. Ramin Khakzad c American Society for Engineering Education, 2017 A Real-World Example for Student Learning: BTSU Cafeteria SimulationAbstractSimulation is a powerful tool both for teaching students about simulation techniques as well asproviding deeper understanding of some courses contents such as networking, operating systems,operational research, just to name a few. Simulation is a well-known technique for evaluation ofwhat-if scenarios for decision making in industry, defense, finance, and many others.Teaching simulation techniques may require creativity in assigning problems to students. Realword examples often excite students and motivate them focusing on their learning objectives.Further, it challenges them
AC 2010-799: INVOLVING HIGH SCHOOL STUDENTS IN CONSTRUCTINGAND USING DEVICES FOR AUTOMATION OF CHEMISTRY LABORATORYIgor Verner, Technion-Israel Institute of Technology Igor M. Verner is Associate Professor and Coordinator of Technology Education at the Department of Education in Technology and Science, Technion – Israel Institute of Technology. He received the M.S. degree in Mathematics from the Urals State University and the Ph.D. in computer aided design systems in manufacturing from the Urals State Technical University, Yekaterinburg, Russia. His research interests are in engineering education with emphasis on experiential learning in technological environments, educational robotics
Conference of the American Society forEngineering Education" 8[4] Siau, K., Sheng, H., and Nah, F. (2006) “Use of a classroom response system to enhance classroom interactivity”, IEEE Transactions on Education, vol. 49, no. 3, pp. 398-403Biographical InformationDr. Douglas R. Carroll, PE is a Professor in the Interdisciplinary Engineering Department at theUniversity of Missouri-Rolla. He is best known for his work with solar powered race cars, winning twonational championships and publishing a book on solar car design. He has received many teaching awardsin his career. His research interests are composite materials, solar-electric
ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA. Manufacturing System Coordinated Optimization Model and Its Application* WANG Zhiguo1,GONG Bengang2 YANG Shanlin3 Department of Management Engineering The School of Management Anhui Polytechnic University Hefei University of Technology Wuhu, China Hefei, China E-mail: kingdom0526@126.com
industries in international companies. He has provided secure enterprise architecture on both military and commercial satellite communications systems. He has also advised and trained both national and international governments on cyber-security. Since joining Brigham Young University in 2010, he has designed a variety of courses on information assurance, cybersecurity, penetration testing, cyber forensics, malware analysis and systems administration and published over a dozen papers in cyber-security.Joseph J Ekstrom, Brigham Young University Dr. Ekstrom spent more than 30 years in industry as a software developer, technical manager, and en- trepreneur. In 2001 he helped initiate the IT program at BYU. He was the Program
Green Energy Challenge – From Green Building to Smart/DC BuildingJimmy Ching-Ming Chen1 and Joseph Vaglica2Engineering Technology Division, Wayne State University, Detroit, MI, USA;1. jcmchen@wayne.edu2. jvaglica@wayne.eduAbstractEnvironment impact and continuously increasing energy costs are driving the constructionindustry to pursue new design and technology alternatives. A thorough understanding of thescience of building performances and effective design is required to achieve maximum energyefficiency and best cost-performance ratio. Therefore, a paradigm shift is needed in a university’scurriculum by adding new materials and endeavors to train future workforce facing the challengesof green energy construction. Students
UniversityDr. Eric Oslund, Middle Tennessee State University Dr. Eric Oslund is a Educational Psychologist and applied statistician. His work focuses on using ad- vanced statistical models to better understand the complex relations among the numerous variables in- volved in learning and education. He received his Ph.D. from Texas A&M University and completed a two-year fellowship at the University of Texas at Austin. He is an associate professor in the College of Education at Middle Tennessee State University.Chrisila Pettey, Middle Tennessee State UniversityDr. Catherine E. Brawner, Research Triangle Educational Consultants Catherine E. Brawner is President of Research Triangle Educational Consultants. She received her
The problems inherent to gaining true self-insight are formidable, but they are notunchallenged. In professional environments, where an accurate understanding of one’s ownbehavior may increase profit margins, the self-insight problem has been partially resolved usingmultisource (or 360-degree) feedback interventions. The goal of this project is to adapt bestpractices and existing theoretical knowledge from the organizational literature to facilitate self-insight and adaptive self-development in a collegiate population of Science, Technology,Engineering, and Mathematics (STEM) students. These experimental strategies are technologiesof the self,18, 19 social psychological tools whose purpose is to help individuals chart new territory
Mechanical and Manufacturing Engineering Technology at Northern Kentucky University. Dr. Sadat-Hossieny is actively involved in consulting and research in different areas of Mechanical and Manufacturing Engineering Technology fields such as CADD, Automation, and technology transfer mechanisms. He regularly publishes papers in different proceedings and journals.Paul Cooper, Northern Kentucky University Paul Cooper is the interim chair of Department of Technology and an Associate Professor of Construction Management at Northern Kentucky University. He obtained his B.S. from Southwest Missouri State University; M.S. from Murray State University and his Doctoral candidacy in Adult and
AC 2007-173: USING DATA MINING TO DETECT INTRUSIONS IN COMPUTERNETWORKSMario Garcia, Texas A&M University-Corpus Christi Page 12.1542.1© American Society for Engineering Education, 2007 Using Data Mining to Detect Intrusions in Computer NetworksAbstractIn recent years Data mining techniques have been applied in many different fields includingmarketing, manufacturing, process control, fraud detection and network management. Over thepast several years a growing number of research projects have applied data mining to variousproblems in intrusion detection. The goal of this research is to design and implement an anomalydetector using data mining. The project
Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) Magnetotaxis for Nanofabrication Isaac G. Macwan, Zihe Zhao, Omar T. Sobh and Prabir K. Patra of a stringent vacuum environment to avoid contamination and Abstract— Magnetotactic bacteria (MTB), discovered in early the construction and capital equipment cost that increases by1970s contain single-domain crystals of magnetite (Fe3O4) or the orders of magnitude [2]. Newer technologies are alreadygreigite (Fe3S4) called magnetosomes ranging from 35 to 120 nm
Paper ID #44858Privacy in the Machine Learning: A Study on User Profiling and TargetedAdvertising on LinkedInMr. Eric UWAYEZU, UNIVERSITY OF BRIDGEPORT Eric UWAYEZU is a PhD candidate at the University of Bridgeport. He has been working in the IT industry for the last 12 years, focusing on IT networks and systems. He is also a computer science Lecturer at Sacred Heart University. His research interests are machine learning privacy, network security, and artificial intelligence in general. ©American Society for Engineering Education, 2024 Privacy in the Machine Learning: A Study on User
2025 ASEE Northeast Section Conference, March 22, 2025, University of Bridgeport, Bridgeport, CT, USA. AI-Driven Wildfire Detection with Integrated Air Quality and Machine Learning Vision Systems Powered by an Accelerator for Early Action Mina Gaber Wahba Ibrahim*, Xingguo Xiong, Navarun Gupta, Ahmed El-Sayed Department of Electrical Engineering Department of Electrical and Computer Engineering, University of Bridgeport University of Bridgeport, Bridgeport, CT 06604, USA Bridgeport, CT 06604, USA
classes such asengineering design. I briefly outline the most common ways in which portfolios are used in suchclasses, discuss some of their advantages and disadvantages, and conclude with some suggestionsfor those considering using portfolios to assess writing. When appropriate, I include some of myown experiences using portfolios in classes ranging from introductory writing-intensive coursesin the humanities and social sciences to senior-level engineering design. Currently I am workingwith faculty from across campus at the Colorado School of Mines to design a four-yearlongitudinal portfolio assessment for students in our McBride Honors Program.What Is a Writing Portfolio?A portfolio is usually defined as a collection of writing by an individual
Paper ID #37806The Hidden Curriculum. Navigating Promotion and Tenure at University ofDelawareDr. Robin Andreasen, University of DelawareDr. Heather Doty, University of Delaware Heather Doty is an associate professor of mechanical engineering at the University of Delaware (UD). Dr. Doty teaches undergraduate courses in thermodynamics, statics, and dynamics, and conducts research on gender in the academic STEM workforce. She is coDr. Shawna Vican, University of Delaware Shawna Vican is an Assistant Professor of Sociology and Criminal Justice at the University of Delaware. She received her Ph.D. in Sociology from Harvard
interviews with eleven students who had taken a course that usedsecond-chance testing. The courses were drawn from the same diverse set of departments listedabove (i.e. Chemistry, Computer Science, Aerospace Engineering and Mechanical Engineering).The interviews were largely used to guide the survey design, but will also be referenced briefly inthe results.The student surveys are our primary source of data and were deployed in the Spring 2022semester in conjunction with a quasi-experimental study. At the institution, there exist twosophomore-level required courses (course A and course B) in the same engineering departmentthat are often taken concurrently. The organization of the two courses and their course policies arevery similar, as they are
configuration protocol (DHCP) 4.There are two methods of obtaining login credentials discussed in this paper. The first methodfocuses on the network analyzing capabilities of Wireshark25. Wireshark is one of the open-source software’s used in this project, and is a valuable tool for understanding both White Hatand Black Hat hacking abilities. Wireshark captures packets with plain-text login credentials forseemingly encrypted web sites. This project provides a brief introduction on the usefulness ofWireshark as well as bring awareness to the vulnerabilities of some web sites. The secondmethod involves SSLstrip, which was created by Moxie Marlinspike. SSLstrip is designed tohijack an SSL session and replace the SSL encryption with plain-text, unknown to
Paper ID #21253A Case Study of Community College Transfer and Success in a 2+2 ProgramDr. Kathleen Alfano, College of the Canyons Kathleen Alfano has a Ph.D. from UCLA in Higher Education with a cognate in administration and evaluation. Her B.S. is in chemistry and she worked as an analytical chemist in industry before pursuing a career in education. She served as founder and Director of the California Consortium for Engineering Advances in Technological Education (CREATE) based at College of the Canyons from 1996 to 2016. Retired from College of the Canyons in November 2016, she is an Emeritus Professor and also former
Paper ID #39720Free-Body Diagram Performance with Problem Depictions at Different Lev-els of AbstractionDr. Andrew R. Sloboda, Bucknell University Andrew Sloboda is an Assistant Professor at Bucknell University where he teaches a variety of mechanics- based courses, including statics, solid mechanics, fluid mechanics, dynamics, system dynamics, and vi- bration. His research interests lie primarily in the fields of nonlinear dynamics and vibration. ©American Society for Engineering Education, 2023 Student Free-Body Diagram Performance with Problem Depictions at Different Levels of
. This paper will address indicationsdemonstrating procrastination, techniques encouraging continuous learning and completionsenabling proactiveness. Analysis is obtained from many engineering and non-engineeringstudents across several engineering courses and semesters. Preliminary results verifyimprovement not only with grades but also with feedback and results in follow-on courses.Key Words—student procrastination, course workload, grade distribution, study habitsIntroductionMany students learn new materials in different methods. Some require a crawl, walk and runapproach. Some require more visual versus verbal styles. Others still may require multipleaspects and iterations to the same problem to achieve understanding—intuition versus sensing
Paper ID #36494Institutional Review Panel for Cybersecurity Research andEducationJames K. Nelson (Associate Vice Chancellor) Associate Vice Chancellor in the Texas A&M University System and Director of the RELLIS Academic Alliance.Brent L. Donham (Dean, College of Science & Engineering) © American Society for Engineering Education, 2022 Powered by www.slayte.com Institutional Review Panel for Cybersecurity Research and EducationAbstractCybersecurity is an emerging field with significant implications as the use of interconnecteddevices increases. We are
://www.brookings.edu/research/opportunity-engines-middle-class-mobility-in-higher-education/major from either other City Tech majors or from other colleges. All of these students came witha background in mathematics and programming and were eager to start taking the Data Sciencecourses designed specifically for the Data Science program. Thus, the first seven students whograduated with BS in Data Science degree in December 2022 had already completed the CS1, CS2,and CS3 sequence by the time City Tech moved to remote teaching in Spring 2020.According to the presented numbers and despite the outlier (BS in Data Science), the analysis ofthe CST department enrollment and performance of the CST students in the introductory levelcourses could provide an insight into
Lab’s Accada RFID prototyping Platform – This free, open-source reader protocol, ALE middleware, tag data translation engine and EPC Information Service (EPCIS) implementation that allow researchers to explore benefits of the EPCglobal Network. The EPCIS software receives RFID “data from the middleware module, translates the data into relevant business events and makes those events available to back- end systems”5 • SAP’s Object Event Repository (OER) Software – This platform is designed to aggregate RFID, sensor and other ID data. SAP also has another RFID network platform product called Auto-ID Infrastructure (AII) which will allow users to integrate all automated communications and sensing
projected toincrease by 33% from 2023 to 2033, far outpacing the average growth for all occupations [2].To address the workforce gap, West Virginia University (WVU) launched a B.S. in Cybersecurityand an Area of Emphasis (AoE) in Cybersecurity for other B.S. majors in 2018. The B.S.program earned ABET accreditation in 2022 and is designated by the NSA as a National Centerof Academic Excellence in Cyber Defense Education (CAE-CD). Aligned with this mission, theNSF S-STEM funded project “Attracting and Cultivating Cybersecurity Experts and Scholarsthrough Scholarships” (ACCESS) aims to increase the annual enrollment in WVU’scybersecurity programs and support student success and career readiness. ACESS incorporatesseveral co-curricular activities
), a fellow of the Opportunities for Under-Represented Scholars (OURS) post-graduate institutional leadership certificate program, and an alumna of the Frontiers of Engineering Education program (FOEE) of the National Academy of En- gineering. She has been serving on the Project Kaleidoscope (PKAL) Capital Area Regional Network steering committee as a founding member since 2016. She received her Ph.D. in Computer Science and Engineering from the University of Nevada, Reno.Dr. Briana Lowe Wellman, University of the District of Columbia Dr. Briana Lowe Wellman is an associate professor and chair in the Department of Computer Science and Information Technology at the University of the District of Columbia. She joined
StepsOverall, offering the Introduction to Vacuum Technology course via telepresence with a VETsystem in the classroom was a success. This model allowed SUNY Erie to utilize facultyexpertise at Normandale CC, which faculty at the EET department of SUNY Erie did notpossess.Activities with the VET systems incorporated active learning into the curriculum. Faculty atSUNY Erie also had access to the Rough Vacuum Equipment Trainer (RVET) system over asemester to understand its design, operation, maintenance and troubleshooting issues in additionto providing students with the hands-on experience. Since the EET department is planning toexpand its vacuum technology course offerings, we were interested in designing our ownvacuum trainer. The experience with the
Page 26.1551.1 c American Society for Engineering Education, 2015 ASEE ABSTRACT – 2015 CONFERENCE A REPORT ON THE USE OF A PRACTIONER/ADACEMIC TEAM IN AN ADVANCED SURVEYING TECHNOLOGY CLASSWhile technological advances have permeated most of society over the past decade and more,those advances have been especially rapid with surveying technology. University professorshave the theoretical background needed to understand how newly developed technologies work,as well as their limitations and optimal uses. However, the nature of the changing academiccalendar means that they may get hands-on work with the technology for one semester a year oreven less frequently. This, coupled with
AC 2007-1680: TEACHING CHEMISTRY AS A CROSS-CULTURAL SUBJECT : IT& LINGUISTICSMargherita Landucci, Liceo Artistico StataleFabio Garganego, Municipality of Venice Page 12.1349.1© American Society for Engineering Education, 2007 Teaching Chemistry as a Cross-cultural Subject IT & LinguisticsAbstractThe main theme of this paper is the language of chemical formulae rather than the languagethat explains chemistry; the focus of our interest is the code used in writing chemicalformulae.The paper describes the nature and scope of a research project started by an out-of-schoolmultidisciplinary team who set up in 1993 and concluded
Paper ID #7012A Multi-Pronged Approach to Assessing Technical and Non-Technical Work-force Skills in a Two Year CollegeDr. Bill D. Bailey, Southern Polytechnic State University Bill Bailey is currently an assistant professor of industrial engineering technology and quality assurance at Southern Polytechnic State University. He holds a PhD in Technology Management (Quality Systems Specialization) from Indiana State University. He also holds a Master of Science in Industrial Technol- ogy degree from North Carolina A&T State University, and a Baccalaureate degree in Psychology and English. Dr. Bailey has extensive
Paper ID #6379Automated Grading of First Year Student CAD WorkDr. Keith Alan Hekman, California Baptist University Dr. Keith Hekman is an associate professor in Mechanical Engineering. He has been at California Baptist University for five years. Prior to teaching at CBU, he has taught at Calvin College and the American University in Cairo. His Ph.D. is from the Georgia Institute of Technology.Dr. Mark T Gordon, California Baptist University Page 23.235.1 c American Society for Engineering