for the technical interview(s)1 week or less before their interview [8].While ideally the industry would find alternative approaches to assessing candidates, currenthiring practices are so widespread that they are unlikely to be changed anytime soon. So what canbe done to help students excel in technical interviews and aid in their transition to the workforce?How can higher education institutions foster the knowledge, capabilities, skills, and dispositionsrequired for students to succeed in the workplace and enhance their employability?In this study, we sought to explore the opportunities to integrate such awareness and training intocurricula. To better understand where it may be feasible to do so within existing academic andprogrammatic
. L IMITATIONS OF THE S TUDY While the study’s approach offers innovative methods to analyze and provide health recommendations basedon HRV data, it was limited to a small number of participants within a selected dataset. Incorporating additional 2 https://github.com/datasci888/ASEE June 2024methodologies, especially the application of neural networks, holds promise for improving accuracy, particularlywhen dealing with larger datasets. Further expansion in demographics, such as including participants from diverseage groups, skin colors, and geographical locations, could provide a more comprehensive understanding of themodel’s effectiveness across various populations. F UTURE D
new, marketable job skills,including IoT hardware, cloud technologies, cryptography, planning, budgeting, intellectualproperty rights, and networking. However, more importantly, the students delivered a productwith their newfound skills to help protect people's privacy. Team SIHDD (from left to right): Garrett Orwig, Nadaa Elbarbary, Krizia Ragotero, Hayden JonesReferences[1] S. Sami, B. Sun, S. Tan, and J. Han, "LAPD: Hidden Spy Camera Detection using Smartphone Time-of-Flight Sensors," in SenSys '21, Coimbra, Portugal. November 15- 17, 2021. Available: https://dl.acm.org/doi/pdf/10.1145/3485730.3485941[2] Z. Yu, Z. Li, Y. Chang, S. Fong, J. Liu, and N. Zhang, "HeatDeCam: Detecting
with validity and reliability checks [10], which is based onFischer, Bruhn, Gräsel and Mandl [11]’s framework. For example, the Evaluating category ismeasured on a scale from 1 (Minimally determined the significance or relevance of informationneeded for the writing task) to 5 (Completely determined the significance or relevance ofinformation needed for the writing task). When scoring student work in this category, studentsreceive high scores if they identify and articulate the most relevant and significant informationfor their argument. For instance, when discussing a principle of network security, one studentcorrectly highlighted the most relevant and significant aspect: “… confidentiality can beachieved through encryption, access controls
without thedominance of societal biases.References[1] T. Camp, W. R. Adrion, B. Bizot, S. Davidson, M. Hall, S. Hambrusch, E. Walker and S. Zweben, “Generation CS: The growth of computer science,” ACM Inroads, vol. 8, no. 2, pp. 44–50, May 2017. [Online]. Available: https://doi:10.1145/3084362. [Accessed Jan 14, 2025].[2] T. G. Zimmerman, D. Johnson, C. Wambsgans and A. Fuentes, “Why latino high school students select computer science as a major,” ACM Trans. Comput. Educ., vol. 11, no. 2, pp. 1–17, Jul. 2011. [Online]. Available: https://doi:10.1145/1993069.1993074. [Accessed Jan 14, 2025].[3] S. R. Roy, “Educating Chinese, Japanese, and Korean international students: Recommendations to American professors
models throughout theentire semester in a production setting is outlined. Such models and processes can be crucial forhigher education institutions in providing timely support to struggling students, therebyimproving learning outcomes and student retention.Bibliography[1] R. Umer, A. Mathrani, T. Susnjak and S. Lim, "Mining Activity Log Data to Predict Student'sOutcome in a Course," in Proceedings of the 2019 International Conference on Big Data andEducation, New York, NY, USA, 2019.[2] S. V. Goidsenhoven, D. Bogdanova, G. Deeva, S. v. Broucke, J. D. Weerdt and M. Snoeck,"Predicting Student Success in a Blended Learning Environment," New York, NY, USA:Association for Computing Machinery, 2020.[3] P. Shayan and M. v. Zaanen, "Predicting Student
institutions to provide timelysupport to struggling students, thereby improving learning outcomes and student retention.Bibliography[1] R. Umer, A. Mathrani, T. Susnjak and S. Lim, "Mining Activity Log Data to Predict Student'sOutcome in a Course," in Proceedings of the 2019 International Conference on Big Data andEducation, New York, NY, USA, 2019.[2] S. V. Goidsenhoven, D. Bogdanova, G. Deeva, S. v. Broucke, J. D. Weerdt and M. Snoeck,Predicting Student Success in a Blended Learning Environment, New York, NY, USA:Association for Computing Machinery, 2020.[3] P. Shayan and M. v. Zaanen, "Predicting Student Performance from Their Behavior inLearning Management Systems," International Journal of Information and EducationTechnology, vol. 9, no. 01, pp
completed and In Newhall et al.’s work at Swarthmore, educators recog- first employed in classrooms in Fall 2021.nized that minority retention was statistically low compared In this section we will describe the methodology used toto the rest of the student body.[4] They instituted a well- understand the impact of the blueprint, as well as presentingorganized student mentorship program in their CS I course, the data from student performance. We collected data onand received immediate positive feedback on the additional students’ course grades from Fall 2016 to Spring 2024. Theresource. They extended mentorship to CS II when they found data is split into two time ranges – student performance beforethat
, W. D. (2015). Programming Robots with ROS: a practical introduction tothe Robot Operating System. " O'Reilly Media, Inc.".[11] Cañas, J. M., Perdices, E., García-Pérez, L., & Fernández-Conde, J. (2020). A ROS-based open tool forintelligent robotics education. Applied Sciences, 10(21), 7419.[12] Hur, B., Zhan, W., & Ryoo, B. Y. (2022). Integrated multidisciplinary capstone projects of an underwater robotand a quadcopter for building structural analysis. In 2022 ASEE Annual Conference.[13] Velamala, S. S., Patil, D., & Ming, X. (2017, December). Development of ROS-based GUI for control of anautonomous surface vehicle. In 2017 IEEE International Conference on Robotics and Biomimetics (ROBIO) (pp.628-633). IEEE.[14] Megalingam, R. K
. Practical experience is essential for acquiring the skills and knowledgenecessary to safeguard against and address cyber dangers in real-life situations.The integration of these tools and resources inside a Cybersecurity VM lab offers a full array for training,experimentation, and skill development in many areas of cybersecurity. They enable learners andpractitioners to stay ahead in the rapidly evolving field of cybersecurity by offering hands-on experiencewith the tools and techniques used in real-world scenarios.Reference1. Aziz, E.-S., S.K. Esche, and C. Chassapis, Design and implementation of a virtual laboratory for machine dynamics. International Journal of Online Engineering, 2010. 6(2).2. Le, T., A survey of live virtual
rate for computer science students,”ACM SIGCSE Bulletin, vol. 37, no. 2, pp. 103–106, Jun. 2005, doi: 10.1145/1083431.1083474.[6] K. J. Bunker, L. E. Brown, L. J. Bohmann, G. L. Hein, N. Onder, and R. R. Rebb,“Perceptions and influencers affecting engineering and computer science student persistence,” in2013 IEEE Frontiers in Education Conference (FIE), 2013, pp. 1138–1144.[7] B. Burd et al., “The internet of things in undergraduate computer and information scienceeducation: Exploring curricula and pedagogy,” Jul. 2018. doi:https://doi.org/10.1145/3293881.3295784.[8] M. Felleisen, R. B. Findler, M. Flatt, and S. Krishnamurthi, “The structure and interpretationof the computer science curriculum,” Journal of Functional Programming, vol. 14, no
flexible choice for applicationslike cookie classification and wildcard matching in cybersecurity.3.3.3 Flan-T5Flan-T5 is an enhanced version of the T5 model that incorporates instruction fine-tuning 15 . By training on a mixture of tasks phrasedas instructions, Flan-T5 improves its ability to follow task descriptions and generalize to new tasks. This makes Flan-T5 particularlyeffective in zero-shot and few-shot learning scenarios, where the model needs to perform well on tasks it has not explicitly beentrained on. In the context of identifying wildcard matches in cookies, Flan-T5’s improved understanding of instructions can lead tomore accurate and reliable classification results.4 Results4.1 Experimental SetupThe experimental
, S, and T-gates and analyzing the results. 2. Create Quantum-Dice game using Qiskit applying Hadamard gate to create a superposition state. 3. Create a Quantum Coin-Flip game, Quantum Tic-Tac-Toe, and Quantum Rock-Paper Scissors game using different quantum gates. Students should use IBM Quantum Simulator 4. Create quantum search Algorithm using simple Grover Search Algorithm and analyzing the results 5. Using IBM Qiskit, implement QFT Algorithm on different states such as a five-qubit state of ‘10110’ 6. Using the Provider Object, find how many quantum systems do they have access to for 5 or more qubits. 7. Using IBM Simulator, create and draw a schedule with Gaussian Waveform from the
in education andopens the door to new opportunities for personalization and adaptability in virtual environments.Integrating advanced technologies with robust pedagogical approaches is essential to transformteaching and learning in the digital age.References[1] S. Martín, E. López-Martín, A. Moreno-Pulido, R. Meier, and M. Castro, “A Comparative Analysis of Worldwide Trends in the Use of Information and Communications Technology in Engineering Education,” Ieee Access, 2019, doi: 10.1109/access.2019.2935019.[2] O. Kuzu, “Digital Transformation in Higher Education: A Case Study on Strategic Plans,” Vysshee Obrazovanie v Rossii = Higher Education in Russia, 2020, doi: 10.31992/0869-3617-2019-29-3- 9-23.[3] B. R. Aditya
education, ultimately preparing students for a rapidly evolvingtechnological landscape.References[1] M. R. Chavez, T. S. Butler, P. Rekawek, H. Heo and W. L. Kinzler, "Chat Generative Pre-trained Transformer: why we should embrace this technology," American Journal of Obstetrics and Gynecology, vol. 228, no. 6, pp. 706-711, 2023.[2] G. Debjania and J.-B. Souppeza R. G., "Generative AI In Engineering Education," in UK and Ireland Engineering Education Research Network Annual Symposium, Belfast, 2024.[3] A. Johri, A. S. Katz, J. Qadir and A. Hingle, "Generative artificial intelligence and engineering education," Journal of Engineering Education, vol. 112, no. 3, p. 572–577, 2023.[4] D. De Silva, O. Kaynak, M. El-Ayoubi, N. Mills, D
, limiting insights into how undergraduate students orthose in other disciplines might experience redesigned assessments. The short-term focus of the studyalso means that long-term impacts on learning and skill retention remain unexplored. Additionally,studies could examine the impact of redesigned assessments on instructor workload, studentengagement, and equity and accessibility, ensuring that innovative assessment practices benefit alllearners.ReferencesAnthropic. (2024). Claude [Large language model]. https://www.anthropic.com/Google. (2024). Gemini [Large language model]. https://gemini.google.com/Huang, A. Y. Q., Lu, O. H. T., & Yang, S. J. H. (2023). Effects of artificial intelligence–enabledpersonalized recommendations on learners
and curriculum developers select the correct learning goals and activities for theirspecific student population.References [1] S. Isaac Flores-Alonso, N. V. M. Diaz, J. Kapphahn, et al., “Introduction to AI in under- graduate engineering education,” in 2023 IEEE Frontiers in Education Conference (FIE), College Station, TX, USA: IEEE, Oct. 18, 2023, pp. 1–4, ISBN: 9798350336429. DOI: 10.1109/FIE58773.2023.10343187. [2] S. Khorbotly, “Machine learning: An undergraduate engineering course,” in 2022 ASEE Illinois-Indiana Section Conference Proceedings, Anderson, Indiana: ASEE Conferences, Apr. 2022, p. 42 132. DOI: 10.18260/1-2--42132. [3] R. DeMara, A. Gonzalez, A. Wu, et al., “A crcd experience: Integrating machine learning
, people whovisit the SILO website are only ever presented with the latest version of each artifact and thereflexive journal is kept offline for the purposes of writing up the findings as they emerge.PMR utilizes ‘referential chronology’ which is an extension of referential adequacy,formulated by Lincoln and Guba in [11]. PMR makes two important advances to referentialadequacy. Firstly, the role of the researcher is quite different in PMR as they are the designeror co-designer of the learning artifact(s). The researcher’s reflexive journal is the primarymechanism to document data analysis because a rationale is provided for each iteration of anartifact. The rationale for these decisions is archived in the chief investigator’s reflexivejournal
will typically increasethe pass rate of a course. This course is also one of the first programming classes taken by transferstudents which may contribute to the high DFW rate. Future work will include a comparison ofthe DFW rates between historic offerings and those that have made use of Plickers.In conclusion using Plickers in class is a positive experience for both the instructor and the stu-dents. Since each class has a clear structure of: Plicker question, lecture, break, Plicker question,lecture/activity, quiz, students are never doing any one task for very long. This aids in keepingstudents engaged and on task.References [1] L. Porter, D. Bouvier, Q. Cutts, S. Grissom, C. Lee, R. McCartney, D. Zingaro, and B. Simon, “A Multi
. For example, Scenario 3 on‘general-purpose’ AI is inspired by the EU AI Act’s requirement [28] that proprietors of ‘generalpurpose’ AI systems report details about model architecture and training processes to national AIauthorities. Each scenario, along with the proposed AI regulations that Congress can vote on, aredescribed in Appendix B. To start the game, only members of Evil Inc. are told internal companyinformation that motivates their lobbying efforts. For example: “Evil Inc.’s large language modelis only successful because its model architecture is kept a secret, so Evil Inc. should preventCongress from requiring the disclosure of any model architecture information.” Each round, EvilInc. members decide how to distribute a limited
2’s message to bird 3 6. Panda then shares bird 1’s message to bird 4 7. Bird 4 flies to snail 2 8. Bird 4 passes on the message to snail 2Discussion prompts: 1. Break down the delay caused by Panda – how much of it is because of waiting? 2. Can we categorize the different sources of delay? 3. (optional to use if time permits) How does Panda deal with messages from different sources going to different destinations?The implementation of the activity was done in-class as an activity for a planned duration of 25minutes, with the following breakdown. 1. 5-minute setup: Students first form groups of 3-4 students. They are first given the time to read the scenario, followed by a check-in to ask for clarifications. 2. 5
pump andsubsequently the consumption of diesel fuel by predicting utilization based on weatherinformation. Preemptive activation of the pump ahead of storms will ensure more effectiveirrigation and minimize the effects of the storm.References 1. Malik, P. K., Sharma, R., Singh, R., Gehlot, A., Satapathy, S. C., Alnumay, W. S., Pelusi, D., Ghosh, U., & Nayak, J. (2021). Industrial internet of things and its applications in industry 4.0: State of the art. Computer Communications, 166, 125–139. https://doi.org/10.1016/j.comcom.2020.11.016 2. LoRa - LoRa Documentation. LoRa. (n.d.). https://lora.readthedocs.io/en/latest/ 3. Nanotron’s technology. Nanotron Technologies GmbH - Technology. (n.d.). https
many as possible rather than to screen [out allbut the best academic students].” Towhidi and Pridmore’s (2023) research underscores the finding that incorporatingindustry certifications is not considered a panacea while Ouh and Shim (2021) explained thatintegrating certifications into a curriculum required an intentional, purposeful, and well-thought-out approach that benefited students, faculty, and industry and, as such, the public. Further,industry organizations regularly seek well-rounded employees of which certifications are simplyone part of the whole. For example, Tran et al. (2023) identified three hiring criteria amongorganizations seeking to hire cybersecurity graduates: 1) an academic degree, 2) professionalcertification(s
navigate environmental obstacles autonomously as a part of this goal.II. DEFINITION OF TERMSTo prevent confusion, unless otherwise specified, the following terms are used according to thesedefinitions throughout this document. All monetary values are in United States Dollars (USD),unless otherwise specified.Limb – a complete, fully constructed arm segment or joint, which contains modular attachmentpoint(s) for expansion, and consists of one or more modules.Module – an organizational concept comprised of purpose-built hardware containing one or moreneurons.Nerve, neuron, or node – a software or mathematical construct, representing a single node in anartificial neural network (ANN). When referring to the biological concept, the term
. Communications in Computer and Information Science, H. Florez and H. Astudillo, Eds. Springer, Cham, 2025, vol. 2237, accessed: 21-Oct-2024. [Online]. Available: https://doi.org/10.1007/978-3-031-75147-9 4 [3] K. Shah, P. Lee, D. Barretto, and S. N. Liao, “A qualitative study on how students interact with quizzes and estimate confidence on their answers,” in Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V. 1, ser. ITiCSE ’21. New York, NY, USA: Association for Computing Machinery, 2021, p. 32–38. [Online]. Available: https://doi.org/10.1145/3430665.3456377 [4] S. N. Liao, “Early identification of at-risk students and understanding their behaviors,” Ph.D. dissertation, UC San
. Kay, "Review: Exploring the use of video podcasts in education: A comprehensive review ofthe literature," Computers in Human Behavior, 2012.[3] N. I. Scagnoli, J. Choo, and J. Tian, "Students' insights on the use of video lectures in onlineclasses," British Journal of Educational Technology, 2019.[4] M. E. Haagsman et al., "Pop-up Questions Within Educational Videos: Effects on Students'Learning," Journal of Science Education and Technology, 2020.[5] N. Singh, S. Getenet, and E. Tualaulelei, "Examining students' behavioral engagement in lecturevideos with and without embedded quizzes in an online course," ASCILITE Publications, 2023.[6] E. Jung and G. Snow, "Using Panopto In-Video Quizzes for Online Education," eLearn, 2023.[7] N. Mirriahi et
• Students learn to manage a project and manage a project timeline • Reinforces that programming is a tool that allows practitioners to implement solutions and designs and is far from the end all and be all of CS • Makes collaboration to learn from peers natural impacting overall learningWhen students have more agency over the project, they are empowered to become owners oftheir learning process.References[1] S. B. Jenkins, “The Experiences of African American Male Computer Science Majors in Two Year Colleges,” University of South Florida, 2019.[2] L. J. Sax, H. B. Zimmerman, J. M. Blaney, B. Toven-Lindsey, and K. J. Lehman, “DIVERSIFYING UNDERGRADUATE COMPUTER SCIENCE: THE ROLE OF DEPARTMENT CHAIRS IN PROMOTING GENDER AND
Computing Education, vol. 10, no. 2, pp. 1–22, Jun. 2010, doi: 10.1145/1789934.1789938.[4] P. Ardimento, M. L. Bernardi, M. Cimitile, and G. de Ruvo, “Reusing bugged source code to support novice programmers in debugging tasks,” ACM Transactions on Computing Education, vol. 20, no. 1, pp. 2–24, Nov. 2019, doi: 10.1145/3355616.[5] H. L. Nguyen, N. Nassar, T. Kehrer, and L. Grunske, “MoFuzz,” in Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, Dec. 2020, pp. 1103– 1115. doi: 10.1145/3324884.3416668.[6] J.-H. Ji, G. Woo, H.-B. Park, and J.-S. Park, “Design and Implementation of Retargetable Software Debugger Based on GDB,” in 2008 Third International Conference on
, Germany, Mexico, and Malaysia. Several research papers[5–11] have found that hands-on learning via mobile studio platforms such as the Mobile StudioBoard (MSB) and the Analog Discovery Board (ADB) can help students with diverse learningstyles, demographics, and academic backgrounds learn better. There are now several commercialproducts, such as Analog Devices Inc.'s ADALM 1000 board (ADALM 1K) and ADALM 2000board (ADALM 2K), Digilent's Analog Discovery 2TM, and Quanser's QUBE-Servo portableplatform, that allow students to conduct control engineering experiments.Given the difficulty, if not impossibility, of obtaining hands-on experience in a traditional labsetting in a CS department, portable hardware platforms could provide a tremendous