Paper ID #32558Student Senior Project and COVID-19Dr. Alireza Kavianpour, DeVry University, Pomona Dr. Alireza Kavianpour received his PH.D. Degree from University of Southern California (USC). He is currently Senior Professor at DeVry University, Pomona, CA. Dr. Kavianpour is the author and co-author of over fifty technical papers all published in IEEE Journals or referred conferences. Before joining DeVry University he was a researcher at the University of California, Irvine and consultant at Qualcom Inc. His main interests are in the areas of embedded systems and computer architecture.John Castellanos, DeVry University
. American c Society for Engineering Education, 2021 Game Design in Computer Engineering Capstone ProjectsAbstractThe purpose of a capstone design project course is to provide graduating senior students theopportunity to demonstrate understanding of the concepts they have learned during their studies.As with many computer science and engineering programs, students of the computer engineeringprogram at Utah Valley University (UVU) conclude their degree programs with a semestercapstone design experience. The intent is for students to utilize competencies developed in thefirst three years of the curriculum in the solution of an embedded design problem.Recently many of our computer engineering
-term investment in a software platform.IntroductionExperiential learning is a relatively modern technique to supplement students’ education by“[developing] a wide range of thinking strategies and perceptual skills which are not called forthby books or lectures” [1]. The benefits of this method have long-term impacts that play a crucialrole in an individual’s professional success. Most ABET-accredited higher-education programsfeature a design course intended to leverage experiential learning by pairing the culmination ofstudents’ knowledge from their undergraduate program with a simulated real-world industryenvironment [2], [3]. There are also several supplemental outlets for continuous project-basedlearning on a larger scale, such as research
Swarms with Distributed Swarm Control 3. Enhancing Security of Cloud-Connected UAS ServicesStudents were placed onto teams based on their prior course experiences and the projectrequirements. Common resources were provided for all students to train them in conductingresearch. Teams were then tasked with developing a more comprehensive research plan for theirspecific project and carrying out that plan throughout the 2020-2021 academic year.Students completed a pre-survey at the start of the project and a mid-project survey shortly afterthe winter break. The surveys combined project specific skills questions as well as relevantquestions from the Undergraduate Research Student Self-Assessment (URSSA), an NSF-fundedassessment tool to measure
c Society for Engineering Education, 2021 Design and Development of a 3-D Printed Hexapod RobotAbstractThe area of robot design has undergone tremendous growth in recent years. A major contributorof this growth has been the advances in microcontroller design, artificial intelligence, machinelearning, sensor design, computational intelligence, and computer vision. The remarkablegrowth in robot design has given rise to a demand for engineers with experience in designing andimplementing these systems. Robotic companies are focusing significant research anddevelopment efforts on these systems. They are recognizing the need for a large, well-trainedworkforce that can conduct these research and development projects
University. He received his Ph.D. from The Uni- versity of Tulsa in 1995. Active in computational science education he has worked on seismic modeling and data analysis for many years. Currently, he is developing algorithms and educational materials for massively parallel computing machines.Dr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several
these processes relate, specifically, to a software venture. This paperpresents the overall instructional plan of the course and discusses each of the course’scomponents. The implementation of the project component is discussed, in particular, in detail.The design and implementation challenges that were encountered are discussed.This course was run in Spring of 2020 and started as an in-classroom course, later transitioningto an online course due to the COVID-19 pandemic. The outcomes of the course are discussed.Possible future enhancements are considered.1. IntroductionSoftware businesses have been responsible for tremendous growth and changes in society. Oncesmall startups, names like Google, Microsoft, PayPal and Facebook now are among the
received his M.S. and Ph.D. in Computer Science from the University of Oklahoma, Norman, Oklahoma. His research focuses on diverse areas such as: Database Design, Data Structures, Artificial Intelligence, Robotics, Computer Aided Manufacturing, Data Mining, Data Warehousing, and Machine Learning. American c Society for Engineering Education, 2021 Haptics in AviationAbstractThe purpose of a capstone design project course is to provide graduating senior students theopportunity to demonstrate understanding of the concepts they have learned during their studies.As with many computer science and engineering programs, students of the
Paper ID #33834Using Data Science to Create an Impact on a City Life and to EncourageStudents from Underserved Communities to Get into STEMProf. Elena Filatova, City University of New York Assistant Professor at CUNY, New York City College of Technology, Department of Computer Systems Technology. Director of the Bachelor of Science in Data Science program.Dr. Deborah Hecht, Center for Advanced Study in Education As Director of the Center for Advanced Study in Education, at the CUNY Graduate Center I am involved in a wide range of educational evaluations of funded and local projects. I also mentor graduate students interested
Paper ID #34368From UML Design to Implementation of a Reliable Student Information Sys-temBriana Marie BaileyDr. Yujian Fu P.E., Alabama A&M University Dr. Yujian Fu is an associate professor of computer science department at Alabama A&M University. Her research interests fall in formal verification of cyber physical systems, behavioral analysis of mobile security, software architecture and design analysis of safety-critical and mission-critical systems. Her projects are supported by NSF, Air Force and DoD. She have several publications regarding to the research and educational projects
Paper ID #34315Integrating Cybersecurity Concepts Across Undergraduate Computer Sci-enceand Information Systems CurriculumDr. Uma Kannan Dr. Uma Kannan is Assistant Professor of Computer Information Systems in the College of Business Administration at Alabama State University, where she has taught since 2017. She received her Ph.D. degree in Cybersecurity from Auburn University in 2017. She specialized in Cybersecurity, particularly on the prediction and modelling of insidious cyber-attack patterns on host network layers. She also actively involved in core computing courses teaching and project development since 1992 in
paper willdescribe the program elements and explain the effects of these activities on our students withpreliminary outcome data and formative evaluation results about the program.1 IntroductionAccording to the 2020 report "STEM and the American Workforce" [1], STEM supports 67% ofU.S. jobs and 69% of the Nation's GDP. Computer occupations play a critical role in STEM.The U.S. Bureau of Labor Statistics projected that about 600,000 or 67% of all new jobs inSTEM between 2018 and 2028 would be in computing. Average annual openings in computeroccupations during the decade were projected to be about 450,000 [2]. Although the number ofstudents who graduated with a bachelor's degree in computer and information sciences in 2016was more than 70,000
courses complementing the primary major, and atwo-semester capstone project course; 10 courses worth 30 credit hours in total.Figure 1: Program outline. Shaded courses form a required core. Arrows to electives are notdrawn, different core courses are prerequisites for different electives.2.2 Core coursesThe goal of the core courses is to develop fundamental knowledge and skills. All core courseshave non-credit weekly labs associated with them.2.2.1 Introduction to Computer Science IIntroduction to Computer Science I (Intro I) course is designed for students with no priorbackground in computing. It has two central aims. The first aim is to enable the students todevelop computational solutions to practical problems: • Break a
describes details of design and implementation of a lower-level(core-Tier1) computer organization and architecture course with online hands-on components as common learning environments. We use the followingpedagogical approaches for the revised course content: lead-learner, blendedcourse delivery, flipped classroom, and project-based learning. Online hands-on component of the course has been focused on using asingle-board computer, and associated hardware with the aim to providestudents contemporary skills in implementing computer orientation and ar-chitecture projects with related software components. We have collectedresearch data after the first two cohorts (in the same academic year, twoseparate sections of the same course). While we
so the organization may effectively conduct cybersecurity work Strategic planning and policy Executive cyber leadership Program/project management and acquisition Protect and Defend Identifies, analyzes, and mitigates threats Cyber defense analysis to internal information technology (IT) Cyber defense infrastructure support systems and/or networks Incident response
computing. She is currently involved with an NSF-funded S-STEM project that awards scholarships to students studying computing at USF. The project implements a suite of community- building activities designed to improve scholars’ self-efficacy and develop computing identity. Sami also co-directed a project that developed system support and user-driven strategies for improving energy effi- ciency in residential buildings. Sami has served in a number of service roles at USF and in her professional community. She was chair of the Computer Science department at USF from 2013-2016. She also served on the editorial board of Sigmobile’s GetMobile Magazine from 2014-2018. She has been involved with the discipline-specific
Paper ID #33383Broadening the Middle School Computational Thinking Interventions Be-yondBlock ProgrammingDr. Mohsen M. Dorodchi, University of North Carolina at Charlotte Dr. Dorodchi has been teaching in the field of computing for over 30 years of which 20 years as an educator. He has taught the majority of the courses in the computer science and engineering curriculum over the past 20 years such as introductory programming, data structures, databases, software engineering, system programming, etc. He has been involved in a number of National Science Foundation supported grant projects including Scholarship for STEM
chain iscreated (through the generation of a genesis/root block), no one has access to modify the genesisblock itself, however, participants can add additional blocks to the chain but not modify them oncemined or validated. There is no way to start over in the public blockchain implementation whichmakes teaching blockchain technology using public platforms extremely challenging. The mainreason is the abstract concept of the blockchain which presents a significant challenge to introduc-ing the blockchain technology in the undergraduate curriculum and demystifying the blockchainnetwork and its inner workings.In this project, two students and their advisor embarked on defining, designing, constructing, andconfiguring a Private Blockchain
labs. (The course was set up for students to complete pre-labs,2/3 of the homework assignments, class related activities, and one project with their teammates).The badges often helped as stress relief and occasionally rewarded students for “grit”. Thesebadges being a 0% column in the gradebook allow students to access and see their achievementswhenever they wanted. Additionally, they would receive a notification from the system when thebadge was “entered”. The idea behind this badge system is to encourage students to work hardand achieve various skills through the semester. The badges are like those often earned in a videogame. Although not all programming students are huge video game players, many of them are,and most have dabbled a little
solve a problem. Reflection prompts can guide studentsto articulate a problem and develop their problem-solving skills [3].In a Data Structures and Algorithms courses we expect students to use their knowledge fromintroductory programming courses to implement data structures and algorithms for solvingproblems efficiently in terms of space and time complexity [4]. Assignments and projects in DataStructures and Algorithms require students to make decisions about what data structures to useand are challenging enough that jumping straight into coding is not an efficient way to solve theproblem. Students often have a hard time choosing the most efficient data structure, which maybe less familiar, rather than the data structures they are comfortable
case we could not locate such information [36]. We then performed data processing and endedwith n = 1,775 records for the next step in our analysis. We applied the following Python librariesand packages to process the data: • Pandas: an open-source data analysis and manipulation tool for Python [37]. We used version 1.1.0 in the analysis. • Numpy: an open-source project to enable numerical computing in Python [38]. We applied version 1.18.1. • lxml: a Python library for processing XML and HTML [39], and we used version 4.3.0 in data collection and processing. • Natural Language Toolkit (NLTK): a suite of open-source libraries for symbolic and sta- tistical natural language processing for English written in
security. He has served as the key technology person in all aspects of Global Academic Initiatives since its inception, with multiple projects that include more than 30 partner universities from more than 20 countries, and the Global Climate Change course including Brazil, China, India, Mexico and USA. American c Society for Engineering Education, 2021Lab Performance Evaluation via a Workshop SurveyAbstractWe implemented a unique learning system, Competitive Labs-as-a-Service (CLaaS), thatprovided comprehensive cybersecurity awareness education. The system included multipleidentical virtual learning environments. Each learner had his/her own learning environment
practice withinengineering education tend to extend only to other science disciplines [3, 1]. Lattuca et. al.’s2017 engineering education study found that a curricular emphasis on interdisciplinary topicsand skills (specifically including participating in non-engineering co-curricular activities andhumanitarian engineering projects), “significantly and positively relate to engineering students’reports of interdisciplinary skills” [4]. In this paper, we suggest an interdisciplinary computerprogramming exercise based on Ada Lovelace’s 1843 program for Charles Babbage’s AnalyticalEngine, thus promoting knowledge transfer between the humanities (history) and computerscience. Every student of computer science should be aware of the Bernoulli
installation instructions for students using different operating systemsor editors, which creates more time to teach programming concepts. Other examples of platformindependent, low bandwidth course resources are “How to Think Like a Computer Scientist:Interactive Edition” by the Runestone Interactive Project [17] and Trinket.io’s Hour of Pythontutorials [18]. Course materials were chosen to take advantage of high quality open educationalresources (OER) to reduce the costs for learners. NDSU’s Student Government created a grantprogram to encourage faculty to use OER [19] and created a joint committee with the NDSULibraries called the Open Resources Board (ORB) to advocate for the implementation andsustainability of open educational resources at both
their availability to prepare, including non-computing related jobs, caring for a familymember, or ongoing health issues. While we do consider the support mechanisms students mayleverage to overcome obstacles, in general, these results emphasize the larger issues in existinghiring structures, and demonstrate the importance of not treating students as a monolith. Thefindings from this work are intended to inform educators about how to better prepare students tosucceed on technical interviews, and to encourage industry to reform the process to make it moreequitable.1 IntroductionBetween 2019 and 2029, demand for workers in computing occupations are expected to surge28.8% [1]. For specific positions the projected rate is even higher, with 35.0
course is a critical component in the undergraduate computer scienceand engineering curriculum. In an era of mobile and ubiquitous computing, almost everyembedded device can connect online to make full use of its potentials and accommodate taskneeds. Hence, a good understanding of computer networking opens doors for many high-techjobs for computer science and engineering majors. Traditionally, computer networking coursesutilize switches and routers in the laboratory environment to give students hands-on projects toenhance their learning experience. However, due to the pandemic situation, many institutionshave switched to online learning. The computer networking class is not allowed to access thephysical networking equipment in the laboratories
toinform students and educators on the hiring process and how to prepare for technical interviews.Moreover, this research serves to provide industry with evidence of the problems inherent withthe existing hiring system. Analysis of these results will be used to offer suggestions andguidelines that will enable a hiring process that can still achieve its target of finding qualifiedapplicants, but that does so in a manner more justly to all job seekers.1 IntroductionJobs in computing are expected to experience 11% growth over the next decade, which is agreater rise than the projected averages for other fields [1]. Although these positions may begaining momentum globally, unemployment remains a real concern for new graduates, asindustry adds barriers
key feature of this offering of this course. Students were giventhree immersion options: industry, research or entrepreneurial. Students divided into groupsbased upon the immersion option that they wanted to pursue as well as the topics that theyindicated interest in. Several project topics were suggested for each category and student groupswere free to propose their own.In the industry option, one group of students had an opportunity to explore the NDSU networkand its security. A second group helped a local business (which one of the students was workingat) to design a security testing exercise which was deployed by the company’s staff who reportedback (somewhat abstracted, for security purposes, results to the students). In both cases
/methods, some of which may be more cost-effective than traditional in-persontools/methods. By adopting proper tools and strategies, we believe that the quality of learning inonline courses can be comparable to, if not better than, that of learning in in-person courses.REFERENCES[1] K. Parker, L. Amanda, and K. Moore, "The digital revolution and higher education: Collegepresidents, public differ on value of online learning," Pew Internet & American Life Project(2011).[2] C. W. Starr, B. Manaris, and R. H. Stalvey, "Bloom's taxonomy revisited: specifyingassessable learning objectives in computer science," ACM SIGCSE Bulletin 40, no. 1 (2008):261-265.[3] P. Li, "Exploring virtual environments in a decentralized lab," ACM SIGITE Research in IT6
that homework accuracy 2 weeks prior can indicate exam perfor-mance [6], which suggests time is an influential factor in flipped classrooms. With this in mind,it is evident that understanding student behaviors is necessary to improve the learning in flippedclassrooms. Willman et al., studied the effect of study habits in students’ performance in CS1 and found that“students who receive the highest grade start and finish their work early, do not work on weekends,and do not work at night....” [18]. Edwards et al., and Shaffer et al., also found that students whobegin programming projects earlier perform better than those who begin closer to the due date[16, 19]. Given that it is mostly accepted that students who start earlier on assignments