significantly before presenting our work inprogress. As more EVGs are used within curriculum, the creation of a useful EVG database willserve as an important resource—a tool for bolstering educational efficiency and access toresources for faculty and instructors.Literature ReviewToday’s students grow up as part of the first generation of learners immersed in digitaltechnology and are therefore more tech-savvy in how they think and learn [1]. The 2003movement for video games in education and training, known as serious games, shaped the wayeducators approached educational instruction to meet the needs of an emerging networkgeneration [2], [3]. EVGs have impacted various fields including firefighting [4], healthcare [5],and business [6]. EVGs are
provide educators with an effective alternative to physical networkingequipment and provide a comprehensive set of custom labs that can be integrated in theircurriculum. The practical labs presented in this paper provide students at high school, college, orprofessional level with skills and knowledge required for the modern digital workforce.IntroductionIt is widely accepted that there exists a growing need for practical networking skills amidst ashortage of hands-on experience opportunities for students, and that this issue is exacerbated byresource shortages, staff shortages, domain knowledge constraints, and limited options for safe,practical ways for students to practice infrastructure skills [1, 2, 3]. To support currenteducational needs
downloaded and cited in theliterature. We also demonstrate how ChatGPT can be used in querying abstracts to identify currentgaps in the literature and future research projects.Literature Review Evaluating research outputs is essential in academia, encompassing the assessment ofscientific contributions, guiding tenure promotions, and directing research resources [1, 2]. Theprimary metric traditionally used has been citation count, with significant emphasis placed on itsrole in measuring research impact [3, 4]. However, the reliance on subjective quality assessments,like peer reviews, has shown inconsistencies in correlation with citation counts and there are otherconcerns noted in the literature about solely relying on citation counts [5, 6
analytics, streaming data processing, spatio-temporal data processing, data mining,federated learning, and data security and privacy. ©American Society for Engineering Education, 2024 Generative-AI Assisted Feedback Provisioning for Project-based Learning in CS Courses Venkata Alekhya Kusam1 *, Larnell Moore1 *, Summit Shrestha1 *, Zheng Song1 , Jin Lu2 , Qiang Zhu1 {alekhyak, larnell, summitsh, zhesong}@umich.edu, jin.lu@uga.edu, qzhu@umich.edu ∗ The authors contribute equally to this work 1 Dept. of Computer and Information Science, University of Michigan at Dearborn
starting point for businesses and offer critical information on identifying,preventing, and responding to cyber incidents, they can be hard to navigate and implement. Tohelp with this issue, this paper identifies the most frequent attack vectors to SMBs and proposes apractical model of Knowledge, Skills, Ability, and Tasks (TKSA) from the NICE Framework forthose attacks. SMBs can use the model as a guideline to assess, equip their existing workforce, oraid in hiring new employees. Additionally, educational institutions can use the model to developscenario-based learning modules to adequately equip the emerging cybersecurity workforce forSMBs.1 Introduction:Cyberattacks come bearing heavy costs to businesses and they are increasing each year
within a 3D environment.Autism Spectrum Disorders (ASD) can be described as mental neurodevelopmental disorders which includesautism and Asperger syndrome. Children with Autism experience difficulties in social interaction, verbal/non-verbal communication, and repetitive behaviors [1,[2]. Several studies have indicated that autism is a complexdisorder caused by several co-occurring factors [3, 4, 5]. Autistic children face difficulties when learningespecially in traditional classroom based learning. In this context, there is a need to explore alternative andinnovative ways to help autistic children learn. In this paper, the domain of learning is science and engineeringconcepts..The term Extended Reality is used to encompass 3 types of immersive
ofthe most important types of information is biometric signature which is usually processed in theform of digital images. Therefore, cybersecurity professionals need to develop expertise indigital image processing. The paper analyzes the role of biometric information in cybersecurityand identifies the skills to successfully design biometric recognition techniques.IntroductionWith the exponential growth of digital and Internet technologies, threats to digital information aswell as computer systems are offering critical challenges to professionals and researchers [1].Hence the demand for cybersecurity professionals is significantly higher than available trainedpersonnel. As a result, the topic of cybersecurity is no longer considered as a branch
continuously monitor forhidden cameras, microphones, and GPS trackers in a room even while humans are away. Theunique aspect of the project is that it sends the sensor telemetry data to a cloud application thestudents build, using microservices, storage, and data models to identify invasive devices.Optionally, if an invasive device is confirmed, its telemetry data is cryptographically packagedas forensic evidence for law enforcement.Furthermore, the project resonates with modern software engineering practices, notably theemployment of cloud microservices to collect and model data used to protect personal privacy.Our presentation is bifurcated into two segments: (1) Project Overview: This section expounds on the concepts covered, details the
F. Salazar-G´omez2 , Cynthia L. Breazeal1,2 sharifah,abagiati,salacho,breazeal@mit.edu 1 Media Lab, 2 Open Learning Massachusetts Institute of TechnologyAbstractThe pervasive and rapid advancement of Artificial Intelligence (AI) necessitates a fundamental AIunderstanding for all individuals. AI’s dynamic nature often makes it challenging even fortechnical people to stay continuously updated on AI, making it especially essential forprofessionals in leading positions, regardless of their technical background. Understanding AIequips leaders to make knowledgeable decisions about AI’s responsible
community tothe center as they gain expertise and engage and participate actively in the sociocultural practicesof the community[7].Figure 1. [7] shows the following components in the situated learning theory: 1) context, theenvironment within which the learning occurs; 2) novice, the learner and newcomer in thecommunity of practice; and 3) experts, who know about the subject to be learned. Figure 1. Model of Situated Learning Theory (From “Situated Learning Theory” by Sandra P. Mina Herrera, used under CC BY 4.0)In [2], the authors considered the traditional classroom to be decontextualized and discussed theapplications of situated learning theory in computer science education and the challenges ofdoing so.ApproachTo
needed help to struggling students is,particularly, important. For higher education institutions, early detection of at-risk students isessential for planning and providing the appropriate remedial services that students need in atimely manner.Various approaches to student performance prediction have been explored. Some studies requiredesigning specific randomized experiments [1], [2], [4], [6], while others, like this study, focuson utilizing data gathered by ubiquitous Learning Management Systems (LMSs) based onstudent activities and interactions with course materials [3], [8], [9]. Additionally, some studiesaim to evaluate the efficacy of certain teaching methodologies [4], [5], while others seek toidentify problems early in the semester to
. Farmers are providedwith water level visualization tools accessible on mobile devices that provide a comprehensibleoverview of the water levels over a period of time. As well, intelligent notifications alert farmers toany anomalies or failures, enabling quick intervention to minimize downtime and prevent cropdamage. Future expansion options for this solution are discussed, such as integration of weatherforecasts and live weather data and sensors' deployment in fuel reservoirs to ensure the pump canrun optimally.Key words: IoT, LoRa, Sensors, Smart Agriculture, Water Management 1. IntroductionThe rising prevalence of Internet of Things (IoT) devices is reshaping industries [1]. One keyadvantage is enhanced efficiency and automation, as IoT
Improvement Act of1998, to address the national need to increase the number of American scientists and engineers[1]. S-STEM programs award scholarships to academically talented students who demonstratefinancial need. S-STEM programs are designed to increase the number and diversity of studentsentering science and engineering programs as well as to retain more students in their STEMprograms through graduation and to improve the quality and preparedness of graduates enteringthe science and engineering workforce.The Smith College of Engineering and Technology at Utah Valley University (UVU) wasgranted an S-STEM Track 2 scholarship program for students in Electrical Engineering,Computer Engineering, Computer Science, Computational Data Science, and
states simultaneously [1]. This unique feature enables quantum computers to processvast amounts of data at unprecedented speeds, making them incredibly powerful tools forspecific types of computations predicted to provide us with new technological innovations andalso needs to safeguard our current infrastructures [2]. It holds the potential to revolutionizevarious fields, including cryptography, drug discovery, financial modeling, artificial intelligence,and more. Quantum computers can solve complex problems that are currently beyond thecapabilities of classical computers, such as simulating large molecular structures or optimizinglarge-scale systems in logistics and manufacturing [3].However, as this technology rapidly advance the challenges of