have to manage excess water. This solution is part of a project from the Center for IoTEngineering and Innovation [4] to aid farmers in Eastern North Carolina. 2. Problem Definition and RequirementsSituated in Eastern North Carolina, Middle Creek Farms faces a persistent challenge of excessivewater, posing a risk of flooding and potential harm to both equipment and crops. Recognizing theneed for an efficient solution, the Center for IoT Engineering and Innovation has strategicallydeployed ultrasound sensors within the irrigation canals managed by the farm. These sensors servea crucial role in continuously monitoring water levels and promptly notifying the farmer whenthey approach critical levels. This real-time monitoring and alert system
eyewear; the semi immersive also allows users to look at thephysical or real world (this occurs when they look away from the projection screen where the models andinteractive environments are projected). The fully immersive environment can be experienced with moreexpensive environments and technologies; this includes wearing a 3D headset such as in an HTC Vive orOculus Rift platform. In such a fully immersive context, all reference to the real world is removed and theuser can interact with the virtual or simulated environment in whichever direction or angle the user turns heror hir head. can also be described as 3D VR/Mixed Reality based environments in which users can interact atmultiple levels of immersion: non-immersion, semi-immersion, full
Allen et al. [27] that foundstudents in a CS1 course which used “many-small-programs” instead of a single large project wereless stressed, more confident, had higher performance, and had higher satisfaction. There are avariety of platforms or instant feedback solutions used for hosting short programming problemswith instantaneous feedback. These include Zylabs by Zybooks [5], Stepik [28], CodeRunner [10],CodeWorkout [29], [30], Leetcode [31], Runestone Academy [6], CodingBat [13], Codio [32],CloudCoder [20], etc. While we acknowledge that there are several open source and manyproprietary platforms for hosting coding problems, as well as research on the effectiveness of thesesystems for teachers and students [18], there is not much research on
class, three different evaluation methods were used, such asclassroom observation, a signature assignment, and a Motivated Strategies for LearningQuestionnaire (MSLQ) survey. The Classroom Observation Protocol for Undergraduate STEM(COPUS) findings indicated greater student engagement when ECP is used; the Signatureassignment results indicated improved learning outcomes for students; and the MLSQ survey,which measures students' motivation, critical thinking, curiosity, collaboration, andmetacognition, determined a positive impact of the ECP on the CS participants.Keywords –CS education, active learning, experimental centric learning, collaborative learning,project based learning, retention.IntroductionSeveral critical factors influence student
difficulty in getting student input and feedback on the contract initially, but we have now refined it over many iterations. The contract outlines the type of grading and what is expected of the students during the course. 2. Learning logs: The students were allowed to write learning logs reflecting on their learning experiences both in and out of the classroom. Two types of logs were used. The first type was a reflection on their learning based on the homeworks or projects that they did. The second type was a learning log in lieu of attending a live lecture or watching an asynchronous lecture. Students submitted weekly logs for the asynchronous learning and biweekly logs for the homeworks or
attempt to comprehend code priorto activities wherein they produce their own code—the Use-Modify-Create approach.2.3 Use-Modify-Create as IBL for CS EducationUse-Modify-Create (UMC) is a CS-specific pedagogical approach introduced by Lee and colleagues in2011[14] for use with K-12 students. They proposed a three-stage model for learning to code. In the firststage, students first used instructor designed code. In the second stage, students modified existing code.Finally, after gaining the skills to code their own projects, students responded to programming problemsby creating their own code. We argue that the UMC approach constitutes three complementary cycles of IBL in introductoryCS education, where the subject of students’ inquiry are the
materials wedeveloped and tested on WPA3 security algorithms.The paper is organized as follows. In Section 2, we provide an account of related work alongwith a brief overview of the project opportunity, objectives, and proposed solution. In Section3, we offer a brief description of the solution components designed, tested and exercised by ourstudents. Section 4 focuses on the solution component configurations in support of the lab exerciseson WPA3 security algorithms and in Section 5 we detail the lab exercises developed, tested andexercised. In Section 6, we offer a discussion including our students feedback and suggestions, ourconclusions, and potential next steps.2 Related Work and Our ProjectIn this section, we provide an account of related
Activities for the 27,404 2017 Classroom and Outreach A Comparison of Network Simulation and Emulation 9,760 2016 Virtualization Tools A Taste of Python – Discrete and Fast Fourier Transforms 6,233 2015 Design of a Bluetooth-Enabled Wireless Pulse Oximeter 5,644 2019 Capstone Projects in a Computer Engineering Program Using 5,558 2016 Arduino A Real-time Attendance System Using Deep-learning Face 5,225 2020 Recognition STEM Outreach: Assessing Computational Thinking and 4,288 2017 Problem Solving A Methodology for Automated Facial
328 students enrolled in the course. The course is a secondpart of programming fundamentals courses and focuses on using C++. This 16-week course isdivided into roughly ten weekly assignments, two major exams, two intermediate projects, andone final project. Both assignments and lectures revolve around the following goals (1) Buildand execute C++ programs from the command-line and an IDE (2) Demonstrate an ability tosolve large programming problems (3) Examine the uses of dynamic memory allocation, pointer,and template to create the creation of memory-efficient data structures such as linked lists,stacks, and queues. In order to answer our research questions, the proxy of students’ performancewas the midterm examination. The midterm exam
. Ricco, University of Indianapolis George D. Ricco is an engineering education educator who focuses on advanced analytical models applied to student progression, and teaching first-year engineering, engineering design principles, and project management. ©American Society for Engineering Education, 2023 Degree Attainment in Computing: Intersectional Switching TrendsAbstractAlthough efforts have been made to broaden participation in computing, ongoing reports andcounts in the field continue to illustrate the need to improve engagement and retention. Thereremains a minoritization of Black or African American men and women, Hispanic or Latinx menand women, Indigenous men and women, White women, and Asian
from Bangladesh University of Engineering and Technology in 1991 and 1994, respectively. He then earned the Doctor of Engineering degree (equivalent to Ph.D.) from Muroran Institute of Technology, Japan in 1999. His research interests include optical communication, wireless communication, digital image processing, computer security and solid state devices. He has received a US patent on Optical Pattern Recognition. He has published more than 160 publications in peer-reviewed journals and conference proceedings. He has successfully completed several research projects sponsored by different federal and private institutions, including US Army, National Science Foundation, and Department of Energy. He served as an
/learning for students, and computer- or web-assisted personalized learning.Mr. Umer Farooq, Texas A&M University Umer Farooq is a Ph.D. student in the Multidisciplinary Engineering Department at Texas A&M University, with a focus on Engineering Education. Umer is part of the Learning Enhancement and Applications Development Lab (LEAD Lab). Umer contributes to research initiatives centered on educational, instructional, and workforce development in the manufacturing sector. His efforts align with the mission of the Texas A&M University Gulf Coast Center of Excellence (GCCoE), where he collaborates on diverse projects aimed at enhancing learning experiences for students, trainees, and professionals.Dr. Saira
Application Administrator at a Mitsubishi Power Systems, where he built state-of-the-art Enterprise and Machine Learning Applications. Academic positions include Adjunct Professor at the University of Bridgeport, CT, and Assistant Professor – Computer Security where he is tenured at the School of Engineering Technology, Farmingdale State College - State University of New York. He has 6 years of higher education experience, and a total of 14 years. He has presented and published numerous conference papers, journal articles and contributed to a book chapter on Large-scale Evolutionary Optimization. He has excelled at going the extra mile, teaching not only his own classes but an additional Capstone projects, doing
adopt more dynamic and participatory pedagogical approaches,particularly in technical and applied areas such as Industrial Engineering.Unlike traditional approaches, active methodologies emphasize student participation in thelearning process [1]. These include techniques such as problem-based learning, project-basedlearning, case studies, and flipped classroom pedagogy. These methods focus on developingtheoretical knowledge, practical skills, and competencies essential in the modern industrialenvironment.Active methodologies are particularly pertinent in teaching Information Systems withinIndustrial Engineering [2], [3]. Information Systems is a dynamic area that requires a theoreticalunderstanding and a practical and applied one. The speed
Psychology, vol. 52, no. 2,p. 196, 2005.[48] J. S. Bruner, The Process of Education. Cambridge, Mass: Harvard University Press, 1960.[49] D. DiBiasio, L. Comparini, A. G. Dixon, and W. M. Clark, “A project-based spiralcurriculum for introductory courses in ChE: III. Evaluation,” Chemical Engineering Education,vol. 35, no. 2, pp. 140–146, 2001.[50] Lohani, Vinod K, M. L. Wolfe, T. Wildman, K. Mallikarjunan, and J. Connor,“Reformulating general engineering and biological systems engineering programs at VirginiaTech,” Advances in Engineering Education, vol. 2, no. 4, p. n4, 2011.[51] S. Vemuru, S. Khorbotly, and F. Hassan, “A spiral learning approach to hardwaredescription languages,” in 2013 IEEE International Symposium on Circuits and Systems(ISCAS
Software Developers, Quality Assurance Analysts, and Testers, theaverage growth rate is expected to surge by 25% (much higher than the 3% for all occupations).For Computer and Information Research Scientists, the growth rate is projected to be 23%.Despite clear needs to fill such roles, obtaining a computing job can be challenging, somethingoften attributed to, at least partially, the expectations of the hiring process and graduates’performance on technical interviews [2].Technical interviews, also referred to as coding interviews or programming interviews, are acomponent of the hiring process frequently employed for computing roles [3]. They entail askingjob candidates to solve problems on a whiteboard or using a text editor to evaluate
easily matchactions with appropriate mnemonics. Instead of first attempting complex projects, students replicate corehigh-level programming constructs in assembly, such as flow control and modular techniques tofamiliarize themselves with a one-to-one mapping between HLL and assembly. [4] suggests a blend ofassembly with C, C++, or Java, leveraging standard tools and compilers rather than specialized,course-supplied interfaces as a bridge between high-level and low-level abstraction. [6] proposes usingthe assembly course exercises as the foundation to acquaint students with the models of computersystems, as relevant to operating systems or the runtime environment. [7] advocates the inclusion ofdebugging exercises, debugging logs, development logs
dozens of graduate and undergraduate students in research and K-12 outreach activities and is the Director of the Excellence in Computing and Information Technology Education (ExCITE) program. She is a fellow of the Center for the Advancement of STEM Leadership Program (CASL) and the Opportunities for Under-Represented Scholars (OURS) post-graduate institutional leadership certificate program and an alumna of the Frontiers of Engineering Education program (FOEE) of the National Academy of Engineering. She has been serving on the Project Kaleidoscope (PKAL) Capital Area Regional Network steering committee since 2016Dr. Briana Lowe Wellman, University of the District of Columbia Dr. Briana Lowe Wellman is an
based on individual needs, competencies,and interests. One way to conduct personalized learning is by using a recommender systemthat employs deep learning, an AI technique. To date, a limited number of researchers havediscussed the application of deep learning methods to develop advanced recommenders inpersonalized learning environments. This study examines the literature that describes deeplearning as a recommender system to support personalized learning environments. This initialphase of the project seeks to synthesize the issues and opportunities associated withpersonalized learning experiences and the potential of using deep learning to support theprocess. Because the topic intersects the education and information technology (IT) fields
instructional design in diverse contexts. Before starting the Ph.D. program he has worked as an IT Project Manager, Business Analyst, Software Developer, and Trainer. ©American Society for Engineering Education, 2023Integrating Microlearning Instructional Approach into an Introductory Data Management Course Shamima Mithun Rajagopal Sankaranarayanan Computer and Information Technology Department Strategic Academic Initiatives IUPUI The University of Texas at Austin Indianapolis, USA Texas, USA smithun
@ewu.eduAbstract:Internet of Things (IoT) technologies have been proliferating in the last decade. Societal relianceon IoT technologies has been increasing over the last 5 years and is projected to increaseexponentially. Wireless communication is a core component of the IoT ecosystem. Cellular andwireless technologies are also foundational topics in the NICE (National Initiative forCybersecurity Education) framework. Educational institutions have been increasingly adding IoT,cellular, and wireless courses to their curricula, to keep in line with societal and regulatory trends.Faraday cages are instrumental in understanding and testing several aspects of the wirelessparadigm. Faraday cages are also indispensable for wireless signal isolation, which is an
researchers to gauge thetemperature of a group of students and assess the effect of interventions developed to promotechange within the culture.BackgroundThe need for computing professionals in the workforce is growing rapidly. The U.S. Bureau ofLabor Statistics (2022) estimates that employment in computer and information technologyoccupations is projected to grow 15% from 2021 to 2031, generating 682,800 new jobs andannually replenishing another 418,500 vacancies. This rate is much faster than the average forall other occupations [1]. These statistics indicate that there is a great need to continue toincrease the overall number of qualified computing professionals within the United States.Though the number of undergraduate students enrolled in
Science and Elec- trical Engineering, West Virginia University, Morgantown, WV. Her research interests are in software engineering, cybersecurity, and data analytics, as well as in higher education focused on these areas. She has served as a Principal Investigator on various NSF, NASA, DoD, and industry funded projects. She leads the B.S. in Cybersecurity program and serves as Academic Coordinator of the M.S. in Software Engineering Program at West Virginia University. She has served on program and organizing committees of many international conferences and workshops.Sadaf Amna Sarwari ©American Society for Engineering Education, 2023 Cybersecurity Students’ Sense of Belonging and
published papers | Research Project winner! Education: BE in Mechanical Engineering MBA in Information Technology MS in Computer Science (IP) My paper is accepted for 2024 ASEE Southeastern Section Conference, Marietta, GA, March 10 - 12, 2024. Research interests: 1. Meditation 2. Music 3. AI Hackathons: 1. INTEL AI Hackathon FIRST prize Winner! 2. Llama 2 ClarifAI LablabAI hackathon SECOND prize winner! Published papers: Peer-reviewed Published papers: 1. FIE 2023 IEEE conference, Texas, USA: EEG Spectral Analysis and Prediction for Inattention Detection in Academic Domain 2. AIMC 2023, Brighton, UK: Introductory Studies on Raga Multi-track Music Generation of Indian classical music using AI. 3. ASEE
alerts based on those sensors[29]. Although this was small scale experiment, it showed promise in allowing people tocustomize the sensor technology to their specific issues. The simple graphical interface helpedparticipants program the sensors without needing a great deal of outside assistance. The hopewas that this project would provide a less expensive approach to navigating through daily life,since this type of technology can be prohibitively expensive for many people, and can requiremore technological knowledge than many people possess. The way in which those facing cognitive issues interact with technology can be differentthan the general population, so some special accommodations may need to be made [30]. Visualinteraction with
, conditionals, while/-for loops, vectors, strings, images, and functions. The course was divided into 14 modules witheight programming-related homework assignments and two exams (a midterm and a final). Thelast assignment was a cumulative final project.4.1 Introductory SurveysEach student was given an introductory survey during the first week of the class. This surveyasked for demographic information (gender, prior programming experience (PPE), year in school,GPA, and major), general information (if the student was also taking the lab associated with thiscourse and how many hours of prior programming experience they had), as well as what grade theyexpected to receive in the course by the end of the semester. Students were given a drop-down menuof
. influence) of a user while weighting that user for the quality of information propagated bythe user. Peer-review percentage score can be used to identify subject-matter experts whotransmit evidence-based information online. We found that these subject-matter expertsoutcompeted public health authorities in online forums by transmitting scientific results.Subject-matter experts engaged with the public whereas public health authorities did not.AcknowledgementsThe authors appreciate Dr. Michael Simpson and Dr. R. Marielle Hjelm for their support andguidance during the execution of the project. We are grateful for the ideas and commentsprovided by the other members of the program review board while advancing this investigation.A large thank you to
, specifically within the context of online learning and engagement, educational technologies, curriculum design which includes innovative and equitable pedagogical approaches, and support programs that boost the academic success of different groups of students. She teaches in active learning environments, such as project-based learning and flipped classrooms. She aims to bring EE and CER into practice.Prof. Harini Ramaprasad, University of North Carolina at Charlotte Dr. Harini Ramaprasad is a Teaching Full Professor in the Department of Computer Science at UNC Charlotte. Dr. Ramaprasad received her B.S. degree in Computer Science from Bangalore University and her M.S. and Ph.D. in Computer Science from North Carolina State
, navigate their educational and career choices within the context of theirsocioeconomic backgrounds. Consequently, any effective support initiative must extend beyondthe confines of educational institutions to consider involving key stakeholders such as families,communities, and societal structures. By broadening the scope of support to encompass thesemacro-level factors, these student support initiatives can better empower lower-income studentsto pursue their academic and professional aspirations.ACKNOWLEDGMENTSWe would like to express our sincere appreciation to Gianni Guirola for his invaluablecontributions to this research project. Gianni Guirola, an undergraduate student from FIU, playeda crucial role in the data analysis phase of this study
].Survey Design and MethodologyThis research project was reviewed and determined to be exempt by our college’s InstitutionalReview Board (IRB). Our experimental setup consisted of two groups of students at a largeMidwestern R1 University, in an undergraduate, pre-capstone SE course. We utilized a quasi-experimental pretest-posttest hybrid between groups and within groups design for this study. Thecontrol and treatment groups consisted of successive cohorts of sophomores/juniors from CS andComputer Engineering, one section each. This SE course was a mandatory component of theiracademic progression towards earning their degree.The treatment group was taught using PI while the control group received instruction throughtraditional lectures. The