Paper ID #37377WIP: Replication of a 1/5th-Scale Autonomous Vehicle to FacilitateCurriculum Improvement in Cyber EngineeringDr. Wookwon Lee, Gannon University Wookwon Lee, P.E. received the B.S. degree in electronic engineering from Inha University, Korea, in 1985, and the M.S. and D.Sc. degrees in electrical engineering from the George Washington University, Washington, DC, in 1992 and 1995, respectively. He is currently a full professor in the Department of Electrical and Cyber Engineering at Gannon University, Erie, PA. Prior to joining Gannon in 2007, he had been involved in various research and development projects in
expectancy. We analyze the data of 600 engineering students enrolled in a CS1 courseand find that gender and PPE are statistically significant factors that influence students’ learningself-efficacy. We also find that learning self-efficacy and GPA are statistically significant predictorsof outcome expectancy. We believe these results will help advance our understanding of engineer-ing students’ motivational beliefs and help instructors identify specific groups of students that mayneed additional support and assistance.1 IntroductionAs the importance of acquiring computational skills increases, there is a growing emphasis onadding more programming and data analysis courses in the undergraduate curriculum, especiallyfor engineering majors [1
are an issue of national security, financial andeconomic stability, and consumer confidence. Data breaches caused by these vulnerabilities canlead to interruptions in public services, monetary loss, and loss of privacy. The 2021 Verizon DataBreach Investigation Report [1] indicates that there were 3,950 data breaches in 2021 in the UnitedStates. Software vulnerabilities continue to increase as tracked by National Institute of Standardsand Technology (NIST) National Vulnerability Database [2] and MITRE Common Vulnerabilitiesand Exposures (CVEs) [3]. A 2021 report from Tenable, a leading IT vulnerability assessment andmanagement solution company, indicates that there were 21,957 vulnerabilities reported in 2021,a slight increase from the 18,358
. It allows for planningand providing the appropriate remedial services that students need in a timely manner. It requiresthe ability to predict student performance several times throughout courses. Many predictivemodels have been proposed and used to varying degrees of success to make such predictions.Some of these models are at the exam level, some at course level and some at the degree level.These models require the use of data sets that typically come from multiple sources such asstudent information systems (SIS's) and pre-college information, to name a few.This study builds upon the work done by a previous paper which focused on a few ComputerScience (CS) courses taught by three instructors [1]. The present paper applies and expands
for big data and artificial intelligence has led to aprogressive interest in developing students’ programming skills. A big part of artificialintelligence and big data is concerned with software development, which often relies on effectivedebugging strategies. Debugging is a process in which a failure is observed, identified, andremoved [1], and it is estimated that 35-50% of the time spent building solutions is debugging[2].Different tools and strategies are believed to help programmers debug programs. Nowadays,debugging tools exist within Integrated Developing Environments (IDEs) in addition to otherspecific scenarios (e.g., [3]–[6]). However, identifying and resolving failures in software is stillchallenging [7]. One reason for being a
specifically, this paper answers the question: Which computer programminglanguage should be introduced first to novice programmers? The paper’s results are novel as theyprovide comparative insights into the viewpoints of faculty and peer mentors.Keywords: programming language, novice programmers, language choice, faculty perspective,students’ perspectiveIntroductionComputer programming is a fundamental skill for Science, Technology, Engineering, andMathematics (STEM) students for their future careers [1]. Particularly in engineering, noviceundergraduate students are often introduced to computer programming courses [2] in their firstor second years to develop computational thinking [3], problem-solving [4], [5] andmathematical modeling abilities [6
areas where its support may belimited. This information equips educators to make informed adjustments to their assessmentstrategies as needed.Keywords: ChatGPT, Natural Language Processing (NLP), OpenAI, Machine Learning (ML),Higher Education Institutions (HEIs).1. What is ChatGPT? In November 2022, ChatGPT was unveiled by OpenAI, an Artificial Intelligence (AI) researchlab, a non-profit organization dedicated to advancing digital intelligence for the collective benefitof humanity [1]. Positioned as a conversational AI interface, ChatGPT leverages natural languageprocessing (NLP) to engage in realistic conversations. ChatGPT is purposefully engineered toproduce text that emulates human conversation, constituting a significant leap forward in
-division computernetworks course.IntroductionComputer Networks is an undergraduate course that is included in most curricula in thecomputing disciplines. It is listed as an element of computing knowledge 1 2 in the ACMrecommended curricula. It is usually the only course on the topic listed as a core course in mostprograms. The textbooks 3,4,5 are an indication of how broad and deep the topic is.In the last three academic years, the courses in the author’s department have had a failure rate of2%, which amounts to 16 students. These are students who would potentially be delayed in their4-year graduation timelines. Students who are underrepresented minorities have had a GPA gapof 0.28, higher than the historic average of 0.26. Active learning has
incorporation of testbed networks and live exercises intoa network security curriculum. 1. IntroductionLearning information security can be challenging for new students, regardless of their background.Various factors contribute to the complexity of the field. Information security is filled with technicalterminology and acronyms, which can be rough for new students to understand. Also, understandingcomputer networking, software execution, and operating systems is crucial for comprehendinginformation security concepts[1]. Information security is always evolving as new threats andtechnologies emerge. Continuous learning and adaptability are needed to keep up. Masteringinformation security is a daunting task for all students, irrespective of their
; Department Information Systems IUPUI Oklahoma State University Email: smithun@iupui.edu Email: xiao.luo@okstate.eduAbstractIn this research-to-practice full paper, we describe our mentoring initiative, where we incorporatedmentoring into a freshman and a sophomore computing course in Spring 2023 and Fall 2022,respectively. Based on our previous work [1], these mentoring initiatives aimed to developstudents' sense of belonging, self-efficacy, and computing identity, as research [2, 3] shows senseof belonging and self-efficacy are the two main reasons for low enrollment and retainingunderrepresented computing students. First-year
other instructors can get ideas and inspiration, aswell as a discussion of how to scale this approach to larger class sizes.IntroductionUnderrepresentation and retention of minorities and women remains a critical problem incomputer science and computer science adjacent fields [1]–[5]. This is a critical issue for thefuture of our profession which is often masked by the huge demand for undergraduate andgraduate computer science courses and programs. Although going into the intricacies of theissues involved and how to address them is out of the scope of this paper (please see [1], [4]–[6]for more) I present an approach here that has shown promise towards addressing some of theseissues.Project-based learning with courses that challenge students to
correspondingoperations.IntroductionThe CPU is the core component responsible for information processing, making it a crucial topicfor students majoring in electrical engineering and computer science to comprehend.Unfortunately, the structure of a CPU is often highly complex, making it difficult for thoseoutside of computer engineering to grasp its intricacies. Although some efforts have been madeto design simplified CPUs [1, 2], they can still be quite challenging for many students to fullyunderstand.A CPU consists of three fundamental components: the arithmetic logic unit (ALU), control unit(CU), and registers. Of these components, the CU is typically the most complex to design.Traditionally, control units are implemented using finite state machines, while pipelinedstructures
with feedback. Our data is collected through a surveywhich follows students’ interaction with our web-based drill and practice programming systemcalled Edugator in the context of a Data Structures and Algorithms (DSA) course at a large publicuniversity in the United States. Our system provided students two workflows for solving andreceiving feedback on short programming problems: (1) using a browser-based workflow and/or(2) downloading an equivalent template of the problem and feedback, and coding it locally on theircomputer (a native workflow). We qualitatively coded 199 students’ responses regarding choicesusing inductive thematic analysis to identify common themes. Our study found that while moststudents were motivated by convenience and
network connecting the participating schools.IntroductionInitially established in 1987, the REU program expands access to research opportunities forstudents from minority groups and non-research-focused tertiary institutions [1]. The NationalScience Foundation (NSF) launched the Research Experience for Undergraduates (REU)program to support this. This program has been proven to support undergraduates to pursueThis material is based upon work supported by the National Science Foundation under GrantNo. 1849454.graduate study in science, technology, engineering, or mathematics (STEM) [2-4]. This researchprogram has also improved students' ability to work through the uncertainty in researchproblems, sharpening their leadership skills, gaining a more
thereduction is correct or finds and displays a small counterexample, along with an explanation for whythe example shows that the reduction is incorrect. This feedback is consistent with the “witnessfeedback” described by Bez´akov´a et al.1 Our course is the first anywhere to use Proof Blocks for amore advanced topic than introductory proofs.184.2 Scaffolded WritingOne of the most important skills we want students to master is clear communication of algorithmicideas. To help develop this skill, we regularly ask students to include landmark sentences in theirwritten homework and exam solutions that clearly and precisely describe their solution strategy. Forexample, in any dynamic programming solution, we ask students to include a precise
Uddin is a professor of Mechanical Engineering at UNC Charlotte and has a long track record of providing leadership to multi-disciplinary activities within the campus.Daniel Andrew Janies ©American Society for Engineering Education, 2023A network analysis of the Twitter-Rxiv ecosystem for purveyors of science misinformation in preprints on the COVID-19 pandemic David Brown1, Erfan Al-Hossami2, Zhuo Cheng2, Alyssa Alameda2, Tia Johnson3, Samira Shaikh2, Mesbah Uddin4 and Daniel Janies1 1 Department of Bioinformatics and Genomics, UNC Charlotte 2 Department of Computer Science, UNC Charlotte 3 Department of Geography and Earth Sciences, UNC Charlotte 4
control the rover remotely. The GUI program obtains the GPSlocation of the rover and displays the location of the rover on a map. For the control of the rover,ROS (Robot Operating System) was utilized. A Raspberry Pi 3B+ board is used as anintelligence unit of the system. The collected samples can be brought to a laboratory for furtheranalysis. In this paper, the details of the amphibious sampling rover and the educational lessonsvia this capstone project are presented.I. Introduction Mosquitos may lay eggs in shallow waters or wet areas near the shore of lakes, ponds, andrivers [1-3]. Although the exact location of where mosquitoes lay eggs depends on the mosquitospecies or the local environment available to the mosquitos, water is a necessity
increasing the gradingload on the instructor.IntroductionComputer Networks is a core undergraduate course in most curricula in the computingdisciplines. ACM curricula recommendations for computing list computer networks as anelement of computing knowledge 1 2 . It is typically taught as an introductory course to the field ofcomputer networks in the upper division. The course has been taught for decades and has grownto incorporate the advancements in the field, as evidenced by the textbooks published in thefield 3,4,5 . The textbooks and the experts in the field have an informal consensus on the courselearning outcomes.Grading is an essential tool to assess students’ achievement of course learning objectives.Point-based systems have been known to
the past worked as an assis- tant researcher in the group of educational Technologies at Eafit University in Medellin, Colombia. His research area is the online Laboratories ©American Society for Engineering Education, 2023 Learning Outcomes as a Self-evaluation Process Catalina Aranzazu-Suescun, Ph.D.1 and Luis Felipe Zapata-Rivera, Ph.D.2 1 Assistant Professor, Department of Cyber Intelligence and Security 2 Assistant Professor, Department of Computer, Electrical and Software Engineering Embry-Riddle Aeronautical University, Prescott CampusAbstractLearning outcomes are measurable statements that can be used to
advancement of artificial intelligent technology, more and morepreviously unthinkable applications and services become possible. To meet this trend, more andmore new technical positions are created and are ready to be filled. Skilled and well-preparedengineers are highly demanded by such newly emerging positions. Computing programs in USuniversities cannot produce enough qualified graduates to fill these positions. To make theproblem even worse, computer programs suffer high dropout and failure rates, mainly due to thereason that students are unprepared and lose their interest in their entry-level courses[1, 2, 3, 4, 5]. In fact, a significant shortage of skilled computer science graduates is observed andwill remain for the next decade [6, 7, 8]. The
list of e-learning platforms that applied RS for personalized learning. The main findingsrevealed that the deep learning method was effective in big data analysis due to its ability toforecast students’ achievements, behaviors, and future paths. Therefore, we considered thatdeep learning could be widely applied as a technique to develop recommender systems tosupport personalized learning environments. Furthermore, because we found that only a fewstudies have investigated the implementation of this AI technology, researchers will have agreat opportunity to explore deep learning to develop more innovative solutions ineducational fields.Keywords: Deep learning, Recommender systems, Personalized learning environments,Artificial intelligence.1
monitoring. ©American Society for Engineering Education, 2023 Teaching Internet-of-Things (IoT) – A Remote Approach Samia Tasnim Department of Electrical Engineering and Computer Science The University of Toledo Toledo, OH, USA Samia.Tasnim@utoledo.eduAbstractThere has been rapid growth in internet-of-things (IoT) over the last few years. According togrand view research, the IoT market value will reach $933.62 billion by 2025. Moreover, thenumber of connected devices will become 1 trillion by 2025, per HP’s report. To prepare thestudents to be
were polled once again. Peer instructionallowed students to get real time feedback on topics that needed more coverage and allowed theinstructor insight into students comprehension.Data collection took place in a junior level computer science software design course over fivesemesters. The course ran for two hours, twice a week. Student perception of the use of Plickerswas measured with a questionnaire that was administered at the end of each semester. In total therewere eight sections across five semesters as shown in table 1. In total there were 163 responsesto the questionnaire for a response rate of 60.59%.There were 269 total students of which 163responded to the questionnaire for a response rate of 60.59%.The data collected indicate that
devices increases,the urgency for safety, security, and error correction also increases. Smart home devices containmany sensors which gather important data that determine the behavior of the entire system.Sensors within the smart home must remain accurate and operational to ensure safety andfunctionality. Currently, smart home technology has developed into various fields such assafety, energy conservation, and health care [1].Today, smart homes are gradually becoming mainstream in new houses, because of their manyconvenient functions to help people to obtain a better quality of life such as smart light, smart airconditioner, smart curtains, smart appliances, etc. In smart homes, the data from the sensors aretransmitted using WSNs. The rapid
the quote from themovie Cool Hand Luke: “What we've got here is failure to communicate [1], [2]." The luridheadline reflects ongoing debate in STEM classrooms on what credence should be given toteacher and student expectations and how to reconcile them when they are at odds. Ubiquitousstudent surveys lack scientific rigor and provide limited insight on teaching effectiveness andhow to improve student outcomes. A teacher may have happy, inspired students and angry,frustrated students in the same classroom. We seek to understand why this is so and what wouldhave helped the struggling teacher and students. Students need help learning difficult subjectmatter. Teachers need help understanding their students’ needs and guidance on best
-step guide with visualaids to walk readers through the process of constructing a Faraday cage suitable for classroom use.We presented comparative signal attenuation testing results of our custom-built Faraday cage. Wediscussed the challenges faced in our construction and curricular integration efforts. We discussedthe suitability of our custom-built Faraday cage in teaching and research environments. I. Introduction:With more schools starting to offer cybersecurity degrees, it is important that these schools alignwith the National Initiative for Cybersecurity Education (NICE) Workforce Framework forCybersecurity (NICE Framework) [1]. One part of that framework is developing a deeperunderstanding of cellular and wireless technologies
coursework pass rates and degree outcomes for underrepresented minority (URM) students orstudents who identify as Black, Hispanic, and/or Native American. The solution is to transition teachingmethods from Transmission, telling students how to do things, to Inquiry, a method that has been shownto improve teaching and learning outcomes by incorporating the prior knowledge, ideas, and lifeexperiences that students bring to the learning process, including unique questions, backgrounds, andconnections they make to content and to the field ([1], [2], [3], [4]). The current proposal, Inquiry Teaching and Learning or ITL, extends the concept of teachingwith Inquiry, a proven approach for closing equity gaps as (i) instructors incorporate Inquiry
demonstrated the appropriateness and efficiency of machine learning by usingAI models to enhance decision making prediction and pattern recognition. In addition, usingan open-source tool like RapidMiner unified the methodology of the entire data scienceprogress from data mining to machine learning/AI and predictive modeling. “RapidMiner, aleading enterprise AI platform for people of all skill levels, announced that it has beenrecognized as a Visionary in the 2021 Gartner Magic Quadrant for Data Science andMachine Learning.”. [1]The worldwide pandemic caused by coronavirus has painted the general picture of minoritygroups are at more risk to be infected with COVID-19 and account for a disproportionatenumber of deaths. [2] Under the circumstances of the
presented findingsshow the trends in courses enrollment, passing, failing, and withdrawing from the courses. Inaddition to a core three-course sequence, the project examines the general department retentionnumbers.1. IntroductionThe COVID-19 pandemic had a profound effect on college enrollment across the United States.“Enrollment reductions were largest among black and Latinx students” [1]. This work presents ananalysis of how COVID-19 affected the enrollment numbers in City Tech in general and at theCST department in particular. The CST department offers three degree programs: an Associatedegree (AAS) in Computer Information Systems, a Bachelor of Technology degree (BTech) inComputer Systems, and a Bachelor of Science degree (BS) in Data Science
researchers to gauge thetemperature of a group of students and assess the effect of interventions developed to promotechange within the culture.BackgroundThe need for computing professionals in the workforce is growing rapidly. The U.S. Bureau ofLabor Statistics (2022) estimates that employment in computer and information technologyoccupations is projected to grow 15% from 2021 to 2031, generating 682,800 new jobs andannually replenishing another 418,500 vacancies. This rate is much faster than the average forall other occupations [1]. These statistics indicate that there is a great need to continue toincrease the overall number of qualified computing professionals within the United States.Though the number of undergraduate students enrolled in