Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 8 results
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Justin L. Hess, Purdue University, West Lafayette; Lorraine G. Kisselburgh, Purdue University; Carla B. Zoltowski, Purdue University, West Lafayette; Andrew O. Brightman, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
mental processing coupled with dialogicinteraction with other learners, where the learner reflects on novel insights and perspectives. Wehave integrated these considerations into our course design. In the next section, we describe thepurpose of this investigation, followed by the course structure.Research PurposeThis paper presents findings from a comparative analysis of the learning outcomes ofengineering students who participated either completely online mode or in a hybrid-mode, whichincluded both online and in-class components. For both learning groups, we utilized the samepedagogy designed to enhance ethical reasoning (the SIRA framework).20 We implemented thispedagogical framework at the graduate-level and assessed student learning and
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Peter J. Clarke, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
student learning outcomes using WReSTT-CyLE and gamification.Access to resources (funding and otherwise) is often cited as the primary barrier totechnology adoption and the integration of software testing and programming skills. Therole of negative disposition towards educational technology and digital games, has notbeen fully considered as a contributing factor in the relatively slow pace of technologyadoption in higher education. The example of such slow adoption of technology inhigher education can be exhibited in many programming courses. Moreover, thesenegative dispositions towards technology may hold also reflect more than several decadesof dominant values informed by the naturalist and romantic beliefs about programming,student learning
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Masoud Naghedolfeizi, Fort Valley State College; Sanjeev Arora, Fort Valley State University; Nabil A. Yousif, Fort Valley State University; Xiangyan Zeng, Fort Valley State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Georgia, is presently undergoing a major revision to reflect the most current trends inthe job market and the ABET computer science curriculum requirements. Additionally, thecurriculum redesign is needed to increase the program's appeal to students and employers. Theunderlying principle for this redesign is to provide more flexibility for students to take major andfree elective courses and lessen the emphasis on traditional mathematics requirements (such asCalculus II).Currently, the major area in curriculum of computer science at FVSU includes 60 credit hours ofwhich 9 hours are major electives and 6 hours free electives. The revised program will include33 credit hours in core curriculum of computer science, 12 credit hours in major electives
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
who have decided topursue a computer science and engineering education.Retention of computer science and engineering students is a major problem at many institutionsof higher education. Retention issues have a big impact on the colleges and universities in avariety of areas such as academic affairs, student services, and even recruitment of newengineering students. Nowadays, graduation rates are published and lower rates reflect poorlyon an institution of higher education. Because of these reasons and more, colleges anduniversities have turned their attentions to finding new ways to retain the students that do enrollin their computer science and engineering programs.In order to increase the retention rate of our Computer Science, Computer
Conference Session
Computing & Information Technology Division Technical Session
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mayari I. Serrano, Purdue University, West Lafayette; Alejandra J. Magana, Purdue University, West Lafayette; Baijian Yang, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
engage students inlearning and allow translation from conceptual knowledge to practice. We propose to use Model-Eliciting Activities (MEAs) to develop students’ representational fluency in the cybersecuritydomain. MEAs are activities that intent to simulate real-word client-driven scenarios. And thesuccess of these MEA activities rely on teamwork and the students’ abilities to apply concepts.Properly constructed and implemented MEAs can increase the use of: (1) student reflection toolsin assessments, and (2) learning technologies. MEAs require students to iteratively build, test andrefine their knowledge by encouraging students to build different forms of representations andconnect and translate among them [3]. These activities focus on
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Alka R Harriger, Purdue University, West Lafayette; Mayari I. Serrano, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
construct elements of a program, and a built-insimulator.4 The simulator allows the user to observe and test the behavior of the programthroughout execution by watching memory elements change in response to the environmentand/or user input/actions. Once the program has been thoroughly tested with the simulator, theIDE is used to download the program to the actual controller.Figure 2 shows the eight key symbols that may be used in a flowchart. As with traditionalflowcharts, the shape of a particular block denotes its function. For example, the two diamond-shaped symbols, compare and decision, reflect branch points in the program logic from whichthere are two exits
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Md Hossain Shuvo, Alabama A&M University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, demonstrate thecapability of mobile platform specially the Android platform which bear the testimony thatmobile platform can be made efficient in controlling robot.Preliminariesi. UMLUnified Modeling Language28 widely known as UML is a software engineering tool used formodeling software systems. Fundamentally it is used as a tool for analyzing, designing andimplementing software intensive systems. UML provides a visual representation of the systemwhich reflects the standard and interactive organization or system’s elements. From thebeginning till now, there are several versions of UML have been evolved and UML 2.0 is usedfor the modeling of our system. UML offers two types of system modeling, one is structural orstatic modeling which require the
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Mahmoud K. Quweider, University of Texas - Rio Grande Valley; Fitratullah Khan, University of Texas - Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
results do not prove the superiority ofthe CBI compared to other traditional methodologies, the CBI approach did offer our students theframework and skills to bridge the gap between traditionally disparate sciences. The courseevaluations filled by students, and the reflective summary by the involved faculty, show manypositive improvements in attitude, independence, attendance, learning engagements, immersion,and mood. We also measured significant improvements in programming and problem solving,especially as it related to mathematics and physics, as well as in decision making.Some of the skills that CBI targeted were interpersonal skills, oral and verbal communications,and presentations.Acknowledgment:Part of this work was conducted while