Asee peer logo
Displaying results 1 - 30 of 33 in total
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #26401How an NSF S-STEM LEAP Scholarship Program Can Inform a New Engi-neering ProgramDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor and Chair of Engineering Department at Utah Valley University. She re- ceived her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems De- sign, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Kristen Przyborski, University of New Haven; Frank Breitinger, University of New Haven; Lauren Beck, University of New Haven; Ronald S. Harichandran, University of New Haven
Tagged Divisions
Computing and Information Technology
Sound Studies in mobile audio works that she calls ”ototheatre.” More recently, Lauren has begun to study the impact of theatre studies on pedagogical practice in non-theatre courses.Dr. Ronald S. Harichandran, University of New Haven Ron Harichandran is Dean of the Tagliatela College of Engineering and is co-PI of the grant entitled Development of the ’CyberWorld’ Common Course at the University of New Haven that facilitated the work reported in this paper. c American Society for Engineering Education, 2019 ‘Cyber World’ – A Cybersecurity Theme for a University-Wide First-Year Common CourseAbstractWhile living in a cyber-connected society provides students with
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
conferences in robotics, software engineering, and computer science education. He has garnered multiple international awards in innovation including the third place in Robocup world competition.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing Information Sciences and STEM Trans- formation Institute. Dr. Ross earned a doctoral degree in Engineering Education from Purdue University. She has a Bachelor’s degree in Computer Engineering from Elizabethtown College, a Master’s degree in Computer Science and Software Engineering from Auburn University, eleven years of experience in in- dustry as a software engineer, and six years as a full-time faculty in the
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Seyed Mousavinezhad, Idaho State University; Cheryl Xu, North Carolina State University
Tagged Divisions
Computing and Information Technology
Paper ID #26981Science and Engineering Courses, Theory and Practice; An ExampleDr. S. ”Hossein” Mousavinezhad P.E., Idaho State University Dr. Mousavinezhad was the principal investigator of the National Science Foundation’s research grant, National Wireless Research Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active mem- ber of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rendong Bai, Eastern Kentucky University; Wutthigrai Boonsuk, Eastern Illinois University; Peter P. Liu
Tagged Divisions
Computing and Information Technology
company has successfully launched semi-autonomous vehicles (Model S and Model X) to Indian market, while Google’s Self-Driving Car(SDC) has been in development since the last decade (Figure 6). Google and Tesla differ fromeach other in the approach they take towards building self-driving cars. Their differences aremainly in two areas, computer vision technology and human car control.Google embraced the LIDAR (Light Detection and Ranging) technology [23], now a de factostandard for autonomous vehicles to form a 3D model of the world around the car (Figure 7).LIDAR is used to determine the size and distance of all things around the car in anycircumstance or situation. However, LIDAR has its own challenges:  LIDAR is expensive and proves
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afrin Naz, West Virginia University Institute of Technology.; Mardigon Max Toler, West Virginia University Institute of Technology
Tagged Divisions
Computing and Information Technology
actual input data; it onlyrelies on n. Therefore, a lookup table can be pre-computed and loaded at runtime. We first definean algorithm in Python-based pseudocode that determines where samples should reside at eachstage of the algorithm, as in Figure 2. Figure. 2 Algorithm for computing table A of sample indices at each stage From this table, we can compute another table that explicitly states the destination indexthat a sample needs to be sent to. That is, using the new table B, calculated using the algorithm inFigure 3, during stage s, sample i in the current buffer should be sent to position B[s][i]. Figure. 3 Algorithm for determining table B, which contains the destination of the current stage's samples
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
IPv6, the Internet’s migration to the new protocol has beenanything but smooth. Many have expressed doubts, and some still do, that IPv6 will reach fulladoption and replace IPv4 as the Internet’s dominant protocol. However, empirical data suggeststhat Internet IPv6 adoption has entered a phase of rapid acceleration [3]. A recent study by [4]found that the number of IPv6 users on the Internet has reached the early majority level ofadoption and full adoption could occur as early as December 2024. Figure 1 shows the numberof users accessing Google over IPv6 reached 26.31% in January of 2019 [5].Figure 1. The adopter distribution normal curve partitioned into adopter categories overlaid withthe S-shaped diffusion curve [6]. The number of IPv6
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Debra M. Duke, Virginia Commonwealth University; Mandayam Thirunarayanan, Florida International University; Abigail Byram, Virginia Commonwealth University; Peter J. Clarke, Florida International University
Tagged Divisions
Computing and Information Technology
Science.As SEP-CyLE continues to evolve and as more information is collected regarding itsimplementation in classrooms in educational institutions across the country, it is likely to becomea valuable tool that students and instructors can use to facilitate teaching and learning incomputer science courses.References[1] Bureau of Labor Statistics, United States Department of Labor , "Software Developers," 13 4 2018. [Online]. Available: https://www.bls.gov/ooh/computer-and-information- technology/software-developers.htm. [Accessed 4 2 2019].[2] D. F. Shell, L. Soh, A. E. Flanigan and M. S. Peteranetz, "Students' Initial Course Motivation and Their Achievement and Retention in College CS1 Courses," in Proceedings of the 47th ACM
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Sanish Rai, West Virginia University Institute of Technology
Tagged Divisions
Computing and Information Technology
behavior can be observed in a building environment.More specifically, the building environment is represented using vertex for nodes and connecting structureslike doors, stairs by links. The occupant in the model is represented using a variable o having state s, where o = ph, v position, id , g id , l from , s   staying  s =  moving inqueue  Here, ph represents the phase of the occupant which represents the environment condition of the building,vposition represents the current vertex the
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
., & LaVaque-Manty, D. (2007). Transforming science andengineering: Advancing academic women. University of Michigan Press.[6] Ceci, S. J., Williams, W. M., & Barnett, S. M. (2009). Women's underrepresentation in science:sociocultural and biological considerations. Psychological bulletin, 135(2), 218[7] Gaughan, M., & Bozeman, B. (2016). Using the prisms of gender and rank to interpret researchcollaboration power dynamics. Social Studies of Science, 46(4), 536-558.[8] Pereira, M. D. M. (2010). Higher Education Cutbacks and the Reshaping of EpistemicHierarchies: An Ethnography of the Case of Feminist Scholarship.Sociology, 44(2), 287–304.[9] Amâncio, L. (1993). Género: representações e identidades. Análise das representações
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Merlinda Drini, Queensborough Community College of the City University of New York
Tagged Divisions
Computing and Information Technology
WNodes number 60 Mobility model Random-WaypointRouting protocol DSR Propagation model Rayleigh fadingMAC protocol 802.11 Carrier Frequency 2.4 GHzPacket size 512 bytes Speed 1-20 m/s - Only when channel quality was considered - When both, the channel quality and the residual power of the nodes were considered. (SP-DSR).The average end-to-end delay is the cumulative of all possible delays in the links and the nodes.Traditional DSR has higher delays, due to the buffering delays of route recoveries and theretransmission delays at the link layer. SP-DSR has the best end-to-end delay
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
.[2] Cyber Seek, “Cybersecurity Supply/Demand Heat Map,” Cyber Seek Website, 2019. [Online]. Available: https://www.cyberseek.org/heatmap.html. [Accessed: 03-Feb-2019].[3] M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A survey on automated dynamic malware-analysis techniques and tools,” ACM Comput. Surv., vol. 44, no. 2, pp. 1–42, Feb. 2012.[4] S. Kalra and S. K. Sood, “Elliptic curve cryptography,” in Proceedings of the International Conference on Advances in Computing and Artificial Intelligence - ACAI ’11, 2011, pp. 102–106.[5] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Computing and Information Technology
VeryDissatisfied Dissatisfied Satisfied Satisfied 1 2 3 4 5 Very Neutral VeryDissatisfied Dissatisfied Satisfied Satisfied 1 2 3 4 5 6 Extremely Very Somewhat Somewhat Very ExtremelyDissatisfied Dissatisfied Dissatisfied Satisfied Satisfied SatisfiedAPPENDIX B: Five–Point Likert Scale. Rubrics courtesy of W. S. U., Pullman, WA. 5 Has demonstrated excellence. Has analyzed important data precisely. Has provided documentation. Has answered key questions correctly. Evidence of
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona; Eliezer Ochoa Jr.; Joshua David De Piano; Michael G. Milford; Alan Moses Galvan; Alireza Kavianpour, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
inception to completion. .The studentsdemonstrated an enhanced understanding of the alternative route for green energy with reneweddesign emphasis on Digital Parasitic applications that employs Thermoelectric GeneratorPeltier instead of traditional analog mechanization. We have collected no data to quantify if thisapproach will be satisfactory with all our capstone senior project students, since the newbatch of students have just started taking their senior project capstone course sequence.References[1] Callan, S. J., & Thomas, J. M., Environmental Economics and Management, Cengage Learning, 2012.[2] Mazidi, M. A., Causey, D., Mazidi, J. G., HCS12 Microcontrollers and Embedded Systems, using assembly and C with code warrior, Pearson
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Peter J. Clarke, Florida International University; Debra Lee Davis, Florida International University; Ingrid A. Buckley, Florida Gulf Coast University; Geoff Potvin, Florida International University; Mandayam Thirunarayanan, Florida International University; Edward L. Jones, Florida A&M University/Florida State University
Tagged Divisions
Computing and Information Technology
integrate LESs into F2F and online class activities, and evaluate which combina-tion(s) of LESs can be most effective on improving student learning.3 Pedagogical Approach using LESsIn this section we present our proposed LES integration model (LESIM), a brief overview of SEP-CyLE, and a description of how LESs are integrated into the F2F and online activities of a softwaretesting class. Preliminary results obtained by comparing the midterm exam scores prior to usingLESs and while using LESs in the classroom are also presented.3.1 LES Integration Model (LESIM)Conceptually LESIM is used to improve student learning based on the model shown in Figure1. The top of the figure shows the pedagogical approaches (LESs and traditional approach) thatare
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Asuman Cagla Acun Sener, University of Louisville; Jeffrey Lloyd Hieb, University of Louisville; Olfa Nasraoui , University of Louisville
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
automatic alerts that are integrated with the visualizations.References:[1] Z. T. Siti Khadijah Mohamada, "Educational data mining: A review," in The 9th InternationalConference on Cognitive Science, Malaysia, 2013.[2] R. S. Baker, "Data Mining for Education," in International Encyclopedia of Education (3rdedition), Oxford, 2012.[3] C. G. Merrett, "Using Textbook Readings, YouTube Videos, and Case Studies for FlippedClassroom Instruction of Engineering Design," in Proc. 2015 Canadian Engineering EducationAssociation (CEEA15) Conf., Canada, 2015.[4] D. N. A. G. M. S. Kenneth A. Connor, "Faculty Development and Patterns of StudentGrouping in Flipped Classrooms Enabled by Personal Instrumentation," in 2017 ASEE AnnualConference & Exposition
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Karen C. Davis, Miami University
Tagged Divisions
Computing and Information Technology
classroom activities.AcknowledgementThe author is grateful for the help of undergraduate teaching assistants in the course sectionsunder study in this paper: Max Anderson, John Biggs, Zachery Eldemire, and Megan Moore.BibliographyCrouch, C. H., Watkins, J., Fagen, A. P., & Mazur, E. (2007). Peer instruction: Engaging students one-on-one, all at once. Research-based reform of university physics, 1(1), 40-95.Freeman, S., Eddy, S. L., McDonough, M., Smith, M. K., Okoroafor, N., Jordt, H., & Wenderoth, M. P. (2014). Active learning increases student performance in science, engineering, and mathematics. Proceedings of the National Academy of Sciences, 111(23), 8410-8415.Garcia, S. (2018). Improving classroom preparedness using guided
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
documentation. Thestudents’ feedback and their final project presentation indicate that they have pride in theirproject accomplishments and have gained confidence in their engineering abilities.References 1. Akyildiz, Ian and Mehmet Can Vuran, “Wireless Sensor Networks”, Wiley, 2010. 2. Li, Yingshu, My Thai, and Weili Wu, “Wireless Sensor Networks and Applications”, Springer, 2008. 3. Dargie, Waltenegus, and Christian Poellabauer, “Fundamentals of Wireless Sensor Networks: Theory and Practice”, Wiley, 2010. 4. Minaie, Afsaneh, et al., “Integration of Wireless Sensor Networks in the Computer Science and Engineering Curricula”, Proceedings of the ASEE Annual Conference, June 2012. 5. M. Assaf, R. Mootoo, S. Das, E. Petriu, V
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Divisions
Computing and Information Technology
robots that are programmable in the sameprogramming language used in the class. Affordability and low maintenance costs are alsoimportant factors to long term sustainability of these activities.Our initial experience with robotics in programming classes indicate that most students enjoyrobotics and they become more motivated to learn programming. We are pleased with theoutcome and will continue using robotic activities in our introductory programming classes.References 1. Bennedsen, J. and Caspersen, M.E.” Failure rates in introductory programming.” SIGCSE Bull. 39, 2 (2007), 32–36 2. Jennifer S. Kay, “Robots in the classroom...and the dorm room,” Journal of Computing Sciences in Colleges, vol. 25, Issue. 3, Jan. 2010, pp
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jingshan Wu, Zhejiang University; Yujie Wang, Zhejiang University; Hanbing Kong, Zhejiang University; Ling Zhu, Zhejiang University
Tagged Divisions
Computing and Information Technology
Paper ID #27348How to Cultivate Computational Thinking-Enabled Engineers: A Case Studyon the Robotics Class of Zhejiang UniversityDr. Jingshan Wu, Zhejiang University Postdoctoral Fellow of Institute of China’s Science, Technology and Education Strategy, Zhejiang Uni- versity; Lecturer, School of Public Administration, Zhejiang University of Finance & EconomicsMs. Yujie Wang, Zhejiang University Postgraduate of Institute of China’s Science,Technology and Education Strate, Zhejiang UniversityMs. Hanbing Kong, Zhejiang University Hanbing Kong, PhD Deputy Director, the Research Center for S&T, Education Policy, and Associate
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Arati Banerjee, University of Central Florida; Damla Turgut, University of Central Florida; Cliff C Zou, University of Central Florida
Tagged Divisions
Computing and Information Technology
- anguished-outraged/Hayajneh, T., Denis, M., & Zena, C. (2016). Penetration testing: Concepts, attack methods, and defense strategies. 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), (pp. 1-6).McGettrick, A. (2013). Toward Effective Cybersecurity Education. IEEE Security Privacy, 66- 68.Microsoft Corporation. (2014). Support for Windows XP ended. Retrieved from https://www.microsoft.com/en-us/windowsforbusiness/end-of-xp-supportMicrosoft Security Bulletins. (n.d.). Retrieved from https://docs.microsoft.com/en- us/security-updates/Mirkovic, J., Benzel, T. V., Faber, T., Braden, R., Wroclawski, J. T., & Schwab, S. (2010). The DETER project: Advancing the science of cyber
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Naeem Seliya, Ohio Northern University; Heath Joseph LeBlanc, Ohio Northern University; J. Blake Hylton, Ohio Northern University; Ziad Youssfi, Ohio Northern University; Matthew Schweinefuss
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
detection. In addition, a study on the trends of curiositylevels across the different lab’s QFT data may yield insight into whether students are improvingin their critical thinking skills and developing more curiosity in exploring a provocative orchallenging statement. We also plan to continue work with studying curiosity detection withother learners, other data mining schemes, investigating linguistic text mining methods, andother QFT or question-based datasets.References[1] D. L. Schwartz, J. M. Tsang, and K. P. Blair. The ABC’s of How We Learn: 26 Scientifically Proven Approaches, How They Work, and When to Use Them. W. W. Norton & Company, Inc., New York, NY, 2016.[2] M. J. Kang, M. Hsu, I. M. Krajbich, G. Loewenstein, S. M. McClure
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said, Davenport University; Ghaythah Abdullah Alqarna
Tagged Divisions
Computing and Information Technology
expected by chance” [2, para. 1]. The second test was Kendall’s tau to show correlations between organizational successand implementation of a defined process model. Kendall’s tau is a measure of rank correlation.“Kendall-tau is a non-parametric correlation coefficient used to assess and test correlationsbetween non-intervals scaled ordinal variables. Frequently, researchers use the Greek letter τ(tau) to abbreviate the Kendall tau correlation coefficient” [5, p. 14]. Rank correlation is aninteresting method to assess and evaluate the data collection [22]. Kendall’s tau is well knownand broadly used to measure the degree of the relationship between variable [22].References1. Aasheim, C. L., Lixin, I., & Williams, S. (2009). Knowledge
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Jianming Deng, Jinling Institute of Technology and Southeast University
Tagged Divisions
Computing and Information Technology
80 96 120 digital circuits Others 128 64 144 48 40 390As can be seen, the science and engineering course requirements vary much more across schools,compared to the requirement of computer science courses and math courses. All schools exceptBUAA require a digital logic (or analog and digital circuits) course. It is possible that BUAA hasthe digital logic component in other courses. Overall, these schools require physics course(s) asthe science requirement. No schools require other areas of sciences such as chemistry, biology,or any other natural science courses.7. Social sciences, humanity, and arts requirementIn this section, we examine the non
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Zhaohong Wang, California State University, Chico; Jing Guo, California State University, Chico
Tagged Divisions
Computing and Information Technology
, William, and Moumita Mitra Manna. Operating systems: internals and designprinciples. Pearson, 2015.[3] Labrosse, Jean J. MicroC/OS-II: The Real Time Kernel. CRC Press, 2002.[4] Catarinucci, Luca, Danilo De Donno, Luca Mainetti, Luca Palano, Luigi Patrono, MariaLaura Stefanizzi, and Luciano Tarricone. "An IoT-aware architecture for smart healthcaresystems." IEEE Internet of Things Journal 2, no. 6 (2015): 515-526.[5] Pack, D., and Barrett, S., "Real Time Operating Systems: A Visual Simulator", in 2004American Society of Engineering Education Annual Conference, Salt Lake City, Utah. June,2004[6] Huang, Y., and Cheng, C., "Work in Progress: Tackling the Problems of KnowledgeIntegration and Barriers to Active Learning in a CDIO Course of Embedded
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
(Feb. 2005).[2]. State of Cybersecurity: Implications for 2016 - An ISACA and RSA Conference Survey. Retrieved from https://www.isaca.org/cyber/Documents/state-of-cybersecurity_res_eng_0316.pdf[3]. Top U.S Universities failing at Cybersecurity Education. Retrieved from https://www.cio.com/article/3060813/it-skills-training/top-u-s-universities-failing-at-cybersecurity- education.html[4]. Can higher education fix the cybersecurity shortfall? – Retrieved from http://www.schools.com/articles/cybersecurity-shortfall[5]. D. Rowe, B. Lunt, J. Ekstorm, “The Role of Cyber-Security in Information Technology Education” - SIGITE’11, October 20–22, 2011. 3[6]. Cybersecurity job market to suffer severe workforce shortage. Retrieved from
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Xiaoyan Gong, Institute of Smart Education, Qingdao Academy of Intelligent Industries. ; Liang Zhao, Faculty of Information Technology, Beijing University of Technology; RenHao Tang, Faculty of Information Technology, Beijing University of Technology; YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology; Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy of Sciences; Jian He, Faculty of Information Technology, Beijing University of Technology; Fei-Yue Wang, National Key Laboratory of Management and Control for Complex Systems, Chinese Academy of Sciences; Ying Tang, Rowan University; Wanruo Shi, Beijing Normal University; Xiaojie Niu, Beijing Normal University; Xinzhu Wang, Beijing Normal University
Tagged Divisions
Computing and Information Technology
. Elliot, W. Crumpler, and K. Lloyd, “A National Machine Intelligence Strategy for the United States.”Report of the CSIS technology policy program, 2018. [2] China, the State Council, “New Generation Artificial Intelligence Development Plan,”2017. [3] X. Han, X. Liu, F. Hu, et al, “Design of AI+ Curriculum for Primary and Secondary Schools in Qingdao,” Proceedings of 2018 Chinese Automation Congress, Nov.30-Dec. 2, 2018, Xi’An, China, [4] F. Wang, and J .S. Lansin, “From Artificial Life to Artificial Societies--New Methods for Studies of Complex Social Systems,” Complex Systems and Complexity Science, Vol. 1, No. 1, pp. 33-41,2004. [5]F. Wang, “Parallel system methods for management and control of complex systems. Control and Decision
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Chaomin Luo, Mississippi State University
Tagged Divisions
Computing and Information Technology
and other activities.References1. A. Behrouzi, and D. Kuchma (2016, June), Inquiry-Based Learning to Explore the Design of the Built Environment Paper, 2016 ASEE (American Society for Engineering Education) Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.25725.2. S. Khorbotly (2015, June), A Project-based Learning Approach to Teaching Computer Vision at the Undergraduate Level Paper, 2015 ASEE Annual Conference & Exposition, Seattle, Washington. 10.18260/p.23432.3. J. Wang, C. Luo, W. Zhao, and X. Li (2017, June), Empowering Students with Self- Regulation in a Project-Based Embedded Systems Course, 124th ASEE Annual Conference & Exposition (ASEE'2017), June 25 - 28, 2017, Columbus, Ohio.4. W
Conference Session
Poster Session
Collection
2019 ASEE Annual Conference & Exposition
Authors
Vigyan Jackson Chandra, Eastern Kentucky University
Tagged Divisions
Computing and Information Technology
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Luis Eduardo Paredes, Guru Labs, L.C.; Jacob Morris, Utah Valley University
Tagged Divisions
Computing and Information Technology
presentation.Course Learning Outcomes: 1. Identify relevant topics from previous courses and then apply them to their project 2. Identify and specify design requirements from general problem descriptions 3. Communicate design ideas and information 4. Demonstrate creative thinking 5. Display information gathering skills 6. Demonstrate oral and written communication skillsTraits: Upon successful completion, students should have the following attitude(s)/traits:  Confidence in their ability to design.  Confidence in their ability to communicate technical information effectively.Our senior design course is structured as a collection of independent or group student projects.This capstone course is offered every semester