Asee peer logo
Displaying all 16 results
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Shanon Marie Reckinger, Stanford University; Bryce E. Hughes, Montana State University
Tagged Divisions
Computing and Information Technology
categorize students along the model’s active-reflectivedimension as reflective, active, or “in-between” (neutral) learners. Students were partneredthroughout the semester with a variety of partners with attention to mixing and matching theirpreferred learning styles to determine any effects of partnering.This study took place across three sections of a sophomore-level programming class in a mid-size, public university in the western United States. The sample included approximately 100primarily second-year mechanical engineering undergraduate students. The course is a requiredprogramming course using MATLAB. A weekly quiz was administered across each of thesections differently. This was done to test the relationship between strategy and
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
Tagged Divisions
Computing and Information Technology
accessed. Flood attacks happen when a system receives too much traffic forthe server to buffer, causing them to slow down to the point of stopping.Distributed denial of service (DDoS) attacks occur when multiple devices are leveraged into abotnet and used to target a single system. Flooding attack methods are used in DDoS strikes toincrease the volume of traffic aimed at the target. DDoS attacks can also be reflected andamplified to further increase the volume of traffic generated.Generally speaking, reflected DDoS attacks are any attack where the attacker spoofs the sourceIP address to be the address of the intended target and amplified attacks are any attack where theoriginal attack is enhanced by use of another protocol, redirection, or spoofed
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Karen H. Jin, University of New Hampshire; Michael Jonas, University of New Hampshire; Christopher David LeBlanc, University of New Hampshire; Theodore Sean Tavares, University of New Hampshire
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
reflecting on a Capstone experience with the purpose ofsuggestions for improving the experience. The contrast of the ACM literature and the ASEEliterature is that software projects tend to be more focused on design and verification, where theengineering papers tend to have more focus on process such as funding and project launch. Inboth the ACM and ASEE literature review it was most common for Capstone experiences tospan two semesters with some literature suggesting that going to a two-semester program wouldbe beneficial [11].In the literature, the following common question groups were observed, and informed theanalysis and narrative of the case studies in this work: • Project format: How are projects assigned? Are students working independently
Conference Session
Crafting the Future of Computing Education in CC2020
Collection
2018 ASEE Annual Conference & Exposition
Authors
Stephen T Frezza, Gannon University; Arnold Neville Pears, Uppsala University; Marisa Exter, Purdue University, West Lafayette (College of Engineering); Barry M. Lunt, Brigham Young University
Tagged Divisions
Computing and Information Technology, Software Engineering Division
.,ComputerEngineeringCurricula2016:CurriculumGuidelinesforUndergraduate DegreeProgramsinComputerEngineering(CE2016); http://www.acm.org/binaries/content/assets/education/ce2016-finalreport.pdf.Accessed 2017August30.[6] ACMetal.,ComputerEngineering2004:CurriculumGuidelinesforUndergraduateDegree ProgramsinComputerEngineering(CE2004); http://www.acm.org/education/education/curric_vols/CE-Final-Report.pdf.Accessed2017 August30.[7] ACMetal.,InformationTechnologyCurricula2017:CurriculumGuidelinesforUndergraduate DegreeProgramsinInformationTechnology(IT2017);[8] Exter, M. E. & Turnage, N. M. Exploring experienced professionals’ reflections on computing education. Transactions on Computing Education, 12 (3), 2012.
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. Other programs reflecting Wei’s international reach include the college’s Poverty Alleviation/Service-Learning program and Engineers Without Borders. This global perspective is rooted in a vision of SJSU as a preeminent producer of forward-thinking problem-solvers. With this goal in mind, Wei has established the Silicon Valley Engineering Scholarship, a program that provides $5,000 of annual support for high-achieving students to pursue engineering careers. Wei is also a Principal Contributor to CSU (California State University) Engineering Academies, a statewide program that helps high schools better motivate and prepare students for the rigors of engineering education. Moreover, she supports the creation of high
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Laura Kay Dillon, Michigan State University; Michelle Slattery, Peak Research
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
in item wording,such as the addition of a neutral response option.6 A Retrospective Pre-Post Test (RPT)methodology [19] was used on six items to reduce rater bias and to increase evaluationefficiency for the classroom. Surveys asked participants to provide ratings of agreement pre-and-post taking the CTL course on statements related to their interest in a career in computerscience, plans to major in computer science, plans to earn a degree in computer science, andfeelings of belonging in both Intro CS and the CTL. Students in the CTL were also asked toprovide ratings of expertise in computer science both pre-and-post CTL. As all wereconcurrently taking Intro CS, ratings on these surveys reflect impact of the combination of IntroCS with the
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Andreas Febrian, Utah State University; Oenardi Lawanto, Utah State University; Kamyn Peterson-Rucker; Alia Melvin; Shane E. Guymon
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
-12 curriculums. As computational thinking (CT) coursesbecome common in K-12 education [11]–[18], some higher education institutions also startedoffering computational thinking courses to students from any majors [4], [19]. At its heart, thismovement reflects that computational thinking is everywhere and for everyone [20]. Various studies reported using text-based computer-programming- [13], [21]–[25], visualcomputer-programming [26]–[28], and puzzle instructional approaches [11], [29]–[31] to teachcomputational thinking. Most of these studies reported a positive impact on learning computingprinciples and an increase of interest in computer science in male and female students [12], [26],[28]. On the other hand, one study argues that
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Michael Oudshoorn, Northwest Missouri State University; Rajendra K. Raj, Rochester Institute of Technology; Stan Thomas, Wake Forest University; Allen Parrish, United States Naval Academy
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
accreditation visit and the accreditation process in general.ABET assigns a team chair and typically one program evaluator per program being evaluatedwith a minimum of two program evaluators assigned for an initial accreditation visit. The teamchair and institution negotiate a visit date which is typically scheduled between September andDecember.Self-study. The institution then has until July 1 to complete and submit its self-study to ABET, akey aspect of the accreditation process. The institution generates a self-study report that addressesthe accreditation criteria directly and is the primary document used by the ABET team to evaluatethe program prior to their arrival on campus. It is intended to be a self-reflective document inwhich programs have
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
to thefundamentals during all project phases and, especially, while conducting the analysis of theirmeasurements during the testing, revision and evaluation phases. The Virginia Tech class followsa top down approach, where the instructor provides a broad overview and the students analyzesome of the specifics of a standard trough different class assignments.The two classes consistently achieve the expected outcomes in terms of student performance,learning objectives, and instructor and class evaluations. We could observe a high student interestin 4G LTE, reflected by the students’ efforts in mastering the corresponding class assignmentsand project milestones. Interestingly, at Virginia Tech we observed that this motivation spillsover into
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State University; Xiangyan Zeng, Fort Valley State University; Chunhua Dong, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
engaging students in interdisciplinary /multidisciplinaryundergraduate research activities. This goal is also fully aligned with the Universitymission that states "FVSU mission is to promote academic excellence for theimprovement of the quality of life for the people it serves"Statement of SignificanceFor the first time, the computer science program at FVSU is planning to conduct a majoreffort to improve and enhance programming knowledge and skills of its students whileprogressing through the program, enhance retention and graduation rates, and engagestudents in enrichment programs. The significance of this project is as follows: 1. Enhance the course curricula of all CS upper level courses (3xxx/4xxx) to reflect the most current
Conference Session
Computing Technology Applications-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Raja S. Kushalnagar, Gallaudet University; Gary W. Behm, Rochester Institute of Technology; Kevin T. Wolfe; Peter Yeung; Becca Dingman; Shareef Sayel Ali, Center on Access Technology ; Abraham Glasser, Rochester Institute of Technology; Claire Elizabeth Ryan
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
raised a hand and gives that person the floor. Aperson raises any hand and lowers it to obtain control of the captions until another person raises ahand. This form of control based on hand raising takes advantage of social dynamics - whensomeone motions with a hand, others know that person would like to speak or to add somethingto the conversation. It is a method which reflects physical-world experiences. These methodsprovide a more obvious indicator of who is speaking as shown in Figure 3.EvaluationFor the study, we recruited 15 participants through flyers and targeted emails on campus. Of the15 participants, 9 participants identified as deaf, and 6 participants identified as hard-of-hearing.There were 7 participants who identified as women
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
ii) having manyconversations, formal and informal interviews, and other interactions with business leaders,companies’ CEOs and CTOs, other Data Scientists working in the private sector, as well as manyhigh-tech, financial sector and other recruiters (those from individual companies’ HRs as well asexternal “head hunters”) searching for the data analytics talent. Some disclaimers are in orderhere. Thoughts that follow are personal observations and insights based on personal experience(from working in and interacting with industry), and need not reflect an official position orprevalent attitudes towards how to best educate and train the next generation of Data Scientistseither of the author’s most recent prior employer, Washington State
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Arshia Khan, University of Minnesota, Duluth
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
than women in various areas ofthe industry, academia and business [1, 2]. The female computerscience students make less than 20% of the total undergraduatestudent population [1]. When it comes to graduate school only afraction of these undergraduates is pursuing graduate schoolleading to fewer female students in graduate school are researchingin computer science. This phenomenon is reflected in othercomputer science related fields such as computer engineering aswell [2]. For example only 30% of women are employed incomputer science. The ripple effect can be observed in making thesituation even worst by creating a very small pool of positivefemale role models for women in CS [3, 4, 12]. This results inmaking it harder for women in CS to succeed
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Yun Dai, University of Southern California; Tianmeng Li, University of New South Wales; Ang Liu, University of New South Wales; Stephen Lu, University of Southern California
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
question was phrased to be too general, the feedback would be short ofclarity. On the other hand, if the question was phrased to be too specific, it would trigger awide range of feedback (i.e., a normal distribution curve with a high deviation).According to the instructor, the P2P platform was somehow functionally coupled with thelearning management system (LMS). From time to time, students needed to visit the LMS towatch the lecture recordings to reflect the previous concepts during the self-study of newconcepts. Once students developed a routine habit of using the platform, it was also used bythe instructor to make important course announcements and conduct course surveys.Conclusion, Limitation, and Future WorkThis paper presents a new learning
Conference Session
Topics in Computing and Information Technology-III
Collection
2018 ASEE Annual Conference & Exposition
Authors
Landon A. Braden; Scott Alexander Kaiser, Utah Valley University; Reza Kamali-Sarvestani, Utah Valley University; Afsaneh Minaie, Utah Valley University; Paul Weber, Utah Valley University
Tagged Divisions
Computing and Information Technology
components will enable a wide range ofcolleges and universities to train the next generation of nanotechnology engineers.AcknowledgementsThis project is supported by the National Science Foundation through the ATE program, AwardNo. ATE 1700695. Any opinions, findings, and recommendations expressed in this paper arethose of the authors and do not necessarily reflect the views of the National Science Foundation.References 1. Poole, Charles P., and Frank J. Owens, “Introduction to Nanotechnology”, Wiley, 2003. 2. R. Feynman,”There’s Plenty of Room at the Bottom”, Engineering and Science, 23(5): 22-36, 1960. 3. Mongillo, John, “Nanotechnology 101”, Greenwood Press, 2007. 4. The National Nanotechnology Initiative – Strategic Plan, December
Conference Session
Topics in Computing and Information Technology-I
Collection
2018 ASEE Annual Conference & Exposition
Authors
Kari L. Jordan Ph.D., The Carpentries; Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE); Elizabeth D. Wickes, University of Illinois at Urbana-Champaign; Naupaka B. Zimmerman, University of San Francisco; Jonah M. Duckles, Software Carpentry; Tracy K. Teal, The Carpentries
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
primary goals of ourworkshops. Confidence and motivation promote community building, a significant focus area ofThe Carpentries.The final survey instrument included 26 questions. Figure 1 provides a select few questions fromthe survey. The entire survey, data set, and code used to prepare this paper can be found on ourGitHub repository at https://github.com/kariljordan/ASEE. The statements below reflect ways in which completing a Carpentry workshop may have impacted you. Please indicate your level of agreement with the statements ● I have been motivated to seek more knowledge about the tools I learned at the workshop. ● I have made my analyses