Paper ID #40200Plickers and Peer Instruction in a Software Design CourseDr. Drew Alex Clinkenbeard, California State University Monterey Bay Drew A. Clinkenbeard teaches in the School of Computing and Design and California State University Monterey Bay. He primarily teaches Software Design and Software Engineering courses designed for sophomores (both transfer and native students) and seniors respectively. Dr.Clinkenbeard primarily fo- cuses on educational research aimed at increasing achievement and equity in underrepresented student populations.Joshua B. Gross, California State University Monterey Bay Joshua Gross is an
will explain the reason behindthis data range in the next section.(iv) In Fig. 5 (a), we can see different options available under the “Blocks” section. Navigate tothe Output code category, then drag out a “print to serial monitor” block and place it just beforethe serial block that is already in the program. A student can change the default text to label theSerial data, such as “Sensor Value: ”, and from the dropdown menu either choose to print with orwithout a new line. Please note, in case of Fig. 4, the default block code has been used, where anumber is printed on the serial monitor. In contrast, after the code block configuration as shownon 5 (b), the serial monitor output looks similar to Fig. 6. A student can stack similar serial
outcomes between students from different colleges.References[1] D. Chatterjee, and J. Corral, How to Write Well-Defined Learning Objectives. The Journal ofEducation in Perioperative Medicine. Dec 2017. Volume 19, issue 4. (Online):https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5944406/[2] B. S. Bloom, M. D. Engelhart, E. J. Furst, E. J. Hill, and D. R. Krathwohl, Taxonomy ofeducational objectives: The classification of educational goals. 1956 New York, NY: Longmans,Green, and Co.[3] L. W. Anderson, and D. R. Krathwohl, et al, A Taxonomy for Learning, Teaching, andAssessing: A Revision of Bloom's Taxonomy of Educational Objectives. 2001 Allyn & Bacon.[4] Z. Taurina, Students’ Motivation and Learning Outcomes: Significant Factors in
accommodatestudents that tested positive for the virus and to continue their learning without being in the classroom.Labor-based grading guarantees to any student that completes the assigned labors honestly, faithfully, in areasonable time, and with a reasonable number of errors, the grade of B (3.1 on a 4 point scale). Gradeshigher than a B can be achieved through the completion of extra labors that expand the learning goals ofthe student or support the learning goals of others in our community. Grades lower than B are awarded tostudents that struggle to meet all the completion criteria for assigned labors, but are still able to completethem with additional help or time.Labor-based grading replaces point based grading with a completion metric. In addition
the school. Table VI shows the correlation of student performance IV. T HE CS I B LUEPRINTbetween CS I and CS II. 81% of students who performedwell in CS I continued to perform well in CS II. Similarly, This section describes our CS I blueprint in detail. Whilestudents who faced challenges in CS I with a grade of C the primary purpose of the blueprint is to increase studentor lower often faced challenges in CS II. For students who retention, it has several added benefits for faculty. For newpassed CS I with a C or lower, 15% of them failed CS II, faculty or faculty who have not taught the course at Wentworth38
, students step through the program to the vulnerable ‘gets’ function, provide input longerthan the 8 bytes allocated for it, and view the stack (Figure 5). As shown in Figure 5, a largenumber of B’s was input. The hexadecimal ASCII representation of ‘B’ is 42. Figure 5 showsthe B’s overflowing the space allocated for it, and overwriting stack memory below it, where theframe pointer and return address for ‘main’ were stored.Figure 5 – Viewing a Buffer OverflowNext students are guided through exploiting the buffer overflow vulnerability by running thevulnerable code from the command line. Students are then introduced to Address Space LayoutRandomization (ASLR), which is a mitigation for buffer overflow vulnerabilities. Students areinstructed to turn
between two random inputted pointsOne example project is shown below:Board game: This is an example of building a graphic game board for C++. The characters usedas markers on the board can be changed and the board can be adapted to different types of logic,size, and number of symbols on the board. Figure 2(a) is an example of using the board to showtravel from two locations. At the end of the semester, there was a mini maker faire for all thegroups to present their work using a tri-fold poster, as shown in Figure 2(b). And the competitionincludes playing each other’s games. Credits were given to the best design and best play. The topthree teams obtained awards.ResultsTo evaluate the effectiveness of the approaches, student surveys were
and game developers should valuediversity to increase public access to technology, computer science and game developmentproducts.”The original VDEIE was rated on a 7-point Likert scale (1 = completely disagree to 7 =completely agree) and validity evidence was obtained through both EFA and CFA approaches[6]. The four-factor solution representing students’ valuing of diversity to a) Serve CustomersBetter, and b) Fulfill a Greater Purpose and their willingness to act inclusively by a) PromotingHealthy Behaviors, and b) Challenging Discriminatory Behaviors on teams showed strongvalidity and reliability evidence both initially and across time ([6]).Due to the valid and reliable nature of the VDEIE and its ability to accurately reflect
first-year engi-neering students with little experience coding in Python. The course consisted of two types of content: (a)UMC content that positioned students to participate in IBL activities and (b) projects designed to catalyzestudents’ sociotechnical thinking by integrating coding with broader social issues. The section studiedhad 30 students, of which 10 (6 female, 4 male) agreed to participate in our study.4.2 Data SourcesWe collected two forms of data over the course of the pilot phase of this research. First, the lead authordocumented observations of learning activities in field jottings. Second, we asked students to documenttheir learning in Python “rules notebooks” and annotations on coding assignments. The rules notebooksare
- Cybersecurity Planning and Management (CPM)CPM-1: Examine the placement of security functions in a system and describe the strengths andweaknessesSource: Final Project Individual Reflection Question 2 which provided a network diagram andasked students to identify strengths and weaknesses. EAMU Vector (19,0,0,0)CPM-2: Develop contingency plans for various size organizations to include: businesscontinuity, disaster recovery and incident response.Source: Final Project Individual Reflection Question 3 which provided three scenarios and hadstudents answer how to achieve various goals. EAMU Vector (18,1,0,0)CPM-3: Develop system specific plans for (a) The protection of intellectual property, (b) Theimplementation of access controls, and (c) Patch and change
CPS platform and (b) the current shape of acompletely assembled car ready for a field test. The key components are largely grouped into thechassis and the compute box. The chassis holds an electronic box and an electric speed controller(ESC) as well as sensors and batteries (not shown in the figure); the compute box contains acustom-built computer running on the Linux operating environment, a power board for DC-DCconversion from the batteries, and various sensors and electronic devices such as IMU, cameras,Wi-Fi modules, to name a few. (a) Top view of key subsystems (b) Side view of the platform for a field test Figure 1. A 1/5-scale autonomous vehicle under development as a Cyber Physical System (CPS) platform
Department of Mechanical Engineering, UNC CharlotteA network analysis of the Twitter-Rxiv ecosystem for purveyors of science misinformation in preprints on the COVID-19 pandemicAbstractThis paper illustrates the final research product resulting from a team of diverse students of manyeducational stages and backgrounds in cyber intelligence-based research. We chose a real-worlddataset of discussion of scientific preprints on SARS-CoV-2 virus and COVID disease on Twitter™. The selection of the real-world dataset was driven by: (a) misinformation regardingCOVID-19 disease and SARS-CoV-2 virus is rampant and undermines our ability to recoverfrom the pandemic, (b) unfounded and false health-related claims are spreading on social
present preliminary results on students’ preferred debugging strategies andcompare them with their learning gains during a programming course. We focus on answeringthe following questions: a) “Is there a difference between students’ preference for debuggingstrategies and their course achievements?”; b) “Is there a relationship between softwaredebugging tools and the conceptual understanding of debugging strategies?”This study was conducted during Fall of 2022 in a 16-week programming fundamentals II courseat a large public southwestern university. This semester, 328 students enrolled from variousengineering and computer science majors. The data was gathered from a debugging assignment,which is an open-ended questionnaire. The open-ended
Paper ID #39724Development of Amphibious Water Sampling Rover for Mosquito ResearchviaCapstone projectDr. Byul Hur, Texas A&M University Dr. B. Hur received his B.S. degree in Electronics Engineering from Yonsei University, in Seoul, Korea, in 2000, and his M.S. and Ph.D. degrees in Electrical and Computer Engineering from the University of Florida, Gainesville, FL, USA, in 2007 and 2011, respectively. In 2016, he joined the faculty of Texas A&M University, College Station, TX. USA, where he is currently an Assistant Professor. He worked as a postdoctoral associate from 2011 to 2016 at the University Florida
253 600Students were asked to self-report their GPA. GPA was based on a scale of 4, with an “A” being a4.00, a “B” being a 3.00, a “C” being a 2.00, a “D” being a 1.00, and an “S” being a 0.00. Someclasses also used a “+” or “–” system. A “+” adds 0.33 to the base grade, while a “-” subtracts0.33. For example, a “B+” would quantitatively be a 3.33 (3.00 + 0.33), while a “B-” would be a2.77 (3.00 - 0.33).Data was gathered on students’ expected majors. Out of a total of 600 students, 311 (51.8%) weremechanical and/or aerospace engineering students, 114 (19.0%) were civil and/or environmentalengineering students, 102 (17.0%) were biomedical engineering students and 73 (12.2%) studentshad other majors. This data can be seen in Figure 2
. Figure 3 Teaching Byte Ordering in CSE 12 in the classroom through (a)Transmission vs (b) Inquiry The traditional Transmission method would find the instructor explaining the relevance of ByteOrdering including the 2 types, Least Significant Byte (LSB) first and Most Significant Byte (MSB) first.Often, the instructor would then directly work through examples in class (Figure 3(a)), and studentswould observe and take notes. The lecture on Byte Ordering would conclude with the instructorexplaining compatibility of the two different types of Byte Ordering. Now, by contrast and as an effort to adopt Inquiry (Figure 3(b)), the work begins before theshared lecture time when students are asked by the instructor to prepare for the
: Graphs that captures the grade distribution. If the grading system would take the bestthree categories among quizzes, homeworks, exams, and projects, the grade change would nothave been significantly different. Each grade level includes + and - level grades. For example, B-is one grade level above a C+. Finally, the last graph show the category in which students receivedtheir lowest grade, which was the category that determined their final grade. Students whose gradewould not change because of one categoryFigure 3 shows the grade distribution for the course in the Fall 2021 and Spring 2022 semesters.In Fall 2021, student grades show inflation. One of the main reasons for this is that the HPquestions in the homeworks did not account for the fact
-resource settings. New technologies, such as virtual and remote laboratories,provide opportunities for students to conduct experiments while substantially reducing the costsassociated with traditional laboratories. Hence, the traditional approaches to introducing thissubject often limit practical work to virtual laboratories in the form of simulation. It allowsstudents to verify their theoretical knowledge from lecture classes by observing and exploringcharacteristics and actual system behavior. B. Nikolic et al. [24] surveyed and evaluated a varietyof simulators available in the open literature and suitable for laboratory use in computerarchitecture and organization. The first group of simulators, which includes HASE, ISE DesignSuite, JHDL
Paper ID #37387Software Guild: A Workshop to Introduce Women and Non-BinaryUndergraduate Students from other Majors to ComputingNimmi Arunachalam, Florida International University Nimmi Arunachalam is presently a Ph.D. student in the School of Universal Computing, Construction and Engineering Education (SUCCEED) program at Florida International University (FIU). She also serves as the Program Director for Break Through Tech with the Knight Foundation School of Computing and Information Sciences at FIU. She is interested in broadening participation in computer science for students from all backgrounds.Dr. Mark A. Weiss
0 Logic NOR 1 0 1 1 Logic NAND 1 1 0 0 Logic XNOR 1 1 0 1 Comparison of A > B 1 1 1 0 Comparison of A = B 1 1 1 1These instructions can be grouped into two primary categories: arithmetic operations and logicoperations. We have demonstrated the functionality of these operations in a video featuring theDE2 board [8], and additional details regarding the I/O interface are shown in Fig.1. The yellowlabels indicate the switches used for inputs, the displays of the
typical guided problem sets, which leads students through thedesign of a dynamic programming algorithm. Dynamic programming is a core technique inalgorithm design; it is also widely recognized as one of the most challenging topics in anyalgorithms course.9, 14, 23, 29 Developing a dynamic programming algorithm typically involves threedistinct stages: 1. Recursive structure: Identify an appropriate recursive structure in the given problem. This requires identifying both (a) the subset of input data that each recursive subproblem needs to consider and (b) how the output of that recursive subproblem depends on that subset of input data. 2. Recursive solution: Write a mathematical recurrence or a recursive backtracking
to the required CS coursesand/or course sequences (see Appendix 1). The changes that students suggested were related to(a) “course requirements,” (b) “program content,” (c) “course sequence,” and (d) “languagesequence.” Regarding course requirements, students wanted to (a) remove a number of coursesfrom the program requirements (e.g., automata theory, assembly language); (b) add courses asprerequisite to other courses to prepare them better for those courses; and (c) make a number ofcourses required for the program. Moreover, students wanted the content of the program to bemore relevant to the skills and knowledge required in the industry. Concerning the coursesequence, students believed that some courses should have been introduced earlier
• Students learn to manage a project and manage a project timeline • Reinforces that programming is a tool that allows practitioners to implement solutions and designs and is far from the end all and be all of CS • Makes collaboration to learn from peers natural impacting overall learningWhen students have more agency over the project, they are empowered to become owners oftheir learning process.References[1] S. B. Jenkins, “The Experiences of African American Male Computer Science Majors in Two Year Colleges,” University of South Florida, 2019.[2] L. J. Sax, H. B. Zimmerman, J. M. Blaney, B. Toven-Lindsey, and K. J. Lehman, “DIVERSIFYING UNDERGRADUATE COMPUTER SCIENCE: THE ROLE OF DEPARTMENT CHAIRS IN PROMOTING GENDER AND
implications may have a negative impact on female students’ participationin computing which is aligned with the previous studies [18] [19] [20] [21]. To increase thefemale population in the CS department, we may need to change gender-based cultural aspects.AcknowledgmentWe would like to thank the Northeastern University Center for Inclusive Computing (CIC) forthe financial support of data collection projects. Please note that Any opinions, findings andconclusions or recommendations expressed are those of the authors and do not necessarily reflectthe views of the CIC or partner institutions.Reference[1] T. Fletcher, R. Quintero, J. Moten and B. N. Boyd, "Race, Gender, and Persistence in Engineering and Computing: A Qualitative Analysis of Female
, pp. 1–35, 2017, doi: 10.1145/3285029.[11] M. A. Peters, “Deep learning, education and the final stage of automation,” Educ. Philos. Theory, vol. 50, no. 6–7, pp. 549–553, 2017, doi: 10.1080/00131857.2017.1348928.[12] A. S. Lan, “Machine learning techniques for personalized learning,” Rice University, 2016.[13] B. Yousuf and O. Conlan, “Supporting student engagement through explorable visual narratives,” IEEE Trans. Learn. Technol., vol. 11, no. 3, pp. 307–320, 2017, doi: 10.1109/TLT.2017.2722416.[14] M. J. Grant and A. Booth, “A typology of reviews: An analysis of 14 review types and associated methodologies,” Health Info. Libr. J., vol. 26, no. 2, pp. 91–108, 2009, doi: 10.1111/j.1471-1842.2009.00848.x.[15
forthe early prediction of course-agnostic student performance," Comput. Educ., vol. 163, pp.104-108, 2021.[5] S. B. Dias, S. J. Hadjileontiadou, J. Diniz and L. J. Hadjileontiadis, "DeepLMS: a deeplearning predictive model for supporting online learning in the Covid-19 era," Scientific Reports,vol. 10, no. 1, p. 19888, 2020.[6] R. Umer, A. Mathrani, T. Susnjak and S. Lim, "Mining Activity Log Data to Predict Student'sOutcome in a Course," in Proceedings of the 2019 International Conference on Big Data andEducation, New York, NY, USA, 2019.[7] S. V. Goidsenhoven, D. Bogdanova, G. Deeva, S. v. Broucke, J. D. Weerdt and M. Snoeck,Predicting Student Success in a Blended Learning Environment, New York, NY, USA:Association for Computing Machinery
Emirates, Apr. 2019.[14] B. Nuttall and D. Jones, “gpiozero — GPIO Zero 1.6.2 Documentation,”gpiozero.readthedocs.io, 2015. https://gpiozero.readthedocs.io/en/stable/ (accessed Jun. 2022).[15] L. J. Pérez and S. Rodriguez, “Simulation of scalability in IoT applications,” presented at theInternational Conference on Information Networking (ICOIN), Chiang Mai, Thailand, Jan. 2018.[16] “QEMU documentation,” www.qemu.org. https://www.qemu.org/docs/master (accessedJun. 20, 2022).[17] B. Ramprasad, M. Fokaefs, J. Mukherjee, and M. Litoiu, “EMU-IoT - A Virtual Internet ofThings Lab,” presented at the IEEE International Conference on Autonomic Computing (ICAC),Umea, Sweden, Jun. 2019.[18] “Setting up Qemu with a tap interface,” Gist, Feb. 13, 2018.https
Integrity Code(MIC)) and confirmation.Exercise 4: WPA3 AES Mode CMAC MIC Verification of the EAPOL-M2 using WPA KCKIn WPA3 (with IEEE 802.11w being mandatory), the MIC is computed using the WPA Key Con-firmation Key (KCK) in the case of the EAPOL-M2 unicast frame (see Figure 8). Figure 8: AES Mode CMAC MIC Verification with KCK in WPA3 EAPOL-M2 [26].The students are to identify the EAPOL-M2 message in a 4-way handshake that is captured byWireshark. The MIC value of the EAPOL-M2 becomes the wTarget. The payload to be used forcomputing the MIC value should have the MIC string replaced with zeros. The KCK is extractedfrom the logs. The students are to compute the cTarget using the Python script (AES-128 MODECMAC implementation) provided in B.2.1
quizzes (Matthews et al. 2014). Similarly, Javorcik and Polasek (2019a)created a microlearning course from an existing e-learning course and compared the studentlearning outcomes. They found that the students in microlearning courses achieved course learningoutcomes more easily and accessed the course twice the number of e-learning courses. As a follow-up study, the same authors presented two models - Model A and Model B to transform eLearningcourses into microlearning courses in Moodle LMS (Learning Management System), and basedon the pilot study results, they found model B with fewer thematic units is appropriate for first-year university students (Javorick & Polasek, 2019b). Likewise, Skala and Drilk focused on thedidactical design of
Group Reports, 2015, pp. 41–63. doi: 10.1145/2858796.2858798.[20] J. Spacco et al., “Analyzing Student Work Patterns Using Programming Exercise Data,” in Proceedings of the 46th ACM Technical Symposium on Computer Science Education, 2015, pp. 18–23. doi: 10.1145/2676723.2677297.[21] J. F. Pane and B. A. Myers, “Usability Issues in the Design of Novice Programming Systems,” Carnegie Mellon University, School of Computer Science, Technical Report CMU-CS-96-132, Pittsburgh, PA., 1996.[22] J. F. Pane, “Designing a Programming System for Children with a Focus on Usability,” in CHI 98 Conference Summary on Human Factors in Computing Systems, 1998, pp. 62–63. doi: 10.1145/286498.286530.[23] E. Lahtinen, K