exposing students to Python. Through theexisting researcher-practitioner partnerships (RPPs), we have been providing CT professionaldevelopment for the teachers based on block programming. Furthermore, we developed andpresented the new materials in two online PDs as a short and a more detailed one in Spring andSummer of 2020 to help the teachers with planning for the 20-21 school year. Moreover, westudied how such PD would impact the teachers.Our prior study of the middle school ecosystem revealed that teachers’ needs should always bethe focal point of PDs, as there are many unmet needs for CS/CT in K-12. Our first challenge wasto provide a holistic view of programming in Python while reassuring the teachers that they areable to learn the language
interests are in Data Science, Network Science, Network Measurements and Distributed Systems, with a recent focus on Online Social Networks, Policies and Regulations Measurements, IoT Networks, and smart-sourced sensing.Mr. KeeJoh OHearonMr. Michael McKee, Indiana University KokomoDr. Md Nour Hossain American c Society for Engineering Education, 2021 IoT Privacy and Security in TeachingInstitutions: Inside The Classroom and Beyond KeeJoh O’Hearon *†, Michael McKee *†, Md Nour Hossain, M. Abdullah Canbaz [ kohearon, mckeeml, mhossai, mcanbaz ] @ iu.edu Indiana University
teaching CSECcurriculum, is balancing the need for learners to have not only the knowledge, but also the skillsand abilities [13]. To address this problem, we can turn to competency-based education (CBE)[8], [13]. CBE is not a new pedagogical concept. It has a relatively long history in K-12education and higher education [14], [15]. According to Geravis, 2016, CBE can trace its originsin US education back to the Morill Land-Acts of 1862 and the notion of applied education.CBE focuses on having students demonstrate the mastery and application of knowledge andskills beyond the confines of the classroom (i.e., in the real world). CBE is also known asoutcomes or problem-based learning [16]. The goal of CBE is to better balance the expectationsand
Paper ID #29586Use of Internet of Things for Remote Laboratory SettingsProf. Abul K. M. Azad, Northern Illinois University Abul K. M. Azad is a Professor and Associate Dean with the College of Engineering and Engineering at Northern Illinois University, US. He has been in academics 30+ years, and his research interests include remote laboratories, mechatronic systems, mobile robotics, and educational research. In these areas, Dr. Azad has over 130 refereed journal and conference papers as well as 5 edited books. So far, he has attracted around $2.6M of research and development grants from various national and international
of online modules infuture semesters. Students’ self-selected project topics indicate that in future semesters the topicsexplored in lecture should be expanded beyond cybersecurity issues to include social mediatopics, particularly cyberbullying body image issues.IntroductionCybersecurity is a growing concern for both the private sector and governments. It has enormousimplications for government security, economic prosperity and public safety. The number of databreaches in the education sector doubled during 2017, with only the financial and healthcaresectors having more breaches [3]. The cost of a data breach in U.S. education is higher than thecost in other sectors and countries [18]. Domains with “.edu” addresses are a high risk for
used in the course are discussed. Finally, plans forfuture offerings of this course are reviewed.1. IntroductionThis paper presents the efforts undertaken to develop and the implementation of a flexiblelearning defensive security course. The course covers the CompTIA Security+ requirements andis based on the HyFlex delivery model which was originally developed at San Francisco StateUniversity.This paper discusses how a limited-flexibility model was transformed due to the COVID-19pandemic into a highly flexible delivery model. Specifically, the course went beyond simplyhaving lecture and laboratory components to offering a HyFlex Options Menu where studentsselect between several options for each area of the class. Students were offered the
exercises in the local community. However, due to theCOVID-19 pandemic, the course transitioned to an online model mid-way through. Because ofthis, the paper includes a discussion of the differences between the planned implementation andthe actual implementation. The challenges of the transition and rapidly converting to onlinedelivery are discussed. Further, the paper discusses how a software entrepreneurship couldoperate under either the online or in-person model, based on this experience.The outcomes of the course are discussed. Possible future enhancements are considered.2. BackgroundBechard and Gregoire [1] trace entrepreneurship education back to at least 1984, thoughelements of entrepreneurship undoubtedly were taught prior to this. In fact
intervention will improve students’ problem-solving skills, give them anopportunity to acquire contemporary technical skills early in their education, and prepare them toapply these skills in future courses and beyond the classroom.To help us determine students’ perceptions of the course, their learning of technical andproblem-solving skills, and their comfort in applying these skills outside of their coursework, weadminister pre and post surveys with multiple choice, likert scale, and open-ended questions. Inour open-ended student responses, many students mention a positive impact on their CSexperience including acquisition of new problem-solving and technical skills. Overall, studentsfind the course useful and interesting and report becoming more
are needed for a good session, they just need to know if the service is ready to provide agood session.5. Data CollectionThe solution must take into consideration the typical management constraints of SaaS based services. Itcould not assume management access will be available to the actual WebEx board or the WebEx servicecontroller beyond being able to pull publicly available statistics. For this reason, the solution is an overlaywith monitoring endpoints mirroring the WebEx boards, connected to the same access networks.The relevant monitoring data can be collected in two distinct ways, each with its benefits and challengesas summarized in Table 3.Table 3. Data Collection Methods Data Collection Description Pros
, Deborah Follman, P.K. Imbrie, Judith Zawojewski, Brenda Capobianco, Margret Hjalmarson. (2004). "Model Eliciting Activities: An In-class Approach to Improving Interest and Persistence of Women in Engineering," Proceedings of the 2004 American Society for Engineering Education Annual Conference and Exposition, 2004.[11] A. Collins, D. Joseph, and K., “Design Research: Theoretical and Methodological Issues, The Journal of the Learning Science,”13(1), 15-42, 2004.[12] Lesh, R., & Doerr, H. M. (2003). Foundations of a models and modeling perspective on mathematics teaching, learning, and problem solving. In R. Lesh & H. M. Doerr (Eds.), Beyond constructivism: Models and modeling perspectives on mathematics problem
, Communities of practice: Learning, meaning, and identity. Cambridge university press, 1998.[6] K. Ward, "Research with undergraduates: a survey of best practices," Journal of Computing Sciences in Colleges, vol. 21, no. 1, pp. 169-176, 2005.[7] P. Stephenson, L. Miguel, J. Peckham, J.-Y. Herv, #233, and R. Hutt, "Using undergraduate interdisciplinary research to promote computer science," J. Comput. Sci. Coll., vol. 22, no. 3, pp. 98-104, 2007.[8] B. K. Dean and O. A. Rawashdeh, "An Interdisciplinary Undergraduate Research Experience Program in Electrical and Computer Engineering-Lessons Learned through 6 Years of Program Operations," in 2017 ASEE Annual Conference & Exposition, 2017.[9] S. Krug
RatesAs before, we assume that the basic reproduction number, R0(t)R0(t), follows a process with areversion to a value R¯0(t)R¯0(t) which could conceivably be influenced by policy. The intuitionis that even if the targeted R¯0(t)R¯0(t) was changed through social distancing/etc., lags inbehavior and implementation would smooth out the transition, where ηη governs the speed ofR0(t)R0(t) moves towards R¯0(t)R¯0(t).Beyond changes in policy, randomness in R0(t)R0(t) may come from shocks to theβ(t)β(t) process. For example, • Misinformation on Facebook spreading non-uniformly. • Large political rallies, elections, or protests. • Deviations in the implementation and timing of lockdown policy between demographics, locations, or
audience [9].Between 1842 and 1843, Lovelace translated the Menabrea publication, adding an elaborateset of footnotes, called Notes [8]. These notes contain what many consider to be the firstcomputer program—that is, an algorithm designed to be carried out by a machine. These notesare of historical value because of Lovelace’s insight into the capabilities of the engine anddecision-making steps in the algorithm. She presented a vision of the capability of computersto go beyond calculating or number-crunching, while Babbage and others focused only on thosecapabilities [11].Lovelace died of uterine cancer in 1852, at only 36 years of age before her contributions to the“poetical science” that would become computer science were recognized [9]. See
all users in many countries) or localize(creating different websites for the same company in different countries and cultures—goingbeyond simple translation). A knowledge of cross-culture communication and related designstrategies is important for those seeking to create successful and culturally sensitive userinterfaces (UIs) for users in different cultures.This paper focuses on a course module and a written report in which students evaluate twolocalized websites produced by one company for their effectiveness in meeting needs of users intwo differing cultures. Students’ evaluations are based on cross-cultural dimensions that aremeasurable and are documented in the literature, e.g., [1] - [8].The module is introduced through lectures and
Council for 2018.Dr. Naupaka B. Zimmerman, University of San FranciscoMr. Jonah M. Duckles, Software Carpentry Jonah Duckles works to accelerate data-driven inquiry by catalyzing digital skills and building organiza- tional capacity. As a part of the leadership team, he helped to grow Software and Data Carpentry into a financially sustainable non-profit with a robust organization membership in 10 countries. In his career he has helped to address challenging research problems in long-term technology strategy, GIS & remote sensing data analysis, modeling global agricultural production systems and global digital research skills development.Tracy K. Teal, The Carpentries c American Society for
attendance at the university upon graduation. With 95% of campersindicating that the camp met or exceeded expectations, this is best summed up in the words ofthe camper who commented “I really didn’t have a favorite part, I really just enjoyed all of it!”References[1] J. Faber, L. Grzech, M. Mahmoud, & K. Becker, (2020, June), “The Effect of Summer Engineering Camps on Students’ Interest in STEM” in 2020 ASEE Virtual Annual Conference, Virtual On line . 10.18260/1-2--35309[2] L. Scinski, “Beyond the Classroom: The Impact of Informal STEM Experiences on Student Attitudes and Interest,” University of California, San Diego, United States -- California, 2014.[3] M. Mahmoud, K. Becker, M. Longhurst, R. Dupont, N. Mesner, J
half). Fig. 2 shows the consequences of friction along a wide area network(WAN) path, from [2]. Namely, this plot shows TCP throughput for a device receiving data overa 10 Gbps path (packet loss rate of 1/22,000, or 0.0046%). The purple curve shows the throughputin a loss-free environment and the green curve shows the theoretical maximum. Beyond LANtransfers, these results show very rapid throughput collapse to under 1 Gbps.A Science DMZ example is shown in Fig. 3(a). Its essential elements are data transfer nodes(DTNs), perfSONAR nodes, offline security monitoring, and a friction-free high-speed path to the wide area network (WAN). Note the absence
model.Decision makers expect concurrent executions of business and integration of new ITtechnologies help to alleviate the business requirements and meet their business goals andobjectives. Introduction: Project management is critical to IT development and helps to keep ITprojects on track through each cycle. A Wall Street Journal report stated recent researchrevealed managing IT projects well could significantly improve a firm’s profits and improve ITinvestments [3]. IT project management is often a process used to keep the project withintechnical limitations, within the allowed budget, and within a deterministic schedule [38].The Standish Group’s “CHAOS Summary 2009” showed the project success rate had decreased,with the data revealing a
, San Jose State University Since her 2002 appointment as Don Beall Dean of SJSU’s Charles W. Davidson College of Engineering, Belle Wei has led a college dedicated to educating engineers who can take on today’s problems and produce tomorrow’s solutions. Under Wei’s leadership, the college has launched programs to enhance students’ global awareness and enrich their professional networks. A signature program is the College’s Global Technology Initiative (GTI), a two-week study-tour to Asia. Since its inception, GTI has sent student-teams to China, Taiwan, or India each year to meet global collaborators, competitors, and leaders through an intensely immersive learning experience that goes beyond classroom studies
from FIU.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women (specifically Black and His- panic women) in computer-related engineering fields.Prof. Zahra Hazari, Florida International University Zahra Hazari is an Associate Professor
program is to exposestudents to cybersecurity concepts especially Cybersecurity fundamentals, cryptography, ethical hackingand computer forensic. Our cybersecurity experience will help us in designing hands-on activitiessuitable for K-17, especially 6-12 grade classrooms.These activities engage students in solving a given problem or implementing a certain task, therebyenhancing their imagination ability and creativity. In our K-17 outreach programs, our objective will beto enable students in bringing their ideas into life. Educating teachers is a vital component in thisoutreach program. This is because it is the K-17 teachers who can provide students an everydayexperience of computing/cybersecurity concepts through afterschool programs or by
dissemination. As a result, the updated IT skill standards will be posted online forcomment as soon as each cluster BILT has completed its work. Further, the ITSS project willpilot a program to develop a process – based on an online crowd-sourcing approach – to keep thestandards current far beyond their online posting date through the feedback and input of industryexperts. Further dissemination will be provided through educator conference presentations ande-mail blasts.Ken Cook at Business Journals recently noticed with approval that many states have increasedsupport for programs “more focused in their curriculum, aligning the education with theeconomic need” [13]. Close collaboration between the industry board room and the collegeclassroom remains an
interesting methods toengage students in programming and further their creative thinking and problem solving skills.The success of robotics in stimulating problem solving and critical thinking in both K-12 andcollege students has been numerously reported and documented [2-4]. The use of robotics inintroductory college programming courses could also be fruitful since it provides a practicalplatform in which programming concepts could be implemented and examined in a more hands-on approach. Since developing a computer program to instruct a robot provides an immediatefeedback on whether the program has accomplished its task, it engages students in both learningand reflection processes. In fact, research has indicated that learning through application
," 25-26 September 1995. [Online]. Available: https://www.cs.cmu.edu/~tjochem/nhaa/navlab5_details.html.[8] K. I. S. S. Martin Buehler, The 2005 DARPA Grand Challenge, New York, NY, USA: Springer, 2007.[9] K. I. S. S. Martin Buehler, The DARPA Urban Challenge, New York, NY, USA: Springer, 2009.[10] C. W. Z. Z. N. Z. J. Xin, "China future challenge: Beyond the intelligent vehicle," IEEE Intell. Transp. Syst. Soc. Newslett., pp. 8-10, 2014.[11] G. S. P. Z. J. C. J. L. D. K. K. Y. a. A. B. P. Cerri, "Computer vision at the Hyundai autonomous challenge," in International Conference on Intelligent Transportation Systems, 2011.[12] P. C. M. F. Alberto Broggi, "The VisLab Intercontinental Autonomous Challenge:," Int. J. Vehicle
collaborative and cooperative learning have been widely tested in various classroomexperiments and show evidence of effectiveness (Coccoli, Stanganelli, & Maresca, 2011;Freeman et al., 2014; Sein-Echaluce, Fidalgo-Blanco, & García-Peñalvo, 2016; K. A. Smith,Douglas, & Cox, 2009; Stump, Hilpert, Husman, Chung, & Kim, 2011). A collection of reviewarticles on collaborative learning collectively looked at over 200 studies (Johnson & Johnson,1989; Johnson et al., 1998; Springer, Stanne, & Donovan, 1999). They found that collaborativelearning (compared to individual learning) improved academic achievement, quality ofinterpersonal interactions, self-esteem, perceptions of social support, student attitudes, likingamong students, and
. Students reported increased organizational skills,persistence, and maturity. Many students drew increased confidence from the intensity of their internshipexperience: they had persevered through challenges and had been successful. This served as inspirationand motivation for increased success in future classes and beyond. For example: Since I was able to overcome a lot of difficult problems in device software while learning more about the concepts my project needed, I will be trying to take courses that do intimidate me, because I want to challenge myself more. If something seems hard, I have a lot more motivation to just do my best to overcome them instead of trying to back off. Students also reported learning about their own
, Purdue University Dr. Umit Karabiyik is an Assistant Professor in the Department of Computer and Information Technology at Purdue University. Prior to his appointment at Purdue, Dr. Karabiyik was an Assistant Professor in the Department of Computer Science at Sam Houston State University from 2015 to 2018. Dr. K received his M.S. and Ph.D. degrees from Florida State University in 2010 and 2015 respectively. His research interests broadly lie in Digital and Cyber Forensics, User and Data Privacy, Artificial Intelligence, Computer and Network Security. He is a recipient of federal grants from National Institute of Justice. He is an Associate Editor-in-Chief for Journal of Digital Forensics, Security and Law, and
coordinator or the dean. For these reasons, theparticipation of part-time faculty members in the accreditation process at our university hasbeen limited.There are additional issues beyond the participation by part-time instructors involved here.Sometimes the data collected by the program could not be readily traced or connected toStudent Outcomes (SOs). It is always a struggle to maintain consistency of data whenmultiple sections are offered and taught by different instructors. The time consuming datacollection, analysis, and reporting occasionally evolve into an accreditation game instead ofbeing a process focused on continuous improvement.With enrollment hovering over 40,000, California State University Fullerton (situated inOrange County, an urban
in hand. The presentation includesinformation about free and open-source software that allows annotations of electronicdocuments.KeywordsCritical reading, Annotation, Network diagrams, Icons, Symbols, Encode, Decode information,Visual thinkingIntroductionReading of any sort in general, and technical reading, in particular, naturally raises questionsabout the topics. It invites engagement and application of theory to practice. When students feelintrinsically compelled to add their notes next to examples or procedures in the text, they aregoing beyond merely reading it. Self-Determination Theory (SDT) [1] provides a framework forunderstanding how to promote motivation. By supporting the three basic psychological needs ofcompetence, autonomy
, Robotics and Automation. She went through engineer- ing pathways herself, completing master electrician degree when completing Technical School in Uzice, Serbia, focusing on pre-engineering program on high power voltage systems and maintenance of electro- mechanical systems. Her research is focuses on engineering pathways, career and technical education, digital thread, cyber physical systems, mechatronics, digital manufacturing, broadening participation, and engineering education. She is a Director of Mechatronics and Digital Manufacturing Lab at ODU and a lead of Area of Specialization Mechatronics Systems Design. She worked as a Visiting Researcher at Commonwealth Center for Advanced Manufacturing in Disputanta, VA