Asee peer logo
Displaying all 8 results
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Lina Battestilli, North Carolina State University; Sarah Korkes, North Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. She worked on the PowerEN Technology, a blur between general purpose and networking processors and hardware accelerators. She identified and studied workloads at the edge of the network that required high-throughput and fast deep-packet processing. Since 2012, her research has been focused on Computer Science Education, especially in the area of peer collaboration, scaling techniques for large courses, auto-graders and learning analytics. She is also working on software that can be used for teaching and learning. She is investigating techniques and best practices on broadening participation in Computer Science. Women and minorities need to be more involved in tech innovation as companies and teams perform
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
data for a planned multiple semester longer term project.This paper contains (1) motivation and goals for this work, (2) outcomes and learning objectives,(3) instructions on how to design this kind of assignment, (4) the video assignment write up, (5)the rubric for the video, (6) the rubric for peer feedback, and (7) the rubric for reflection. Thispaper focuses on the structure and instruments used during the course.About the CourseArtificial Intelligence (AI) is being used to tackle more and more of the real-world problemsaround us. EECS 4901 Special Topics: Introduction to Artificial Intelligence will introducestudents to the fundamentals of Artificial Intelligence (AI). During this course students will lookat various problems being solved
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
of the summer course. Otherhomework assignments were peer-graded within the learning management system. Lectures weredelivered as ‘live’ notes using PDFAnnotator. Note taking has been shown to improve learning,so this was preferred over using premade slides. At the same time, traditional board notes wouldnot have been easy for online students to read. The final instructor notes were then made availableto all. Students were able to join the lecture via Zoom, a video conferencing platform. Pauses inlecture allowed for questions and comments from both the live class and via the chat feature withinZoom. The versatility of Zoom was also critical for evening office hours. The ability to screenshare was especially valuable for addressing errors in
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jared Oluoch, University of Toledo
Tagged Divisions
Computing and Information Technology
CAC and ETAC. In this example, let’sfocus on CAC and ETAC student outcomes 1 and 2. Below is a list of questions that were used inan examination to test and demonstrate achievement of the student outcomes. 1. Write a program that accomplishes the following Generates a random number Asks the user to guess the random number generated If guess is not between 1 and 10, print message “no!” If user has guessed the number correctly, print out “You got it!” Otherwise, print the correct random number generated. 2. Write a Java program that asks the user to enter three integers. Use an if else statement to print out the largest integer. 3. Write a for loop that asks the user to enter five integers
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
approaches have been used to increase students’ interest in cybersecurity.The game-based learning approach proposed in [6] provides motivation to students’ willing tostudy the power grid through inclusion of the physics of power systems, cyber physicalvulnerabilities, energy markets, and control systems. The game provides the mechanism forunderstanding the impact from computer security, growth of customer base, power generationassets, energy markets, automation, and human operator decisions on the stability of a smallelectric grid.The study in [7] presents a peer-based learning approach with cybersecurity co-curriculumactivities conducted and assessed using a student survey. Results demonstrate the efficacy of theseactivities in increasing students
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
desired performance level. At this point, students are self-regulated learners: they canset their own learning goals, determine how to best accomplish these goals, and monitor their progressin accomplishing them [1, Part II]. When self-regulated learners perceive deficits in their learning, they exhibit adaptive help-seeking:asking others for the resources necessary in order to learn independently [16], [17]. Students may engagein formal (approaching an instructor) or informal (approaching a peer or friend) help-seeking behavior.Students who use more metacognitive, cognitive, and resource management strategies are more likely toseek help when needed. Furthermore, students who exhibit high self-esteem appear more likely to seekhelp when needed
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
cybersecurity education including the participation of women. She is an author or co-author of over 30 peer-reviewed journals and conference proceedings in these areas. She is a member of the IEEE Computer Society, ACM, ACM-W, Women in Cyber Security (WiCys), SWE(Society of Women Engineers), and NCWIT(National Center of Women in Technology).Brandon Earwood, Texas A&M University-San AntonioDr. Young Rae Kim, Texas A&M University-San Antonio Young Rae Kim, youngrae.kim@tamusa.edu, is an assistant professor of mathematics education in the Department of Curriculum and Instruction in the College of Education and Human Development at Texas A&M University-San Antonio. His research interests focus on how students
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Leila Zahedi, Florida International University; Stephanie J. Lunn, Florida International University; Samira Pouyanfar, Microsoft; Monique S. Ross, Florida International University; Matthew W. Ohland, Purdue University, West Lafayette
Tagged Divisions
Computing and Information Technology
engineering through the exploration of: 1) race, gender, and identity in the engineering workplace; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women and minorities in computer-related engineering fields.Dr. Matthew W. Ohland, Purdue University at West Lafayette Matthew W. Ohland is Associate Head and Professor of Engineering Education at Purdue University. He has degrees from Swarthmore College, Rensselaer Polytechnic Institute, and the University of Florida. His research on the longitudinal study of engineering students, team assignment, peer evaluation, and active and collaborative