Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying all 7 results
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Hugh Jack P. Eng. P.E., Western Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
● Room (e.g. BL 266A) ● Instructor (e.g. “Jack H”)In the application, these columns are renamed to standard titles and new columns are added. Theprogram has been written in a modular format to allow easy substitution of titles. The outputspreadsheet is shown in Figure 2. In addition to renaming the columns, a few basic calculationshave been made. This includes changing the time from AM/PM to military formats. The timedurations have been calculated. This requires some correction for academic practices such as 50minutes = 1 hour and a 3-hour laboratory might be 2 hours and 45 minutes. It is worth notingthat the durations of ECET 452 and EE 311 are not an even or half and the times for thesecourses will need to be adjusted. The weight reflects
Conference Session
Wireless Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Kyle Joseph Wheelhouse, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
samples of Senior Design Projects which reflect common studentprojects.Wireless Sensor NetworksA wireless sensor network consists of many wireless-capable sensor devices workingcollaboratively to achieve a shared goal [4]. A WSN may have one or multiple base-stationswhich collect data from all sensory devices. These base-stations serve as the interface throughwhich the WSN interacts with the outside world [2]. The basic premise of a WSN is to performnetworked sensing using many relatively rudimentary sensors instead of utilizing the moreconventional approach of developing a few expensive and sophisticated sensing modules [2].The potential advantage of networked sensing over the conventional approach, can besummarized as greater coverage, accuracy
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
John Pickard, East Carolina University; Dale Drummond, East Carolina University; Philip J. Lunsford II, East Carolina University; Ciprian Popoviciu
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
closely reflects the user experience when navigatingto dual-stack sites. Once the measurements are completed, they are sent to a central server forstorage and eventual analysis.The 197 IPv6 reachable domains were polled at 60-minute intervals for a period of 24 hoursfrom four network monitoring agents deployed in Toronto, New York City, and San Francisco.The use of multiple agent location vantage points helps avoid biases associated with anindividual location. The agents at each location were deployed in Virtual Machines (VMs)hosted by Digital Ocean. Each VM ran on CentOS 7.3 with 1 CPU, 512MB of memory, 20GB ofstorage on a Solid-State Drive (SSD), 1TB of transfer data, and was enabled for both IPv4 andIPv6. Digital Ocean was chosen as the
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Reza Sanati-Mehrizy, Utah Valley University; Kailee Parkinson, Utah Valley University; Elham Vaziripour, Utah Valley University; Afsaneh Minaie, Utah Valley University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
University, North Carolina University, Michigan State University, Illinois Institute of Technology, Washington University in St. Louis, University of Illinois Collected Data Points: Prerequisites to the course, main topics covered, subtopics included, referenced materials, programs utilized, assessment standardsSince Data Science courses offered on online platforms reflect the current expectations of theindustry, we’ve included a small sample of Data Science courses offered by Coursera andfast.ai. Our approach for gathering data from these courses was the same as our approachtowards universities to keep our data consistent.The data points mentioned above were then used to create a
Conference Session
Curriculum and Assessment III
Collection
2019 ASEE Annual Conference & Exposition
Authors
Rosa Maria Castro Fernandes Vasconcelos, University of Minho; Victor F. A. Barros, University of Minho; Luis Alfredo Martins Amaral P.E., University of Minho; Emilia Rodrigues Araújo, University of Minho; Isabel Ramos, University of Minho
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
be extended over a longer period, what, on the otherhand, turned out to be beneficial, thus allowing greater internal dissemination of the projectThe working groups allowed to confirm the general unawareness of gender inequality at theuniversity. However, if at the beginning of the discussion, people argued that gender issues at theUniversity were almost irrelevant (since no problems had been reported), in the course of thedebate people started to reflect more about the subject, admitting several situations of inequalitydue to gender.The next challenge consisted in discussing possible solutions for the identified issues, which turnedout to be also very difficult, not only to find solutions but also to recognize good practices in
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Janis P. Raje
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
expressed in thispaper are those of the authors and do not necessarily reflect the views of the National ScienceFoundation.References 1. UVU Fact Book 2017, Office of Institutional Research. Online at https://www.uvu.edu/iri/documents/additional_resources/factbook17.pdf 2. NSF Scholarships in Science, Technology, Engineering, and Mathematics (S-STEM), Program Solicitation NSF 17-527. Online at https://www.nsf.gov/funding/pgm_summ.jsp?pims_id=5257&org=NSF . 3. Warnock, John (2019), Utah’s Engineering Initiative has boosted state’s high-tech boom, Salt Lake Tribune, January 21, 2019. Retrieved from https://www.sltrib.com/opinion/commentary/ 2019/01/31/john-warnock-utahs/ . 4. Utah System of Higher
Conference Session
Computing Research I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mohsen Taheri, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University; Deepa Chari, Florida International University; Zahra Taheri
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Foundation [CollaborativeResearch: Florida IT Pathways to Success (Flit-Path) NSF# 1643965, 1643931, 1643835]. Anyfindings, conclusions, and recommendations expressed in this work do not necessarily reflect theviews of the National Science Foundation.References[1] A. Hogan and B. Roberts, “Occupational employment projections to 2024,” Mon. Labor Rev., 2017.[2] “Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Computer Programmers, on the Internet at https://www.bls.gov/ooh/computer-and- information-technology/computer-programmers.htm (visited January 29, 2019).” .[3] X. Chen, Stem Attrition: College Students & apos Paths into and Out of StemFields. Statistical Analysis Report