approach to develop a bold and ambitious strategicstudents helps each member reach their greatest potential. We plan. The completed plan was unanimously endorsed by theseek to maximize the value of our graduates’ contributions to Board of Trustees in February 2020.global society and their effectiveness as future leaders. [6] The plan established four strategic focus areas – Inclusive Excellence, High Value Learning, a Transformative StudentB. Size and Programs Experience, and Next Generation Partnerships. Within each Wentworth has approximately 4000 students who are pre- of these focus areas, the
) develop strategies to besuccessful in computing, and iii) develop career plans and explore resources. To achieve theseobjectives, we designed a set of course-specific mentoring activities. In our initiative, we formeda group of mentors composed of successful alumni, graduate students, senior students, industrialpersonnel, and faculty of different races, genders, and ethnicities.We performed anonymous surveys, interviews, and reflections to answer our second researchquestion. We also analyzed students' course performance. Results show that mentoring improvesthe sense of belonging and confidence for both groups of students. Data also indicates first-yearstudents prefer mentoring to succeed academically (e.g., learning programming). On the otherhand
pursuing graduate education was discussed in the interviews (Figure 4). When asked if they planned on pursuing graduate level education, nine participants indicated yes, one participant indicated that they were unsure, and one participant indicated that they were not interested in pursuing graduate education. When asked if they planned on pursuing future research opportunities, all eleven participants indicated that they would be pursuing more research opportunities in the future (Figure 4). When asked if the altREU program provided an accurate representation of the research process, all seven participants indicated that they felt the altREU program accurately represented research (Figure 4). This question was added during the
drawconclusions. We end the paper with our future plan.Theoretical Framework and Background LiteratureAs communities of practice, college learning communities facilitate the development ofcollaborative and academic support relationships through ongoing peer interaction [5]. Sense ofcommunity is the feeling that one is part of a larger, dependable, stable structure [16]. It iscomprised of the following sub-factors: membership, influence, needs fulfillment, and emotionalconnection [11], [12], [14].The authors of [17] presented a linked-course learning community in computer science majorsfor men of color and women (of any ethnicity) with “a variety of activities planned to facilitatethe forming of an academic support group.” They reported that “learning
the general educationprogram: a planned sequence of courses that include critical and practical knowledge gainedfrom studies in communications, mathematics, computer technology, science, history,philosophy, literature, and the arts. The course introduces students to computers and selectedpopular applications and their uses in society. We also encourage students in our CS curriculumto complete the IBM Cybersecurity and AI modules in other CS courses. For this paper, we willfocus on the CS 150 course.Catalog Description of CS 150 Computer Technology Course at our institution:CS 150 Computer Technology. 3(1, 2). This course is for undergraduates from all disciplines,which explores the nature and history of computers, their impact on society
) with an interest and aptitude for engineering and computing degree programs by offering an average of 23 scholarships per year over a 6-year period to at least 43 unique students. 2. Intentional Mentoring - Support scholars’ academic growth with faculty mentors who emphasize the use of an Individual Education and Development Plan to foster student growth and increase student outcomes for persistence, completion, and career aspirations. 3. Engagement in High Impact Practices - Engage scholars in high impact practices, including capstone projects, internships, and collaborative projects. 4. Professional Preparation - Foster professional preparation through common academic coursework, skills workshops, guest
in our study, including the data collection and analyses, are articulatedin Section 5. The results of our study and a discussion of our findings are described in Sections 6and 7. In Section 8, we address the limitations of our study. Finally, we present the key takeawaysfrom the Guild workshop and its implications for other researchers who would like to adopt orcontinue similar efforts in Section 9.2 BackgroundWomen have continued to be minoritized in computing fields in the U.S. over multiple decades[1]. Data from the Cooperative Institutional Research Program (CIRP) Freshmen Survey revealedthat while the percentage of men planning to major in computing in post-secondary institutionsrose from 3.3% to 9.3% over a ten-year period ending in
careers. Meanwhile, Lehman et al. [6] highlighted the underrepresentation of women in CSand explored the backgrounds of female students who chose this major. Their study showed thatfemale computer science majors had lower high school grades, but higher SAT verbal scorescompared to female students in other STEM fields. Additionally, these women often valuedthemselves lower on their academic and leadership abilities and struggled with deciding in clearcareer plans. Research on promoting computer science as a major has frequently explored whattypes of students choose to major in the field. On the other hand, there has been limited exploration into the backgrounds ofinternational students who pursue computer-related majors in the U.S. Zheng
course The literature discussed in this section focuses on the in a consistent manner across all sections. The blueprintcommon goals of identifying why students fail first-year includes descriptions of the required tools, textbook, topics,computing classes, and identifying resources to help them assignments, exams, checkpoint questions for faculty andsucceed. These works present methods, teaching approaches, students, and a sample schedule for the course. Instructors atand insights that highlight the recurring need for improved Wentworth use the information contained in the blueprint whencomputing education. forming their teaching plan. The blueprint was
2’s message to bird 3 6. Panda then shares bird 1’s message to bird 4 7. Bird 4 flies to snail 2 8. Bird 4 passes on the message to snail 2Discussion prompts: 1. Break down the delay caused by Panda – how much of it is because of waiting? 2. Can we categorize the different sources of delay? 3. (optional to use if time permits) How does Panda deal with messages from different sources going to different destinations?The implementation of the activity was done in-class as an activity for a planned duration of 25minutes, with the following breakdown. 1. 5-minute setup: Students first form groups of 3-4 students. They are first given the time to read the scenario, followed by a check-in to ask for clarifications. 2. 5
active sites create project concepts, which are completed byDecember. Prospective participants are given pre-projects to work on at the beginning of theyear, and graduate mentors and faculty advisers at the location conduct training and researchactivities before the start of the summer program.REU participants select one of the three active host institutions during the hiring process basedon the research activities offered, faculty engagement, and the site's location. Participants in the6-week RET program, drawn from nearby high schools, do not remain on campus. Participantswork on their research for 32 hours per week during the summer, with team-building exercisesand the creation of lesson plans (for RET participants) and weekly reports (for
Figure 5 CSE12 pass rate data from Fall ‘17 - Spring ‘22 In preparation for the greater ITL effort, we have been focused on closing equity gaps in ourlarge, gateway CSE12 course, beginning fall of 2021. We used institutional data and developed a processfor improvement as detailed in the later section Training Development Plan. Through a series of meetings,members of the ITL Team during academic year 2021 - 2022, collaborated in meetings to review 1)teaching methods, 2) assessments, and 3) scalability in relation to student outcomes and course data, andspecifically looking at equity gaps between URM and non-URM student subgroups. Inquiry was thefoundation for all pre-ITL meetings with the guiding question “How can we teach differently to
. Thus, female students could have less time for schoolwork than malestudents.To confirm our belief, we plan to conduct another survey to better understand the impact ofgender roles and social implications on female students’ confidence in their academicperformance. Also, we plan to continue to collect the data in early programming courses as weapproach the end of the COVID-19 pandemic. Then, we will compare them with the current data.In addition, we plan to organize a female CS student support group to share their experiences.ConclusionBased on the data and the survey result, we believe that the academic performance of femalestudents is comparable to that of male students’ performance. However, we believe that genderroles and their social
for the CST majors the CS3 course is a mandatory one. Also, no recoveryafter the end of the pandemic (in Fall 2021) is recorded for the CS3 enrollment numbers.Figure 4 summarizes Table 3 and demonstrates that COVID-19 affected the enrollment numbersfor students across all ethnicities. However, it can be observed that different ethnicities havedifferent patterns of when students of those ethnicities were affected most. We cannot explain whythe timelines of the changes in the enrollment numbers for different ethnicities vary. However, thisis an interesting phenomenon that we plan to investigate in our future work.Figure 2. Enrollment For CS1, CS2, and CS3 Courses for Men and Women: Overall Enrollment for CST and non-CST
-computer integration technologies, whilesimultaneously providing the researcher with valuable experience in robotics and artificial neuralnetwork based controls.An ideal prototype would demonstrate the following capabilities: • Provide the operator with the ability to construct a robot as needed from individual limbs, without requiring explicit programming of geometric parameters. • Self-adapt to changes in geometry, without user, utilizing integrated sensors to detect its own environment, identify potential obstructions, and determine safe movement ranges; and • Execute high-level commands such as object retrieval without requiring explicit path planning, demonstrating the ability to
outcomes is helpful in knowing what we need to understand but not as important as the content itself”Based on the comments, we can see that more junior/senior level students expressed how helpfuland important is a good definition of learning outcomes for establishing their goals for the courseand for defining their study plan for the course.Conclusions and Future WorkA correct definition of the learning outcomes is crucial for the students to make more effectiveuse of them during their learning process in the courses.Technological tools such as LMSs help substantially in the management of the learningoutcomes definition. They also help in its publication and evaluation week by week or lesson bylesson, making it easy for the students to have
synergybetween textbooks and certifications serves as a valuable resource, helping to mitigate theadditional demands of studying for certification exams. Second, balancing course content withadditional learning objectives requires careful planning. Incorporating every textbook chapter aswell as including additional outcomes such as team building or presentation skills reduced thetime available for in-depth exploration of cybersecurity topics. While integrating theseinterpersonal and professional skills was beneficial, greater alignment or clearer expectationscould have better supported learning the certification material. Third, enhancing student studyhabits and recall ability is essential. Identifying a theory or mechanism for improving students’study
before segueing into the construction of several classificationmodels for mental health metric prediction. This will be followed by the evaluation of our modelsin Section 4 before we conclude our work in Section 5. We will then finish with our planned futurework to improve our project in Section 6.2 Related WorksMachine learning and its applications within the field of mental health is currently a popular topicin research, with many works revolving around integration into diagnosis frameworks [9]. Crisisintervention is a large part of the field as well, with recent work showing that machine learninghas been valuable in clinical practice for caseload management and ameliorating risk [10]. Currentwork in the field of mental health with applied
class sections was capped at 49 students, and most of thestudents that registered to be in-person still opted to attend the class virtually. Figure 1: Weekly plan of the CS1 flipped courseFigure 1 shows the standard weekly timeline for the course. Since the course used the flipped class-room model, students were expected to watch module lectures and complete the weekly gradedquiz before class. Class time was reserved for reviewing the content taught in the video lecturesand completing in-class programming problems with the instructor and peers. Students worked onthe module homework assignments outside of class, which were due at the end of the week.The key programming concepts covered in the modules included input/output
learn at a pace more suited to them [1]. Video recordings by thecourse instructor allow students to access learning material according to their planned schedule[2]. Also, rewatching material through video lectures can provide flexibility and less fearassociated with one-time lectures [3]. With these flexibilities, students may learn more efficientlywithout their performance being hindered by insufficient time to understand a lecture’s material[4]. Although many available online resources like YouTube and podcasts are found effective forstudents' learning, material from the instructor is mostly deemed helpful in students' learningexperience [5]. One noted issue with other available resources is the varying structure of thesevideos, as they are
. LaFerriere, “Enabling Meaningful Labor: Narratives of Participation in a Grading Contract,” J. Writ. Assess., vol. 13, no. 2, p. 1, 2020, doi: 10.35360/njes.316.[12] A. M. Shubert, “Contracts for a Time of Crisis : What I Learned from Grading in a Pandemic,” vol. 1, no. 17, 2021.[13] T. S. Harding, M. J. Mayhew, C. J. Finelli, and D. D. Carpenter, “The Theory of Planned Behavior as a Model of Academic Dishonesty in Engineering and Humanities Undergraduates,” Ethics Behav., vol. 17, no. 3, pp. 255–279, Sep. 2007, doi: 10.1080/10508420701519239.[14] T. VanDeGrift, H. Dillon, and L. Camp, “Changing the Engineering Student Culture with Respect to Academic Integrity and Ethics,” Sci. Eng. Ethics, pp. 1–24, Nov. 2016, doi:10.1007
is that lowerincome students have significantly different perceptions regarding the risks and opportunities oftheir career pathways [14], [15]. Kapoor & Gardener-McCune [11] found that computingstudents with lower socioeconomic backgrounds found it difficult to pursue industry internshipdue to family and other circumstances. Krenz et al. [16] indicated that lower-income computingstudents had difficulty pursuing graduate school full-time due to familial and economicresponsibilities. To better support lower-income students in computing to broaden theirparticipation in computing careers, it is critical to understand these students’ viewpoints on jobfactors associated with different career pathways for their post-graduation plans.3. Research
can executean attack on a device and then protect the device from that attack would be something a lot ofstudents who want to advance in security will find enjoyable.” We considered these valuablesuggestions from the students and are planning to address some of the suggestions in the futureteaching of the IoT Security class. Regarding the recommendation to include offensive securitytechniques, we intend to consult with the university’s general counsel to ensure compliance withinstitutional guidelines and ethical standards.Educational Content and Learning Opportunities The course’s structured learning materialsand assignments were deemed extremely helpful. The students praised the clarity and relevanceof the shared slides and the variety of
), and enhance safety compliance and decision-making capabilities through realistic workscenarios. In addition, an adaptive difficulty mechanism is introduced in the PPE InspectionTraining scenario. Finite automaton improves training efficiency and stability and optimizes theoverall user experience.In future work, will focus on optimizing LLM’s response and developing more diverse teachingmodules as templates to adapt to educational needs flexibly. Also, future studies plan to collectadditional data on user experience and educational research to allow for better statistical analysisby considering more participants and real-world application scenarios and consideringphysiological, socioeconomic, cultural, and other variables. Future work will
literature review, one of the participants said, “I would say, goingthrough the initial research was very helpful to really understand the situation, and the casebetter, I would say. In terms of, going through research papers, going through research articles,there was already a lot of research done by people” [S02].5. Discussion5.1 The Importance of Hands-On, Real-World Experience The students highly valued the group project, particularly for the near-real-worldexperience it provided in designing accessible technology for people with disabilities. Unliketraditional course projects that often rely on simulated scenarios with pre-set plans andpredictable outcomes, this project offered students the chance to engage with the complexitiesand
plan of the CS1 flipped courseFigure 1 shows the standard weekly timeline for the course. The course follows a flipped classroommodel where students watch lectures for each module and complete graded quizzes before class.During class time content taught in the video is reviewed and in-class programming problems werecompleted with the instructor and peers. Homework assignments were assigned weekly and werecompleted outside of class.The key programming concepts covered in the modules included input/output, conditionals, while/-for loops, vectors, strings, images, and functions. The course was divided into 14 modules witheight programming-related homework assignments and two exams (a midterm and a final). Thelast assignment was a cumulative final
. Similarly, ACCESS students appear to haveincreased their confidence in being able to approach a faculty or staff member to get assistancewith academic problems between the 2021 and 2022 surveys. This result may be explained bythe changing population of ACCESS students. All 2021 survey respondents were in their firstyear of the ACCESS program, while among 2022 survey respondents some students were intheir first and other in their second year of the ACCESS program. The variation of time in theACCESS program, along with the natural maturity gained by completing another year of collegeand life, may explain some of the increase.Future work may include augmenting the survey with additional questions related to the sense ofbelonging. Furthermore, we plan
builtinto smart phones such as Siri, was a polarizing issue for most of the participants. Thirteenparticipants have VAs installed in their homes and use them regularly, expressing satisfactionwith how well they worked. Five of the remaining nine participants that did not use VAs werequite adamant that they did not use them and were not planning to do so, citing privacy concernsof installing passive monitoring devices in their homes. A wide variety of smart devices were mentioned by participants. The most commondevice, mentioned by twelve participants, was smart outlets that were used primarily to remotelycontrol Christmas lights, regular lights, and fans. Seven participants discussed security-relatedsmart devices such as Ring doorbells