thesystem. Other extensions we studied included adding laboratories and test locations which oftenprolonged the wait times in the system. Care should be taken for the average service times whenadded lab-works or other facilities. Finally, certain percentages of emergency room patients oftenend up having an overnight stay in the hospital. If a complete study is necessary, such extensionscan be added to the system.6. Concluding RemarksWe presented a simple yet powerful simulation model to teach our future engineers. The simulationcase study exhibits a drop-in healthcare clinic with staff, nurses, doctors, and patients. Due to thefamiliarity of a healthcare system, most students immediately recognize themselves in thisscenario. Further, the simplicity
of computer programming teaching methods,” in XXII Central European Conference on Information and Intelligent Systems, pp. 1–6, 2011.[30] M. M. Reek, “A top-down approach to teaching programming,” in ACM SIGCSE Bulletin, vol. 27, pp. 6–9, ACM, 1995.[31] R. Decker and S. Hirshfield, “Top-down teaching: object-oriented programming in cs 1,” in ACM SIGCSE Bulletin, vol. 25, pp. 270–273, ACM, 1993.[32] E. Wells, “Using bottom-up techniques in a digital hardware design laboratory to better facilitate experiential learning,” in Proceedings of the 11th International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS’15), 2015.[33] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion
stronger than imagined. system for achieving this end goal. ● Lack of User Knowledge and Awareness: the sophisticated functionality of IoTs requires Our study aims to create a guideline for establishing serious awareness of the threats and reasonably affordable, relevant IoT cybersecurity vulnerabilities [16], [17]. Users’ lack of laboratories configured primarily for use at teaching knowledge can make them victims of social institutions. Furthermore, we deliver a set of engineering attacks. algorithms that can be used to better
programmable data plane switches.Mr. Jose Gomez, University of South Carolina Jose Gomez is a Computer Engineering PhD student at the University of South Carolina in the United States of America. For the last three years, he worked as a researcher and teaching assistant in the School of Engineering at the Catholic University in Asuncion.Antonio Mangino, The University of Texas at San Antonio Antonio Mangino is currently pursuing a Master’s degree in Information Systems and Cyber Security at The University of Texas at San Antonio. He received his B.S. in Computer Science from Florida Atlantic University (FAU) in 2019. As a member of the Cyber Threat Intelligence Laboratory at Florida Atlantic
an off-campus Master’s program. Growth over a few years hasoutpaced the acquisition of new faculty, space, and equipment. The conflict of accommodatingmore students within the constraints of the limited resources is making scheduling increasinglymore difficult. This work was inspired by standard scheduling duties such as finding overlappingcourse times, faculty load calculation, keeping track of adjuncts, dealing with schedules toaccommodate students out of sequence, and integration with math and physics courses.Tools were created to perform data manipulation and analysis for standard scheduling tasks.These included calculations often foreign to other non-STEM departments such as differingcredit for teaching laboratories. At the point of
or without the pandemic. However,the pandemic is likely to accelerate the changes. The demand to move from traditional learningto online learning may be even higher in computing and information technology programs due togrowing enrollment and tight resources. After the outbreak is controlled, the trend to moveonline probably will continue.This paper will cover the experience in online teaching and learning in our Information andComputer Technology Programs. Strategies of converting in-person courses to online courseswill be discussed.2. MOTIVATIONInformation technology operations in industry have moved from in-house to the cloud steadilyover the past two decades. Since mid-2000s, we have followed the trend and converted many in-person
Paper ID #29528Drawn together: Integrating words with visuals while annotatingtextbooks and articles for strengthening competencies in computernetworking technologyDr. Vigyan Jackson Chandra, Eastern Kentucky University Vigyan (Vigs) J. Chandra, Ph.D., serves as professor and coordinator of the Cyber Systems Technology related programs offered within the Department of Applied Engineering and Technology (AET) at Eastern Kentucky University. He received his master’s and doctoral degrees from the University of Kentucky in Electrical Engineering, and holds certifications in several computer/networking areas. He teaches courses
student-centered laboratory,” Proc. 32nd IEEE FIE, Boston, MA, Nov. 2002. [4] J.-S. Chenard, Z. Zilic, and M. Prokic, “A laboratory setup and teaching methodology for wireless and mobile embedded systems” IEEE Trans. Educ., Vol. 51, No. 3, pp. 378-384, Aug. 2008. [5] J.W. Thomas, “A review of research on project-based learning,” San Rafael, CA: Autodesk Foundation. 2000. [6] K. Edström and A. Kolmos, “Comparing two approaches for engineering education development: PBL and CDIO,” Proc. 8th Int. CDIO Conference, Queensland University of Technology, Brisbane, July1-4, 2012. [7] J. Malmqvist, K. Edström, K. Gunnarsson, and S. Östlund, “Use of CDIO standards in Swedish national evaluation of engineering educational programs,” Proc
Paper ID #34705Work in Progress: Engaging First-year Students in Programming 1 DuringCOVID-19Dr. Stephany Coffman-Wolph, Ohio Northern University Dr. Stephany Coffman-Wolph is an Assistant Professor at Ohio Northern University in the Department of Electrical, Computer Engineering, and Computer Science (ECCS). Research interests include: Artifi- cial Intelligence, Fuzzy Logic, Game Theory, Teaching Computer Science, STEM Outreach, Increasing diversity in STEM (women and first generation), and Software Engineering. American c Society for Engineering Education, 2021
the semester during theregularly scheduled laboratory sessions, which are otherwise used for the implementation ofcoding concepts and development of programming skills through interactive group activities andcode-writing exercises. The coding interviews provided an opportunity for each student to meetindividually with a Teaching Assistant (TA) or Instructor to discuss the core programmingconcepts of the course in the context of code that the student wrote for a previous assignment.The TAs were trained to keep the interviews as an informal discussion focused on the codingconstructs implemented in the student’s code with primary goals as follows: • To ensure each student is developing fundamental programming skills and to flag those
Paper ID #28246Writing Effective Autograded Exercises using Bloom’s TaxonomyDr. Lina Battestilli, North Carolina State University Lina Battestilli is Teaching Associate Professor of Computer Science at NC State University. She received her Ph.D. in Computer Science from NCSU in August 2005, her masters in Computer Networking in August 2002 also at NCSU and her BS in Electrical Engineering and Minor in Applied Mathematics from Kettering University in 1999. Prior to joining North Carolina State University in 2012, Dr. Battestilli was a network research engineer at the Next Generation Computing Systems at IBM Research
Paper ID #26201Data-Driven Investigation of Curiosity in Student Text ResponsesDr. Naeem Seliya, Ohio Northern University Dr. Naeem (Jim) Seliya, PhD., is an Associate Professor of Computer Science at Ohio Northern Uni- versity, Ada, Ohio, USA, where he currently teaches Mobile App Development, Data Science, Software Engineering, Software Design Patterns, Net-Centric Computing, and Theory of Computation. His key ex- pertise and interests include: Data Science (i.e., Machine Learning, Big Data Analytics, Deep Learning, Data Quality, Data Visualization, Data Wrangling, and Feature Engineering); Software Engineering and
Design course is to provide our students with a realisticembedded design experience and to teach them the tools and methodologies that can help thembe successful. Our senior design course is structured as a collection of independent studentprojects. This course is offered every semester. Usually, the students in the ComputerEngineering program take this course during their last semester. Students have the option ofworking individually or in group of twos. Students either can come up with an embedded projectthemselves or work on a project that is given to them by their advisor. Students write a proposalto define problems and identify solution approaches for their project and the hardware andsoftware that is needed for their project. After several
Paper ID #29171Cyber-Physical Systems Security Introductory Course for STEM StudentsProf. Sin Ming Loo, Boise State University Sin Ming Loo is a professor at Boise State University with interests in sensor systems and cyber-physical systems security research and education. He is responsible for Hartman Systems Integration and Cyber Lab for Industrial Control Systems laboratories. He holds a joint appointment with Idaho National Lab. He is a member of IEEE/CS, ISSA, Tau Beta Pi, and amateur radio (KI4AKS). nLiljana Babinkostova c American Society for Engineering Education, 2020 Cyber-Physical
the program. There must be a suf- ficient number of faculty and they must have sufficient responsibility and authority to improve and implement the program.7. Facilities All facilities (classrooms, offices, laboratories, and associated equipment) must be adequate to support the attainment of the student outcomes. Modern tools, equip- ment and resources must be available to the students, and they must be systemati- cally maintained and upgraded.8. Institutional Institutional support and leadership must be adequate to ensure the continuity of the Support program. Institutional resources provided to the program must be