Paper ID #37372What Do Undergraduate Engineering Students at the Onsetof Emergency Hybrid Learning During COVID-19 SayAbout Peer Mentorship?Darcie Christensen Dr. Darcie Christensen is a probationary Assistant Professor in the Department of Integrated Engineering at Minnesota State University Mankato. She teaches for Iron Range Engineering on the Minnesota North campus in Virginia, Minnesota. Dr. Christensen received her Ph.D. in Engineering Education from Utah State University in the Summer of 2021. The title of her Dissertation is “A Mixed-Method Approach to Explore Student Needs for Peer Mentoring in a
Engineering and Technology(ABET)-accredited programs and three mentioned adapting the competition requirements to fitthose standards. Instead of implementing the competition as a team project, one professormodified it for each student to submit an individual report, thereby satisfying the written reportrequirement for ABET accreditation. Although direct misalignment was rare, when present thestandard was prioritized before the competition requirements. National competitions thatencourage classroom adaptations should be aware of standards that may impact that process anddesign programs so that they are easily applied across the board.Implementation boundary (within or extended beyond semester)Across implementations, two different boundaries emerged
AC 2011-2527: OCCASIONING THE EMERGENCE OF KNOWLEDGEAND PROMOTING MOTIVATION FOR ALL STUDENTS: APPLYING IN-STRUCTIONAL PRINCIPLES TO ENGINEERING SITUATIONSJennifer A Turns, University of Washington Jennifer Turns is an Associate Professor in the Department of Human Centered Design & Engineering at the University of Washington. She is interested in all aspects of engineering education, including how to support engineering students in reflecting on experience, how to help engineering educators make effective teachings decisions, and the application of ideas from complexity science to the challenges of engineering education
Paper ID #26983Emerging Support Systems for Entrepreneurship Education in the Contextof an Ambitious National Reform in Chilean Engineering SchoolsMiss Macarena Ver´onica Zapata P.E., Universidad de Chile Macarena Zapata Pizarro received her Bachelor degree in Industrial Engineering at Universidad de Chile and Master degree in Management and Public Policy at Universidad de Chile. She serves as coordinator of the Armonizaci´on Curricular Area in Ingenier´ıa 2030 project for the Facultad de Ciencias F´ısicas y Matem´aticas of the Universidad de Chile. Her research interests include entrepreneurship, innovation, technology
Paper ID #15591Analyzing an Abbreviated Dynamics Concept Inventory and Its Role as anInstrument for Assessing Emergent Learning PedagogiesMr. Nick Stites, Purdue University, West Lafayette Nick Stites is pursuing a PhD in Engineering Education at Purdue University. His research interests include the development of novel pedagogical methods to teach core engineering courses and leveraging technology to enhance learning experiences. Nick holds a BS and MS in Mechanical Engineering and has eight years of engineering experience. He also has four years of experience as an adjunct instructor at the community-college and
in Cinema from Southern Methodist University and an MFA from Loyola Marymount University.Ms. Ann F Beheler, Collin County Community College Ann Beheler has been in the Information Technology industry for over 30 years, and she is now responsi- ble for Emerging Technology grants at Collin College. In that capacity she leads the National Convergence Technology Center, a five-year $4 million National Science Foundation grant. The work of the National CTC builds on a previous four-year $4.4 million National Science Foundation grant. From 2011-2015, Ann also led the National Information, Security, and Geospatial Technologies Consortium, an almost $20 million Department of Labor TAACCCT grant. Ann has corporate
interaction, pace/workload and student ex-perience, and the male gender [12]. While Barker et al. do not identify student persistence asbelonging, the three most important measures they identify align well with that of Rainey et al.[9]. Barker’s student to student interaction could be seen as Rainey’s Interpersonal Relationships,Barker’s pace/workload and student experience seems to align with Rainey’s Competence, andwhile Rainey does not have an explicit measure for the male gender, results are analyzed in gen-dered slices which can show emergent results that may be consistent with Barker’s work. Other works about student belonging include Garvin-Doxas et al.’s work on “strut-ting” and social status in computer science classrooms. The
Paper ID #34578Curricular Improvement Through Course Mapping: An Application of theNICE FrameworkDr. Ida B. Ngambeki, Purdue University, West Lafayette Dr. Ida Ngambeki is an Assistant Professor of Computer and Information Technology at Purdue Univer- sity. Dr. Ngambeki graduated from Smith College with a B.S. in Engineering and from Purdue University with a PhD in Engineering Education. Dr. Ngambeki’s research is focused on the intersection of human behavior and computing, specifically how educational and policy interventions can be used to improve human interactions with technology. Dr. Ngambeki’s key areas of research
experts in specific subjectsrelevant to his course. He pursued and persuaded these experts to give a live lecture during hiscourse via video teleconferencing. The video and audio is clear in both direction, the guestlecturer can see student responses and the student of course gets relevant information direct fromthe field expert. In most cases the presenter feels it to be an honor to be asked as a guest lecturerin a graduate engineering course and for a student the opportunity to ask questions directed to theexpert is invaluable. The above mentioned scenarios take place at OEEP several times asemester. Does this foster student participation and learning? We think so. Of coursecommunication technology has helped tremendously in marketing. We no
Society for Engineering Education, 2021Web-Based Cryptomining DetectionDima Kudriashov, EPAM Systems, Seattle, Washington, USAVijay Anand, Department of Information Systems and Technology, University of Missouri, St. Louis, Missouri,USAA drastic surge on the cryptocurrency market of late 2017 and early 2018 lead to development andwidespread implementation of web-based cryptomining. Initially providing a valid alternative to aregular advertisement-based forms of monetization, cryptomining quickly became a novelty form ofmalware by silently executing in the background without obtaining explicit consent from a user, anactivity later became commonly known as drive-by mining or cryptojacking. To solve the issue oftimely detection and prevention of
impact on this industry. I think that, of all the things I discovered this summer, is what’s going to stay with me when I start my career . . . Observing their colleagues and noticing the extent to which they had to learn new technologies onthe job, students noted that life-long learning is an essential feature of CSE industry positions. For example: From the internship, I had a grasp of the feeling of the ever-changing nature of the software industry. To keep up with your team, you have to learn at all times: at your workspace or at some of your free time, about the technologies your team is using or considers to use. In addition to that, you would also way to play around with emerging technologies that could be
in Computer Science. I am currently an Engineering Writing Fellow and have written previously on implementing Data Mining courses at an undergraduate level. I am the recipient of the Student Excellence Award in Computer Science in the UVU College of Technology & Computing.Dr. Elham Vaziripour, Utah Valley University Elham Vaziripour, Ph.D. in computer science, is currently a professor assistant at Utah Valley University. Her area of research is Security, UX research, and Data analysis. She graduated recently, Dec 2018, from Brigham Young University. Her dissertation was on analyzing security and privacy of secure messaging applications.Dr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a
gainedduring years of study. Students work very hard to have a working project by the end of thesemester. These projects provide students many opportunities to engage in self-directed learning.They develop the ability to debug, seek and find information they need, and the ability tounderstand and reverse-engineer poorly written documentation. The students’ feedback and theirfinal project presentation indicate that they have pride in their project accomplishments and havegained confidence in their engineering abilities.References: 1. Wikipedia, “Haptic Technology”, https://en.wikipedia.org/wiki/Haptic_technology, accessed 3-1-2021. 2. Okamura, A. M., et.al, “Feeling is Believing: Using a Force-Feedback Joystick to Teach Dynamic Systems
Paper ID #30994A Healthcare Case-Study to Teach Simulation TechniquesDr. Hassan Rajaei, Bowling Green State University Hassan Rajaei is a professor of computer science at Bowling Green State University, Ohio. His research interests include cloud computing, High Performance Computing (HPC), distributed simulation, parallel and distributed processing, communication networks, wireless communications, and IoT. Rajaei received his Ph.D. from Royal Institute of Technology, KTH, Stockholm, Sweden, and he holds a M.S.E.E. from the University of Utah, and a BS from University of Tehran. c American Society
self-driving car, also known as an autonomousvehicle (AV), connected and autonomous vehicle (CAV), driverless car, robo-car, or robotic caris a vehicle that is capable of sensing its environment and moving safely with little or no humaninput [1, 2, 3, 4].” “Self-driving cars combine a variety of sensors to perceive their surroundings,such as radar, lidar, sonar, GPS, odometry and inertial measurement units [1]. Advanced controlsystems interpret sensory information to identify appropriate navigation paths, as well asobstacles and relevant signage [5, 6, 7].” It can be said that autonomous vehicles are complexembedded devices.The area of autonomous vehicles goes back to at least the 1920s where the first radio-controlledvehicles were designed
Paper ID #24785Implementing a Demilitarized Zone Using Holistic Open Source SolutionDr. Chafic BouSaba, Guilford College * Joined Guilford College in January 2008 * Serves as Assistant Professor in the Computing Technology and information Systems. * Cybersecurity major coordinator c American Society for Engineering Education, 2019 Implementing a DeMilitarized Zone Using Holistic Open Source SolutionAbstractCybersecurity continues to be a growing priority for organizations of all sizes and industries. Thethreat landscape continues to rapidly evolve producing disastrous cyber attacks that are cripplingtheir
Paper ID #34347Computing Ethics for the Ethics of ComputingDr. Robin K. Hill, University of Wyoming Dr. Hill is an adjunct professor in both the Wyoming Institute for Humanities Research and the Phi- losophy Department of the University of Wyoming, and a Lecturer in Computer Science. She currently writes a blog on the philosophy of computer science for the online Communications of the ACM. Her teaching experience includes logic, computer science, and information systems courses for the University of Wyoming, University of Maryland University College (European Division), State University of New York at Binghamton
'15 Proceedings of the 46th ACM Technical Symposium on Computer ScienceEducation, Kansas City, 2015.[9] Sahin A., Cavlazoglu, B., & Zeytuncu, Y. E. (2015). Flipping a College Calculus Course: ACase Study. Educational Technology & Society, 18 (3), 142–152.[10] Khribi, M. K., Jemni, M., & Nasraoui, O. (2008, July). Automatic recommendations for e-learning personalization based on web usage mining techniques and information retrieval. InAdvanced Learning Technologies, 2008. ICALT'08. Eighth IEEE International Conference on(pp. 241-245). IEEE.[11] Khribi, M. K., Jemni, M., & Nasraoui, O. (2015). Recommendation systems forpersonalized technology-enhanced learning. In Ubiquitous learning environments andtechnologies (pp. 159-180
Paper ID #25754Parallelization of Sequential Monte Carlo methods in building occupancysimulation and data assimilationDr. Sanish Rai, West Virginia University Institute of Technology SANISH RAI is an Assistant Professor in the Department of Computer Science and Information Systems at West Virginia University Institute of Technology, Beckley, WV. He received his Ph.D. degree from Georgia State University in 2017. His research interests include simulation and modeling, agent and graph based systems, artificial intelligence, data assimilation and machine learning. His email address is sanish.rai@mail.wvu.edu
cybersecurity education including the participation of women. She is an author or co-author of over 30 peer-reviewed journals and conference proceedings in these areas. She is a member of the IEEE Computer Society, ACM, ACM-W, Women in Cyber Security (WiCys), SWE(Society of Women Engineers), and NCWIT(National Center of Women in Technology).Brandon Earwood, Texas A&M University-San AntonioDr. Young Rae Kim, Texas A&M University-San Antonio Young Rae Kim, youngrae.kim@tamusa.edu, is an assistant professor of mathematics education in the Department of Curriculum and Instruction in the College of Education and Human Development at Texas A&M University-San Antonio. His research interests focus on how students
. Ponte, C. Juelich, A. Viera, and J. Schenker, “Teachers as designers: Integrating robotics in early childhood education,” Information technology in childhood education annual, vol. 2002, no. 1, pp. 123–145, 2002. [9] L. Darling-Hammond, M. E. Hyler, M. Gardner et al., “Effective teacher professional development,” 2017.[10] A. Hargreaves and M. Fullan, Professional capital: Transformng teaching in every school. Teachers College Press, 2015.[11] L. Matherson and T. M. Windle, “What do teachers want from their professional development? four emerging themes.” Delta Kappa Gamma Bulletin, vol. 83, no. 3, 2017.[12] R. Jocius, D. Joshi, Y. Dong, R. Robinson, V. Catet´e, T. Barnes, J. Albert, A. Andrews, and N. Lytle, “Code
frame diagrams and other high-level design documents. Theywere also asked to identify key areas of technical risk and to research those. Finally, they wereasked to identify the key technology or technologies that they would need to develop to maketheir product successful, based upon product need and the lack of an existing solution.Teams wrote up their software design, presented it to the instructor informally and submitted itfor assessment. They also selected one of the key technologies that they identified to use for thepatent project, which is described in Section 6.6. Patent ProjectTo help the students learn about the value of intellectual property and the process of protecting it,students participated in a short patent project. This
carefully evaluate andselect keywords for indexing publications to improve the research topic relevancy and publicationvisibility for broader impact.References [1] J. Webster and R. T. Watson, “Analyzing the past to prepare for the future: Writing a literature review,” MIS quarterly, vol. xiii-xxiii, 2002. [2] A. Ortiz-Cordova and B. J. Jansen, “Classifying web search queries in order to identify high revenue generating customers,” Journal of the American Society for Information Sciences and Technology, vol. 63, no. 7, pp. 1426–1441, 2012. [3] G. Chen and L. Xiao, “Selecting publication keywords for domain analysis in bibliometrics: A comparison of three methods,” Journal of Informetrics, vol. 10, no. 1, pp. 212–223, 2016. [4] H. N
application form for recruiting participants.The event information was distributed to both our Advisory Board of the Information ComputerTechnology (ICT) Program and the Cisco Academy Support Center. The seats were filled withinone day and nineteen attended the event. All the participants were from Colleges andUniversities in the Southeast region, which were a mix from North Carolina, South Carolina,Georgia, and Virginia. Among them, only two did not teach cybersecurity related courses. Inaddition, two guest speakers from the cybersecurity industry and three from academia wereinvited to give presentations about the latest technology and real-world cybersecurity issues.4. WorkshopIn total, ten identical learning environments were created and two
. in Electrical Automation & Robotic Technology. His pursuit of professional development include mecha- tronic design that encompass embedded systems, electrical & mechanical hardware design, and control systems.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at Utah Valley University, Orem, Utah. He received his M.S. and Ph.D. in Computer Science from the University of Oklahoma, Norman, Oklahoma. His research focuses on diverse areas such as: Database Design, Data Structures, Artificial Intelligence, Robotics, Computer Aided Manufacturing, Data Mining, Data Warehousing, and Machine Learning. American
their constructive comments that helped us improve the paper.References [1] R. L. S. De Oliveira, C. M. Schweitzer, A. A. Shinoda, and L. R. Prete, “Using mininet for emulation and prototyping software-defined networks,” in 2014 IEEE Colombian Conference on Communications and Computing (COLCOM). IEEE, 2014, pp. 1–6. [2] R. R. Fontes, S. Afzal, S. H. Brito, M. A. Santos, and C. E. Rothenberg, “Mininet-wifi: Emulating software-defined wireless networks,” in 2015 11th International Conference on Network and Service Management (CNSM). IEEE, 2015, pp. 384–389. [3] R. Ruslan, M. F. M. Fuzi, N. Ghazali et al., “Scalability analysis in mininet on software defined network using onos,” in 2020 Emerging Technology in Computing
lostfrom normal industrial mechanism processes thereby save energy and promote the modulardesign for satellites and space applications. It furnishes an alternative route for green energy withrenewed design emphasis on semi-conductor technology instead of traditional analogmechanization. Finally, the results of the survey analyzing this learning methodology will also bediscussed. This will go a long way in motivating engineering technology students to conductpotential future research, and reinforcing the best practices for life-long learning.BackgroundEngineering departments are often confronted with the necessity to update laboratory exercisesand equipment with the latest emerging technological trends within tight budget constraints.Another
educationalparadigm for engineering can no longer be adapt for the emergence of complexsystems and grand challenges. As a response, School of Engineering launched a newLong Range Plan “Engineering with a Big E: Integrated Engineering Education”(Moses, J., 1994), which is essentially the integration of engineering technologies andengineering science at first and the integration of STEM and non-STEM elements aswell (Kong H.B, 2011).The “Big E” strategy led to CDIO (Conceive, Design, Implement, Operate) approachin the Department of Aerospace Engineering (Crawley, 2001) and had a profoundinfluence on engineering education: Olin College of Engineering came up with“Engineering2.0” demanding new qualities for the next generation of problem solvers(Miller R.K., 2017
Paper ID #32627Impact of COVID-19 on Faculty Teaching and Student LearningDr. Mudasser Fraz Wyne, National University Dr Wyne has a Ph.D. in Computer Science, M.Sc. in Engineering, and B.Sc. in Electrical Engineering. Currently he serves as Professor of Computer Science at College of Professional Studies, National Uni- versity. He is the Academic Program Director (APD) for MS in Computer Science and have also been APD for MS in Information Technology Management, BS in Information Systems, and MS in Database Administration programs. His association with ABET USA dates back to 2001, as a certified program evaluator for BS
Paper ID #31490An Initial Look into the Computer Science and Cybersecurity PathwaysProject for Career and Technical Education CurriculaDr. Vukica M. Jovanovic, Old Dominion University Dr. Vukica Jovanovic is a Batten Fellow and an Associate Professor of Engineering Technology in Me- chanical Engineering Technology Program. She holds a Ph.D. from Purdue University in Mechanical Engineering Technology, focuses on Digital Manufacturing, Magistar (Ph.D. candidate) degree in Ind- sutrial Engineering and Management, focused on Production Systems Design, and dipl.ing. degree in Industrial Engineering focused on Mechatronics