School of Chemical Engineering Dr. Keith's research uses mathematical modeling to improve air quality and energy efficiency through the applied fields of reactor design and alternative energy. He has also spent time studying, evaluating and implementing faculty development programs. Prior to joining Mississippi State University, Keith was a faculty member at Michigan Technological University, most recently as an associate professor. Proceedings of the 2011 North Midwest Section Conference
. Much of her work has focused on introducing STEM concepts to broad audiences and encouraging students, including women and others in traditionally under-represented groups, to consider graduate school.Prof. Heidi A. Diefes-Dux, Purdue University, West Lafayette Heidi A. Diefes-Dux is a Professor in the School of Engineering Education at Purdue University. She received her B.S. and M.S. in Food Science from Cornell University and her Ph.D. in Food Process En- gineering from the Department of Agricultural and Biological Engineering at Purdue University. She is a member of Purdue’s Teaching Academy. Since 1999, she has been a faculty member within the First- Year Engineering Program, teaching and guiding the design of
, Firefox, and Apache.Because the objectives are curriculum dependent, it would be helpful to review thecurriculum within which our cryptography course evolved.Our Applied Cryptography ClassOur College is a small college within a large university. In addition to other goals, ourapplied security program is designed to prepare students to provide enterprise securityassessment and evaluation. Expected job titles for our graduates include securityinvestigator, manager, and auditor.The scope of the applied cryptography class includes cryptographic services required tosecurely store and transmit confidential information. It also includes relatedcryptographic services such as those that provide integrity, authentication, andnonrepudiation. Specific topic
password security and label them by strength 1. Page 11.985.3 2SAMInsideSAMInside was developed by a Russian company called InsidePro primarily for passwordrecovery. InsidePro offers a shareware version for demo purposes and a full version availablefor $40. SAMInside purports to be the first program in the world which can “break” SysKeyprotection 6. SAMInside can conduct brute force, mask, dictionary and distributed attacks, andit provides a user friendly interface which makes it easy to choose which accounts to crack.However, because it was designed for
AC 2007-1286: PLANNING A SMALL-SCALE WIND-ELECTRIC SYSTEM INEAST-CENTRAL IOWAMichael E. Hay, University of Northern Iowa Michael Hay completed his masters degree in Industrial Technology at the University of Northern Iowa. Mr. Hay holds a BT in Industrial Technology/Mechanical Design from the University of Northern Iowa and an MA in Industrial Technology from the University of Northern Iowa. Mr. Hay has over 25 years of experience in various Engineering positions and is listed on six US patents. His graduate research was in planning small-scale wind-electric systems. He has worked on several other renewable energy and electric vehicle projects as well.Recayi "Reg" Pecen, University of
clock cycle and its performanceis rated at 1800 MIPS. The C6713 can perform 2 multiply and accumulate (MAC)instructions per cycle. The processor can access 264kB of internal memory. Ofthat, 4kB each is allocated as L1P (Level 1 Program cache) and L1D (Level 1data cache) and the remaining 256kB is designated as L2 memory which is ashared program and data space. Figure 2. The functional block diagram of TMS320C6713 (Courtesy of Texas Instruments)2.3 The importance of the McBSP portsSince the McBSP ports are important in this interface project, we discuss them insome detail. The McBSP ports provide the interface between the input and output
: Are the students engaged by the learning material? Can be positively responded,then a proof will exists about the effectiveness of the experience. A second question is: to whatextent quantitatively? Following (A. C. Worcester 2013)[15] a survey will be designed todetermine the contribution of the activities to 1) the participants’ level of knowledge, 2) toincrease their interest and confidence in learning engineering, and 3) the appropriateness of thesoftware/tools in use. Likert scales ranging from -2 (“strongly disagree) to +2 (“strongly agree”),and including 0 points for the “neutral” response.The following questions will be applied in a survey for assessing their thinking about (1) theknowledge base: 1. I believe the activity was
Environmental Management Programs.5. Parkhurst, D. L., & Appelo, C. A. J. (1999). User’s Guide to PHREEQC (VERSION 2) – A Computer Program for Speciation, Batch-Reaction, One-Dimensional Transport, and Inverse Geochemical Calculations. U. S. Department of the Interior, U. S. Geological Survey: Water-Resources Investigations Report 99-4259, pp 312.6. Mondal, A. M., (August 2009). Preliminary Comparison of Hydrogen and Ethanol as Reductants for Stimulating Microbial Denitrification in Groundwater Contaminated with Uranium and Nitrate. Master’s thesis in Environmental Engineering, Texas A&M University-Kingsville.7. Eti, R. (December, 2011). Microcosm Study of Uranium and Molybdenum Reduction in Groundwater using
integrated approach to designing college courses. John Wiley & Sons, 2013.[17] G. M. Sullivan and R. Feinn, "Using effect size—or why the P value is not enough," Journal of graduate medical education, vol. 4, no. 3, pp. 279-282, 2012.[18] H. J. Keselman et al., "Statistical practices of educational researchers: An analysis of their ANOVA, MANOVA, and ANCOVA analyses," Review of educational research, vol. 68, no. 3, pp. 350-386, 1998.[19] A. M. Hassan, A. Dallal, and M. A. Zaghloul, "Students' Perspectives on Online Lecture Delivery Methods for Programming Courses: A Survey-based Study during COVID-19," in 2021 IEEE Frontiers in Education Conference (FIE), 2021: IEEE, pp. 1-5.[20] M. A. Zaghloul, A. M. Hassan
School of Information Sciences at the University of Illinois at Urbana- Champaign. Her expertise is in the area of social computing, human-computer interaction, Internet of Things, and human-AI interaction. In her work, she designs, implements and evaluates social computing systems that can engage community members to co-create new services for better community wellbeing. American c Society for Engineering Education, 2021How Students Search Video Captions to Learn: An Analysis of Search Terms and Behavioral Timing DataAbstractEngineering students used ClassTranscribe, an accessible video player, in multiple engineeringcourses to view course videos
Paper ID #42444Why are we here? A Study of Student Perspectives on Attendance in a CombinedLecture and Laboratory CourseDr. Kara Bocan, University of Pittsburgh Kara Bocan is an Assistant Professor in the Department of Electrical and Computer Engineering at the University of Pittsburgh. Her primary focus is teaching with a secondary focus on engineering education research. She completed her PhD in Electrical Engineering and her BSE in Electrical Engineering and Bioengineering, both at the University of Pittsburgh. She currently teaches courses on introductory programming, data structures and algorithms, software
Paper ID #40473Experiential Learning: Improving Agility and Coordination with aPiezoelectric Agility Ladder (PLA)Dr. Bala Maheswaran, Northeastern University Bala Maheswaran, PhD Northeastern University 367 Snell Engineering Center Boston, MA 02115Carmen ChengSteven Rotolo, Northeastern University ©American Society for Engineering Education, 2023 Experiential Learning: Improving Agility and Coordination with a Piezoelectric Agility Ladder (PAL) Spandana Machavarapu, Bence Kovacs, Kenny Kazibwe, Steven Rotolo, Carmen Cheng, and Bala Maheswaran
Ms. Elizabeth PorchAfter the data goes through the Data Loader and the CNN Model, the program displays 5 randomtraining images and presents its predictions above each of the images. These images above weretaken from a 0-0 pair and were both correctly identified as not having Acromegaly.App BuildingAs of right now, I have planned out much of the app’s UI, but because I want the app to be givento researchers to help them check for Acromegaly in patients, the design is going to be veryminimal and will just consist of two paths. The first will allow the researchers to upload newpatient images which will get added to the existing patient dataset, and the other allows theresearchers to train on that dataset to see if there is a chance for
, Dr. Stahovich joined the Mechanical En- gineering Department at UC Riverside in 2003 where he is currently a Professor and Chair. His research interests include pen-based computing, educational technology, design automation, and design rationale management.Robert C Calfee, Graduate School Of Education, University of California Riverside Page 22.82.1 c American Society for Engineering Education, 2011 A Pen-Based Statics Tutoring SystemAbstractWe present an intelligent pen-based tutoring system for Statics – the sub-discipline ofengineering mechanics concerned with the
program. Greg has serves on numerous non-profit boards and has consulted with local and regional industry in human resource training. Greg currently incorporates storytelling as a teaching pedagogy in his courses and he led K-State in a Diversity Storytelling Project Page 15.107.1© American Society for Engineering Education, 2010 A Triple Play: Mathematics, Baseball, and StorytellingAbstractThere are many effective teaching pedagogies. One way we have found to produce results is tocombine the use of storytelling about baseball in mathematics classes. This paper will illustrate apositive relationship
AC 2011-1773: GOING ONLINE WITH STATICSSheryl A. Sorby, Michigan Technological University Sheryl A. Sorby is a Professor of Mechanical Engineering-Engineering Mechanics and Director of Engi- neering Education and Research. She is the former Associate Dean for Academic Programs in the College of Engineering at Michigan Technological University and previously served as a rotator to the Division of Undergraduate Education at the National Science Foundation. Sorby is active in the American Society for Engineering Education serving as Director of Programs and past chair of the Engineering Design Graphics Division of ASEE. She was a recipient of the Dow Outstanding New Faculty award and the Distinguished Teaching
AC 2012-4328: NO SKILL LEFT BEHIND: INTELLIGENT TUTORINGSYSTEMS ENABLE A NEW PARADIGM IN LEARNINGMr. Hatem M. Wasfy, Advanced Science and Automation Corp. Hatem Wasfy is the President of Advanced Science and Automation Corp. (ASA), a company that special- izes in the development of online virtual learning environments, and advanced engineering simulations. He has helped design several interactive learning environments that include a CNC machining course, a centrifugal pump maintenance course, an undergraduate physics course, and a welding course. He re- ceived a B.S. (1994) and an M.S. (1996) in mechanical engineering from the American University in Cairo. Wasfy’s research interests include advanced learning systems
Paper ID #42115Work-in-Progress: Describing the Epistemic Culture of our Research Teamsfrom Ethnographic ObservationsDr. Courtney June Faber, University at Buffalo, The State University of New York Courtney Faber, Ph.D., is an Assistant Professor of Engineering Education at the University at Buffalo (UB). Prior to joining UB in August of 2023, she was a Research Associate Professor and Senior Lecturer in Engineering Fundamentals at the University of Tennessee, Knoxville. She was also the Director of the Fundamentals of Engineering and Computing Teaching in Higher Education Certificate Program. Her research focuses on
Paper ID #33967Adapting Online Learning for the United States Military AcademyMajor Raymond Vetter, United States Military Academy Raymond Vetter, PE, PMP is currently an instructor and analyst in the Department of Systems Engineer- ing at the United States Military Academy (West Point). He graduated from the United States Military Academy (West Point, New York, USA), 2010, with a Bachelor of Science in Systems Engineering with Honors. In 2014 Ray graduated from the Missouri University of Science and Technology, earning a Mas- ter of Science in Engineering Management. In 2019, he graduated from the Massachusetts Institute of
. Page 14.53.3The 8D Methodology may be used by individuals or teams, as described in a previouswork.4 In this paper, the 8D Methodology process was carried out by one of the authorswho learned the system in an engineering context and whose knowledge of medicine islimited to some college-level study. This individual then spent several days researchingheart disease and current treatments from literature and medical textbooks. During thisresearch phase, existing solutions (treatments and prevention programs) for heart diseasewere categorized into the 8D categories. Because of the different emphasis and the desireto promote prevention as a different type of treatment, solutions that maintain healthwhere separated from those that would help an ill
with 13 leaders from each of the networks and partner organizationsto understand their institutions’ historical context and their own professional background in theirnetworks, societies, and organizations through the lens of wider CI. These members included fivepeople from academic institutions, five organization leads from their respective partner organi-zations, three organization leads from their respective grant-driven networks, and one externalpartner organization responsible for research and evaluation. These leaders are all associated withand actively engaged in activities to broaden participation in engineering programs. 2 Protocol and questions can be provided upon requestZarch, McGill
between the User, Botpress, Whatsapp API, and Meta Developer Platform4. System Architecture & DesignThis section outlines the key requirements for developing a phishing detection chatbot for WhatsApp. Bydefining functional, non-functional, and technical specifications, we ensure a secure, scalable, and efficientsolution for real-time phishing detection.The WhatsPhish architecture is designed to automate phishing detection in WhatsApp conversations,ensuring users can quickly identify and mitigate potential threats. The system integrates multiplecomponents, including VirusTotal for external threat validation, OpenAI’s NLP model for languageanalysis, Botpress for dialogue management, and an internal phishing dataset for immediate filtering
. Her research interests include gender issues in the academic sci ©American Society for Engineering Education, 2023 Rule Based Database System for Airplane Maintenance Reza Sanati-Mehrizy Cody Strange Afsaneh Minaie Professor Student Professor College of Engineering and Technology Utah Valley UniversityAbstractOrganizations have many business rules (constraints) to implement in their dailyoperations. This is done mainly by action assertions traditionally implemented inprocedural logic buried deeply within user’s application program in a form that isvirtually unrecognizable
, mobile computing, networks, operatingsystems, digital forensics, philosophy/ethics, programming languages, software engineering,statistics/probability, and web programming 18 . Course content may range from cryptography, andthe mathematical principles and algorithms used to protect data to system-level protocols 4 .Additionally, the goals of courses vary dramatically, such as teaching cybersecurity as practicalvocation skills, as good engineering practices, or as academic theories.The methods used to teach these courses are just as varied as their goals. Some courses focus onlaboratory-based, experimental operations 6,14 . Others are lecture-based and involve the reviewand discussion of literature, and still others are challenge based courses
University. His interests include numerical methods, differential equations and exploring new ways of teaching common mathematics topics. Dr. Camp is currently the WeBWorK Administrator at Louisiana Tech, a position he finds both challenging and rewarding. He received his Ph.D. in Mathematics from Virginia Tech in 2003. Page 13.1327.1© American Society for Engineering Education, 2008 USING A WEB-BASED HOMEWORK SYSTEM TO IMPROVE ACCOUNTABILITY AND MASTERY IN CALCULUSAbstractHomework is a standard part of most calculus courses. Designing out-of-class assignments thatfoster individual accountability
AC 2009-2020: NETWORK PARTICLE TRACKING (NPT) FOR ECOSYSTEMTHERMODYNAMICS AND RISK ANALYSISErnest Tollner, University of Georgia, AthensJohn Schramski, University of Georgia Building on a distinguished and a uniquely diverse career in both public and private industry Dr. Schramski is a member of both the Environmental Engineering Faculty and the Systems & Engineering Ecology Research Program at the University of Georgia. Among other areas, his research and pedagogical pursuits include ecosystem energetics, industrial ecology, ecological network analysis, and engineering education curriculum. Currently, his engineering education research includes his restructuring of the traditional
project j provides benefits per unitof cost. Selecting projects in decreasing order of their B/C ratio until funds are exhausted usuallyresults in a selection of projects of a quality very similar to that of the binary programming for-mulation [1]. The heuristic does not include incremental analyses designed to insure selectionsidentical to PW. Its success nonetheless indicates that a project's B/C ratio is an indicator of itsquality in a limited resource environment. Page 4.212.3Rate of Return. The internal rate of return (IRR) of a project is defined to be the interest ratethat would be paid by a savings account receiving c0 dollars
, activelistening, and conflict management. As such, using academic controversy was a naturalextension of the pedagogical framework for the leadership course. Over several semesters, the course activities were designed to direct students' attention tothe role of ethics in computing by confronting them with controversial situations framed asethical dilemmas. The instructors, with input from students as one of the in-class course groupassignments, selected current and challenging topics that represented ethical dilemmas incomputing. The leadership course followed the constructive academic controversyimplementation format from Johnson and Johnson [39] that incorporates the five essentialelements of formal cooperative learning mentioned above. Each of
. V. ACKNOWLEGEMENTSFig. 17. Number concentration (NC) and mass concentration (MC) of sand We are indebted to lab manager Ami Rath at Wentworth,in the air chamber. who went above and beyond to make sure we had everything we needed. REFERENCES[1] P. Naughton, "History of Cleanrooms," Ashrae Journal, vol. 61, (11), pp. 38–54, November 2019.[2] D. H. Erickson, "Cleanroom Design", Washington State University, June 1987.[3] U.S. Department of Health and Human Services et al, "Guidance for industry sterile drug products produced by aseptic processing
. Unlike most upper-year engineering courses, our computer networks course isrelatively light on mathematics, and instead focuses on protocols, algorithms, and systems-levelthinking. Lectures and tutorials are dedicated to teaching the relevant concepts and problem-solving skills, while laboratory sessions are centered on hands-on design and analysis. Studentsare paired for the labs and are required to complete two large socket programming projects in theC language. In this section, we discuss the key challenges that we faced in the online delivery ofour course. We analyze these challenges, explain the actions we took to address them, and drawconnections to the literature.The first challenge we faced on the teaching side was determining how to