- Conference Session
- Curriculum and Assessment I
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Peter J. Clarke, Florida International University; Debra Lee Davis, Florida International University; Ingrid A. Buckley, Florida Gulf Coast University; Geoff Potvin, Florida International University; Mandayam Thirunarayanan, Florida International University; Edward L. Jones, Florida A&M University/Florida State University
- Tagged Divisions
-
Computing and Information Technology
opportunityfor schema construction (germane load) is possible. Note that although our model currently showsonly 4 LESs, we expect that this number will increase over time as more pedagogical approachesare integrated.The main objective of the proposed model is through research find the values of a, b, c, d, e, q, r, s,and t in the equations F2FA (aCL + bGA + cPBL + dSI + eLS) and OA(qCL + rGA + sPBL + tSI)that maximizes student learning and engagement. Where F2FA and OA are the face-to-face andonline activities respectively. CL - collaborative learning, GA - gamification, PBL - problem-basedlearning and SI - social interaction are the LESs, and LS - lecture style the traditional approach.You may think of a, b, c, d, e, q, r, s, and t as the percentage of
- Conference Session
- Wireless Technology
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
. Groza, and S. Bixwas, “Sensor Based Home Automation and Security System”, February 5, 2018 6. H. Huang, S. Xiao, X. Meng, and Y. Xiong, “A Remote Home Security System Based on Wireless Sensor Network and GSM Technology”, February 5, 2018 7. “Safer. Smarter. Z-Wave”, Z-Wave, Silicon Laboratories, http://www.z-wave.com/, February 5, 2018. 8. Blynk. Retrieved April 08, 2018, from http:docs.blynk.cc/ . 9. https://www.geekstips.com/temperature-sensor-dht22-ds18b20-arduino-tutorial/, Accessed on April 2018.10. https://www.google.com/search?q=arduino+light+sensor&safe=active&source=lnms&tb m=shop&sa=X&ved=0ahUKEwiCm43PqLraAhVjx1QKHeIwBpsQ_AUICigB&biw=16 82&bih=921#spd=0, accessed on April
- Conference Session
- Wireless Technology
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Merlinda Drini, Queensborough Community College of the City University of New York
- Tagged Divisions
-
Computing and Information Technology
International Conference on Advanced Wireless, Information, and Communication, 2015, pp. Volume 73, 2015, Pages 162-171. [9] T. S Rappaport, Wireless Communications: Principles and Practice.: Prentice Hall , 2002.[10] Merlinda Drini and Tarek Saadawi, "Modeling Wireless Channel for Ad-Hoc Network Routing Protocol," in ISCC Marakech Marocco, 2008, pp. 549-555.[11] Amir Salman Avestimehr, Suhas N. Diggavi, and David N C. Tse, "A Deterministic Model for Wireless Relay Networks and its Capacity," in IEEE Information Theory Workshop on Information Theory for Wireless Networks, 2007.[12] Q. Zhang, A. Kassam, and S.A, "Finite-State Markov Model for Rayleigh Fading Channels," IEEE transactions on communications, vol. 47, no. 11, pp. 1688
- Conference Session
- Curriculum and Assessment III
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Xiaoyan Gong, Institute of Smart Education, Qingdao Academy of Intelligent Industries. ; Liang Zhao, Faculty of Information Technology, Beijing University of Technology; RenHao Tang, Faculty of Information Technology, Beijing University of Technology; YaNa Guo, Faculty of InformationTechnology,Beijing University of Technology; Xiwei Liu, Qingdao Academy of Intelligent Industries; Institute of Automation, Chinese Academy of Sciences; Jian He, Faculty of Information Technology, Beijing University of Technology; Fei-Yue Wang, National Key Laboratory of Management and Control for Complex Systems, Chinese Academy of Sciences; Ying Tang, Rowan University; Wanruo Shi, Beijing Normal University; Xiaojie Niu, Beijing Normal University; Xinzhu Wang, Beijing Normal University
- Tagged Divisions
-
Computing and Information Technology
Application Software Modules”, Zhejiang University, 2016.[10] S. Q. Cheng,“ Dynamic Cooperative Engagement Based on Multiple Agent Software Design andImplementation ,” Xidian University, Xi’an, 2015.[11] H. J. Dai, “The Embedded System Research on Chip Multiprocessor Architecture and Component-Based Software,” Zhejiang University, 2007
- Conference Session
- Cyber Technology
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Debra M. Duke, Virginia Commonwealth University; Mandayam Thirunarayanan, Florida International University; Abigail Byram, Virginia Commonwealth University; Peter J. Clarke, Florida International University
- Tagged Divisions
-
Computing and Information Technology
. 3, no. 1, pp. 72-77, 2013.[20] G. Barata, S. Gama, J. Jorge and D. Goncalves, "Engaging Engineering Students with Gamification," in 2013 5th International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES), 2013.[21] F. F. Nah, Q. Zeng, V. R. Telaprolu, A. P. Ayyappa and B. Eschenbrenner, "Gamification of Education: A Review of Literature," in HCI in Business. HCIB 2014. Lecture Notes in Computer Science, 2014.[22] J. Jurado, A. Fernandez and C. Collazos, "Applying gamification in the context of knowledge management," in Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, New York, NY, USA, 2015.[23] M. Reddy, G. Walia and A. D. Radermacher
- Conference Session
- Computing Research I
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Gholam Ali Shaykhian, Florida Institute of Technology; Khalil A. Said, Davenport University; Ghaythah Abdullah Alqarna
- Tagged Divisions
-
Computing and Information Technology
://www.hornbill.com/campaigns/itil-state/_files/ITIL-State-of-the-Nation-Survey-US.pdf15. Huang, D., & Hu, Q. (2007). Achieving IT-business strategic alignment via enterprise-wide implementation of balanced scorecards. Information Systems Management, 24, 173–184. doi:10.1080/1058053070123931416. Huber, H. (2005, February 7). CEOs and CIOs split on IT success. Computer Weekly. Retrieved from http://www.computerweekly.com/news/2240059805/CEOs-and-CIOs-split-on-IT-success17. Iden, J., & Langeland, L. (2010). Setting the stage for a successful ITIL adoption: A Delphi study of IT experts in the Norwegian Armed Forces. Information Systems Management, 27(2), 103-112. doi:10.1080/1058053100370837818. ITIL Foundation. (2011). ITIL
- Conference Session
- Computing Research I
- Collection
- 2019 ASEE Annual Conference & Exposition
- Authors
-
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
for Mathematics Identity,” Child Dev., vol. 86, no. 4, pp. 1048–1062, Jul. 2015.[17] C. A. P. Cass, Z. Hazari, J. Cribbs, P. M. Sadler, and G. Sonnert, “Examining the impact of mathematics identity on the choice of engineering careers for male and female students,” in 2011 Frontiers in Education Conference (FIE), 2011, p. F2H–1–F2H–5.[18] J. E. Stets and P. J. Burke, “Identity Theory and Social Identity Theory,” Soc. Psychol. Q., vol. 63, no. 3, p. 224, Sep. 2000.[19] J. E. Stets and R. T. Serpe, “Identity Theory,” Springer, Dordrecht, 2013, pp. 31–60.[20] R. Jenkins, Social identity. Routledge, 2014.[21] E. H. Erikson, “Autobiographic notes on the identity crisis,” Daedalus, 1970.[22] J. P. Gee, “Chapter 3 : Identity