Paper ID #19945The Firelighters: Understanding the Demand for Instructional ComputerScience FacultyJoshua B. Gross, Blackburn College Joshua B. Gross is a professor of computer science at Blackburn College in Carlinville, Illinois. His research focuses on pedagogical problems in computing, as well as employment issues in the IT industry. c American Society for Engineering Education, 2017The Firelighters: Understanding the Demand for Instructional Computer Science FacultyAbstractInstructional faculty (those whose primary responsibility is teaching undergraduates) incomputing are not well-studied, and the
of Mechanical Engineering and Mechanical Engineering Technology at Eastern Washington University. He teaches courses in the areas of Robotics, Mechanics, Thermodynam- ics, Fluids, CAD, and Capstone Design.Dr. Donald C. Richter, Eastern Washington University DONALD C. RICHTER obtained his B. Sc. in Aeronautical and Astronautical Engineering from The Ohio State University, M.S. and Ph.D. in Engineering from the University of Arkansas. He holds a Professional Engineer certification and worked as an Engineer and Engineering Manger in industry for 20 years before teaching. His interests include project management, robotics /automation, Student Learning and Air Pollution Dispersion Modeling
traditional REU model (A) andthe VisREU Site model (B) for student research teams. This arrangement fostered collaborationamong team members, an appreciation of the visualization process and an understanding of therole visualization plays in discovery and analysis for both the undergraduate researcher and forthe research team.Figure 1. Traditional REU student research team model (A) versus VisREU student researchteam model (B). Dashed lines in (B) indicate the REU mentoring and collaboration structurewithin the VisREU Site. Complementary outcomes of the VisREU Site are to (1) explore visualization as aconduit for collaboration, and (2) educate faculty researchers regarding the benefits ofintegrating data visualization into the systematic
Stolk, and L. Vanasupa. Collaborative Design of Project-Based Learning Courses:How to Implement a Mode of Learning That Effectively Builds Skills for the Global Engineer. in Proceedings of theAmerican Society for Engineering Education Annual Conference. 2007. Honolulu, HI.8. Sheppard, S.D. and R. Jenison. Thoughts on freshman engineering design experiences. in Frontiers in EducationConference, 1996. FIE '96. 26th Annual Conference., Proceedings of. 1996.9. Brown, B. and B. Brown. Problem-based education (PROBE): learning for a lifetime of change. in Proceedingsof the 1997 ASEE Annual Conference and Exposition. 1997. Milwaukee, WI.10. Rubino, F.J. Project based freshman introduction to engineering technology courses. in Proceedings of the
watching the video.) (a) Describe two recent “amazing” applications of Deep Learning presented by Jeremy Howard. (b) Describe the key differences between Machine Learning and Deep Learning. (c) According to Jeremy Howard, what impact will Deep Learning have on society in the future. • JupyterHub: A free package that makes it possible for students to seamlessly run Jupyter notebooks on a centralized server from within their browser. (The author was not able to get this package properly installed in time for the course.)References [1] Kangbeom Cheon, Jaehoon Kim, Moussa Hamadache, and Dongik Lee. On replacing pid controller with deep learning controller for dc motor system. Journal of Automation and Control
the performance to be better than if Turtlebot was relying solely on the map. Thereare 3 main problems that were observed when driving Turtlebot on this robot-made map. Themaps shown in Figures 1.4a,b were previously edited in Gimp as explained earlier. Any missinggaps were filled in and small sections of the map were stitched together to create a master robot-made map. Figures 1.4 a,b Highlighting problems encountered in the robot-made mapping method The first problem encountered in this map was the stitching process. Figure 1.4a shows 2of the problems highlighted in the yellow and red boxes. The yellow box shows that the hallwayhas almost doubled in width, which occurred when Turtlebot shifted its map’s coordinate systemduring
the vice president of Purdue Billiards Club since 2015.Mr. Zhuofan LiMr. Yudi WuDr. Carla B. Zoltowski, Purdue University Carla B. Zoltowski is an assistant professor of engineering practice in the Schools of Electrical and Com- puter Engineering and (by courtesy) Engineering Education at Purdue University. She holds a B.S.E.E., M.S.E.E., and Ph.D. in Engineering Education, all from Purdue. Prior to this she was Co-Director of the EPICS Program at Purdue where she was responsible for developing curriculum and assessment tools and overseeing the research efforts within EPICS. Her academic and research interests include the profes- sional formation of engineers, diversity and inclusion in engineering, human-centered
monitors using the discussion threads. Students are instructedto first search the discussion board when they experience a problem with the lab because the sameproblem and its solution may already be posted.Discussion board thread samples:This section shows some samples of the discussion board threads that students’ use to discussany issues or seek support from the instructors or their class mates. Lab Access Discussion Forum: Ethernet Cable Unplugged in VM. Lab A Discussion Forum: Lab 2.1 Step 3 - Problems Downloading eicar.com File. Lab B Discussion Forum: Lab 6.3 - Can't generate certs. Lab C Discussion Forum: Lab 7.2 - WinRM Prevents Web Server IIS. Lab D Discussion Forum
laboratoryforteachingcomputernetworks.PaperpresentedattheOptimizationofElectrical andElectronicEquipment(OPTIM),201213thInternationalConferenceon.Fanelli,R.L.,&O’connor,T.J.(2010).Experienceswithpractice-focusedundergraduatesecurity education.PaperpresentedattheProc.ofthe3rdWorkshoponCyberSecurityExperimentation andTest,Washington,DC.Ferguson,B.,Tall,A.,&Olsen,D.(2014).NationalCyberRangeOverview.Paperpresentedatthe MilitaryCommunicationsConference(MILCOM),2014IEEE.Gavas,E.,Memon,N.,&Britton,D.(2012).WinningCybersecurityOneChallengeataTime.Security& Privacy,IEEE,10(4),75-79.Hoffman,L.,Burley,D.,&Toregas,C.(2012).HolisticallyBuildingtheCybersecurityWorkforce.Security &Privacy,IEEE,10(2),33-39.Justice,C.(2015,November3-5,2015
These 2 equations are put in standard form: 9V1 – 4V2 = -280 V1 – 2 V2 = 35 With solutions obtained as V1 = -50 V , V2 = -42.5 V .At this time it is pointed out that the system of equations above can be put in matrix formAX = B and solved, for example, using Matlab:>> % Nodal Analysis, Spring 2017>> A=[9 -4;1 -2];>> B=[-280;35];>> inv(A)*Bans = -50.0000 -42.5000>>Once node voltages are computed, students can check the balance of power:Absorbed powers:P5Ω = 11.25 W (this is the 5Ω between nodes 1 and 2)P’5Ω = 361.25 W (the 5Ω resistor between node 2 and the ground)P4Ω = 625 WΣ Pabs. = 997.5 WP14A = (-14
Paper ID #19699A Real-World Example for Student Learning: BTSU Cafeteria SimulationDr. Hassan Rajaei, Bowling Green State University Hassan Rajaei is a professor of computer science at Bowling Green State University, Ohio. His research interests include cloud computing, High Performance Computing (HPC), distributed simulation, parallel and distributed processing, communication networks, wireless communications, and virtual training envi- ronments. Rajaei received his Ph.D. from Royal Institute of Technology, KTH, Stockholm, Sweden, and he holds a M.S.E.E. from the University of Utah, and a BS from University of Tehran.Mr
! A matter of Identity?”, In proceedings of 1st International Conference on Learning and Teaching in Computing and Engineering, pp. 114-121, Los Alamitos, USA, 2013.2. Verginis, I., Gogoulou, A., Gouli, E., Boubouka, M. and Grigoriadou, M., “Enhancing Learning in Introductory Computer Science Courses Through SCALE: An Empirical Study”, IEEE Transactions on Education, VOL. 54(1), February 2011.3. Isong, B. “A Methodology for Teaching Computer Programming: first year students’ perspective”, International Journal of Modern Education and Computer Science, Vol. 9, pp. 15-21, 2014.4. Kanellopoulos, D., Sakkopoulos, E., Lytras, M. and Tsakalidis, A. “Using Web-Based Teaching Interventions in Computer Science Courses”, IEEE
0.03022093 scholarship 0.030290559 graduate 0.028531669 leadership 0.028049867 innovation 0.028128905 learning 0.02741647 global 0.027577932 interdisciplinary 0.027188976 leadership 0.027501058 quality 0.027041394 service 0.027494654 address 0.026898937 education 0.026526552Figure 1 shows a bar diagram plotting the tf-idf scores of the top 5 tokens of Private (Fig. 1-a)and Public (Fig. 1-b) schools. To facilitate comparison, the corresponding tf-idf score
,instructions, and alternatives are provided in Appendix B. As mentioned earlier the first part ofthis activity was inspired by “The Orange Game” from CS Unplugged 2 and uses it as a warm upexercise. This is a great outreach activity to have students participate in after they have beensitting working on individual tasks and can be easily tailored to various time lengths.Linked List with Yarn and Paper BagsLearning Objectives: • Define, in their own words, a data structure • Define, in their own words, a linked list • Explain the steps to add a node to a linked list (front or back) • Explain the steps to delete a node from a linked list (front or back)In this activity, students learn about the basic data structure linked list. Many students
Instrumentation SetupThe Bioinformatics offers a representation of medical data (e.g., nucleotide and amino acid sequences—DNA) in a quantitative and precise (almost exactly) using discrete representation. In this lab, we willexplore the sequence of the typical chain nucleic acid molecules containing adenine, guanine, cytosine,and thymine/uracil specific to DNA, RNA, and proteinThe BioMedical instrumentation setup depicted above is used in conjunction with The Silver(Ag)-Silver Chloride (AgCl) electrodes, a high-performance bio-potential amplifier with built-inhardware filter from iWorx, IV, National Instrument Elvis II+, and Laptop/PC runningBiomedical Workbench, LabVIEW, and MATLAB.The only new addition is Raspberry PI 3 Model B Python Module: it uses
studies are potentially limited because they primarily engage self-selectingstudents in extra-curricular study groups, and thus may include be selecting motivated studentswho rather than simply effects of PLTL. One of the additional hopes of this paper is to inspireempirical research, perhaps even retrospective views of courses such as this study, to further theunderstanding of peer learning in the classroom.References[1] L. Vygotsky, Thought and language. Cambridge, MA: MIT Press, 1962.[2] N. Salleh, E. Mendes, and J. Grundy, “Empirical Studies of Pair Programming for CS/SE Teaching in Higher Education: A Systematic Literature Review,” IEEE Trans. Softw. Eng., vol. 37, no. 4, pp. 509–525, 2011.[3] L. Porter, C. Bailey-Lee, and B
/ITU- T/recommendations/rec.aspx?rec=y.2060 , accessed on Feb. 2017. 6. Stapko, T.J., “Practical Embedded Security: Building Secure Resource-Constrained Systems”. Amsterdam: Newnes, 2008. 7. Pfleeger, Charles, et. al., Security in Computing”, 5th Edition, Prentice Hall, 2015. 8. Mu, D., Ma, B., Mao, B., & Hu, W., A bottom-up approach to verifiable embedded system information flow security. IET Information Security, 8(1), 12–17. doi:10.1049/iet-ifs.2012.0342, 2014. 9. Xiang, W., Zexi, Z., Ying, L., & Yi, Z. (2013). A design of security module to protect program execution in embedded system. 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and
. The critical role of retrieval practice in long-term retention. Trends in Cognitive Sciences, 15:20–27, 2011.[5] D. Rohrer, K. Taylor, and B. Sholar. Tests enhance the transfer of learning. Journal of Experimental Psychology Learning Memory and Cognition, 36:233–239, 2010.[6] K. E. Train. Discrete Choice Methods with Simulation. Cambridge University Press, second edition, 2009.[7] M. West and C. Zilles. Modeling student scheduling preferences in a computer-based testing facility. In Proceedings of the Third (2016) ACM Conference on Learning @ Scale, pages 309–312, 2016. doi: 10.1145/2876034.2893441.[8] C. Zilles, R. T. Deloatch, J. Bailey, B. B. Khattar, W. Fagen, C. Heeren, D. Mussulman, and M. West. Computerized testing: A
testsby allowing each user performs the tasks on only two platforms. Platform order will be assignedto users randomly. By reducing the platforms to two, the time per user will be greatly reduced,the learning effect will only be from one platform to a second platform, rather than across fourplatforms. By randomizing the platform selections, we will have as many subjects learning fromplatform A to B as we do from B to A. Statistically the learning effect will be removed. Thisapproach requires significantly more test subjects but will require a much shorter test time foreach.3.2 Metrics of PerformanceQuantifiable metrics permit quantitative analysis, as has been discussed. The metrics selected forthe tasks as discussed above are time, errors and
. Leung, YP. Lee, HY. Chan, and MH. Tang, "Fetal biometry by an inexperienced operator using two- and three-dimensional ultrasound," Ultrasound in Obstetrics and Gynecology, vol. 35, no. 5, pp. 566--571, 2010.7. Ioannis Pratikakis, Christian Barillot, Pierre Hellier, and Etienne Memin, "Robust Multiscale Deformable Registration of 3D Ultrasound Images.," International Journal of Image and Graphics, vol. 3, no. 4, p. 547, 2003.8. Aaron. Fenster, B. Downey Dónal, and Neale Cardinal H., "Three-dimensional ultrasound imaging," Physics in Medicine and Biology, vol. 46, no. 5, p. R67, 2001.9. Charles E. Kahn Jr, John A. Carrino, Michael J. Flynn, Donald J. Peck, and Steven C. Horii, "DICOM and Radiology: Past, Present, and Future
design project through ROS mayassist us in conducting a rudimentary evaluation of the TCK integrated multi-lab method. Thequestionnaire covers the seven questions below. The outcomes specified in the parentheses are inaccordance with the ABET standards. Figure 2 Generated ROS navigation environment • Question 1 - “I can apply formal engineering design methodology to carry out the design, experiments and construction of labs and project based on ROS data and interpretation.” (Outcome b: An ability to design and conduct experiments, as well as to analyze and interpret data relating to electrical systems.) • Question 2 - “I understand the fundamental algorithms on ROS and software/hardware co
Paper ID #18897Rethinking ABET Accreditation of Computer Science Degree ProgramsProf. Gene Lee Fisher Ph.D., California Polytechnic State University, San Luis Obispo Gene Fisher received a BS in Computer Science and a BA in Mathematics from the University of Califor- nia Irvine in 1973. After several years in industry he returned to Irvine for his PhD, which he completed in 1985. Currently Dr. Fisher is an emeritus professor in the Department of Computer Science at the California Polytechnic State University San Luis Obispo. He joined the Cal Poly faculty in 1990. Prior to this, he was an Assistant Professor at the
- in-schools/report/19. Seehorn, D., Carey, S., Fuschetto, B., Lee, I., Moix, D., O'Grady-Cunniff, D., . . . Verno, A. (2011). CSTA K-12 Computer Science Standards. New York: Association for Computing Machinery. Retrieved March 31, 2016, from http://csta.acm.org/Curriculum/sub/CurrFiles/CSTA_K-12_CSS.pdf20. Seiter, L., & Foreman, B. (2013). Modeling the Learning Progressions of Computational. Proceedings of the ninth annual international ACM conference on International computing education research - ICER '13, (pp. 59-66).21. Snow, E., Haertel, G., Fulkerson, D., Feng, M., & Nichols, P. (2010). Leveraging Evidence-Centered Assessment Design in Large-Scale and Formative Assessment
firsttest/exam. Results are provided in Table 4. As you can see from the results, the percentage ofstudents whose grade stayed the same or improved was fairly consistent for assignment 1 and 2,increased a bit on the combined assignments, and was significantly higher for the first test/exam. A B C DFigure 1. Correlation of student's final grade with Assignment 1 (A), Assignment 2 (B), combined assignments (C) and first test/exam grades (D). Table 4. Results of Chi-square Goodness of Fit Test Comparing Proportion of Final Grade Equal to or Higher than Variable Grade Against Chance
different representations can easily translate between them, and can assess theusefulness of a particular representation in different situations. Similarly, Spiro (1992) found thatwhen learners develop multiple representations they are better able to transfer knowledge to newdomains with increased cognitive flexibility (Spiro, 1992). Representational fluency in theSTEM fields can include: a) visualizing and conceptualizing transformation processes abstractly;b) understanding systems that do not exhibit any physical manifestations of their functions; c)transforming physical sensory data to symbolic representations and vice versa; d) quantifyingqualitative data, e) qualifying quantitative data; f) working with patterns; g) working withcontinuously
, the connectivity is limited by many environmental factors such as distance,noise, objectives, etc. In order to extend the connectivity in wireless network, the relay node iscommonly used in many wireless applications such as cellular network, wireless ad hoc network,wireless sensor network, etc. For example, when two wireless nodes are out of communicationrange each other, relay node can be located between them to connect each other as shown inFigure 1(a). Another common application is Wi-Fi extender, which can extend the coverage areaby relaying the traffic between wireless access point and clients (i.e., PCs, mobile devices, etc.)as in Figure 1(b). (a) Relay node in mobile ad hoc network (b) Wi-Fi extender
11Formal Education and Computing Professionals’ Needs and do it. And if you go to industry, they find very hard. . . but that’s what they are looking for.Degree of Coverage in the Curriculum and Their Individual Courses When we asked about the degree of emphasis of the skills described above in the CScurriculum, all participants explained that these skills are not stated explicitly in the curriculumbecause of a number of reasons: (a) faculty are not trained this way, (b) faculty do notsufficiently value them, and finally, (c) faculty have a heavy curriculum load and not enoughtime to address or even incorporate these skills. As one participant explained, This is part of team leadership, program management. It is hard to
-ftcs-consumer-complaint-categories-again-2014[5] Beckers, J. J. & Schmidt, H. G. (2001). The structure of computer anxiety: A six-factor model. Computers in Human Behavior, 17(1), 35-49.[6] John Winterdyk. & Nikki Thompson. (2008). Student and Non-Student Perceptions and Awareness of Identity Theft. Canadian Journal of Criminology and Criminal Justice 50(2), 153-186. Project MUSE. Web. 5 Apr. 2013. http://muse.jhu.edu[7] Nachmias, D. & Nachmias, C. (1987). Research methods in the Social Sciences. New York: St. Martins Press.[8] Costello, A. B., & Osborne, J. W. (2005). Exploratory Factor Analysis: Four recommendations for getting the most from your analysis. Practical Assessment, Research, and Evaluation, 10(7
Paper ID #20263Mobile Payments and End Users’ Sensitivity to Information DisclosureMr. Abdulwaheed Johnson, Pace University Abdulwaheed Johnson is a cybersecurity enthusiast who is currently in the second year of his Masters’ Degree program in Telecommunication Systems and Networks at Pace University, New York. His first degree was in Electrical Engineering, and is looking to specialize in cloud security after the completion of his Masters Degree program.Dr. Anthony Joseph, Pace University Dr. Anthony Joseph has a Ph.D. in electrical engineering with specialization in digital signal processing. He conducts research in
Paper ID #18191The Application of PID Control in Student ProjectsDr. Alireza Kavianpour, DeVry University, Pomona Dr. Alireza Kavianpour received his PH.D. Degree from University of Southern California (USC). He is currently Senior Professor at DeVry University, Pomona, CA. Dr. Kavianpour is the author and co-author of over forty technical papers all published in IEEE Journals or referred conferences. Before joining DeVry University he was a researcher at the University of California, Irvine and consultant at Qualcom Inc. His main interests are in the areas of embedded systems and computer architecture.Miss Sogand Kavianpour