation Commission of ABET, and currently is chair of a major effort to revise the computing accreditation criteria and to develop new accreditation criteria for cybersecurity. Dr. Parrish
that homework accuracy 2 weeks prior can indicate exam perfor-mance [6], which suggests time is an influential factor in flipped classrooms. With this in mind,it is evident that understanding student behaviors is necessary to improve the learning in flippedclassrooms. Willman et al., studied the effect of study habits in students’ performance in CS1 and found that“students who receive the highest grade start and finish their work early, do not work on weekends,and do not work at night....” [18]. Edwards et al., and Shaffer et al., also found that students whobegin programming projects earlier perform better than those who begin closer to the due date[16, 19]. Given that it is mostly accepted that students who start earlier on assignments
is posted in the departmentABET website to share with department community.CMMI Practice 12: Collect Process-Related FeedbackCollect work products, measures, measurement results, and improvement informationderived from planning and performing the process to support the future use andimprovement of the organization’s processes and process assets. This generic practiceprovides a reminder to all organizations and projects to constantly and forever keepimproving the process.Our ABET practiceThe department has made great strides in the assessment, evaluation and implementation ofcontinuous improvement activities.Plan-Do-Check-Act (PDCA) Cycle Applied to Criterion 4 of ABETThe Computer Science Department has been using the CMMI norms diligently
participants working as a teamwere given access to a learning environment for the duration of the workshop. The workshopwas coordinated by the project director with the assistance of one undergraduate and onegraduate student. This allowed every participant an opportunity to have questions answered andto get individual attention from the facilitators.The workshop covered the following topics: • Details of the virtual online learning system for cybersecurity education, CLaaS, that include the network topology, the method to access the environment, the usage of the GUI application, and the introduction of labs • Hands-on lab time to run through the cyberattack and cyber defense scenarios • Presentations of guest speakers5
,replicate tables or activate a procedure [5]. Interested readers can get more information abouttriggers in Oracle 11g at [6]. Figure 2: Schema for the Above ER Diagram:Figure 2 represents the schema for the ER diagram represented in figure 1. Faculty, Qualify andCourse become tables. Since the assign relationship is a one-to-many relationship, there is noneed for assign table. But the key of faculty table (FId) and date assigned are added to coursetable. The programmer has created extra table temp to activate the triggers because in Oracle 11g(used in this project), if the trigger is written on update of course table, it does not allow toaccess the course table in the body of the trigger. But the actual course assignment is done
the best fit to our students. Learning aspecific RTOS has the benefit of being able to utilize it immediately for projects. Nonetheless,the fast development and updates on the area of RTOS may cause the knowledge learned fromone specific RTOS outdated in some time and not applicable to another RTOS.Traditionally, teaching and learning RTOS are implemented in the following ways. First, weteach the students the design principles of RTOS and show them a ready-to use commercialRTOS. We call this a “top-down” approach. The benefit is that students will be able toimmediately deploy that specific RTOS [1]. However, without a thorough understanding of whyand how tasks are created and managed by the RTOS, students lack the skill set to pick up a
Toler, West Virginia University Institute of Technology Mardigon Toler is a student of Computer Science and Mathematics at West Virginia University Institute of Technology, finishing a bachelor’s degree in both fields in spring 2019. His interests include digital audio, digital signal processing, and distributed and parallel computing. His past projects have included applications of AI to real-time music accompaniment as well as real-time software-based audio synthesis using Fourier transforms. c American Society for Engineering Education, 2019 Investigating Communication Patterns for Distributed Fast Fourier TransformsIntroduction Fast