Paper ID #21348Enhancing Computer Science Program Through Revising Curriculum, PeerMentoring/Tutoring, and Engaging Students in Undergraduate ResearchDr. Masoud Naghedolfeizi, Fort Valley State University Dr.Masoud Naghedolfeizi is a senior professor in the Department of Mathematics and Computer Science at Fort Valley State University. His academic background includes a B.S. in Mechanical Engineering with minor in instrumentation and control, an M.S. in Metallurgical Engineering, and M.S. and Ph.D. in Nuclear Engineering. Dr. Naghedolfeizi’s research interests include instrumentation and measurement systems, applied
academic quality. • Demonstrate accountability. • Encourage, where appropriate, self-scrutiny and planning for change and needed improve- ment. • Employ appropriate and fair procedures in decision making. • Demonstrate ongoing review of accreditation practice. • Possess sufficient resources.This clarifies ABET’s role as one of accrediting programs through a focus on continuous im-provement, curriculum, student outcomes, skilled faculty, and adequately resourced programs.The accreditation criteria discussed above makes that clear. While compliance with federal lawsis important, it is not regarded as an indication of a commitment to continuous improvement andexcellence in education. Furthermore, since ABET accredits programs
of the introductory curriculum. These courses haveteaching assistant who was also interested in encouraging women’sinterest in CS.The student monitor played an important role in monitoring thehomework discussions where the entire process of how studentsfinish their project was tracked. Most of the time, the mechanismfor solving the problems was not unique and other times differentstudents suggested different solutions. This created an interestingdynamic in the discussions where we could see the collision of theirideas, which was a great motivation for the students and furtheredtheir interest in the subject. The students were given the option toshare their continued progress of their code until the day ofsubmission. It was fascinating to
, various autonomous and semi-autonomous devices assist us in ourhome, work, and during travel [1], [2]. Some of these instruments can operate seamlessly,making us a step closer to achieve one of the digital age’s visions that identified by Weisser (see[3]). Incredible as it is, most people believe this is not the peak of technological advancementsand expect science and technology will continue to grow for an indefinite time. Nowadays, manybusinesses and industries prefer to utilize technology-integrated solutions when addressingproblems, which then shaped the expected skill set of next-generation professionals [4], [5] andinspired numerous state legislators [6]–[10] to integrate computer science (CS) problem-solvingapproaches in their respective K
Paper ID #21287Applied Computing for Behavioral and Social Sciences (ACBSS) MinorDr. Farshid Marbouti, San Jose State University Farshid Marbouti is currently an Assistant Professor of General Engineering at San Jose State University. He completed his Ph.D. in Engineering Education at Purdue University. He has an M.A. in the Educational Technology and Learning Design and an M.S. and B.S. in Computer Engineering. His research interests are engineering design education, feedback, and using learning analytics to improve first-year engineering students’ success.Dr. Valerie A. Carr, San Jose State UniversityProf. Belle Wei
andimplement the original are proposed. However, in case of difficulty to adopt the original designas in the currents case study. An updated design is suggested to overcome the complicationsescalated on the original design. The new design and its implementation is discussed in details.Partial integration of the system is presented due to the lack of full integration results to date.The benefits and drawbacks to students are highlighted to show the potential of the labenvironment to student success. Finally a summary for course curriculums are emphasized toshow the capabilities of the lab environment to introduce a successful learning experience.ReferencesAmazon®. (2017). Amazon EMR Product Details. Retrieved from https://aws.amazon.com/emr/details
products.The widespread adoption of LDAP is due to its flexibility, scalability, and compatibility. A computer network related program named Computer Network & System Administration (CNSA) was introduced at MichiganTechnological University in 2003 [3]. The purpose of this program was to serve the needs of industry by educating and training studentsto succeed in the field areas of systems administration and network engineering, with an emphasis on network security. An integral partof the CNSA curriculum is a three credit hour course on Directory Services (DS). In the DS course, students are exposed to topics like planning, designing, implementing and troubleshooting various directory serviceproducts, including Microsoft Windows Active Directory
Engineering and Sciences (AES) department. Thecollege is part of a larger university and being an urban commuter campus, its mission is as muchon giving students real-world experiences as it is on providing a sound liberal arts education.With a setting in the largest city in the state, many opportunities arise for students to enhancetheir post-graduate skills with an extensive professional development curriculum. With over 25years of history supporting Capstone, faculty members in the AES department have formulatedseveral approaches to this professional development. From a more traditional approach ofhosting a semester long project where students are embedded with industry partners, toindividual or small group projects either with a faculty member or
to more advanced tools that will enable them to explore and experiment with networkarrangements where the integration of the physical and emulated devices are required. With theexercises as a starting point, we will rapidly be able to exercise more sophisticated applicationsfor a wide range of algorithms, such as OSPF and BGP. More importantly, we will be able toenhance the undergraduate curriculum to include programming assignments for the students todevelop their skills further in modifying and creating new applications and algorithms that wouldhave been nearly unattainable in the traditional networking environment.It should be noted that more research needs to be done on the overall effectiveness of hands-onlearning. The effectiveness of
," IEEE IT Professional, vol. 12, no. 1, pp. 14-23, 2010.[4] A. Andress, Surviving Security: How to Integrate People, Process, and Technology, Boca Raton, FL: Auerbach Publications, 2003.[5] S. A. a. L. S. Jane LeClair, "An Interdisciplinary Approach to Educating an Effective Cyber Security Workforce," in InfoSecCD '13: Information Security Curriculum Development Conference (InfoSecCD '13), New York, NY, USA, 2013.[6] N. Swain, "A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA)," in American Society for Engineering Education, 2014.[7] L. H. R. H. Costis Toregas, "Exploring Ways to Give Engineering Cyber Security Students a Stronger Policy and Management
data framein the pre-program data was not collected from an identical frame in the post-program datacollection. In effect, this would bolster the representation of women in their programs notbecause more women were recruited, but because the set of units used for the data wereexpanded to include new, more gender-balanced sub-disciplines. However, because ES-UPrecommends creating these types of program expansions or features (“multiple pathways”) as away to increase women, variation in the data frame speaks to the benefits of using this strategy.Nonetheless, the authors were not able to identify if this had occurred among the seven schoolsused in the study.References[1] U.S. Department of Education, “Integrated Postsecondary Education Data
environment (ALOE) to provide a practical learning environmentthat facilitates developing many of the needed technical and soft skills without the inherentdifficulty and cost associated with radio frequency components and regulation. We define sixlearning stages that assimilate the standardization process and identify key learning objectivesfor each. We discuss our experiences when employing the proposed methodology at BarcelonaTech in Spain, compare the approach with an equivalent class at Virginia Tech in the US andmake the following observations: (1) The complexity of standards need to be abstracted andpresented in a form suitable for a given class. (2) Educating about cellular communicationsstandards is most effective when students are immersed