Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 14 results
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
James P Cohoon, University of Virginia; J. McGrath Cohoon, University of Virginia; Luther A Tychonievich, University of Virginia; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Divisions
Computing & Information Technology
. ○ Recruiting techniques for more and diverse computing majors. ○ Pedagogical best practices that result in more and diverse computing majors (e.g., pair programming). ○ Teacher success stories. ● Time every day to reflect, plan for action, and share thoughts and experiences. ● Physical movement, especially as the end of the day approaches. ● Both at-workshop and follow-up evaluation of workshop efficacy and follow-up evaluation of participant outcomes, ● Participant compensation out of respect for their interest in improving high school computer science education and recognition of the value of their time.Each of these principles is addressed in the following sections.Organizer recruitment, selection, and
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Camilo Vieira, Eafit; Alejandra J. Magana, Purdue University, West Lafayette
Tagged Divisions
Computing & Information Technology
practices, best practices best practices theory, research and best practicesReflection The reflection Reflection is The reflection is Reflection is is not realized done but it does complete and it complete and it or the answers not provide allows identify presents some are not explanatory most elements examples that coherent with elements that of experience demonstrate the responses allow uncover clearly the the experience
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Bahareh Azarnoush, Arizona State University; Jennifer M Bekki, Arizona State University; Bianca L. Bernstein, Arizona State University; George C Runger, Arizona State University
Tagged Divisions
Computing & Information Technology
doctoral students in STEM programs from 27universities around the United States were given access to the website and asked to spend at leastfive hours exploring the site in an unconstrained manner during a two-week time period. Whileparticipants explored the site, their behavior was tracked using a tracking mechanism withDrupal, which is the content management system on which the CW intervention is built.Following the exploration of the website, participants were given access to a final post-assessment, which measured key learning measures that CW is designed to influence. Theassessment instrument includes different scales that reflect the social-psychological constructssuch as Problem-Solving Knowledge, Resilience, and Coping Efficacy
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Duke Mejia Bulanon, Northwest Nazarene University; Stephen A. Parke P.E., Northwest Nazarene University
Tagged Divisions
Computing & Information Technology
c American Society for Engineering Education, 2013 Crop Monitoring System: A Case of Teaching Machine Vision through Undergraduate Research AbstractNorthwest Nazarene University, which is located in the Treasure Valley of Idaho, is developing acrop monitoring platform (CMP). The CMP, which uses a machine vision system, estimates fruittree parameters such as tree canopy volume and canopy reflectance characteristics. This researchproject, conducted by undergraduate engineering students, is integrated with the teaching ofmachine vision in a Control Systems course. This paper presents a case for teaching machinevision through undergraduate research.1. IntroductionNorthwest
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Hoda Baytiyeh, The American university of Beirut
Tagged Divisions
Computing & Information Technology
one dataset toinvestigate the acceptance of Moodle.An Exploratory Factor Analysis (EFA) was employed to the data to determine which ofthe 30 items formed related subsets. EFA was applied with principal componentsextraction, eigenvalues greater than 1.00 and absolute value greater than .40 13, 14. Resultsof a Kaiser–Meyer–Olkin (KMO) measure of sampling equal to .935 and Bartlett’s test (p< .0001) showed that using EFA was appropriate for this study 15. The EFA withprincipal components extraction yielded five factors that accounted for 63.93% of thetotal variance.Table 1 shows the rotated factor loadings, which are the correlations between the variableand the factor. The size of each loading reflects the extent of the relationship
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Lifang Shih, Excelsior College; Jane A LeClair, Excelsior College
Tagged Divisions
Computing & Information Technology
requirements.In addition to the Information Technology core requirements, students must complete a 3-credithour capstone course entitled, Integrated Technology Assessment (ITA), which involvesdevelopment and submission of E-portfolios. The Integrated Technology Assessment (ITA)process in Excelsior College’s BSIT Program provides students with an opportunity to create andmanage web-accessed electronic portfolios that document their knowledge, skills, andachievements from coursework, practical work experience, and other extracurricular activities.These portfolios support student reflection and provide a thoughtful accumulation of academicand non-academic work over a period of time.In order to continue to track the students’ progress after graduation
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
render anaugmented view, similar to the helmets used in virtual reality. Using an HMD, the user viewsthe physical world through transparent glass capable of reflecting virtual information, oralternatively, using the two small displays in helmet that display a video stream of theenvironment. While providing an immersive experience, they are prohibitively expensive formany universities. An alternative to HMDs is to use smart mobile devices that serve as awindow through which to view the augmented world. By pointing the device at an area ofinterest, the video stream from the built-in camera can be sent to the display, providing the userwith a mediated view of the world. This view provides no depth information, but can still serveas a foundation for
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
. The cadets have found these topicsengaging and have participated with excitement in the projects and discussions that centeraround the topics. The cadets enjoy discussing and learning about the various topics in computerscience, especially the discussions on networking. Using the networking project provided byNICERC, the cadets became the nodes and lines of communication while others acted as the“Man in the Middle” or the “Denial of Service.” This enhanced their understanding of sendingmessages through cyberspace and threats that exist.Cyber Science is one course which has been accepted readily and enthusiastically by both theCyber Science instructors and the NOMMA administration. This excitement is reflected in thecadets’ interest and desire
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Dhana Rao, Marshall University; Rajeev K Agrawal, North Carolina A&T University (Tech); Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
remainder of the paper is organized as follows. Tools for the first three tasks in the researchworkflow are discussed in section 3. Section 4 presents tools for analyzing and interpretingresults, and writing research papers. Our reflections on this work and future research are indicatedin section 5.3 Literature Search, Review, and AssessmentWhen students embark on research, often they have no clear cut ideas about which area or topicsthey want to investigate. At best they will have one or two key phrases (e.g., comparative genomicanalyses) to begin their exploration. This is also true with seasoned researchers who want to forayinto emerging areas (e.g., bigdata visual analytics). A first step in this scenario is to get acquaintedwith the
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Brian R. King, Bucknell University; Ashwin Satyanarayana, New York City College of Technology
Tagged Divisions
Computing & Information Technology
quite pleased to work on an interesting, relevant large-scaledataset of their choice, and see how the methods taught would work in practice; their enthusiasmwas reflected in the results obtained.6.2 Reflection and DiscussionOne of the biggest challenges we faced with the design of the course was from the unexpectedinterest from non-CS majors. While this was a pleasing observation, it did require us toreconsider the depth of some material, and perhaps consider some different techniques in thefuture, as the interest is continuing to expand. We are strongly considering offering two variantsof the course: one course would be the existing data mining course as an elective for thecomputer science major, with a prerequisite of taking a course on data
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Munish Sharma, Northern Illinois University
Tagged Divisions
Computing & Information Technology
) embedded assessment strategies; and e) scaffolds. These features provide anengaging laboratory experience, work with students’ pre-existing knowledge, and develop skillsof self-monitoring and reflection, which contribute toward improving the quality of STEMeducation. The project experimentation part of the facility has two major components: a) aremote laboratory and b) pedagogical design.3.1 Remote LaboratoryThis implementation proceeds through a number of inter-linked tasks covering a range ofdisciplines, which include computer interfacing, web design, interactive graphical user interface,computer networking, network/web security, experiment module designs, assessment strategy,and project evaluation.The developed facility can be presented by a
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Shaundra Bryant Daily, Clemson University; Juan E Gilbert, Clemson University; Wanda Eugene, University of North Carolina Charlotte; Christina Gardner-McCune, Clemson University; Kyla Alanna McMullen, Clemson University; Phillip Wendell Hall Jr, Clemson University ; Sekou L Remy, Division of Human Centered Computing - School of Computing, Clemson University; Damon Lamar Woodard, Clemson University; Tania Roy, Clemson University
Tagged Divisions
Computing & Information Technology
, these preferences are reflected in the top majors chosen by womenthat include business, health professions, education, history, psychology, visual and performingarts, communication, English language and literature, and liberal arts and humanities. In fact, theonly major considered more of a “hard” science that is among the top ten chosen majors isbiological/biomedical sciences. Even in the choice of biology-related fields; however, we see thedirect opportunity for graduates to realize impacts on people as compared to traditional computerscience research. Figure 2 shows the gender composition of college majors, while Figure 3shows the chosen occupations of men and women with STEM-related degrees
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Simin Hall, Virginia Tech; Clifford A. Shaffer, Virginia Tech; Eric Fouh, Virginia Tech; Mai Hassan ElShehaly, Virginia Tech; Daniel Breakiron, Virginia Tech
Tagged Divisions
Computing & Information Technology
lead students to reflecting on their errorsprior to resubmission because they lose points for wrong responses. This makes guessing ineffec-tive. Our proficiency exercises are modeled after the TRAKLA system5, 14 and implemented us-ing the JSAV algorithm visualization library15.3. Research MethodsWe viewed this study as the first step in assessing our overall approach. Our goal was to make asmuch progress as possible on answering a number of key questions.  Can students learn as well or better using interactive tutorials instead of traditional lecture and textbook?  Will students be accepting of a class focused on interactive tutorials rather than tradition- al lecture and textbook?  Will our client/server
Conference Session
Embedded Systems and Mobile Computing
Collection
2013 ASEE Annual Conference & Exposition
Authors
Maurice F. Aburdene, Bucknell University; Marie Catherine Pizzorno, Department of Biology, Bucknell University; Alexander P Thompson, Bucknell University
Tagged Divisions
Computing & Information Technology
? How many possible triplets are there? How many amino acids are there? Whyis there a difference in these numbers? What is a start codon? What is a STOP codon? What dowe mean by gene regulation? What governs the rate of activation of genes?g) Databases. Where are the data bases located? What is the National Institute of Health? Whosupports it? What does NCBI refer to?h) Character strings described by Numerical Sequences. How do we change a string to anumerical sequence? How do we represent the DNA sequence of length N? How would werepresent the complementary DNA sequence?i) Assume we used the complex conjugate notation of a, t, g, and c. What would be the sum of aand t? Reflecting on our class work? What would be the sum of a DNA sequence?j) A