Paper ID #26401How an NSF S-STEM LEAP Scholarship Program Can Inform a New Engi-neering ProgramDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor and Chair of Engineering Department at Utah Valley University. She re- ceived her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems De- sign, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of
Sound Studies in mobile audio works that she calls ”ototheatre.” More recently, Lauren has begun to study the impact of theatre studies on pedagogical practice in non-theatre courses.Dr. Ronald S. Harichandran, University of New Haven Ron Harichandran is Dean of the Tagliatela College of Engineering and is co-PI of the grant entitled Development of the ’CyberWorld’ Common Course at the University of New Haven that facilitated the work reported in this paper. c American Society for Engineering Education, 2019 ‘Cyber World’ – A Cybersecurity Theme for a University-Wide First-Year Common CourseAbstractWhile living in a cyber-connected society provides students with
conferences in robotics, software engineering, and computer science education. He has garnered multiple international awards in innovation including the third place in Robocup world competition.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing Information Sciences and STEM Trans- formation Institute. Dr. Ross earned a doctoral degree in Engineering Education from Purdue University. She has a Bachelor’s degree in Computer Engineering from Elizabethtown College, a Master’s degree in Computer Science and Software Engineering from Auburn University, eleven years of experience in in- dustry as a software engineer, and six years as a full-time faculty in the
Paper ID #26981Science and Engineering Courses, Theory and Practice; An ExampleDr. S. ”Hossein” Mousavinezhad P.E., Idaho State University Dr. Mousavinezhad was the principal investigator of the National Science Foundation’s research grant, National Wireless Research Collaboration Symposium 2014; he has published a book (with Dr. Hu of University of North Dakota) on mobile computing in 2013. Professor Mousavinezhad is an active mem- ber of IEEE and ASEE having chaired sessions in national and regional conferences. He has been an ABET Program Evaluator for Electrical Engineering and Computer Engineering as well as
company has successfully launched semi-autonomous vehicles (Model S and Model X) to Indian market, while Google’s Self-Driving Car(SDC) has been in development since the last decade (Figure 6). Google and Tesla differ fromeach other in the approach they take towards building self-driving cars. Their differences aremainly in two areas, computer vision technology and human car control.Google embraced the LIDAR (Light Detection and Ranging) technology [23], now a de factostandard for autonomous vehicles to form a 3D model of the world around the car (Figure 7).LIDAR is used to determine the size and distance of all things around the car in anycircumstance or situation. However, LIDAR has its own challenges: LIDAR is expensive and proves
actual input data; it onlyrelies on n. Therefore, a lookup table can be pre-computed and loaded at runtime. We first definean algorithm in Python-based pseudocode that determines where samples should reside at eachstage of the algorithm, as in Figure 2. Figure. 2 Algorithm for computing table A of sample indices at each stage From this table, we can compute another table that explicitly states the destination indexthat a sample needs to be sent to. That is, using the new table B, calculated using the algorithm inFigure 3, during stage s, sample i in the current buffer should be sent to position B[s][i]. Figure. 3 Algorithm for determining table B, which contains the destination of the current stage's samples
IPv6, the Internet’s migration to the new protocol has beenanything but smooth. Many have expressed doubts, and some still do, that IPv6 will reach fulladoption and replace IPv4 as the Internet’s dominant protocol. However, empirical data suggeststhat Internet IPv6 adoption has entered a phase of rapid acceleration [3]. A recent study by [4]found that the number of IPv6 users on the Internet has reached the early majority level ofadoption and full adoption could occur as early as December 2024. Figure 1 shows the numberof users accessing Google over IPv6 reached 26.31% in January of 2019 [5].Figure 1. The adopter distribution normal curve partitioned into adopter categories overlaid withthe S-shaped diffusion curve [6]. The number of IPv6
Science.As SEP-CyLE continues to evolve and as more information is collected regarding itsimplementation in classrooms in educational institutions across the country, it is likely to becomea valuable tool that students and instructors can use to facilitate teaching and learning incomputer science courses.References[1] Bureau of Labor Statistics, United States Department of Labor , "Software Developers," 13 4 2018. [Online]. Available: https://www.bls.gov/ooh/computer-and-information- technology/software-developers.htm. [Accessed 4 2 2019].[2] D. F. Shell, L. Soh, A. E. Flanigan and M. S. Peteranetz, "Students' Initial Course Motivation and Their Achievement and Retention in College CS1 Courses," in Proceedings of the 47th ACM
behavior can be observed in a building environment.More specifically, the building environment is represented using vertex for nodes and connecting structureslike doors, stairs by links. The occupant in the model is represented using a variable o having state s, where o = ph, v position, id , g id , l from , s staying s = moving inqueue Here, ph represents the phase of the occupant which represents the environment condition of the building,vposition represents the current vertex the
., & LaVaque-Manty, D. (2007). Transforming science andengineering: Advancing academic women. University of Michigan Press.[6] Ceci, S. J., Williams, W. M., & Barnett, S. M. (2009). Women's underrepresentation in science:sociocultural and biological considerations. Psychological bulletin, 135(2), 218[7] Gaughan, M., & Bozeman, B. (2016). Using the prisms of gender and rank to interpret researchcollaboration power dynamics. Social Studies of Science, 46(4), 536-558.[8] Pereira, M. D. M. (2010). Higher Education Cutbacks and the Reshaping of EpistemicHierarchies: An Ethnography of the Case of Feminist Scholarship.Sociology, 44(2), 287–304.[9] Amâncio, L. (1993). Género: representações e identidades. Análise das representações
WNodes number 60 Mobility model Random-WaypointRouting protocol DSR Propagation model Rayleigh fadingMAC protocol 802.11 Carrier Frequency 2.4 GHzPacket size 512 bytes Speed 1-20 m/s - Only when channel quality was considered - When both, the channel quality and the residual power of the nodes were considered. (SP-DSR).The average end-to-end delay is the cumulative of all possible delays in the links and the nodes.Traditional DSR has higher delays, due to the buffering delays of route recoveries and theretransmission delays at the link layer. SP-DSR has the best end-to-end delay
.[2] Cyber Seek, “Cybersecurity Supply/Demand Heat Map,” Cyber Seek Website, 2019. [Online]. Available: https://www.cyberseek.org/heatmap.html. [Accessed: 03-Feb-2019].[3] M. Egele, T. Scholte, E. Kirda, and C. Kruegel, “A survey on automated dynamic malware-analysis techniques and tools,” ACM Comput. Surv., vol. 44, no. 2, pp. 1–42, Feb. 2012.[4] S. Kalra and S. K. Sood, “Elliptic curve cryptography,” in Proceedings of the International Conference on Advances in Computing and Artificial Intelligence - ACAI ’11, 2011, pp. 102–106.[5] A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp
VeryDissatisfied Dissatisfied Satisfied Satisfied 1 2 3 4 5 Very Neutral VeryDissatisfied Dissatisfied Satisfied Satisfied 1 2 3 4 5 6 Extremely Very Somewhat Somewhat Very ExtremelyDissatisfied Dissatisfied Dissatisfied Satisfied Satisfied SatisfiedAPPENDIX B: Five–Point Likert Scale. Rubrics courtesy of W. S. U., Pullman, WA. 5 Has demonstrated excellence. Has analyzed important data precisely. Has provided documentation. Has answered key questions correctly. Evidence of
inception to completion. .The studentsdemonstrated an enhanced understanding of the alternative route for green energy with reneweddesign emphasis on Digital Parasitic applications that employs Thermoelectric GeneratorPeltier instead of traditional analog mechanization. We have collected no data to quantify if thisapproach will be satisfactory with all our capstone senior project students, since the newbatch of students have just started taking their senior project capstone course sequence.References[1] Callan, S. J., & Thomas, J. M., Environmental Economics and Management, Cengage Learning, 2012.[2] Mazidi, M. A., Causey, D., Mazidi, J. G., HCS12 Microcontrollers and Embedded Systems, using assembly and C with code warrior, Pearson
integrate LESs into F2F and online class activities, and evaluate which combina-tion(s) of LESs can be most effective on improving student learning.3 Pedagogical Approach using LESsIn this section we present our proposed LES integration model (LESIM), a brief overview of SEP-CyLE, and a description of how LESs are integrated into the F2F and online activities of a softwaretesting class. Preliminary results obtained by comparing the midterm exam scores prior to usingLESs and while using LESs in the classroom are also presented.3.1 LES Integration Model (LESIM)Conceptually LESIM is used to improve student learning based on the model shown in Figure1. The top of the figure shows the pedagogical approaches (LESs and traditional approach) thatare
automatic alerts that are integrated with the visualizations.References:[1] Z. T. Siti Khadijah Mohamada, "Educational data mining: A review," in The 9th InternationalConference on Cognitive Science, Malaysia, 2013.[2] R. S. Baker, "Data Mining for Education," in International Encyclopedia of Education (3rdedition), Oxford, 2012.[3] C. G. Merrett, "Using Textbook Readings, YouTube Videos, and Case Studies for FlippedClassroom Instruction of Engineering Design," in Proc. 2015 Canadian Engineering EducationAssociation (CEEA15) Conf., Canada, 2015.[4] D. N. A. G. M. S. Kenneth A. Connor, "Faculty Development and Patterns of StudentGrouping in Flipped Classrooms Enabled by Personal Instrumentation," in 2017 ASEE AnnualConference & Exposition
classroom activities.AcknowledgementThe author is grateful for the help of undergraduate teaching assistants in the course sectionsunder study in this paper: Max Anderson, John Biggs, Zachery Eldemire, and Megan Moore.BibliographyCrouch, C. H., Watkins, J., Fagen, A. P., & Mazur, E. (2007). Peer instruction: Engaging students one-on-one, all at once. Research-based reform of university physics, 1(1), 40-95.Freeman, S., Eddy, S. L., McDonough, M., Smith, M. K., Okoroafor, N., Jordt, H., & Wenderoth, M. P. (2014). Active learning increases student performance in science, engineering, and mathematics. Proceedings of the National Academy of Sciences, 111(23), 8410-8415.Garcia, S. (2018). Improving classroom preparedness using guided
documentation. Thestudents’ feedback and their final project presentation indicate that they have pride in theirproject accomplishments and have gained confidence in their engineering abilities.References 1. Akyildiz, Ian and Mehmet Can Vuran, “Wireless Sensor Networks”, Wiley, 2010. 2. Li, Yingshu, My Thai, and Weili Wu, “Wireless Sensor Networks and Applications”, Springer, 2008. 3. Dargie, Waltenegus, and Christian Poellabauer, “Fundamentals of Wireless Sensor Networks: Theory and Practice”, Wiley, 2010. 4. Minaie, Afsaneh, et al., “Integration of Wireless Sensor Networks in the Computer Science and Engineering Curricula”, Proceedings of the ASEE Annual Conference, June 2012. 5. M. Assaf, R. Mootoo, S. Das, E. Petriu, V
robots that are programmable in the sameprogramming language used in the class. Affordability and low maintenance costs are alsoimportant factors to long term sustainability of these activities.Our initial experience with robotics in programming classes indicate that most students enjoyrobotics and they become more motivated to learn programming. We are pleased with theoutcome and will continue using robotic activities in our introductory programming classes.References 1. Bennedsen, J. and Caspersen, M.E.” Failure rates in introductory programming.” SIGCSE Bull. 39, 2 (2007), 32–36 2. Jennifer S. Kay, “Robots in the classroom...and the dorm room,” Journal of Computing Sciences in Colleges, vol. 25, Issue. 3, Jan. 2010, pp
Paper ID #27348How to Cultivate Computational Thinking-Enabled Engineers: A Case Studyon the Robotics Class of Zhejiang UniversityDr. Jingshan Wu, Zhejiang University Postdoctoral Fellow of Institute of China’s Science, Technology and Education Strategy, Zhejiang Uni- versity; Lecturer, School of Public Administration, Zhejiang University of Finance & EconomicsMs. Yujie Wang, Zhejiang University Postgraduate of Institute of China’s Science,Technology and Education Strate, Zhejiang UniversityMs. Hanbing Kong, Zhejiang University Hanbing Kong, PhD Deputy Director, the Research Center for S&T, Education Policy, and Associate
- anguished-outraged/Hayajneh, T., Denis, M., & Zena, C. (2016). Penetration testing: Concepts, attack methods, and defense strategies. 2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT), (pp. 1-6).McGettrick, A. (2013). Toward Effective Cybersecurity Education. IEEE Security Privacy, 66- 68.Microsoft Corporation. (2014). Support for Windows XP ended. Retrieved from https://www.microsoft.com/en-us/windowsforbusiness/end-of-xp-supportMicrosoft Security Bulletins. (n.d.). Retrieved from https://docs.microsoft.com/en- us/security-updates/Mirkovic, J., Benzel, T. V., Faber, T., Braden, R., Wroclawski, J. T., & Schwab, S. (2010). The DETER project: Advancing the science of cyber
detection. In addition, a study on the trends of curiositylevels across the different lab’s QFT data may yield insight into whether students are improvingin their critical thinking skills and developing more curiosity in exploring a provocative orchallenging statement. We also plan to continue work with studying curiosity detection withother learners, other data mining schemes, investigating linguistic text mining methods, andother QFT or question-based datasets.References[1] D. L. Schwartz, J. M. Tsang, and K. P. Blair. The ABC’s of How We Learn: 26 Scientifically Proven Approaches, How They Work, and When to Use Them. W. W. Norton & Company, Inc., New York, NY, 2016.[2] M. J. Kang, M. Hsu, I. M. Krajbich, G. Loewenstein, S. M. McClure
expected by chance” [2, para. 1]. The second test was Kendall’s tau to show correlations between organizational successand implementation of a defined process model. Kendall’s tau is a measure of rank correlation.“Kendall-tau is a non-parametric correlation coefficient used to assess and test correlationsbetween non-intervals scaled ordinal variables. Frequently, researchers use the Greek letter τ(tau) to abbreviate the Kendall tau correlation coefficient” [5, p. 14]. Rank correlation is aninteresting method to assess and evaluate the data collection [22]. Kendall’s tau is well knownand broadly used to measure the degree of the relationship between variable [22].References1. Aasheim, C. L., Lixin, I., & Williams, S. (2009). Knowledge
80 96 120 digital circuits Others 128 64 144 48 40 390As can be seen, the science and engineering course requirements vary much more across schools,compared to the requirement of computer science courses and math courses. All schools exceptBUAA require a digital logic (or analog and digital circuits) course. It is possible that BUAA hasthe digital logic component in other courses. Overall, these schools require physics course(s) asthe science requirement. No schools require other areas of sciences such as chemistry, biology,or any other natural science courses.7. Social sciences, humanity, and arts requirementIn this section, we examine the non
, William, and Moumita Mitra Manna. Operating systems: internals and designprinciples. Pearson, 2015.[3] Labrosse, Jean J. MicroC/OS-II: The Real Time Kernel. CRC Press, 2002.[4] Catarinucci, Luca, Danilo De Donno, Luca Mainetti, Luca Palano, Luigi Patrono, MariaLaura Stefanizzi, and Luciano Tarricone. "An IoT-aware architecture for smart healthcaresystems." IEEE Internet of Things Journal 2, no. 6 (2015): 515-526.[5] Pack, D., and Barrett, S., "Real Time Operating Systems: A Visual Simulator", in 2004American Society of Engineering Education Annual Conference, Salt Lake City, Utah. June,2004[6] Huang, Y., and Cheng, C., "Work in Progress: Tackling the Problems of KnowledgeIntegration and Barriers to Active Learning in a CDIO Course of Embedded
(Feb. 2005).[2]. State of Cybersecurity: Implications for 2016 - An ISACA and RSA Conference Survey. Retrieved from https://www.isaca.org/cyber/Documents/state-of-cybersecurity_res_eng_0316.pdf[3]. Top U.S Universities failing at Cybersecurity Education. Retrieved from https://www.cio.com/article/3060813/it-skills-training/top-u-s-universities-failing-at-cybersecurity- education.html[4]. Can higher education fix the cybersecurity shortfall? – Retrieved from http://www.schools.com/articles/cybersecurity-shortfall[5]. D. Rowe, B. Lunt, J. Ekstorm, “The Role of Cyber-Security in Information Technology Education” - SIGITE’11, October 20–22, 2011. 3[6]. Cybersecurity job market to suffer severe workforce shortage. Retrieved from
. Elliot, W. Crumpler, and K. Lloyd, “A National Machine Intelligence Strategy for the United States.”Report of the CSIS technology policy program, 2018. [2] China, the State Council, “New Generation Artificial Intelligence Development Plan,”2017. [3] X. Han, X. Liu, F. Hu, et al, “Design of AI+ Curriculum for Primary and Secondary Schools in Qingdao,” Proceedings of 2018 Chinese Automation Congress, Nov.30-Dec. 2, 2018, Xi’An, China, [4] F. Wang, and J .S. Lansin, “From Artificial Life to Artificial Societies--New Methods for Studies of Complex Social Systems,” Complex Systems and Complexity Science, Vol. 1, No. 1, pp. 33-41,2004. [5]F. Wang, “Parallel system methods for management and control of complex systems. Control and Decision
and other activities.References1. A. Behrouzi, and D. Kuchma (2016, June), Inquiry-Based Learning to Explore the Design of the Built Environment Paper, 2016 ASEE (American Society for Engineering Education) Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.25725.2. S. Khorbotly (2015, June), A Project-based Learning Approach to Teaching Computer Vision at the Undergraduate Level Paper, 2015 ASEE Annual Conference & Exposition, Seattle, Washington. 10.18260/p.23432.3. J. Wang, C. Luo, W. Zhao, and X. Li (2017, June), Empowering Students with Self- Regulation in a Project-Based Embedded Systems Course, 124th ASEE Annual Conference & Exposition (ASEE'2017), June 25 - 28, 2017, Columbus, Ohio.4. W
presentation.Course Learning Outcomes: 1. Identify relevant topics from previous courses and then apply them to their project 2. Identify and specify design requirements from general problem descriptions 3. Communicate design ideas and information 4. Demonstrate creative thinking 5. Display information gathering skills 6. Demonstrate oral and written communication skillsTraits: Upon successful completion, students should have the following attitude(s)/traits: Confidence in their ability to design. Confidence in their ability to communicate technical information effectively.Our senior design course is structured as a collection of independent or group student projects.This capstone course is offered every semester