Education” funded by the United States Department of Education Innovation andModernization Program funded by the Perkins V statute, Congress. The project started inNovember 2019 and this paper presents its initial quarter. This project is a continuation ofcollaboration that was established between Old Dominion University and Granby High School thatwas funded by the Office of Naval Research and that was focused on mechatronics pathways forCareer and Technical Education. The impact of the project will be accessed with in depth datacollection and analysis after the first set of modules and activities is completed in June 2020 andwill be then presented and published in various outlets. This paper presents the first sets ofactivities hoping that this
Paper ID #22172The Research Experience for Undergraduates (REU) Principal Investigators(PI) Guide: Development of a Best Practices WebsiteMs. Mariangely Iglesias Pena, Iowa State University Mariangely Iglesias Pena is an MS student in Human Computer Interaction at Iowa State University’s Virtual Reality Applications Center. Her background is in industrial design, which drives her interest in interactive and web design.Prof. Stephen B. Gilbert, Iowa State University Stephen B. Gilbert received a BSE from Princeton in 1992 and PhD from MIT in 1997. He has worked in commercial software development and run his own company. He
Paper ID #24858Survey and Analysis of Digital Thermoelectric-Generator-based Power Sys-temDr. Mohammad Rafiq Muqri, DeVry University, Pomona Dr. Mohammad R. Muqri is a Professor in College of Engineering and Information Sciences at DeVry University. He received his M.S.E.E. degree from University of Tennessee, Knoxville. His research interests include modeling and simulations, algorithmic computing, analog and digital signal processing.Mr. Eliezer Ochoa Jr.Mr. Joshua David De Piano I graduated Devry with an Electronics Engineering degree in 2016. I have been in the semiconductor industry for a out 10 years. I have 2 kids
and Tagg’s learning paradigmarticle provides us with a valuable insight about the kind of change that is urgently needed inUniversity Higher Education (Barr & Tagg 1995). The author has previously utilized these ideasin several of his ASEE publications and presentations (Narayanan, 2007 & 2009).Assessment Scholars agree that Assessment is a process in which rich, usable, credible feedback froman act of teaching or curriculum comes to be reflected upon by an academic community, andthen is acted on by that community, a department or college, within its commitment to getsmarter and better at what it does (Marchese, 1997, page 93). The National Research Councilsays that High-quality Mathematics Assessment must focus on the
programson this cluster of inexpensive hardware is representative of clusters found in professionalapplications, and no statistical tests were performedAlgorithms A very common, easily implementable way to parallelize the FFT is to distribute allsamples of the input evenly across all processes. [3] describes this pattern of communication andpresents results for its performance compared with some alternative methods. In early first stageof the FFT, the processes can perform butterfly operations on the samples assigned to them. Forthe next stage, half of the processes will have samples that need to be involved with butterflyoperations with samples in the memory of process from the other half of the processes. So, afterthe initial stage is
computers that host the webservers as well as machines that provide network security functions like an Intrusion DetectionSystem (IDS), honeypots to draw unwanted attention away from the internal network, and alsoproxy servers which act as a gateway between the trusted zone and untrusted zone.HardwareThe initial portion of the project is based off a tower consisting of four Raspberry Pi 3B SBCs,see Figure 1. Each Pi has a 32 GB microSD card for both OS and storage of logfiles and othernecessary configuration files, see Figure 2. There were many factors that influenced our decision.First factor was its cost. A single Raspberry Pi at the time of the build was $35 US dollars sobuilding a cluster would be relatively inexpensive as compared to an
Paper ID #24910ITIL Its Effectiveness: Decision Makers’ PerspectivesDr. Gholam Ali Shaykhian, Florida Institute of Technology Gholam Shaykhian has received a Master of Science (M.S.) degree in Computer Systems from University of Central Florida and a second M.S. degree in Operations Research from the same university and has earned a Ph.D. in Operations Research from Florida Institute of Technology. His research interests include knowledge management, data mining, object-oriented methodologies, design patterns, software safety, genetic and optimization algorithms and data mining. Dr. Shaykhian is a professional member of
environments. Reasons such as this have created a shortage of qualified workforce to conduct the much-needed research and development in these areas. This paper describes our experience with mentoring a cohort of ten high achieving undergraduate students in Summer 2019 to conduct engineering HPC research for ten weeks in Clarkson University. Our mentoring activity was informed and motivated by an initial informal study with the goal to learn the roles and status of HPC in engineering research and what can be improved to make more effective use of it. Through a combination of email surveys, in-person interviews, and an analysis of faculty research profiles in Clarkson University, we learn several characteristics of their research
consulting services [1]. These strategies help with problems of findingenough classrooms and teachers to accommodate students but undercut many of the research-based methods proven to help retain more diverse students and women, like providing rolemodels with Peer-Led Team Learning [3], increasing confidence and self-esteem with activelearning [4], and building community and sense of belonging with collaborative learning groupsand diverse instructors [5]–[8]. While both academic and non-academic factors affectpersistence in all majors, non-academic factors have a stronger influence for non-majoritystudents in engineering [9], [5].At Michigan State University, the Department of Computer Science and Engineering (CSE)initially responded to enrollment
role, advises computer science and engineering departments on diversifying their undergraduate student population. She remains an active researcher, including studying academic policies, gender and ethnicity issues, transfers, and matriculation models with MIDFIELD as well as student veterans in engi- neering. Her evaluation work includes evaluating teamwork models, broadening participation initiatives, and S-STEM and LSAMP programs. American c Society for Engineering Education, 2021 Positive Impact of a S-STEM Scholarship Program on Computer Science Students’ Academic Performance and Retention RateAbstract:In this paper, we present a progress
, andthus, weakly integrated with little discussion about the details of the required data. Therefore, weconclude that most academic computing programs do not have a comprehensive CI plan andpropose additional research to further explore areas of integration among CI components.1. IntroductionOrganizations strive to establish and sustain Continuous Improvement (CI) initiatives. Theconcepts of Continuous Improvement and Total Quality Management came to prominence uponthe publishing of W. Edward Deming’s book: “Out of the Crisis” [1], in which the authordetailed his 14 points for management. One of the points is Continuous Improvement (CI)defined as, “constantly and forever improving the system of production and service” [1]. In thisdefinition, CI
achieved by performing text mining of course descriptions. Anotherinteresting avenue for research is surveying current cybersecurity-related cluster activities in topuniversities. Typically, such clusters promote interdisciplinary work through direct collaborationof university-wide faculty.The data from the survey in Table 1 shows an interesting relationship between theinterdisciplinary programs offered and the programs hosting departments. Almost all theinterdisciplinary programs have both the ENG and the CS departments as the two majorsoffering the program jointly. However for all other programs that do not support aninterdisciplinary initiative, departments such as Informatics or Computing and Information arethe departments offering the program
and discrimination that affect the various participantsof the organization as well as a set of methodological proposals to overcome them, it has not provedsufficient to change the reality of practices in teaching and research institutionsSince gender inequality is a transversal problem and holds implications for the University as awhole, and individually for the people that compose it, this study documents the initial measuresimplemented at Engineering School, as part of Project EQUAL_IST- Gender Equality Plan forInformation Sciences and Technology Research Institutions, which is being carried out by teamsin several European countries, and aims, mainly, to study and intervene in the advancement ofgender equality in the area of Technology and
Paper ID #31526The CAHSI INCLUDES Alliance: Realizing Collective ImpactDr. Elsa Q. Villa, University of Texas at El Paso Elsa Q. Villa, Ph.D., is a research assistant professor at The University of Texas at El Paso (UTEP) in the College of Education, and is Director of the Center for Education Research and Policy Studies (CERPS). Dr. Villa received her doctoral degree in curriculum and instruction from New Mexico State University; she received a Master of Science degree in Computer Science and a Master of Arts in Education from UTEP. She has led and co-led numerous grants from corporate foundations and state and
complications create barriers that preventsmaller universities and colleges from adequately providing their students the opportunity tolearn the process of nanomanufacturing, let alone become the masters the industry needs. Due tothese two issues: price and risk, it became necessary to look for an alternative means of teachingstudents plasma etching.Knowing the problems connected to learning nanomanufacturing researchers at UVU begandiving into the potentials of virtual reality technology. The first hurdle to overcome was cost:high-end VR equipment comes at a cost of $400-$800 (see Fig 2) but this is not the only price toconsider.Fig 2: HTC Vive bundle. Priced at $599 when researchers began initial workIn order to be effective VR equipment must be
Paper ID #23065Modernizing Capstone Project: External and Internal ApproachesProf. Karen H. Jin, University of New Hampshire Karen H. Jin has been an Assistant Professor of Computer Science in Computing Technology program at UNH Manchester since Spring 2016. She previously taught as a lecturer for over ten years in University of Windsor and Dalhousie University. Her interest in computer science education research focuses on devel- oping new empirically supported theories and practices in teaching programming, software engineering and project-based learning with industrial relevance. She received her Ph.D. and M.Sc. in
Paper ID #27073Design of a Bluetooth-Enabled Wireless Pulse OximeterDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor and Chair of Engineering Department at Utah Valley University. She re- ceived her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems De- sign, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at
techniques on the target system. 5. All bots are attacking a single target. 6. If the adversary uses amplification techniques during an attack, all the bots achieve the same amount of amplified attack capability.4.2 Hypothesis ReviewAs stated, we initially began this research with two hypotheses: 1) CPU and RAM will have aneffect on maximum bandwidth generated, and 2) network capability will not be the limitingresource for an individual IoT device’s ability to generate bandwidth. After reviewing the datacollected from our IoT emulation, we determined that our first hypothesis was incorrect whileour second hypothesis remained true. TABLE III CPU TESTING AVERAGES Fig. 4 Observed
; algorithm design and solution implementation. Digital Leadership: To initiate and guide computation-related innovation. In other words, those essential soft skills or ways of thinking for a digital age, including system thinking, interdisciplinary or integration skills, innovation and entrepreneurship, multi-cultural teamwork and collaboration skills. Figure 1. The Framework of CT-ENGIII. Case Study: The Robotics Class of Zhejiang University1. Research Design(1) Research MethodThis research adopts the single case study method. Case study research design is anin-depth practical investigation of a current event in the actual context (Yin, 2009).According to (Siggelkow,2007; Gaya H.J& Smith E.E.,2016), a
Paper ID #34137Web-based Cryptomining DetectionDr. Vijay Anand, University of Missouri, St. LouisMr. Dmytro Kudriashov, EPAM Systems Dmytro Kudriashov is a Software Engineer at EPAM Systems in Seattle, WA. He received his BS (2004) ans MS (2006) in Banking and Financial Support Services from the Kyiv National Economics University, and his MS (2019) in Applied Computer Science from the Southeast Missouri State University. Since 2018 his research efforts have focused on the interconnection areas of cybersecurity and digital financial instruments. American c
-organizes university-wide innovative cyber security research, development and training initiatives. He is also an Associate Professor at the department of Information Systems and Cyber Security specializing in operational cyber security and data science as applicable to national security challenges. Previously, he was a senior research scientist at Carnegie Mellon University (CMU) where he contributed to federally-funded projects related to critical infrastructure security and worked closely with the Software Engineering Institute (SEI). He is also a permanent research scientist at the National Cyber Forensic and Training Alliance (NCFTA) of Canada; an international organization which focuses on the investigation of
ToolAbstractA cyberlearning tool was developed to facilitate teaching and learning of software engineeringcourses. The tool, SEP-CyLE (Software Engineering and Programming CyberlearningEnvironment), was developed by a publicly funded research university and is currently beingused by at least seven other universities across the United States of America. The NationalScience Foundation (NSF) provided funding for the development and implementation of the tool.Since its initial development the scope of the tool has been expanded for use in other universitylevel computer science courses.The three learning engagement strategies (LESs) that are an integral part of the tool are (i)collaboration, (ii) gamification, and (iii) social interaction. This paper
to other senior design and project-basedcourses throughout Georgia Tech and potentially supporting other universities’ adoption of low-code platforms for similar use cases. With core IDCD and EM functionality complete, thedevelopment team will continue to support and enhance those applications for the benefit of end-users. This support will facilitate capstone faculty in their initiative to streamline and standardizestudent collaboration efforts in project-based courses across campus. The first release ofintegrated IDCD and EM applications was just released March 2021, and the development teamis optimistic about its reception. Additional research is currently underway to more formallycollect student and faculty feedback to further
research universities have decided to address this growing demand-vs-supply of talentgap in data-intensive fields, especially at the entry-/junior-level data analytics related positions,by initiating data science undergraduate programs. A prominent example of a leading universitycreating and successfully scaling (so far) such an undergraduate program is the Ohio StateUniversity [5]. Subsequently, a number of academic institutions have attempted creating andgrowing their own data science and/or analytics undergraduate degree programs, often based onthe experiences and curricula at Ohio State.According to www.bachelorsportal.com, there are currently 95 data science / data analyticsundergraduate programs offered by the US colleges and universities
expressed in thispaper are those of the authors and do not necessarily reflect the views of the National ScienceFoundation.References 1. UVU Fact Book 2017, Office of Institutional Research. Online at https://www.uvu.edu/iri/documents/additional_resources/factbook17.pdf 2. NSF Scholarships in Science, Technology, Engineering, and Mathematics (S-STEM), Program Solicitation NSF 17-527. Online at https://www.nsf.gov/funding/pgm_summ.jsp?pims_id=5257&org=NSF . 3. Warnock, John (2019), Utah’s Engineering Initiative has boosted state’s high-tech boom, Salt Lake Tribune, January 21, 2019. Retrieved from https://www.sltrib.com/opinion/commentary/ 2019/01/31/john-warnock-utahs/ . 4. Utah System of Higher
Institute in Berkeley, CA, and the Technical University in Munich, where he obtained his M.S. and Ph.D. in Computer Science. His main areas of research are Artificial Intelligence and Human-Computer Interaction, with particular interest in the intersection of the two fields.Prof. Maria Pantoja, CalPoly San Luis Obispo Maria Pantoja Computer Engineering Computer Science & Software Engineering Office: 14-211 Phone Number: 805-756-1330 Email: mpanto01@calpoly.edu Homepage: https://cpe.calpoly.edu/faculty/mpanto01/ Biography B.S., Universidad Politecnica de Valencia, Spain Ph.D., Santa Clara University Research Interests High Performance Computing Neural-Electronics Parallel ComputingDr. Irene Humer, California
Paper ID #34603A Journey from End Systems to Backbone Routers: A Virtual LabEnvironment for Online Computer Networking CoursesDr. Zhaohong Wang, California State University, Chico Dr. Zhaohong Wang received his Ph.D. in Electrical Engineering from University of Kentucky in 2016. Prior to joining the faculty of EECE at CSU, Chico, he had worked as an embedded system engineer and software engineer throughout his graduate study. His teaching interests include embedded systems, computer networks, and digital signal processing. His current research is about algorithm design for digital signal processing in the encrypted domain
Paper ID #29618Final Report on LEAP at UVU: An NSF S-STEM ProjectDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor of Electrical and Computer Engineering and Chair of Engineering De- partment at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, Nanotech- nology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a
Paper ID #34429UML-based Design of Vendor and Employee Management SystemMr. Michael Porter, Alabama A&M University Michael Porter is a junior currently attending Alabama A&M University in Huntsville, Alabama, where he is working towards his undergraduate degree in Computer Science with a concentration on cybersecurity. He has experience in many programming languages, including Python, Java, and JavaScript. Michael has performed research into the application of UML and object-oriented programming principles.Dr. Ralph (Phil) Bording, Alabama A&M University Dr. Bording is a Research Professor at Alabama A&M
Paper ID #22855Leveraging the power of Matlab, SPSS, EXCEL, and Minitab for StatisticalAnalysis and InferenceDr. Mohammad Rafiq Muqri, DeVry University, Pomona Dr. Mohammad R. Muqri is a Professor in College of Engineering and Information Sciences at DeVry University. He received his M.S.E.E. degree from University of Tennessee, Knoxville. His research interests include modeling and simulations, algorithmic computing, analog & digital signal processing, and statistical analysis and inference.Nikole HarperHasan MuqriMr. Brian Keith Wesr Sr. c American Society for Engineering Education