not limited to, embedded technology, autonomoustechnology, edge and end-point technologies. Compared to cybersecurity in general, however,cyber engineering still requires further refinement in its curriculum coverage. The currentcurriculum for the cyber engineering program at our university is centered on cyber physicalsystems (CPS) and their security including device-level security, boot security, and attack-resilienthardware/middleware. As an engineering curriculum, cyber engineering also requires a variety ofhands-on laboratory-based learning as well. To better facilitate hands-on learning in a curricularsetting, we have been developing a 1/5th-scale autonomous vehicle as a framework of cyberphysical systems for a set of cyber engineering
usefulness, UI design, technical soundness, and presentation quality including the Q&A session. Notably, the external evaluators were unaware of the feedback exploration approach used. 4. ChatGPT Feedback: For some of the checkpoints, we provided students with the pre-designed prompts. They were encouraged to use these prompts, to seek feedback from ChatGPT on their projects. These prompts were tailored to the specific requirements of each checkpoint, which enabled ChatGPT to offer both comprehensive and detailed feedback.Fig. 1 presents the detailed steps involved in the process of retaining valuable knowledgeobtained from various sources throughout the course duration to build a more specializedgenerative feedback
group with (n = 7) faculty members from around the UnitedStates. We applied social cognitive career theory as we explored: 1) learning experiences thateducators may incorporate into courses; and 2) actions perceived as necessary for institutions toenhance students’ technical interview performance and career attainment. We employed thematicanalysis to assess their responses and suggestions on ways forward. Within courses, three themesemerged, as educators described opportunities for “fostering professional skills” (e.g.,communication and teamwork) and “fostering technical skills” (e.g., use of tools, programmingproblem decomposition, and testing). They also spoke about job preparation, including utilizingrole play in the context of mock
Paper ID #43281The Intersection of Smart Home Technology and the Disabled PopulationJacquelyn Williams Trost, North Carolina Agricultural and Technical State University Jacquelyn Trost is a graduate student at North Carolina A&T University, pursuing a master’s degree in Information Technology. She is a resident of High Point, NC. ©American Society for Engineering Education, 2024 The Intersection of Smart Home Technology and the Disabled Population Jacquelyn Trost North Carolina A&T
educational CRMplatforms include: HubSpot CRM, Microsoft Dynamics 365, Pipedrive CRM, and Zoho CRM.In sum, integrating a CRM capability within the LMS can be a complex technical challenge. Itrequires careful planning and expertise. It is important to carefully consider the functional andtechnical requirements, and potential roadblocks, before embarking on a LMS-CRM project. It isa worthy endeavor with many potential benefits. The LMS-CRM system provides a way to riseabove beliefs, complaints, and speculation. It is a tool for clarity and informed decision making.Using LMS (Learning Management System) and CRM (Customer RelationshipManagement) Generated AnalyticsLearning Management Systems vary widely in their features, functions, and
comparisons included bothfunctionality and the actual python coding similarities and differences.The Raspberry Pi is the heart of both the physical and VM systems. The Raspberry Pi is wellsuited for IoT and uses the Linux-based Operating System and a general purpose Input/Output(GPIO).Virtual (VM) SystemSteps students were required to do to set up the VM System included:1. Install the Hypervisor VMWare2. Install Ubuntu Linux from an Image3. Install the Qemu Emulator4. Run Raspberry Pi Emulation in Qemu, emulate GPIO devices using the Python Library called TKGPIOThe QEMU is a type 2 hypervisor capable of emulating the Raspberry Pi hardware. QEMU canemulate arm, mips, and sparc as well as X86 architectures and is highly customizable.GPIO
implementation project, complete with adetailed UML class diagram, domain model, and corresponding code. Crucial elements such asthe number of classes and types of relationships—be it inheritance, aggregation, or association—can be specified within the prompt, showcasing the versatility of ChatGPT in aiding CS instructors.As an example, consider the following simple prompt:Create a Java project with five classes in a restaurant environment to demonstrate Object OrientedDesign with explicit use of inheritance, aggregation, and dependance. 1) Describe the UML classdiagram. 2) Give the implementation. In response to this prompt, ChatGPT adeptly generates a set of five classes within thecontext of a restaurant, complete with appropriate attributes
have been developed in computing education to measure and assess self-efficacy [9, 10, 11]. Recently, Steinhorst et al. proposed a more generalized instrument for assessingself-efficacy that is paradigms and language agnostic [12]. Multiple studies have investigated therole of self-efficacy in the context of introductory programming courses [13, 14, 15, 16]. Whilethere have been a number of studies, it should be noted that the landscape of CS1 has been evolv-ing with growing enrollments and a wide variety of programming languages used in the courses.Also, more students can now take CS0/1 in high school compared to some time back [17]. Thus,studying the effect of motivational constructs may differ based on students’ past experiences
reported in 2020 [4]. Despite increased tracking and abatementof software vulnerabilities, Gueye and Mell [5] report that the most prevalent software errors havenot changed much since vulnerabilities were first cataloged. Indeed, MITRE [6] lists the top threesoftware vulnerabilities as: 1. Improper Neutralization of Input on Webpage Generation (cross-site scripting) 2. Out-of-bounds write (buffer overflow) 3. Improper input validationThe prevalence of software vulnerabilities can be reduced when developers use principles ofsecure programming. It is vital that future developers are taught principles of cybersecurity andsecure programming, and that students understand the consequences of buffer overflow attacks.Review of Stack Buffer
Sciences, vol. 6, no. 4, pp. 72–87, Oct. 2007, doi: 10.11120/ital.2007.06040072.[14] J. Whalley, A. Settle, and A. Luxton-Reilly, “Novice reflections on debugging,” in SIGCSE 2021 - Proceedings of the 52nd ACM Technical Symposium on Computer Science Education, Mar. 2021, pp. 73–79. doi: 10.1145/3408877.3432374.[15] L. M. Cruz Castro, A. J. Magana, K. A. Douglas, and M. Boutin, “Analyzing Students’ Computational Thinking Practices in a First-Year Engineering Course,” IEEE Access, vol. 9, pp. 33041–33050, 2021, doi: 10.1109/ACCESS.2021.3061277.[16] A. J. Ko and B. A. Myers, “A framework and methodology for studying the causes of software errors in programming systems,” J Vis Lang Comput, vol. 16, no. 1–2, pp. 41
minutes for prompt 1 3. 5 minutes to share with the entire class 4. 5 minutes for prompts 2 and 3 5. 5 minutes to share with the entire classAfter the activity, we went through the slide deck, similar to a lecture session, to tie the activity tothe concept. A practice problem was provided for students to try. This activity was piloted inSpring 2022 and revised in Spring 2023.To test how well students grasped the concept, the author used a quiz, the midterm exam, anoptional retake for the midterm exam (with different questions), and a final exam. The quiz couldbe taken any number of times with questions picked from a question bank and from formulaquestions on the learning management system.Transmission Control Protocol (TCP) sequence numbers
TechnicalSymposium on Computing Science Education, 2016, pp. 498–503.a[60] A. Tafliovich, J. Campbell, and A. Petersen, “A student perspective on prior experience inCS1,” in Proceeding of the 44th ACM Technical Symposium on Computer Science Education,2013, pp. 239–244[61] E. D. Bunderson and M. E. Christensen, “An analysis of retention problems for femalestudents in university computer science programs,” Journal of Research on Computing inEducation, vol. 28, no. 1, pp. 1–18, 1995.[62] C. Mooney, B. A. Becker, L. Salmon, and E. Mangina, “Computer science identity andsense of belonging: a case study in Ireland,” in Proceedings of the 1st International Workshop onGender Equality in Software Engineering, 2018, pp. 1–4. APPENDIX I. QUALITATIVE FINDINGS
(A==1) is a comparison operationchecking whether the value of A is equal to 1. It is generally the equalityoperator (==) that you want to use when comparing values in conditionalstatements.”(c) Teaching the Concept of LOOPsHomework 3:Consider for (; ; ;) statement:(i) Is it a correct statement?(ii)Ask ChatGPT what is the use of for (; ; ;) in C programming.Question to ChatGPT:What is the use of for (; ; ;) in C programming?Answer from ChatGPT (without editing):“In C programming, for (; ; ;) is an infinite loop. It is a shorthand notation for aloop with no initialization, no condition, and no increment or decrementexpressions. In practice, infinite loops are used in situations where continuousexecution is desired until the program is manually
Loyola University Chicago 17 Intro to OO Programming (Java) (online) COMP 170 Spring 2021 Loyola University Chicago 12 Intro to OO Programming (Java) (online) CS 21 Fall 2021 Saint Mary’s College of 21 Programming I California (Python) (in person)* In the Fall 2017 section, students were given an option between a standard project and a student-driven project.**Online here refers to sections where there were synchronous sessions (or classes) held weekly. Both classmeetings and 1-on-1 meetings
multiple assignments that helped the students to conduct hands-on labusing a remote simulation tool (e.g., Tinkercad). The end-of-the-semester positive student reviewssupport the success of the course design.1 IntroductionInternet of things (IoT) is a system that connects people and devices (e.g., sensors, smartphones,wearables) anytime and anywhere. The fast-growing IoT system has influenced and materializedmany industries, such as smart cities, smart grid, smart healthcare, and so on. Kevin Ashton firstcoined the term Internet of Things as “refers to scenarios where network connectivity andcomputing capability extends to objects, sensors and everyday items not normally consideredcomputers, allowing these devices to generate, exchange and
isomorphic PI questions for SOLIDprinciples. Our PI questions are available at the website [27]. The development of PI questionsinvolved multiple steps.Step 1: We identified where students had common misconceptions in the topic.Step 2: We determined the number of questions we wished to include in each class session,based on the typical length of a PI cycle in class [1].Step 3: In accordance with the flipped classroom approach [1] for PI, our third step was to decidewhat material needed to be assigned to students for familiarization prior to class, and whatmaterial would be based on the mini-lectures.Step 4: We collected meaningful distractors for each question, and formulated multiple choicequestions for the letters of sub-topic within the topic of
published papers | Research Project winner! Education: BE in Mechanical Engineering MBA in Information Technology MS in Computer Science (IP) My paper is accepted for 2024 ASEE Southeastern Section Conference, Marietta, GA, March 10 - 12, 2024. Research interests: 1. Meditation 2. Music 3. AI Hackathons: 1. INTEL AI Hackathon FIRST prize Winner! 2. Llama 2 ClarifAI LablabAI hackathon SECOND prize winner! Published papers: Peer-reviewed Published papers: 1. FIE 2023 IEEE conference, Texas, USA: EEG Spectral Analysis and Prediction for Inattention Detection in Academic Domain 2. AIMC 2023, Brighton, UK: Introductory Studies on Raga Multi-track Music Generation of Indian classical music using AI. 3. ASEE
the register.Moreover, it also accommodates the "Clear" operation. Fig. 4. Register circuit and component.Furthermore, students are required to construct a one-hot decoder circuit employing basic logicgates, as depicted in Fig. 5. This decoder circuit plays a pivotal role in governing the data pathbetween the ALU and the registers, ensuring that only one output is set to ‘1’ while the otherthree remain ‘0’. While this circuit is very simple and can be manually designed, CircuitVerseoffers a convenient tool (combinational analysis) capable of generating digital circuits based ontruth tables. Fig. 5. One-hot decoder circuit and component.Having designed the register and decoder circuits
fundamental design principles: 1)Engaging learners in experiential learning methods, 2) Addressing applicable workplace ethicsand policy topics in the learning content, and 3) Ensuring accessible experiences for learners fromall educational and technical backgrounds. These principles guided the construction anddevelopment of our sessions’ learning objectives, hands-on activities, and instructionaltools.The curriculum design emphasizes hands-on, team based, experiential learning, whichencourages learners to apply theoretical knowledge in practical contexts, engaging in activelearning instead of traditional teacher-centric teaching, expected to lead to improvedcomprehension, creativity, and problem-solving abilities. Alongside technical concepts
education has been justified from multiple perspectives, including: 1) the need tomaintain a sustainable labor market; 2) the rationale for computational thinking for solvingeveryday problems; 3) the computational literacy value of generating new ways of expression,thinking, and learning; and 4) the need for equity in participation [16]. These differing viewpointsare the impetus behind how lessons and curricula are established and implemented and have thepotential to shape the training of the future workforce. Developments in coursework, non-profits,organizations, informal programs, and research work to ensure that all students receivehigh-quality CS education but also that learners are supported and empowered [17]. However, thefirst step in such
presented findingsshow the trends in courses enrollment, passing, failing, and withdrawing from the courses. Inaddition to a core three-course sequence, the project examines the general department retentionnumbers.1. IntroductionThe COVID-19 pandemic had a profound effect on college enrollment across the United States.“Enrollment reductions were largest among black and Latinx students” [1]. This work presents ananalysis of how COVID-19 affected the enrollment numbers in City Tech in general and at theCST department in particular. The CST department offers three degree programs: an Associatedegree (AAS) in Computer Information Systems, a Bachelor of Technology degree (BTech) inComputer Systems, and a Bachelor of Science degree (BS) in Data Science
encryption are fundamental concepts for securing data transmission acrossnetworks. This lab will demonstrate these concepts using Generic Routing Encapsulation (GRE)and Internet Protocol Security (IPSec).Students will begin by configuring a GRE tunnel between Router 0 and 1, establishingconnectivity between two private subnets. This will enable Desktop 0 to communicate withDesktop 1. The first part of the task involves monitoring traffic over the router and ISP linksusing Wireshark to observe the data transmitted between two desktops.The next step is to enhance security by configuring an IPSec tunnel over the existing GREtunnel. This will encrypt the data being transferred. Students must then repeat the monitoringprocess to observe that the
. We use embedded tutors in all first-year CS courses but have We summarize that we have built an improved set of never studied their effect on the CS classroom, especially afterteaching and learning tools in the form of a blueprint. Our the blueprint has been developed. We will study the effectsapproach was to build a set of tools that went beyond a by looking at 1) student retention in the class, 2) studentstandardized set of lectures and assignments. We polled the attendance in tutoring sessions and 3) DFW rates in the class.faculty informally and there is unanimous support for the use ACKNOWLEDGMENTof the blueprint. We have created course consistency and this is
. Finally,the last section delves into future work and offers concluding remarks.ApproachThe early prediction of student performance is framed as a binary classification problem withtwo distinct classes: POSITIVE (coded as 1) for at-risk students and NEGATIVE (coded as 0)for all others. This classification is based on a threshold of C- (cumulative score of <74%) orbelow. Predictions are generated by models trained on data, utilizing the effective modelsidentified in previous studies [8], [9].All data utilized in this study were extracted from the Canvas Learning Management System,collected via RESTful and GraphQL APIs from 274 lower-division Computer Science (CS)courses. These courses encompass 2,656 students and 37 instructors and are offered
. Aweekly PowerPoint deck introduced a discussion theme before the Friday session. Participantshad to assemble aesthetically appealing presentations that offered their take on the subject. Eachparticipant was invited to give these slides during the Friday lunch sessions with the knowledgethat the talk may easily switch to any other subject as the discussions progressed. For example,one conversation topic would be "a movie that impacted my perspective on life," another mightbe "what are you passionate about." A third might be "how the epidemic has changed afundamental idea I have had." The mentoring sessions and group lunches' technical and socialcontacts produced a support system that improved the participant's research and professionalgrowth
measuredusing the 5-point Likert scale: 1-strongly disagree; 2-somewhat disagree; 3-neither agree nordisagree; 4- somewhat agree; 5- strongly agree. In general, male students’ feedback is morepositive than female students in all of the five questions. For example, male students agree moreon the statement that “I’m confident that CS is the right major for me”. Figure 3. Average scores of CS2011 surveyMann-Whitney test is conducted to test whether the differences are statistically significant.Based on the results of the Mann-Whitney test, as shown in Table 4, the differences betweenfemale and male students in Question 7 and Question 8 are statistically significant (p-value are0.04 and 0.049 respectively). Male students feel more
rules of programming languages, such asprogramming syntax and semantics. For example, just as IBL approaches begin with orientation activities,UMC begins from instructor-scaffolded learning activities that make use of pre-written code in structuredtasks. Other phases of IBL—the conceptualization, investigation, conclusion, and discussion phases—aremanifested across the use-modify-create model in specific student activities (Table 1). UMC IBL Student activity Use Orientation Read and run pre-written code Conceptualization Develop questions about what is happening in the program and why Investigation Attempt to answer the questions generated in the conceptualization
., & Potts, C. (2023). Relational reasoning andgeneralization using nonsymbolic neural networks. Psychological Review, 130(2), 308-333.https://doi.org/10.1037/rev0000371Haldeman, G., Tjang, A., Babes-Vroman, M., Bartos , S., Shah, J., Yucht, D., & Nguyen, T. D.(2018, February). Providing meaningful feedback for autograding of programming assignments.SIGCSE ‘18: Proceedings of the 49th ACM Technical Symposium on Computer ScienceEducation, 289-283. https://doi.org/10.1145/3159450.3159502Hartson, R., & Pyla, P. S. (2018). The UX book: Process and Guidelines for Ensuring a QualityUser Experience (2nd ed.). Morgan Kaufmann.Katai, Z. (2014, June 1). The challenge of promoting algorithmic thinking of both sciences- andhumanities-oriented
significantly before presenting our work inprogress. As more EVGs are used within curriculum, the creation of a useful EVG database willserve as an important resource—a tool for bolstering educational efficiency and access toresources for faculty and instructors.Literature ReviewToday’s students grow up as part of the first generation of learners immersed in digitaltechnology and are therefore more tech-savvy in how they think and learn [1]. The 2003movement for video games in education and training, known as serious games, shaped the wayeducators approached educational instruction to meet the needs of an emerging networkgeneration [2], [3]. EVGs have impacted various fields including firefighting [4], healthcare [5],and business [6]. EVGs are
. Thedetailed description of the platform is outside the scope of the paper but it can be reviewed at theprovided reference [13]. 4. Our Implementation and ResultsThe solution to the problem stated at the beginning of the paper is to implement a system thatmonitors the water level in irrigation canals in real-time, generates operational decisions driven bythe weather conditions and current water levels, and turns on the pumps at the appropriate timeand for the appropriate duration to maximize the benefits for the farmer. The ultrasonic sensorsthat detect water levels were deployed in the irrigation canal close to the water pump as shown inFigure 1.Figure 1, LoRaWAN enabled ultrasound sensor deployed for water level monitoring.The sensor used in this