secure information technology (IT) systems, with responsibility for aspects of Software development system and/or network development Systems architecture Technology R&D Systems requirements planning Test and evaluation Systems development Operate and Maintain Provides the support, administration, and Data administration maintenance necessary to ensure effective Knowledge
Centre/University of Minho (Portugal) working on H2020 Project titled ”Gender Equality Plans for In- formation Sciences and Technology Research Institutions, EQUAL-IST”. He is Member of Intersociety Cooperation Committee, Standing Committee of the IEEE Education Society; Vice President of Brazilian Chapter of Association of Information Systems (BRAIS); Vice President of the Portuguese Chapter of the IEEE Women in Engineering (IEEE WiE); and Associate Editor of Directory of Open Access Journals (DOAJ). He is Editor-in-Chief of Brazilian Journal of Education, Technology and Society (BRAJETS) and Associate Editor of Journal of Information Systems and Technology Management (JISTEM). He is titled ”Engineering Educator
process to beperformed in the organization for the institutionalization of a process:1. Establish an Organizational Policy 7. Identify and Involve Relevant Stakeholders2. Plan the Process 8. Monitor and Control the Process3. Provide Resources 9. Objectively Evaluate Adherence4. Assign Responsibility 10. Review Status with Higher Level Management5. Train People 11. Establish a Defined Process6. Control Work Products 12. Collect Process Related ExperiencesInstitutionalization of ABET Metrics at California State University, FullertonData plays a key role in any improvement effort since it shows the areas that
data for a planned multiple semester longer term project.This paper contains (1) motivation and goals for this work, (2) outcomes and learning objectives,(3) instructions on how to design this kind of assignment, (4) the video assignment write up, (5)the rubric for the video, (6) the rubric for peer feedback, and (7) the rubric for reflection. Thispaper focuses on the structure and instruments used during the course.About the CourseArtificial Intelligence (AI) is being used to tackle more and more of the real-world problemsaround us. EECS 4901 Special Topics: Introduction to Artificial Intelligence will introducestudents to the fundamentals of Artificial Intelligence (AI). During this course students will lookat various problems being solved
. 1,2017- Oct. 1. 2020) in September 2017. This paper describes the project goals,objectives, and expected outcomes as well as the steps taken to implement some of theproject activities. It should be noted that the project is a work in progress and thus itsimpact on the students and our CS program could not be currently evaluated due toinsufficient data. The effectiveness of the project will be measured annually by Octoberof each project year. We are planning to present the assessment results of this project in afuture article by 2020.Goal StatementThe primary goal of this project is to enhance the retention and graduation rates ofcomputer science students at FVSU through revising curriculum, implementing a peer-to-peer tutoring/mentoring, and
accommodate per year ten high-achieving undergraduate students recruited from across the USA and their faculty mentors on the theme of HPC applications in engineering research. In this experience report, we describe our first offering of the site in summer 2019, including the processes of students recruitment and selection, training and engagement, research mentoring, and professional development for the students. Best practices and lessons learned are identified and summarized based on our own observations and the evaluation conducted by an independent evaluator. In particular, improvements are being planned so as to deliver a more holistic and rigorous research experience for future cohorts
Swarms with Distributed Swarm Control 3. Enhancing Security of Cloud-Connected UAS ServicesStudents were placed onto teams based on their prior course experiences and the projectrequirements. Common resources were provided for all students to train them in conductingresearch. Teams were then tasked with developing a more comprehensive research plan for theirspecific project and carrying out that plan throughout the 2020-2021 academic year.Students completed a pre-survey at the start of the project and a mid-project survey shortly afterthe winter break. The surveys combined project specific skills questions as well as relevantquestions from the Undergraduate Research Student Self-Assessment (URSSA), an NSF-fundedassessment tool to measure
, IGERT, and I3 grants for the National Science Foun- dation. She is an Extension Services Consultant to the National Center for Women & Information Tech- nology and has helped more than a dozen universities increase recruiting and retention of women in their technology programs with data driven methods and evaluation support. Four of her clients are NCWIT NEXT Award winners for the Extension Services outcomes they achieved. Michelle has an M.A. in Applied Behavioral Sciences with Human Factors specialization. Her research interests include the eval- uation of STEM projects and programs, diversity studies, strategic planning, and data visualization. c American Society for Engineering
browsing capabilities via TOR (The Onion Router), LAMP (Linux, Apache, MySQL, PHPor Python or Perl) server, Virtual Private Network (VPN) server, and protected browsing viaproxy service. The main goal of this educational project is to leverage the total holisticintegration of open source hardware and software to provide an affordable and portable solutionthat could be promptly deployed in case of an emergency, as a part of an incident response plan(IRP), or in case it is needed for testing purposes. Implementing this project provides valuablehands-on security experience and best practices in network architecture and configuration.Additional security features, both in hardware and software, were added to the single-boardcomputers to add additional
-week on-campus experience. In the successof the first year, expansion, to include a satellite campus, was planned for year two. This wasnever realized due to COVID-19.The summer 2020 delivery and curriculum was redesigned two short months before delivery.The decision was made to offer a much abbreviated online version of the camp, whilemaintaining the maximum capacity. Through a partnership with cyber.org, curriculum wasselected and a virtual capture-the-flag was offered. The capture-the-flag competition served topromote participation in the recruitment activities. Through the use of pre and post tests, datawas collected as to familiarity with the university, the Department of Computer Science degreeofferings, job opportunities in the field
ofthe economy, from scientific investigation and engineering to finance, health, and nationalsecurity, demands a high quality professional computing workforce that includes the meaningfulparticipation of diverse perspectives and experiences. These perspectives and experiencesinform how personnel approach and solve a wide variety of difficult problems. Computingoccupations and degree programs, however, struggle with generating gender diversity. In 2015,only 18 percent of computing bachelor’s degree recipients were women, despite womencomprising 57 percent of bachelor’s degree recipients across disciplines [1]. Embeddingevidence-based interventions in a strategic plan is an effective approach to increasingenrollments and ultimately attaining
more comfortable participating in computing activities beyond the classroom. Thetechnical practice was immediately useful for some students as described below: It has shown me how to use python and wireshark and even do some web dev. I plan to make my own website using some of this knowledge. I also appreciate learning so much material that I never even knew, now CS is not as intimidating Learned python and got experience using libraries that are crazy, and it helped refamiliarize me with git & git bash. I actually contributed to a GitHub repository because I felt somewhat confident. Been a few weeks now and there aren’t any comments bashing it! :D I have joined more CS activities like the Web
experience with online courses. We weresomewhat prepared when there was a need to move F2F courses to online courses as thepandemic started in early 2020.In spring 2020, fall 2020 and spring 2021, all undergraduate F2F courses in our department weremoved online to reduce the potential spread of COVID-19 infections. For DE students, thechanges in course delivery were relatively small. For many F2F students, taking all coursesonline was neither expected nor planned when they came to this college. Both F2F and DEstudents were also facing additional challenges and stressors, physically, mentally, andfinancially. It is important to find a way to make the online transition as seamless as possible.3. STRATEGIES OF MOVING COURSES ONLINEIn the classes I
sites based on their research projects, thereis still a need to provide new PIs with guidance on the different aspects of an REU site such asidentifying resources that can assist in recruiting women and underrepresented minorityapplicants, providing training for graduate students acting as mentors, and strategies for keepinga mentoring connection to undergraduate researchers after they return to their home institutions.Currently, REU site preparation and orientation for new PIs is a face-to-face process thatrequires careful planning and significant travel costs. The REU PI Guide, a set of web-basedresources at https://www.vrac.iastate.edu/cise-reu-pi-resources/, was developed to share bestpractices of experienced PIs and build capacity within
exposing students to Python. Through theexisting researcher-practitioner partnerships (RPPs), we have been providing CT professionaldevelopment for the teachers based on block programming. Furthermore, we developed andpresented the new materials in two online PDs as a short and a more detailed one in Spring andSummer of 2020 to help the teachers with planning for the 20-21 school year. Moreover, westudied how such PD would impact the teachers.Our prior study of the middle school ecosystem revealed that teachers’ needs should always bethe focal point of PDs, as there are many unmet needs for CS/CT in K-12. Our first challenge wasto provide a holistic view of programming in Python while reassuring the teachers that they areable to learn the language
satisfactionproblems are common problems in computer science. Furthermore, puzzles are also commonlyused in CS instructional approaches [11], [29]–[31], [59], [60]. The third problem was a shopping task, where the participants received a hypotheticalgrocery store floor plan and a shopping list. Using the given floor plan, the participants had todescribe their route for acquiring all items in the list including a gallon of milk, a jar of jam, afive-pound bag of flour, five pounds of chicken, and a bottle of fruit juice. No specific constraintwas given to the participants. At the end of this task, the participants were asked to describe theirusual shopping strategy. We believe people develop a general floor plan of their favorite stores, which
members in this work that was attached to a grade.discussion had different solutions. 2.4 Recommendations for future study Bearing in mind the observations and shortcomings of the interventions we plan to augment our interventions by ensuring the drawbacks observed were addressed. One recommendation is to have icebreaking games at the beginning to make the group
nearly quadrupled from its fall 1993 enrollment of 10,500. UVU isnow the largest bachelor-degree granting institution in the state. While this institutional transitionhas been the result of much strategic planning, it has strained state and community resources andcontinues to create a number of challenges, particularly in the availability of scholarship funds.UVU has a dual mission – that of a comprehensive university offering bachelor’s degrees and afew master’s degrees, and that of a community college offering associate degrees andcertificates. As part of its community college mission, the institution maintains an open-enrollment policy. Student demographics are similar to those of a community college, withmany students seeking a “second
fromlinear algebra alongside Python and Numpy.Many undergraduate programs include artificial intelligence (AI) or embedded systems in theirCS curricula [9, 10, 11, 12]. However, the authors could not find a course that would combineboth topics. As the AI algorithms make their way into wearables, smart phones and Internet ofThings (IoT) devices, having experience in real-time AI algorithms will benefit students in theirprofessional careers.The course is still under preparation and is planned to be offered in the summer of 2018. We aresharing our work-in-progress that illustrates the development of the labs for EAI. Two differentforms of learning were taken into consideration: “top down” approach, where the student beginswith a fully functional model
development background of computing education in China to form a morecomprehensive and clear understanding of it, and refine the path of the realization ofcomputing education through the structured case study.2 The development of computing education in ChinaThe training for computer science and technology professionals started in the United Statessince the 1950s. Later the training programs adopted by other countries including China, allreferred to the US system.In 1995, on the basis of extensive research, the Ministry of Education approved the plan forthe reform of educational contents and curriculum for computer science and technology. Theproject is undertaken by a team of teachers from 9 universities including Fudan University,Shanghai Jiaotong
biomasspower 5. A bachelor's degree with a specialization in renewable energy offers focusedengineering technology coursework, preparing students with technology skills that can put towork future in green technologies across three areas: Engineering Technology, InformationTechnology, and Software and Information Systems.As student pursue a bachelor’s degree with a specialization in renewable energy, will learn aboutalternative energy generation and the complex factors behind green technology. This includeshow economics, sociology and environmental science are connected, and the design processesused in today’s leading renewable energy initiatives. From planning and project management toenergy production and storage.In the following, courses for this
mentors are now required to create a SMART (Specific, Measurable,Achievable, Relevant, Time-bound) goal [15] for each mentee and develop a plan to implementthat goal in the academic year. The SMART goal and plan should be completed by the end ofOctober. Project PIs now meet with mentors to discuss the goals for their mentees to make sure itis reasonable. In addition, we survey mentors monthly to document their activities and meet withmentors once a month to gather feedback, identify potential problems, and share successfulstories or tips. Based on the monthly report from peer mentors during the 2020-2021 academicyear, we have observed positive changes between mentors and mentees.4.2 Research ExperienceUndergraduate research is one of the thirteen
have completecontrol over design implementation once requirements have been fully articulated. Prior analysis[5] indicates that RAD focuses on “incremental prototyping” of user-centric design that can bequickly released by small, yet diverse teams of developers, data architects, and solutionsdesigners, among others. Originated by James Martin in the early 1990s, RAD consists of“requirements planning, user design, construction, and cutover” [6]. This methodology isimplemented in LCNC platforms like Infinite Blue Platform, Mendix, and Salesforce. The low-code market is quickly growing; in 2017, Rymer [7] forecast the low-code developmentindustry’s market value to be over $21 billion by 2022, a 658% increase since 2016.LCNC offerings are hosted
, intensivepractice, and skill mastery.Short-form (1-2 hour) workshops are often the most universal offering for training. They are theeasiest to book rooms for (or offer online as webinars), find instructors for, and create materialfor. For the participant, one hour is a reasonable amount of time to find in their day and there arerarely any follow-up requirements. Thus, there is very little risk of making a bad time investmentfor the learner, and the instructional team has a lot of flexibility in repeating the training andexperimenting with content. From research methods to retirement plans, this format is anexceptional platform for learners to explore new tools and services. Even though hands-onpractice can be quite limited in this format, this discovery
. This exposed our students tocollaborators among different fields, with their own terminology, goals, work methods andpractical approaches. Our paper reports on the initial experiment during the Fall 2019 term,involving two sections of an Artificial Intelligence class and one section of a Deep Learningclass. We are planning to continue this collaboration in the future.Keywords: Collaborative Learning, Interdisciplinary, Inter-Class teamwork 1. IntroductionStudents at California Polytechnic State University, San Luis Obispo (Cal Poly) are exposed topractical, hands-on educational activities throughout their course of studies, reflected by theuniversity’s “Learn by Doing” motto. In the Computer Science, Software Engineering andComputer
) early accessto research in the field, (ii) active learning in the classroom to conduct scientific thinking withtheir peers, and (iii) participating in learning communities [6] / study groups to benefit from peerlearning and community building.Lichtenstein et al. [7] found that when students find the learning environment to be academicallysupportive and encouraging, they are more likely to respond with a stronger commitment to theiracademic pursuit and degree completion. Wilson et al. [8] include “academic advising,interventions, and individualized development plans” from faculty advisors as one of the keyfactors that helps students in STEM fields build confidence and stay in the major. Cromley etal. [9] discuss similar themes in their work on
rest of the paper is structured as follows. Section 2 presents the details of the QuestionFormulation Technique and its use in our study. Section 3 presents our proposed approach for thespecific problem identified in our overall project. Section 4 presents and discusses the empiricaldata mining results obtained. Section 5 provides a summary of our paper with a plan for futurework.2. The Question Formulation TechniqueThe ability to formulate salient questions is a critical life skill that enables the student to moredeeply engage with the content being learned. Questions serve the purpose of making clear andconcrete that which is unknown or misunderstood by the student. By making the unknownconcrete, a pathway for exploration, engagement and
don't detract from the learning topicsFinally, we added other elements of fun that aren't directly related to learning but that don'tinterfere with learning. Adding music to the game isn't related to the learning topics, but itdoesn't interfere with them and it increases the sensation game pleasure. Likewise some of themore whimsical and fantastic elements of the game (such as talking magpies and some visualaspects of the museum rooms) add to a sense of fantasy and sensation.We haven't yet incorporated the game pleasures of fellowship and expression into the design ofMagnitude Museum, but those game pleasures can make the game more fun without interferingwith the educational aspects.Future workIn the future we plan to make a multiplayer version
applied to the student retention problem. A data mining approach could be a mostworthwhile strategy for other practitioners and researchers planning to include many variablesalong with all levels of STEM students in the data set. Hendrix [19] found only one out of every2,352 dissertation abstracts included the search words “data mining” in a search of dissertationswith the key words “higher education” and “retention.”In this review, the relevant retention factors, organized in groups, concern students’ academicbackground, commitment behavior, and family background. Multiple variables within thesethree groups of factors are also part of the discussions.Method & ModelThe data mining method of analysis was a predictive classification process
containing information about the victims (age, race, sec), date and time of the crime, etc.;motor vehicle collisions; Housing Preservation and Development (HPD) data set on buildings,units, and projects that began after January 1, 2014 and are counted towards the Housing NewYork plan; New York Air Quality data set; etc.After the completion of the project, the students wrote a report describing what they learned,what conclusions can be made based on this data. Student enthusiastically discussed theirfindings, and the semester concluded in a lively and productive discussion about the importanceof data analysis for the understanding of the city day-to-day life, problems. At the same time, thestudents learned about the importance of the broad and, at