Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 15 results
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Usman Ghani, DeVry University; Ahmed S. Khan, DeVry University, DuPage
Tagged Divisions
Computing & Information Technology
Page 24.1203.4is guided in terms of what to consider, how to create associations between ideas, and how theseassociations form a supportive scaffolding structure. 21, 22 According to Cagiltay23 supportivescaffolding can be accomplished by several methods and mechanisms, such as coachingcomments, providing feedback, and provoking reflection. Packet-Tracer provides scaffolding inthe form of corrective feedback. According to Jaehnig and Miller the types of correctivefeedbacks commonly used are:24 1. Knowledge-of-Response (KOR), which simply indicates that the learner’s response is correct or incorrect. 2. Answer-Until-Correct (AUC), it requires learner’s to remain on the same test item until the correct answer is selected. 3
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Tanya Stanko P.E., Innopolis University; Oksana Zhirosh, Unium
Tagged Divisions
Computing & Information Technology
inmultiple languages and codes that information employs (textual, iconic, hypertextual,audiovisual, multimedia, etc.), should be a recurring, continuing goal throughout theeducation system as a whole, from primary education to higher education2.In addition, international organizations have focused their attention both on thedevelopment of advanced curricula and instruction in general. This has been reflected inseveral projects supported by UNESCO and OECD. One such project, called “DeSeCo”(Determination and Selection of Competencies), had published a number of researchpapers in the 2000s which lay a theoretical foundation for the new understanding of theconcept of competencies in education and in the IT industry5,12,13.In the 1960s, when modern
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Paymon Sanati-Mehrizy, Icahn School of Medicine at Mount Sinai; Ali Sanati-Mehrizy
Tagged Divisions
Computing & Information Technology
-oriented society, some researchers 4,5,6, haveargued that the development of autonomous learners is fundamental. Coto describes autonomyas: … the ability to take charge of one’s own learning. It means to have the responsibility for setting learning goals; identifying and developing learning strategies; developing study plans; reflecting on learning; identifying and selecting relevant resources and support; and assessing one’s own progress7.In a research study conducted at the National University of Costa Rica with the goal ofproducing a curriculum shift from a teacher-centered approach toward a student-centeredapproach, it was concluded that this shift is not going to be an easy one. They pointed out theimportance of
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Charles B. Owen, Michigan State University; Sarah Coburn, Michigan State University; Jordyn Castor
Tagged Divisions
Computing & Information Technology
rubber bands. Wire allowed the instructor tocreate links that reflected those on the drawing, with bends and a single, sturdy line. Rubber Page 24.1167.6bands allowed the student to modify the diagram herself. Roles were indicated on associationsusing smaller Post-it notes, also with Braille.A set of foam symbols was found at a local craft store that included several symbols close to theUML symbols used on edges. Figure 3 shows some of these symbols and their correspondingUML element. The zero, one, and star symbols represented the most common multiplicities.Inheritance was indicated using a triangle. Composition was indicated with the two
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
factors can be made easier byorthogonal factor rotation. We used the varimax rotation method with Kaiser normalization.2.3 Cluster AnalysisAfter the factors or components underlying the different conceptual categories have beenidentified, it is possible to derive scores for each student on each factor. We used hierarchicalcluster analysis, using the Euclidian distance as a proximity measurement, to classify students’factor scores and to group students in different clusters reflecting their responses to conceptualassessments. The number of clusters was determined by inspection of the dendrogram, a displayrepresenting visually the distances at which clusters are combined
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reneta Davina Lansiquot, New York City College of Technology; Ashwin Satyanarayana, New York City College of Technology; Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
different courses of the sametype. The lack of transfer is likely due to multiple factors. Students may have forgotten some of thematerial learned in a previous course; students may not perceive the connections; students may seethe connections but are unable to use the material in meaningful ways in a different context; or thepedagogical approach used by instructors may not be conducive to transfer.3Approaches used to facilitate transfer of learning include the use of reflective writings,contextualization of learning experiences, and application of learning to real life. Multiplestrategies have been suggested to encourage transfer 3: making the need for transfer of learningexplicit to students, advising students to take courses in the appropriate
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
. Table 2 shows the data for four semesters, µ – mean and σ –standard deviation.Specifically: Page 24.199.10• Spring 2011 – Addition of specific examples in check-mark criteria for both SO (a) Foundations, and SO (b) CS Core. This may account for improved statistics for SO (b) post Fall 2010.• Fall 2011 - Incorporation of the 2nd Tier Teamwork Peer Rating Rubric, to seed the SO (f) Teamwork ratings. The change in the rating probably reflects a more realistic assessment in Fall 2010 and Spring 2011• Fall 2011 - Incorporation of the 2nd Tier Presentation Skills Rubric, to seed the SO (g) Communication ratings
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeremy Webb, Department of Mechanical and Biomedical Engineering Boise State University; Inanc Senocak, Boise State University; Dazhi Yang, Boise State University
Tagged Divisions
Computing & Information Technology
as a combination of conduction in the fluid and thebulk motion of the fluid in our study. The convection simulation (Fig. 6) shows fluidmolecules removing energy from solid molecules as students vary the wind speed.Figure 6.Molecular simulation of convection heat transfer.The radiation module (Fig. 7) explains the concept as the interaction between moleculesand photons in our study. The radiation simulation depicts a water molecule absorbing,reflecting, or being transparent to different wavelengths of radiation. Students are able tochange the temperature of a solid object that acts as an energy source. As students changethe temperature of the source the amount of energy emitted increases and thewavelengths of the energy change
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cory Brozina, Virginia Tech; David B. Knight, Virginia Tech Department of Engineering Education
Tagged Divisions
Computing & Information Technology
, the graduate student wasable to take MOOC courses for credit and most likely learn material that would have otherwisebeen unavailable on campus. The weekly meeting with his faculty advisor required the studentto summarize and distill information from the MOOCs as well as reflect upon the educationaldelivery mechanism’s effectiveness. From this experience, the student also determined that therecan be a variety in quality and level of rigor with each MOOC; thus, he would recommend thatmultiple MOOCs be included in a course plan to increase the likelihood that valuable learningcan take place across courses. For example, though the E-Learning and Digital Cultures courseappeared rigorous in the description, the actual execution of the course was
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona; Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Mini Breadboard $10.00 CodeWarrior Freescale free Total $298.00 Table 1: Bill of Materials for ECET-365course project with Tower Fig 2. Robotic Car with TowerThe Dragon Plus-2 Board with the MC9S12DG256B microcontroller is different in somerespects from the Tower Board (MC9S12G128), and the algorithm, physical design and codescreated reflect that. The two groups who used the Dragon board had to make continual changesto each part in order to achieve the best performance from their microcontroller, sensors, and caroperation. Their kit came with the H-Bridges, the sensor module
Conference Session
Information and Network Security
Collection
2014 ASEE Annual Conference & Exposition
Authors
Richard Scott Bell, Kansas State University; Eugene Y. Vasserman, Kansas State University; Eleanor C. Sayre, Kansas State University
Tagged Divisions
Computing & Information Technology
during the 1970s 9 . Since that time, the importance and need fora workforce skilled in cybersecurity has grown rapidly 17 . Due to this rapid growth, and thetremendous breadth of material that falls under the umbrella of cybersecurity, a wide array ofcontent and pedagogical practices have been incorporated into today’s cybersecurityclassrooms.While this diversity reflects the reality of cybersecurity education, it is a major hindrance to thedevelopment of a consistent model for cybersecurity education. Areas which could beincorporated into this domain, include: computer architecture, criminology/law, cryptography,databases, human-computer interaction, information retrieval, information theory,management/business, mathematics, military science
Conference Session
Topics in Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Abul K. M. Azad, Northern Illinois University; Namratha Siripragada, Northern Illinois University
Tagged Divisions
Computing & Information Technology
, and Mathematics) project, award number DUE-1140502. Any opinions, findings, and conclusions or recommendations expressed in this materialare those of the authors and do not necessarily reflect the views of the National Science Foundation.References[1] Elliott, S. and Kukula, E. (2007), The Challenges Associated with Laboratory-Based Distance Education, EDUCASE Quarterly, pp. 37-42.[2] Saleem, A. I. and Al-Aubidy, K. M. (2008), Mixed Reality Environment for Web-Based Laboratory Interactive Learning, International Journal of Online Engineering, 4(1), pp. 40-45[3] Gomes, L. and Bogosyan, S. (2009). Current Trends in Remote Laboratories, IEEE Transactions on Industrial Electronics, 56(12), pp. 4744-4756.[4] García
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
MD B. Sarder, University of Southern Mississippi
Tagged Divisions
Computing & Information Technology
third tier of the application is available to the students and it increases their interaction withthe instructors (Student Interaction Tier). The MOD has two features. The first feature was basedon a question/answer repository (database) related to material covered in specific lectures. Thisrepository works in conjunction with the recorded lectures to serve as an interactive feedbackmechanism to ensure proper viewing as well as improve understanding of the lecture material.The second feature was to extract specific events from each recorded lecture. These eventscorrespond to interactions between students and instructor in a live lecture setting. The benefitsof extracting these interactions will reflect on current and future students
Conference Session
New Trends in Computing and Information Technology Education
Collection
2014 ASEE Annual Conference & Exposition
Authors
Rob Elliott, Purdue University School of Engineering and Technology, Indiana University Purdue University at Indianapolis
Tagged Divisions
Computing & Information Technology
language and models. This type of learning can easily bedone independently through the use of learning activities. Another consideration is that thecourse focuses on iterative and incremental improvement in the proposed software models.Review, revision, and improvement are key components of any modeling process and aredifficult to accomplish within the confines of a single weekly deliverable. Finally, the mostinvigorating element of this flipped course is the abundance of class time it provided forcollaborative activities and peer learning, which is reflective of how the systems analysis anddesign process is conducted in a real world environment. The development of a rich classroomenvironment was a fundamental goal of the author’s flipped
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University (ENG); Charles Richard Cole, Southern Polytechnic State University; Christopher Welty, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
provide a central location for game assets. Also, the web presence helped to maintaina constant visual “brand” as the collaborative passed from one semester to the next with new de-signers entering the collaborative as others graduated.This ongoing collaboration is intended to examine the design and production process of each dis-cipline, observe and reflect on the efficacy of that process and seek that interstitial area betweenthe two disciplines - the "overlap" - and make meaningful reform to the next collaboration. Aftertwo semesters, from fall 2012 to spring 2013, the faculty and student collaborators found sub-stance in the overlap, frustrations in the process and sufficient value in the effort and product tojustify continuing the