activity. Robotic activities around a person’s faceneed to be extremely delicate so as not to injure the person, so there hasn’t been a lot ofexperimentation in this area to date when compared with other robot-assisted activities. Upper-arm mobility issues can also cause difficulty when interfacing with a computer,since a combination of a keyboard and a mouse is the standard interfacing mechanism. Adecrease of stamina or dexterity in a user’s arm, hand, or fingers can make the keyboard andmouse set-up hard to use accurately or for an extended period of time. Wang et al. proposed andtested a human-computer interface (HCI) device called an AirMouse that can be attached to apair of glasses [15]. The built-in gyroscopes can detect motion of the
synergybetween textbooks and certifications serves as a valuable resource, helping to mitigate theadditional demands of studying for certification exams. Second, balancing course content withadditional learning objectives requires careful planning. Incorporating every textbook chapter aswell as including additional outcomes such as team building or presentation skills reduced thetime available for in-depth exploration of cybersecurity topics. While integrating theseinterpersonal and professional skills was beneficial, greater alignment or clearer expectationscould have better supported learning the certification material. Third, enhancing student studyhabits and recall ability is essential. Identifying a theory or mechanism for improving students’study
Uddin is a professor of Mechanical Engineering at UNC Charlotte and has a long track record of providing leadership to multi-disciplinary activities within the campus.Daniel Andrew Janies ©American Society for Engineering Education, 2023A network analysis of the Twitter-Rxiv ecosystem for purveyors of science misinformation in preprints on the COVID-19 pandemic David Brown1, Erfan Al-Hossami2, Zhuo Cheng2, Alyssa Alameda2, Tia Johnson3, Samira Shaikh2, Mesbah Uddin4 and Daniel Janies1 1 Department of Bioinformatics and Genomics, UNC Charlotte 2 Department of Computer Science, UNC Charlotte 3 Department of Geography and Earth Sciences, UNC Charlotte 4
. His dedication, attention to detail, andanalytical skills greatly enhanced the quality of our findings. We are grateful for his hard work,enthusiasm, and commitment throughout the project.This material is based upon work supported by the National Science Foundation under AwardNumber 2130398. Any opinions, findings, and conclusions, or recommendations expressed inthis material are those of the author(s) and do not necessarily reflect the views of the NationalScience Foundation.REFERENCES[1] A. Kapoor and C. Gardner-McCune, “Understanding CS Undergraduate Students’ Professional Identity through the lens of their Professional Development,” in Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education
students’ experiences and thecourse’s influence on their perspectives.4. Findings4.1 Differences in the Experiences of the Students Who Had Taken the Course To better understand the participants, we asked questions about their familiarity withaccessibility and inclusive design. Given the postgraduate nature of the course, students camefrom diverse academic and professional backgrounds, resulting in varying levels of experienceand engagement with the course material. For some, this was their first exposure to the conceptsof accessibility and inclusive design. One participant reflected, “I think it’s super important. It’sextremely important. So I did not know about accessibility, inclusive design, any of that before Icame to the iSchool
to design VR based simulators forsurgical training, manufacturing, and space systems among others [6-9]. Such an information centric modelcaptures the information inputs, controlling factors or constraints, the decision outcomes and the performingagents or mechanisms. The primary information attributes are based on the categories of attributes reflectedin the IDEF-0 functional model. The engineering Enterprise Modeling Language (eEML) which was used tobuild this information model has its roots in the IDEF-0 modeling language; however, it is capable of alsorepresenting temporal precedence relationships among activities; it also has a more detailed way of modelingtask outcomes which can be divided into physical and information outcomes
Management) CapabilitiesAssuming the project is approved after the feasibility analysis, the ultimate goal is a LMS with afunctional CRM system, shown in Fig. 4. Different educational settings and programs mayimplement this in whole or in part, depending on their unique requirements. The CRM systemconsists of two major elements. The first element consists of user touchpoints and incentivedelivery mechanisms. The LMS provides a natural interface for system users, and powerful toolsfor automated data collection and electronic delivery of incentives. Other touchpoint optionsinclude text messaging, email, mobile applications, and web-based portals. Special APIs(Application Programming Interfaces) and other technology solutions may be needed to
of “gaming the system”. In these cases, students take advantage of the system’s scoring mechanisms to gain points rather than properly thinking through the material [26]. That is a problematic situation that is tricky to handle, as the score received does not really capture students’ efforts. While the instructor has taken steps against this phenomenon, it might still 19 be present in our dataset. • Finally, we acknowledge that the data we use might not capture all the intricacies that are present in student learning and collaboration. When we believe this might be happening, we have mentioned it in the corresponding section.7 ConclusionActive learning
uses the quality of his technical writing to judge his competence in thetechnical domain: “I perceived the quality of my writing as a very strong indicator of myunderstanding of the domain”. Victor explicitly discussed the interplay between learningtechnical material and the ability to communicate the technical material: “[b]ut really, they gohand in hand, right? Like how much hard technical material can you learn if you’re notcommunicating it properly.”Multiple participants stated that technical writing helped them organize and clarify their thoughts.For example, Nadir and Jason are more able to find their mistakes when they put their thoughts inwriting: “when you actually put it in writing, you figure out your mistakes” (Nadir) and “you
Background and Related WorkIn computer science, assembly language programming extends beyond its immediate practicalities, suchas direct hardware manipulation and optimized performance. When students juxtapose high-levelprogramming with assembly, they deepen their understanding of how abstract data types, like linked listsor queues, materialize at the machine level. For instance, the direct interaction with memory addresses inassembly language provides a tangible grasp of pointers, often considered abstract in high-levellanguages [1]. Assembly language also exposes students to crucial engineering trade-offs, such asbalancing code efficiency with maintainability [1]. Additionally, its understanding is indispensable foradvanced topics, including
Curriculum, and Associate Professor, Teaching-stream, at the Faculty of Applied Science and Engineering, University of Toronto. He received his Ph.D. from the Department of Mechanical and Industrial Engineering, and his B.A.Sc. in Materials Science Engineering, both from the University of Toronto. His multidisciplinary teaching and research bring together Engineering Education and Industrial Engineering to identify, understand, and mitigate learning barriers for diverse student populations. ©American Society for Engineering Education, 2025 A Framework for Understanding the Role of Generative AI in Engineering Education: A Literature ReviewAbstractThis complete research
interdisciplinary workshops are an effective mechanism for students tolearn CI and become future workforce who can use CI effectively for their research and discovery.We report the lessons learned from organizing the workshop. Our experience can be beneficial toother educators who plan to organize similar activities.Related WorkThe design of the workshop is inspired by existing studies (see below) that show the benefits ofproject-based approach and competition, particularly in a team setting, in stimulating students’interest and enhance learning. Specifically, project-based learning is a student-centered educationmethod in which learners acquire knowledge and skills by working on a project over an extendedperiod and the project typically involves exploring
learning atmosphere within the engineering community. As a Computer Science major, Amanda is focused on making positive impact through software engineering and machine learning.Sage Bachus, University of Florida Sage Bachus is a fourth-year Mechanical Engineering and Pre-Med student at the Herbert Wertheim College of Engineering, University of Florida. His main research focus is in learning analytics and developing a way to better understand the underlying intricacies of how students learn and perform.Ashish Aggarwal, University of Florida Ashish Aggarwal is an Instructional Associate Professor of Computer Science in the Department of Engineering Education at the University of Florida’s Herbert Wertheim College of
: This study uses GraphRAG to improve the precision of LLM responses in 4IR expertise to provide flexible course content adjustment • Adaptive Difficulty Mechanism with Finite Automaton: We use finite automaton in gAI-PT4I4 to split each exercise into different states of varying difficulty, requiring 80% student task-performance accuracy, to dynamically increase the difficulty of the exercise by transitioning through the automaton.MethodsMulti-Fidelity Digital Twin Education FrameworkDigital twins (DT) originated in the aerospace field [13] and today impact a wide range of fieldssuch as transportation, climate, manufacturing, etc [14–16], and also education [17], wherein”Software systems replicating the behavior of one or
undergraduate-level Web Technologies PBL course. In particular,we adapt three different methods: 1) Retaining previous knowledge of domain experts andeducators - by using their feedback to fine-tune a ChatGPT model; 2) Providing relevantcontext from course-specific materials and previous submissions of a continuous project - byfeeding them to ChatGPT using Retrieval-Augmented Generation (RAG); 3) Obtainingadditional task-specific information from external data sources and services - by customizingtool functions using RAG. Combining the aforementioned methods, we developed a tool on top ofthe general-purpose ChatGPT that is better specialized for our particular PBL use case. Ourevaluation of the tool’s effectiveness involved comprehensive user studies
mechanisms. For a phenomenography of pedagogical/andragogicalapproaches in data structures courses, see Lister et al. [3], with key elements identified as developing transferablethinking, the need to improve student’s programming skills, teaching them what’s “under the hood,” developing theirknowledge of software modules and libraries, and developing component or modular thinking. I found that the use ofmore than one programming language also enabled students to more easily see the bigger picture, along with thesupporting the aforementioned learning goals. Necaise [4] reports on the opposite situation to that at SMC, focusing on a transition from Java to Python in the CS2course and reported student benefits in terms of being less bogged down with
Paper ID #38210Labor-based Grading in Computer Science: A Student-Centered PracticeChris MarriottMenaka AbrahamDr. Heather E. Dillon, University of Washington Dr. Heather Dillon is Professor and Chair of Mechanical Engineering at the University of Washington Tacoma. Her research team is working on energy efficiency, renewable energy, fundamental heat transfer, and engineering education. Before joining academia, she worked for the Pacific Northwest National Laboratory (PNNL) as a senior research engineer working on both energy efficiency and renewable energy systems, where she received the US Department of Energy Office of
importantaspect of any IoT/Cellular/Wireless technology course. Commercially available Faraday cages thatare suitable for use in teaching or research environments are priced in the range of $3,300 andbeyond. Such pricing may disincentivize institutions from deploying Faraday cages in theirclassrooms. Unavailability of Faraday cages in classrooms can in turn lead to deficiencies incurricular effectiveness and assessment for IoT/Cellular/Wireless courses. Lower cost alternativesare needed.We constructed a custom-made, low-cost Faraday cage using materials that are available over thecounter at a local hardware store or an online superstore. We listed materials and their approximatecosts required to build a Faraday cage from scratch. We presented a step-by
Examples Degree Categorization based on CIP codes Computing-related fields in the STEM major list computer science, computer engineering,Computing 11-Computer and Information Sciences and Support Services information technology, data science, information sciences, etc. Engineering related fields in the STEM major listEngineering electrical engineering, material engineering, 14-Engineering, 15-Engineering Technologies mechanical engineering other engineering, etc. Other technology/science-related fields in the
comprehend their mechanisms, without the danger of these harmfulentities propagating to actual networks or systems[28].2.2 Practicing Hacking TechniquesDealing in Hacking Techniques: Ethical hacking is an essential proficiency in the field of cybersecurity,used for defensive and proactive objectives. Virtual machine laboratories provide a controlledenvironment for both novice and seasoned cybersecurity experts to hone their skills in hackingmethodologies, including penetration testing and vulnerability exploitation. Gaining practical experienceis essential for comprehending the methods used by attackers and improving defense mechanismsagainst such assaults[29].2.3. Realistic Scenarios Without Real-World Consequences:Simulated Scenarios with
standing within anassociate's degree program, junior or senior standing in a bachelor's degree program, or currentlyenrolled in a master's degree program, or participating in a research-based doctoral program.Academic institutions are funded through NSF to manage the SFS program [3]. Institutions mustdefine the specific criteria used to select scholars, the approach used to recruit and awardscholarships, how to mentor and monitor scholars, and to ensure they meet all the obligationsrequired. SFS NSF awards typically last five years and there is a renewal mechanism in place tofund those programs that can show continuous success.IV. ApproachGiven that participation in research activities is not a mandatory component of the SFS program,a targeted
interaction, deep learning, intelligent transportation systems, and evolutionary computation.Mr. Timothy Sellers, Mississippi State University Timothy Sellers received the B.S. degree in robotics and automation technology and applied science in electro-mechanical engineering from the Alcorn State University, Lorman, MS, USA in 2020. He is currently pursuing a Ph.D. degree in the Department of Electrical and Computer Engineering at Mississippi State University, Mississippi State, MS, USA. He is currently a Graduate Teaching Assistant for Senior Design II (ECE4542/ECE4522) and was for Advance Circuits (ECE3434) at the undergraduate level and as guest lecturer delivered graduate-level courses, Advanced Robotics (ECE 8743) and
andengineering oriented students.Introduction and Literature ReviewArtificial Intelligence (AI) continues to be one of the most talked-about topics in highereducation and is of particular emphasis in colleges of engineering and computing across theworld. In addition to being highly relevant in research themes during the era of autonomy andbig data, there are large benefits to education as well. Advantages to chatbots are numerous, butinclude being available 24/7 to students, being (potentially) anonymous to answer questions thatmay be considered bad or humiliating to the student who is asking, to being able to providequizzes and other materials to test knowledge retention, and having a capacity to handle whatmay be considered to be too many questions
giving students control over video playback, have been shown toimprove learning outcomes [8]. Advancements in video technology now enable more sophisticatedinteractivity features such as embedded quiz questions, polls, enforced pauses, and branchingscenarios. These features can foster deeper learning by encouraging students to actively process andapply new knowledge as they watch [10], [11], [8], [12], leading to deeper understanding andretention of material [1], [9].Embedded QuizzesEmbedded quizzes are interactive questions integrated directly within the video user interface, whichpause playback and require learners to respond before the video continues. This design can be used toprompt learners to process and apply information in real time and
Paper ID #39391WIP: Skip the Lecture: A Decoding First Approach to IntroductoryComputing EducationDavid Zabner, Tufts UniversityTrevion S Henderson, Tufts University Trevion Henderson is Assistant Professor of Mechanical Engineering at Tufts University. He earned his Ph.D. in Higher Education at the University of Michigan. ©American Society for Engineering Education, 2023 (WIP) Skip the Lecture: A Decoding First Approach to Introductory Computing Education David Zabner Trevion Henderson david.zabner@tufts.edu
heighten students' quantum awareness and curiosity as they will beconfronted with opportunities and issues related to quantum computing in their softwareengineering careers. Our student survey results, utilizing a Likert scale ranking, indicate asignificant increase in students' interest and curiosity in quantum concepts, as well as theireagerness to further explore quantum computing. These results that we are meeting oureducational objectives.IntroductionQuantum computing represents a paradigm shift in the field of computational science, leveragingthe principles of quantum mechanics. Unlike classical computing, which uses bits to processinformation in a binary format, quantum computing uses quantum bits, or qubits, that can exist inmultiple
students.Moreover, the flexibility of virtual learning environments allows for real-time feedback and peerinteractions, essential for mastering intricate OOP concepts. The ability to receive immediateresponses to coding exercises or project submissions can significantly enhance a student'sunderstanding and retention of complex programming principles. This is supported by Eom'sresearch, which suggests that early engagement in online courses, characterized by timelyinteractions with course materials and peers, positively correlates with academic performance[3]. Learning analytics tools can further facilitate this process by providing educators withinsights into student behaviors and engagement levels, allowing for timely interventions whennecessary [4].In
students’ understanding of IoT security,from fundamental concepts to complex security solutions for state-of-the-art IoT devices. Theclass objectives aim to equip students with the following: • A thorough understanding of basic and advanced security mechanisms in the IoT. • Insights into software and hardware architectures of various IoT platforms. • Competence in designing energy-efficient and secure IoT systems. • Practical skills in programming and securing state-of-the-art IoT devices.The content being taught in the class is divided into a total of 12 modules comprising topicsranging from security and confidentiality in IoT, to intrusion detection systems in IoT devices anddigital forensic concepts in IoT devices. During
DataStructures and Algorithms (DSA) course at a large public university in the United States. We reporton a qualitative analysis of 199 students’ open-ended responses regarding students’ choices. Ourcontributions from this paper are as follows: (1) rich descriptions of workflows for assessing andproviding students feedback when solving short programming problems using cloud-based ornative approaches and (2) student preferences and challenges when solving short programmingproblems using different mechanisms. These findings have design implications for computingeducators, system designers, and other stakeholders involved with the selection of cloud-based ornative programming workflows who want to accommodate eclectic learner needs and promotestudent
21,22,23,24 .As a result, AI itself requires robust security mechanisms to ensure fairness, reliability, andtrustworthiness for cybersecurity for AI. Despite this interdependence, AI and cybersecurity havetraditionally been treated as distinct disciplines in education, with little emphasis on theirintegration. This gap hinders students from gaining a comprehensive understanding of how AIcan both enhance and be protected by cybersecurity.To bridge this divide, we introduce DARE-AI (discover, explore, develop and integrate a scalableinstructional approach for integrated AI and cybersecurity) - an experiential learning frameworkthat integrates AI and cybersecurity education through hands-on, research-driven instruction.DARE-AI aims to provide students