also serves in the program committees of many international conferences. Dr. Cai received his Ph.D. in Computer Science from University of Colorado at Colorado Springs in 2005. He is a member of IEEE and ACM. c American Society for Engineering Education, 2018 Teaching Directory Services: Topics, Challenges, and ExperiencesABSTRACTDirectory service is used to organize and access information in an electronic directory. It becomes one of the essential network services intoday’s enterprise environment. However, there are not enough discussions on teaching directory services among computing community. Thispaper presents a course on directory
addition to making numerous other conference presentations. Straub’s research spans the gauntlet between technology, commercialization and technology policy. In particular, his research has recently focused on cybersecurity topics including intrusion detection and forensics, robotic command and control, aerospace command and 3D printing quality assurance. Straub is a member of Sigma Xi, the AAAS, the AIAA and several other technical societies, he has also served as a track or session chair for numerous conferences. American c Society for Engineering Education, 2021 Pandemic Response: Hybrid-Flexible Course Delivery for General Education Computer
chance” at education. UVU has a high number of non-traditional students (age 25 or older – 34%), students with spouses (45%) and/or children underage 12 (20%) [1]. It also has the largest percentage of low-income (48%) and first-generation(38%) students of any of the universities in the state. These factors affect the overall graduationrate, which is low at 33% (nationally standardized IPEDS rate for completions within 150% oftime; UVU IR 2019) [1]. UVU’s students live at home or in off-campus housing, which makes itvery difficult to organize activities for student programs. Many students do not have time tospend much time outside of class on campus, leading some to feel little connection with otherstudents.New Engineering ProgramsTo meet one of
Paper ID #26285Pedagogical Assessment of Secure Coding in Student ProgramsDr. Saeed Al-Haj, Ohio Northern University Dr. Saeed Al-Haj, PhD., is an Assistant Professor of Computer Science at Ohio Northern University, Ada, Ohio. He completed his Ph.D. in Computing and Informatics from the University of North Car- olina Charlotte. His expertise and general interests include: Computer and Network Security; Security Analytics; Firewalls and Access Control Configuration Analytics; Computer Science Education and Cy- bersecurity Education. His teaching experiences include teaching Computer Science courses and labs, utilizing
current research is focused towards Rapid Application Development.Arjun Shakdher, Purdue University Arjun Shakdher is currently a graduate student in the department of Computer and Information Tech- nology at Purdue University. He has been working as a Graduate Research Assistant since 2017 on an NSF-funded program called TECHFIT, focused on Computational Thinking. His interest lies in Software Development, Cloud Engineering, Machine Learning, Network/Cyber Security, Analytics, Data Science and IT Project Management. He has previously worked as a Software Development Engineer at Ericsson and is an incoming Cloud Engineer at Amazon (2019). c American Society for Engineering Education, 2019
, electric circuits, signals and systems, engineering economics, electromagnetics, and integrating the entrepreneurial mindset with an engineering mindset in core engineering courses. He received the Professor Henry Horldt Outstanding Teaching Award in 2015.Dr. J. Blake Hylton, Ohio Northern University Dr. Hylton is an Assistant Professor of Mechanical Engineering and Coordinator of the First-Year Engi- neering experience for the T.J. Smull College of Engineering at Ohio Northern University. He previously completed his graduate studies in Mechanical Engineering at Purdue University, where he conducted re- search in both the School of Mechanical Engineering and the School of Engineering Education. Prior to Purdue, he
Paper ID #24858Survey and Analysis of Digital Thermoelectric-Generator-based Power Sys-temDr. Mohammad Rafiq Muqri, DeVry University, Pomona Dr. Mohammad R. Muqri is a Professor in College of Engineering and Information Sciences at DeVry University. He received his M.S.E.E. degree from University of Tennessee, Knoxville. His research interests include modeling and simulations, algorithmic computing, analog and digital signal processing.Mr. Eliezer Ochoa Jr.Mr. Joshua David De Piano I graduated Devry with an Electronics Engineering degree in 2016. I have been in the semiconductor industry for a out 10 years. I have 2 kids
Paper ID #23855Short-format Workshops Build Skills and Confidence for Researchers to Workwith DataKari L. Jordan Ph.D., The Carpentries Dr. Kari L. Jordan is the Director of Assessment and Community Equity for The Carpentries, a non-profit that develops and teaches core data science skills for researchers.Marianne Corvellec, Institute for Globally Distributed Open Research and Education (IGDORE) Marianne Corvellec has worked in industry as a data scientist and a software developer since 2013. Since then, she has also been involved with the Carpentries, pursuing interests in community outreach, educa
succeeding in CS career [5], and the further they go, the moreThe gender parity in the field of computer science (CS) is evident insecure they feel. This anomaly only grows by indirectly forcingin education, workforce and research. This study, explores the women in CS to quit CS due to the struggles they encounter. Someintroductory computer science class in an attempt to understand the researchers have found female graduate students in CS to lack self-low retention of women in CS. As means to encourage the retention confidence when compared to men [5]. This stereotype also playsof women in this class in the department of computer science at the a role in pushing women away from CS at young ages [2]. ThisUniversity of Minnesota
Paper ID #22337Cloud Application Monitoring for Efficient Network Management in PublicSchoolsDr. John Pickard, East Carolina University Dr. Pickard is an Assistant Professor at East Carolina University in the College of Engineering and Tech- nology. He teaches undergraduate and graduate Information and Computer Technology (ICT) courses within the Department of Technology Systems. Dr. Pickard plays an active role in building positive and sustainable industry relationship between the college, local businesses, and industry partners. Current industry recognized certifications include; Cisco Certified Network Professional
project that will look good on theirresume, and assist landing a post education job or entering graduate school. For example, oneselected topic was “Forecasting Ford Motor Company (USA) Sales”. This project wasimplemented in R and used historical data, regression models, and a neural network. A secondtopic was an “Analysis and Model of Firearm Policy to domestic violence”. This project wassearching for a longitudinal relationship between changes in firearm policy, and changes indomestic violence rates. The project was implemented in Python. During the semester, studentsmeet at least every two weeks with an adviser, write a proposal, perform algorithm and codereviews, and provided demos of data collection and analysis progress. The class concludes
numerous international workshops on student-centered learning and online learning-related topics during his service. Dr. Lawanto’s research interests include cognition, learning, and instruction, and online learning.Kamyn Peterson-RuckerAlia MelvinMr. Shane E. Guymon c American Society for Engineering Education, 2018 Does Everyone Use Computational Thinking? - A Case Study of Art and Computer Science MajorsAbstract In this digital age, being computer literate and having computer science skills areessential, especially since most real-life solutions are technology-driven. Many K-12 and highereducation institutions, states, and countries incorporate computational thinking (CT
c American Society for Engineering Education, 2018 Paper ID #22994is currently serving as the executive director of MnCyber. He is also the co-founder and executive memberof Minnesota Cyber Career Consortium (MNC3) whose mission is to address Minnesota’s cybersecurityworkforce needs and to help assist Minnesota businesses in handling cyber risks.Dr. Kaleem has established a solid track record in teaching and has received numerous awards includingthe best professor and the best course awards (cybersecurity) from various graduating cohorts. Dr. Kaleemis an advisory board member to various organizations as well as the faculty advisor for the
approaches is presented from the point of view of the student. Theassessment also asked the student to rate the assignment topics, to list how many hours werespent per each lab, and to propose suggestions for improvement.1 IntroductionLaboratory work is essential for students in the Science, Technology, Engineering, andMathematics (STEM) fields, and its importance is well-studied [1, 2]. Laboratory assignmentsoffer students opportunities for practical applications of theory and have the potential to promoteknowledge acquisition via experimentation. Hands-on learning is an important process forstudents, as active learning achieves positive educational results and prepares students forreal-world problems in the STEM fields [3]. Laboratories allow
structure and its forensic analysis in their programs. As part of the industry support,we are consideringAs part of out industry reach out and support activities, we have contact with InduSoft for theireducation support programs. We are giving the free education version of their software that wehave utilized in our design and experiments. We share our finding and experiments with InduSoftengineers for future product development. We will be also reaching out to industry partners forcollaborations and internship opportunities that our students can benefit the most. Table 4: Student Involvement in SCADA Laboratory Name Major Contribution/Length Duty Active/Graduated
hours per semester.1. IntroductionChina’s undergraduate computing education, started in the late 1950s, has gone throughtremendous changes in recent decades, both in numbers and in contents, in response to thechanging needs of the economy, research, and social development. By 1960, about 15universities in China offered computing related programs2 [1]. According to [2], there are 2,603computing related programs with 901,000 students in these programs in 2015, making up forabout 16 percent of the entire engineering student body in China. The graduates coming out ofthe pipelines are playing increasingly more important role in science, engineering, andeconomics of the country in general. The graduates are also becoming very competitive atvarious
base of Chinese Academy of Engineering. I studied information and computing science for my bachelor degree. And I became a PhD Candidate in Educational Economy and Management in Zhejiang University after my graduation. Engineering education, as one of the main research field in ICSTEP, has become my research topic since I have participated in several research projects of engineering education funded by Chinese Academy of Engineering and Ministry of Education.Prof. Wei Zhang, Zhejiang University 2015-Present Professor, Institute of China’s Science,Technology and Education Strategy, Zhejiang Uni- versity Associate director of Research Center on Science and Education Development Strategy, Zhejiang University 2012-2014
, commercialization and technology policy. In particular, his research has recently focused on cybersecurity topics including intrusion detection and forensics, robotic command and control, aerospace command and 3D printing quality assurance. Straub is a member of Sigma Xi, the AAAS, the AIAA and several other technical societies, he has also served as a track or session chair for numerous conferences. c American Society for Engineering Education, 2019 Assessment of the Educational Benefits Produced by Peer Learning Activities in CybersecurityAbstractPeer learning activities may represent a solution to several problems in the cybersecurityeducation field. Peers have the potential
provide a well packaged and documented softwarelibrary. The report contains a general overview of their system and describes any relevant detailsand procedures. All student groups demonstrate the operation of their system to the class in asession that could be made open to other faculty and students.After completing this module, the student will be able to Demonstrate how objectives have been met and what process has been followed in obtaining the results, Compare the achieved results with alternative solutions, and Properly document the project and effectively present it to others.4 Cellular communications standards education: LTE case studyWireless Communication has been taught as part of the Master of Science
will cover over 80% of the overall issues experienced by real IT environments. Thisassessment remains a topic of future research.13While the solution presented in this paper is addressing a very specific use case, the type ofinstrumentation proposed by it becomes very powerful in enabling other capabilities important in ITmanagement such as continuous security assessment, compliance verification and SLA verifications. Theauthors believe that this IoT approach to IT management lends itself to many opportunities for innovation.8. Conclusions and Future WorkDistance Education and Distance Collaboration are essential tools for engaging a wide range of studentsand communities in the education process while delivery rich, expert guided learning
Paper ID #33582Rapid Development of Software Solutions to Enhance Course Infrastructureand the Educational Experience of Student DevelopersMs. Geraghty Anne Ellis, Georgia Institute of Technology Geraghty Anne Ellis graduated from Georgia Institute of Technology with an undergraduate degree in Mechanical Engineering in 2020. She has six years of experience in solutions architecture and rapid application development platforms, with focus on Infinite Blue Platform and Salesforce. Geraghty Anne specializes in designing automation solutions in engineering and educational environments.Mr. Nicholas Mulka, Georgia Institute of
and cybersecurity have gained the attention of various stakeholders, industryrepresentatives, educators, parents and students who are thinking about their future careers.Teaching computer science courses has moved into K-12 education, no longer introduced in thecollege classroom. There are various reasons for this trend. One is that in this way more childrenhave access to the curriculum that integrates computer science principles, not just thoseundergraduate students in specific STEM majors. Other industries need different levels ofcomputer science and cybersecurity education. There are various programs across the nation thatare focusing on introducing these topics as early as elementary school through various outreachprograms or even in the
automotive industries, and robotics communities.Autonomous vehicles are a hot topic in the world today. Almost every major car manufacturerand many new startup companies are racing towards a fully autonomous vehicle. These cars ofthe future will allow us to regain our lost drive time and perform other tasks during our dailycommute to work, running errands around town, and any and every other time we have to hopinto the car to go anywhere at all. Not only will autonomous vehicles give us back part of ourday, they will also provide a much safer driving environment overall.Autonomous vehicles are a well-recognized motivational tool for engineering education. It is anenjoyable topic for many students. They are great motivational tools for teaching
Paper ID #33301Positive Impact of an S-STEM Scholarship Program on Computer ScienceStudents’ Academic Performance and Retention RateDr. Zhijiang Dong, Middle Tennessee State University Dr. Zhijiang Dong is a Professor in the Department of Computer Science at Middle Tennessee State University. His research areas are in the fields of formal methods, system verification and validation, and computer science education. He received his BS in Mathematics from Huazhong University of Science and Technology at China, and his PhD in Computer Science from Florida International University.Dr. Joshua Lee Phillips, Middle Tennessee State
were assigned to students to cover various previous topics in thiscourse, which assist in student learning enhancement of hardware and programming skills inComputer Architecture course. Satisfactory performance was evaluated by various milestonereview sessions, assignments, in-class exercises, exams and other activities. Results of learningoutcomes and assessment indicate that this integrated learning pedagogy is effective and efficientin student learning and improving the quality of computer design and organization.1. IntroductionIn higher education, especially, in engineering education, all the effort of educators is focused oneducating students to be qualified for their future professionals. To achieve these learningoutcomes in engineering
. Wenk B. Lee J.Q Brown, M. Wang. High-area-throughput automated gigapixel imaging of whole prostate tumor resection surfaces using structured illumination microscopy. SPIE Photonics West - BIOS, pages 9313–15, 2015. [7] Computing Research Association. Generation cs: Computer science undergraduate enrollments surge since 2006, 2017. URL https://cra.org/data/Generation-CS/. [8] Miran Lipovaca. Learn You a Haskell for Great Good!: A Beginner’s Guide. URL http://learnyouahaskell.com/. [9] Alex Edgcomb, Frank Vahid, and Roman Lysecky. Students learn more with less text that covers the same core topics. In Proceedings of the 2015 IEEE Frontiers in Education Conference (FIE), FIE ’15, pages 1–5, Washington, DC, USA, 2015. IEEE
founding chair of the Student Division, a Program Chair and a Director for the Educational Research and Methods Division, and the General Chair of the First-Year Division’s First-Year Engineering Experience Conference.Prof. Richard S. Stansbury, Embry-Riddle Aeronautical University Dr. Richard S. Stansbury is an associate professor of computer engineering and computer science at Embry-Riddle Aeronautical University in Daytona Beach, FL. His research interests include unmanned aircraft integration, machine learning, and aviation big data analytics. He is the ERAU lead for the FAA Center of Excellence for Unmanned Aircraft Systems, ASSURE.Dr. Mustafa Ilhan Akbas, Embry-Riddle Aeronautical University M. Ilhan Akbas is an
toinform students and educators on the hiring process and how to prepare for technical interviews.Moreover, this research serves to provide industry with evidence of the problems inherent withthe existing hiring system. Analysis of these results will be used to offer suggestions andguidelines that will enable a hiring process that can still achieve its target of finding qualifiedapplicants, but that does so in a manner more justly to all job seekers.1 IntroductionJobs in computing are expected to experience 11% growth over the next decade, which is agreater rise than the projected averages for other fields [1]. Although these positions may begaining momentum globally, unemployment remains a real concern for new graduates, asindustry adds barriers
- ods. Shanon has taught courses in thermodynamics, numerical methods (graduate), fluid dynamics, gas dynamics (graduate), computational fluid dynamics (undergrad/graduate), fundamentals of engineering, mathematical analysis in MATLAB. Currently, Shanon is enrolled in the Computer Science Education program at Stanford University.Dr. Bryce E. Hughes, Montana State University Bryce E. Hughes is an Assistant Professor in Adult and Higher Education at Montana State University, and holds a Ph.D. in Higher Education and Organizational Change from the University of California, Los Angeles, as well as an M.A. in Student Development Administration from Seattle University and a B.S. in General Engineering from Gonzaga
Valley University, Orem, Utah. He received his M.S. and Ph.D. in Computer Science from the University of Oklahoma, Norman, Oklahoma. His research focuses on diverse areas such as: Database Design, Data Structures, Artificial Intelligence, Robotics, Computer Aided Manufacturing, Data Mining, Data Warehousing, and Machine Learning.Mr. Brandon David Wright, University of Utah Brandon Wright is a graduate student at the University of Utah. He received a B.S. in Computer En- gineering from Utah Valley University. He is currently pursuing an M.S. in Electrical and Computer Engineering at the University of Utah. His research interests include Flexible Electronics and education in the engineering field