feedback to make updates.References[1]. Sanati-Mehrizy, Reza, Kailee Parkinson, and Afsaneh Minaie. "Integration of data miningcourse in computer science curriculum." Journal of Computing Sciences in Colleges 34.2 (2018):87-98[2]. Romero, Cristobal, and Sebastian Ventura. "Data mining in education." WileyInterdisciplinary Reviews: Data Mining and Knowledge Discovery 3.1 (2013): 12-27.[3]. Chakrabarti, Soumen, et al. "Data mining curriculum: A proposal (Version 1.0)." IntensiveWorking Group of ACM SIGKDD Curriculum Committee 140 (2006).[4]. Anderson, Paul, et al. "An undergraduate degree in data science: curriculum and a decade ofimplementation experience." Proceedings of the 45th ACM technical symposium on Computerscience education. ACM, 2014.[5
Paper ID #21348Enhancing Computer Science Program Through Revising Curriculum, PeerMentoring/Tutoring, and Engaging Students in Undergraduate ResearchDr. Masoud Naghedolfeizi, Fort Valley State University Dr.Masoud Naghedolfeizi is a senior professor in the Department of Mathematics and Computer Science at Fort Valley State University. His academic background includes a B.S. in Mechanical Engineering with minor in instrumentation and control, an M.S. in Metallurgical Engineering, and M.S. and Ph.D. in Nuclear Engineering. Dr. Naghedolfeizi’s research interests include instrumentation and measurement systems, applied
software talent training system that is supported byuniversities, governments and enterprises for industrial and practical application needs. The deep convergence of engineering and computing. With the advancement ofscience and technology and the continuous development of the Internet, engineering andcomputing have become an integral whole. It is an inevitable trend to solve engineeringproblems more efficiently and accurately by using computing knowledge and skills. Accelerated integration of hardware and software. The rapid development of artificialintelligence, robotics and other industrial fields put forward requirements to the in-depthintegration of hardware and software. These fields require the use of the knowledge and skillsof diversified
-WIE. She is also on the leadership team of the Kentucky Girls STEM collaborative network. c American Society for Engineering Education, 2019 USING A DATA SCIENCE PIPELINE FOR COURSE DATA: A CASE STUDY ANALYZING HETEROGENEOUS STUDENT DATA IN TWO FLIPPED CLASSESAbstractThis study presents a data science methodology to integrate and explore disparate student datafrom an engineering-mathematics course. Our methodology is based on exploratory data miningand visualization for analyzing and visualizing raw student data from multiple data sources. Theexploratory analysis serves two purposes, 1) it supports the instructor's desire to gain insightsinto the implementation of a flipped
otherinstitutions.During these group meetings, and with the consent of all the participants, notes were taken by oneof the researchers, which were later rewritten into summaries and conclusions, that after beingvalidated by all the participants, became formal records kept by the project team.Collecting Internal Data (Step 2)The collection of the necessary data to produce the report was not an easy task. The main reasonsfor these difficulties were related either to bureaucracy or to the non-integration of informationsystems.However, all these problems were minimized by the support of all the working group. Eachmember of this working group has been selected taking into account either his/her position insidethe University, his/ her recognition in the scientific
Paper ID #29528Drawn together: Integrating words with visuals while annotatingtextbooks and articles for strengthening competencies in computernetworking technologyDr. Vigyan Jackson Chandra, Eastern Kentucky University Vigyan (Vigs) J. Chandra, Ph.D., serves as professor and coordinator of the Cyber Systems Technology related programs offered within the Department of Applied Engineering and Technology (AET) at Eastern Kentucky University. He received his master’s and doctoral degrees from the University of Kentucky in Electrical Engineering, and holds certifications in several computer/networking areas. He teaches courses
Paper ID #27115Using An Engineering Analysis Tool for Department AdministrationDr. Hugh Jack P.E., Western Carolina University Dr. Jack is the Cass Ballenger Distinguished Professor of Engineering and Department Head of the School of Engineering and Technology within Western Carolina University. His interests include robotics, automation, and product design. c American Society for Engineering Education, 2019Using An Engineering Analysis Tool for Department AdministrationAbstractThe paper describes a basic application created using Matlab to assist in academic scheduling oftechnical programs. The work
academic quality. • Demonstrate accountability. • Encourage, where appropriate, self-scrutiny and planning for change and needed improve- ment. • Employ appropriate and fair procedures in decision making. • Demonstrate ongoing review of accreditation practice. • Possess sufficient resources.This clarifies ABET’s role as one of accrediting programs through a focus on continuous im-provement, curriculum, student outcomes, skilled faculty, and adequately resourced programs.The accreditation criteria discussed above makes that clear. While compliance with federal lawsis important, it is not regarded as an indication of a commitment to continuous improvement andexcellence in education. Furthermore, since ABET accredits programs
ofcompetencies, even though they are not listed in the revised version[9].The NICE Framework was developed from some of the earlier attempts in the US to develop aminimum foundation that CSEC professionals graduating from an academic program shouldhave. An example here is the NSA Centers for Academic Excellence (CAE) in InformationSecurity that focused more on the theoretical aspects of CSEC and not much on the skills andabilities [10]. The next large-scale effort was more international and was spearheaded by theIEEE-CS and ACM and produced the Joint Task Force on Cybersecurity EducationCybersecurity Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity(CSEC 2017). But here again, workforce development was not a large focus (if any
computer engineeringprogram at Utah Valley University (UVU) conclude their degree programs with a semestercapstone design experience. The intent is for students to utilize competencies developed in thefirst three years of the curriculum in the solution of an embedded design problem.Educational excellence requires exposing students to the current edge of research. To ensure thatstudent projects are along the same trajectory that the industry is moving, educators mustcontinually introduce emerging techniques, practices, and applications into the curriculum. Thefield of haptics is growing rapidly, and there is increasing interest in providingundergraduate students with a foundation in the area. It is crucial that the emerging field ofhaptics
of the introductory curriculum. These courses haveteaching assistant who was also interested in encouraging women’sinterest in CS.The student monitor played an important role in monitoring thehomework discussions where the entire process of how studentsfinish their project was tracked. Most of the time, the mechanismfor solving the problems was not unique and other times differentstudents suggested different solutions. This created an interestingdynamic in the discussions where we could see the collision of theirideas, which was a great motivation for the students and furtheredtheir interest in the subject. The students were given the option toshare their continued progress of their code until the day ofsubmission. It was fascinating to
coursetechniques to integrate these six skills into a more virtual learning experience using varioushands-on activities both individually and as a group. This paper shares techniques for faculty tobe more innovative as we live in the new "normal" with an increase in hybrid and online courses.Each activity is designed to not only cement a programming skill (or skills) but integrate EMskills with special attention to making connections between abstract programming concepts andthe real-world examples to help ground those concepts for all students and allow students tounleash their creativity. These techniques introduce (1) gamification, (2) students taking controlof their learning, and (3) encouragement of creativity which will hopefully spark their
is essentialfor CT to be included as part of the K-12 curriculum. Furthermore, being able to employ a web-based tool that is a repository of peer reviewed questions that could be used to assess CT skills instudents should enhance the effectiveness of any curriculum incorporating CT [4]. Literatureshows that a number of solutions have been developed but lack standardization, require priorprogramming knowledge, or are too lengthy [5] [6].The tool described in this paper was designed to give users the ability to search for questionsbased on specific attributes. The questions can be rated by experts across the world for eachattribute of CT. The aggregate rating is available to users for each question.TECHFIT, an initiative to introduce and
, electric circuits, signals and systems, engineering economics, electromagnetics, and integrating the entrepreneurial mindset with an engineering mindset in core engineering courses. He received the Professor Henry Horldt Outstanding Teaching Award in 2015.Dr. J. Blake Hylton, Ohio Northern University Dr. Hylton is an Assistant Professor of Mechanical Engineering and Coordinator of the First-Year Engi- neering experience for the T.J. Smull College of Engineering at Ohio Northern University. He previously completed his graduate studies in Mechanical Engineering at Purdue University, where he conducted re- search in both the School of Mechanical Engineering and the School of Engineering Education. Prior to Purdue, he
temperature,light, and vibration.Educational excellence requires exposing students to the current edge of research. To ensure thatstudent projects are along the same trajectory that the industry is moving, educators mustcontinually introduce emerging techniques, practices, and applications into the curriculum. Thefield of wireless sensor networks is growing rapidly, and there is increasing interest in providingundergraduate students with a foundation in the area. It is crucial that the emerging field ofwireless sensor networks be integrated into the undergraduate computer science and engineeringcurricula. This paper presents the details of two WSN projects that our undergraduate computerengineering students have done in their senior capstone
standard undergraduate courses). Students who successfullycomplete this course are able to build computational solutions to problems using existing ideasand artifacts in an interdisciplinary domain, to work in a collaborative project setting, and topresent the result of their work both orally and in writing. It is largely the capstone project thatdistinguishes the coordinate major from a minor.This area of application of student’s studies in computer science is usually this student’s primarymajor. However, any subject in which a student has completed extensive course work (or obtainedequivalent experience) can serve as the area of application. If a student completes a capstoneproject in their primary major, CS capstone may form an integral part of
, rather than having to immediately solvein a more “public” fashion. Also, candidates may prefer explaining problems with a pencil on thepaper or on a computer using an integrated development environment. Next, they suggested usingproblems actually encountered at the company, since many puzzles are not reflective of real-worldsituations. Such tasks are seen as giving an unfair advantage to candidates just out of school.Finally, they propose problem solving “as colleagues, not as examiners” a recommendation whichhighlights that rather than an intense interrogation the process should be balanced, and shouldinvolve working together to solve issues, and that this could even be accomplished with other“potential teammates.”In addition to the two
Integration (CMMI) is the culmination of an effort to define thestages that software organizations pass through as they gain better and better control overtheir processes. The effort was kicked off by the US Department of Defense and undertakenby the Software Engineering Institute (SEI) at Carnegie Mellon University. The originalproduct that most software developers are familiar with is CMM and it was designed tomeasure the process maturity of a software development organization.In the 1990’s, a veritable galaxy of quality frameworks emerged and CMM was divided intoversions for software development (SW-CMM) and versions for software engineering(SECM) and product development (IPD-CMM). Later in the decade, SEI began an effort tointegrate all of the
, various autonomous and semi-autonomous devices assist us in ourhome, work, and during travel [1], [2]. Some of these instruments can operate seamlessly,making us a step closer to achieve one of the digital age’s visions that identified by Weisser (see[3]). Incredible as it is, most people believe this is not the peak of technological advancementsand expect science and technology will continue to grow for an indefinite time. Nowadays, manybusinesses and industries prefer to utilize technology-integrated solutions when addressingproblems, which then shaped the expected skill set of next-generation professionals [4], [5] andinspired numerous state legislators [6]–[10] to integrate computer science (CS) problem-solvingapproaches in their respective K
; and an understanding of the complex societal, global, andprofessional contexts in which engineering is practiced” [4]. ABET’s accreditation standardsrecognize the fundamental importance of these skills, many of which are learning outcomestied to the humanities.Finally, this exercise introduces the story of Ada Lovelace as a female role model and founder ofcomputer science. Psychologist Penelope Lockwood’s suggests that women benefit fromoutstanding female role models more so than men, for whom the gender of the role modeldoes not have an impact [19]. We therefore suggest that using Ada Lovelace as an historicalrole model in engineering curriculum can help engineering and science students revise
Paper ID #21287Applied Computing for Behavioral and Social Sciences (ACBSS) MinorDr. Farshid Marbouti, San Jose State University Farshid Marbouti is currently an Assistant Professor of General Engineering at San Jose State University. He completed his Ph.D. in Engineering Education at Purdue University. He has an M.A. in the Educational Technology and Learning Design and an M.S. and B.S. in Computer Engineering. His research interests are engineering design education, feedback, and using learning analytics to improve first-year engineering students’ success.Dr. Valerie A. Carr, San Jose State UniversityProf. Belle Wei
; connected communities, and securing cyber-physical systems [4,5], we are not aware that currently exist an educational model that integrates cyber security as partof STEM curriculum. The program’s goal is to broaden knowledge of our STEM graduates to beaware of cyber issues as engineers. The curriculum is shown in Figure 1, where 4 tracks areavailable for the student’s interest and major of study. The courses within each track are existingcourses with security content added to them. Figure 1: Cyber-informed engineering curriculum for STEM majors. Each track gives the students an opportunity to earn a security certificate as part of their undergraduate degree. The color of boxes has no special meaning.The introductory
Paper ID #33383Broadening the Middle School Computational Thinking Interventions Be-yondBlock ProgrammingDr. Mohsen M. Dorodchi, University of North Carolina at Charlotte Dr. Dorodchi has been teaching in the field of computing for over 30 years of which 20 years as an educator. He has taught the majority of the courses in the computer science and engineering curriculum over the past 20 years such as introductory programming, data structures, databases, software engineering, system programming, etc. He has been involved in a number of National Science Foundation supported grant projects including Scholarship for STEM
Engineering and Sciences (AES) department. Thecollege is part of a larger university and being an urban commuter campus, its mission is as muchon giving students real-world experiences as it is on providing a sound liberal arts education.With a setting in the largest city in the state, many opportunities arise for students to enhancetheir post-graduate skills with an extensive professional development curriculum. With over 25years of history supporting Capstone, faculty members in the AES department have formulatedseveral approaches to this professional development. From a more traditional approach ofhosting a semester long project where students are embedded with industry partners, toindividual or small group projects either with a faculty member or
to more advanced tools that will enable them to explore and experiment with networkarrangements where the integration of the physical and emulated devices are required. With theexercises as a starting point, we will rapidly be able to exercise more sophisticated applicationsfor a wide range of algorithms, such as OSPF and BGP. More importantly, we will be able toenhance the undergraduate curriculum to include programming assignments for the students todevelop their skills further in modifying and creating new applications and algorithms that wouldhave been nearly unattainable in the traditional networking environment.It should be noted that more research needs to be done on the overall effectiveness of hands-onlearning. The effectiveness of
Paper ID #31526The CAHSI INCLUDES Alliance: Realizing Collective ImpactDr. Elsa Q. Villa, University of Texas at El Paso Elsa Q. Villa, Ph.D., is a research assistant professor at The University of Texas at El Paso (UTEP) in the College of Education, and is Director of the Center for Education Research and Policy Studies (CERPS). Dr. Villa received her doctoral degree in curriculum and instruction from New Mexico State University; she received a Master of Science degree in Computer Science and a Master of Arts in Education from UTEP. She has led and co-led numerous grants from corporate foundations and state and
this course are offered with total enrollment varyingbetween 115 to 255, this number is expected to rise. This course has CS1 as a prerequisite so weexpect students to have some programming experience. We chose to use python in this course, asit is easy-to-use across many topics. It is a bonus that this allows us to introduce a language that isotherwise not a standard part of our lower-division curriculum.Our experience working with undergraduate research students helped inform our decisions abouttechnologies and approaches for this course. Mentoring undergraduate research students as theylearned python, git, and SQL helped reinforce the need for these topics in our curriculum andprovided an opportunity to try various tutorials, IDEs, and
Networking Networking Women community since 2010, serving as mentor, fellowship co-chair, and workshop co-chair She was co-chair of the board of Networking Networking Women from 2016-2018.Prof. Alark Joshi, University of San Francisco Alark Joshi is an Associate Professor in the Department of Computer Science at the University of San Francisco. He was a co-PI on the IDoCode project at Boise State University that provided teacher train- ing, curriculum development, and policy changes in the State Board of Education in the state of Idaho. Currently, he is a co-PI on the S-STEM proposal focused on engaging students in the local community to enable successful outcomes for them with respect to increased self-identity, better
data framein the pre-program data was not collected from an identical frame in the post-program datacollection. In effect, this would bolster the representation of women in their programs notbecause more women were recruited, but because the set of units used for the data wereexpanded to include new, more gender-balanced sub-disciplines. However, because ES-UPrecommends creating these types of program expansions or features (“multiple pathways”) as away to increase women, variation in the data frame speaks to the benefits of using this strategy.Nonetheless, the authors were not able to identify if this had occurred among the seven schoolsused in the study.References[1] U.S. Department of Education, “Integrated Postsecondary Education Data
environment (ALOE) to provide a practical learning environmentthat facilitates developing many of the needed technical and soft skills without the inherentdifficulty and cost associated with radio frequency components and regulation. We define sixlearning stages that assimilate the standardization process and identify key learning objectivesfor each. We discuss our experiences when employing the proposed methodology at BarcelonaTech in Spain, compare the approach with an equivalent class at Virginia Tech in the US andmake the following observations: (1) The complexity of standards need to be abstracted andpresented in a form suitable for a given class. (2) Educating about cellular communicationsstandards is most effective when students are immersed