Engineering Education, 2017 Dual Credit Programs: K-12 Outreach, Recruiting, or BothAbstractRecruiting consumes considerable resources for any post-secondary institution. Manyinstitutions also have a mission of K-12 engagement. A dual credit program helps an institutionfulfill its K-12 outreach mission and also provide valuable recruiting opportunities. This paperexplores the process of creating and implementing a dual credit program at Purdue PolytechnicAnderson, a regional location Purdue University’s statewide program.Traditional dual credit programs are concurrent enrollment models, whereby high school coursesare taught by high school faculty and for which high school juniors and seniors can also earncollege credit. Other dual credit
level. Richard also works for the Eastman Kodak Company as a Senior Design Engineer. Richard has received two teaching awards while at RIT. He was the recipient of the 1998 Adjunct Excellence in Teaching Award and the recipient of the 2002 Provost’s Excellence in Teaching Award. Richard is a contributing volunteer in both ABET and IEEE. Page 26.929.1 c American Society for Engineering Education, 2015Improving Technical Writing Skills through the Judicious Use of InfographicsMotivationThis paper shares the experiences and outcomes of teaching data visualization techniques withingraduate
limited time period. Considering themixed ability level of students, the allocated time is often not enough for all students tocomplete their tasks satisfactorily and also gain sufficient experience through the process 6,7.Sometimes students want or feel a need to perform additional experiments beyond theirassigned tasks. It is usually difficult to accommodate any extra time due to the lack ofavailable resources to keep the laboratories open. Additionally, laboratory facilities are often Page 22.1002.2inaccessible to the students of other departments within the same institution because of theirgeographical location. Ironically, too much laboratory
sufficient experience through the process.4,5 Sometimesstudents want or feel a need to perform additional experiments beyond their assigned tasks. It isusually difficult to accommodate any extra laboratory time due to the lack of available resourcesto keep the laboratories open. Additionally, laboratory facilities are often inaccessible to thestudents of other departments, even within the same institution, because of their geographicallocation. Ironically, too much laboratory equipment lies idle during most of its usable lifetime.6,7,8Only a remote experimentation facility can provide cost effective and unlimited access toexperiments and maximize the utilization of available resources. Moreover, this will allow inter-laboratory collaboration among
-Zubía, J., Angulo, I., Rodriguez-Gil, L., Orduña, P., Dziabenko, O., and Güenaga, M. (2013). Boole- WebLab-FPGA: Creating an Integrated Digital Electronics Learning Workflow Through a Hybrid Laboratory and an Educational Electronics Design Tool, International Journal of Online Engineering, 9, pp. 19-22. Page 24.563.15[5] Yan, X., Wang, F., Hu, L., Zhao, K., and Xiong, W. (2013). Application-oriented Network Performance Evaluation for the Internet of Things, International Journal of Online Engineering, 9(7), pp. 51-56.[6] Das,B., Chattopadhyay,A., Fatima, S., Mohanty, A. R. (2013). Remote Triggered Virtual
collaboration with the CyberInnovation Center (CIC), a 501c3 not-for-profit corporation. Physics and Cyber Science wereoriginally piloted regionally in 2010 and 2011, respectively, and then, expanded to a largerregion including schools in the states Louisiana, Texas, and Arkansas in 2011 and 2012,respectively.Established through the CIC is the National Integrated Cyber Research Center (NICERC).NICERC’s Cyber Science and Physics courses utilize many technologies and projects to drive tothe fundamental content. Cyber Science, specifically, integrates various disciplines (engineering,computer science, and liberal arts) to convey the ideas of cyber. NICERC’s Physics utilizes amicrocontroller platform to convey physics concepts. With such unique curricula
through the perspectives of variousstakeholders. Starting with local projects, subsequent assignments involve projects based in theglobal context. In this way, students move from community service projects to the exploration ofglobal implications of engineering practice. This process helps them to develop an understandingof global citizenship.The Institutional ContextThe University of British Columbia (UBC) is the leading university of the Province of BritishColumbia, and it has been consistently ranked among the top 5 universities in Canada and top 40universities in the world. This four-year university serves about 60 thousand students in a broadrange of programs, from undergraduate liberal arts and sciences to professional programs,including
. Replacing the previously laborious exercise ofassignment was a primary motivator for this effort. The algorithm utilized Google Apps Script’sability to generate and manipulate data objects while having full access to Google’s variety ofcloud services. Furthermore, to create a robust platform for improved student assignment, newproject and student requirements that could not previously be accommodated were added. For theFall 2014 term, the new automated approach was compared to the old manual sorting method byeach of the four engineering departments. Beyond the obvious benefits, further advantages of theautomated assignment are documented here. This paper describes the automation approach indetail and provides insights for implementing such a
circuits," Electronics, vol. 38, April 19, 1965 1965.12 R. R. Schaller, "Moore's Law: Past, Present and Future," IEEE Spectrum, vol. 34, pp. 52-59, June 1997 1997.13 L. G. Roberts, "Beyond Moore's law: Internet growth trends," Computer, vol. 33, pp. 117-119, 2000.14 D. K. Lidtke, "What's new in curriculum design: working with industry," in 28th Annual Frontiers in Education Conference, 1998, p. F4E.15 R. Lister and I. Box, "A citation analysis of the SIGCSE 2007 proceedings," presented at the Proceedings of the 39th SIGCSE technical symposium on Computer science education, Portland, OR, USA, 2008.16 "Proceedings of the 9th ACM SIGITE conference on Information technology education," Cincinnati
. Moebs’14 focussed on the effect of ‘flow’ on QoEfor learners, in an attempt to address this. Although flow is expected to be highly relevant to theeffect of system performance (QoS) on QoE, the study does not account for the relative effect ofall the factors that are expected to impact on QoE for learning. For the purpose of this paper, it isenough to assume that a QoS threshold exists beyond which technical performance becomes thedominant (negative) factor in the learning experience. This observation is also supported bytechnical studies into Quality of Experience15, 16 that suggest that there is a logarithmicrelationship between technical performance parameters and quality of experience.Network access quality is a necessary but not a
control volume steady?” Thisproblem, which we designated as conceptual-definition (3.a.), was explained in detail in thesolutions manual, breaking it up into analysis and discussion pieces. This information andexplanation in the solutions manual would provide considerable information for an instructor tomake a judgment on a student’s understanding and assign a grade. Analysis: Flow through a control volume is steady when it involves no change with time at any specified position. Description: This applies to any variable we might consider – pressure, velocity, density, temperature, etc.However, problems in the “Design and Essay” designation were not explained in the solutionsmanual beyond stating: “Students’ essays and
traditional method used in the classroom consisted of lectures based on the text book writtenby K. Schwalbe, reading assignments, reports, and exams. The lectures included standardillustration, case studies and short video clips. The video clips were found on YouTube.com bythe students and demonstrated key concepts found in the reading material. Students were thenrequired to work with their real class client to define project scope, create workable timeline, andbudget, and manage team members and work flow, while navigating through the key phase of aproject lifecycle. The students were required to develop a project charter that addressed scope,quality, schedule, cost, configuration, change, communication, human resource, procurement andrisk
; } Figure 9: Filter Function to Illustrate switch StatementConclusions and Future WorkThe iHASOB idea proposes the integration of electronic text, software, and hardware into asingle environment to facilitate different modes of learning that are supported the literature. Inthe prototyped embodiment, a student will read an e-book, run a domain specific software relatedto the e-book, and collect and display data related to the topic being studied. The data collectionis performed through hardware interface to an iPad. The hardware facilitates collecting data fromsensors connected to a microcontroller board. The iHASOB could be used in facilitating thestudy of many subjects in science and engineering and can be expanded far beyond the currently
,” in Beyond Fear, 2006, pp. 14 – 16. Page 23.1057.176. M. E. Whitman and H. J. Mattord, "Introduction to Information Security," in Principles of Information Security, pp 8, 20117. K. Stouffer and K. Scarfone, “Guide to Industrial Control Systems ( ICS ) Security Recommendations of the National Institute of Standards and Technology,” 2011.8. A. C. Alvaro, “Challenges for Securing Cyber Physical Systems.” in Workshop on future directions in cyber-physical systems security, 2009.9. K. K. Venkatasubramanian, "Security in Pervasive Computing,” Ph.D. dissertation, Arizona State University, Arizona
thateducational based games are generally as effective as traditional educational approaches but also Page 24.638.3benefit from increased learner satisfaction with and motivation toward their lessons 27, 28. Thesefindings are particularly relevant in the current study as maintaining the interest of the player iscrucial as increased player engagement and participation is what drives the effectiveness of theintervention.Health gamesHealth games have a long history that dates back at least to the 1980’s 17. However, only untilrecently have gains in technology and manufacturing cost made it practical to consider game-based physical therapy beyond specialized
scaled up and higher resolution imagery is processedthere will likely be many millions of indexed ROIs. Searching through such a large data set willnot be very efficient. To address this issue we have begun investigating clustering techniques,such as k-means clustering [21], [22] and Locality Sensitive Hashing [23] to identify clusters ofneighboring ROIs within the multidimensional feature space and assign representative ROIs foreach cluster. Searching through this much smaller set of representative ROIs will be much moreefficient. These clusters will also form the basis for the image mining and annotation featuresdescribed earlier.7 Future WorkThe results accomplished in this six-month exploratory research have demonstrated the validityof
important time for developing education and career goals. The majority ofstudents majoring in science, technology, engineering, or math made that decision during highschool.17Many high schools contribute to the low numbers and gender imbalance through non-existent CScourses or by mislabeled non-CS offerings, such as keyboarding, with the CS label. High schoolsalso often lack teachers trained in the CS subject area, are unaware of the gender issues incomputing, and engage in minimal efforts to recruit students into CS. Numerous calls forimprovement point to a need for: ● Access to high quality computing experiences, ● Public understanding of what computing really is, ● Course content, ● Teacher training, ● Education policies
Page 22.1347.137. Hmelo-Silver, C. (2004). Problem-based learning: what and how do students learn? Educational Psychology Review, 16(3), 235-266.8. Wing, J. M. (2006). Computational thinking. Communications of the ACM, 49(2), 33-35.9. Denzin, N. K., & Lincoln, Y. S. (2000). The discipline and practice of qualitative research. Handbook of qualitative research, 2, 1-28.10. Patton, M. Q. (2002). Qualitative research & Evaluation Methods. Thousand Oaks, Ca.: Sage Publications.11. Charmaz, K. (2006). Constructing Grounded Theory: A Practical Guide Through Qualitative Analysis: Sage.12. Glaser, B., & Strauss, A. (1967). The discovery of grounded theory: Strategies for qualitative research. Chicago, IL Aldine.13. Dale, N
Design intervention offered more room for students to create and implement theirown ideas in their final project video game.Conclusions and Future WorkIn this paper, we discussed two novel interventions applied during a 5th-9th grade summerSTEM institute. Though both interventions differed in topics (video games vs. Mars rover),they showed similarly strong improvements in student self-efficacy in CT concepts. Thispedagogy shows that it has a positive impact how CT concepts are delivered through CS andcomputer programming at the K-12 level. Likewise, by expanding the survey done by Bell,we were able to gain more insight into specific CT concepts learned by students in a similarenvironment5. Furthermore, we were able to reveal some lasting impacts
sharedexperiences; 2) externalization (E) is converting tacit knowledge into explicit knowledgethrough codification; 3) combination (C) is creating explicit knowledge from other explicitknowledge by sorting, adding, and categorizing from exchanges with others; 4)internalization (I) is the converting of explicit knowledge into tacit knowledge for individuallearning.Knowledge can be viewed as an object in the sense that it can be gathered, stored, andtransferred like an “object” [7]. Knowledge can also be viewed as a process in that it can bedeveloped, shared, and distributed. Through the lens of practice, the understanding ofknowledge extends beyond development or delivery, and can include the consumption andshared participation by employees and groups
an earlier section on threats to validity, another area of future workis in terms of developing engineering education specific datasets which are more relevant tocontexts of engineering, and more relevant to the engineering community of practice.ReferencesBarnett, R. (2003). Beyond All Reason: Living with Ideology in the University: ERIC.Bird, S., Klein, E., & Loper, E. (2009). Natural language processing with Python: analyzing text with the natural language toolkit: " O'Reilly Media, Inc.".Church, K. W., & Mercer, R. L. (1993). Introduction to the special issue on computational linguistics using large corpora. Computational Linguistics, 19(1), 1-24.Creamer, E. G., & Ghoston, M. (2013). Using a mixed methods
theories of ROS and the students may not have hands-on opportunities to learn the ROSadvanced software development [15]. Lab-driven learning has been considered to be the mosteffective pedagogy for teaching and learning in electrical engineering [17]. However, if the labactivities are not authentic, too large to handle, or not well-aligned to what we expect ourstudents to learn about ROS, students will still not be able to master ROS meaningfully. Themeaningful mastery of a technology is beyond learning about the technology’s functionsrepresented in the tool bars or menus, or even beyond doing a few random exercises through trialand error. To make meaningful mastery happen, we call for the adaptation of TPACK, atheoretical framework regarding
enterprise environment. An insider may first createsecret user account and setup a virtual machine (VM) instance, and then copy sensitive data di tothe VM instance to be accessed later. Let P = {p1, p2, …, pK} denote the set of K access paths inthe healthcare enterprise environment, where pi is one specific access path such as USB access,CD access, VM instance access, email access, etc. Let Path({ui}, k) denote the set of accesspaths to data dk by a subset of users, {ui}, in U, then Path({ui}, k) can be defined by a set of 4-tuples (ui, oj, dk, pm,). With the 4-tuples (U, O, D, P) data access path modeling, denoted asUODP, it is possible to identify whether an access activity is an inside activity or not. Anapplication developer ui copy healthcare
line items. The 25 columns were merged intoone single column with 1,265 line items. The 1,265 individual remote laboratorycharacteristics were then sorted alphabetically.Exact duplicates were easily identified within the alphabetized list. Exact duplicates wereremoved. Several passes through the list were made to ensure all duplicates were caught.A more challenging task was to identify fungible concepts and reduce the related fungibles toa single line item. Again in several passes were made through the list so that all thefungibles were caught and condensed.The initial merged list of 1,265 terms was first reduced by duplicate elimination and thenreduced again by converting multiple homologous entities to a single line item. In the endthe 25
://www.park.edu/cetl/quicktips/writinglearningobj.html 14. Radwan Ali and Elke Leeds, (2009), “The Impact of Face-to-Face Orientation on Online Retention: A Pilot Study”, Online Journal of Distance Learning Administration, Volume XII, Number IV, Winter 15. Huett, J. K., Kalinowski, K. E., Moller, L. & Huett, K. C. (2008). Improving the motivation and retention of online students through the use of ARCS-Based E-Mails. The American Journal of Distance Education, 22 (3), 159 Page 24.760.16
challenging opinions with peers1, 2. Through collaborativelearning, students may learn far beyond the limit of what they can reach from their independentindividual learning. The driving force behind collaborative learning is the social interactions inlearning, which may provoke both cognitive and meta-cognitive processes in learning3, 4, 5.Therefore, collaborative learning is being acknowledged and utilized by more and moreengineering faculty and students for facilitating learning. Koehn et al. had found thatcivil/construction-engineering students preferred collaborative learning6. A pilot surveyconducted by the authors of this paper also revealed that STEM students at authors’ institutionalso recognized the effectiveness of collaborative learning
Computing, Human-Centered Computing Division at Clemson University. Her research focuses on gaining a better understand of how students learn and apply STEM and computing content in their everyday lives. She is particularly inter- ested in the iterative design, refinement, and sustainability of curriculum and program development to support computing and STEM learning in formal and informal learning environments. She has designed and piloted a mobile application course for undergraduate non-CS majors through her participation last summer in the national pilot of the new AP CS Principles course. She is currently designing mobile application curriculum with MIT AP Inventor for 8th grade mathematics classes and middle
will be immediately applicable and serve students long after they leave theuniversity. Beyond serving the students, we believe that society’s collective security depends onevery user being security-aware and exhibiting thoughtful discipline over their personalinformation and computing resources. It has long been recognized by security experts that theuser is in fact the weakest link in the security chain and that technical measures alone cannot andwill not solve current cyber security threats1. So why not target the weakest link and address itin a formal educational environment? Page 22.1379.2
, computer scientist and learning scientists. His research in engineering education and learning sciences explores how undergraduate engineering students develop skills in design, troubleshooting and analytical reasoning. He is particularly interested in how these skills develop through students’ interaction with technology. c American Society for Engineering Education, 2017 Understandingtheimpactofstrategicteamformationinearly programmingeducationAbstractThis evidence based research looks at the impact of a team-based instruction on learning toprogram in a first year engineering course designed under the Bauhaus studio model. Each teamis formulated with a “more knowledgeable
. Shankar, Florida Atlantic University Ravi Shankar has a PhD in Electrical and Computer Engineering from the University of Wisconsin, Madi- son, WI, and an MBA from Florida Atlantic University, Boca Raton, FL. He is currently a senior professor with the Computer and Electrical Engineering and Computer Science department at Florida Atlantic Uni- versity. His current research interests are on K-12 education, engineering learning theories, and education data mining. He has been well funded by the high tech industry over the years. He has 7 US patents, of which 3 have been commercialized by the university. He has published earlier work on the use of the semantic web for medical applications at another conference. This work