. Page 14.53.3The 8D Methodology may be used by individuals or teams, as described in a previouswork.4 In this paper, the 8D Methodology process was carried out by one of the authorswho learned the system in an engineering context and whose knowledge of medicine islimited to some college-level study. This individual then spent several days researchingheart disease and current treatments from literature and medical textbooks. During thisresearch phase, existing solutions (treatments and prevention programs) for heart diseasewere categorized into the 8D categories. Because of the different emphasis and the desireto promote prevention as a different type of treatment, solutions that maintain healthwhere separated from those that would help an ill
with 13 leaders from each of the networks and partner organizationsto understand their institutions’ historical context and their own professional background in theirnetworks, societies, and organizations through the lens of wider CI. These members included fivepeople from academic institutions, five organization leads from their respective partner organi-zations, three organization leads from their respective grant-driven networks, and one externalpartner organization responsible for research and evaluation. These leaders are all associated withand actively engaged in activities to broaden participation in engineering programs. 2 Protocol and questions can be provided upon requestZarch, McGill
Paper ID #48329Identifying Struggling Students Using LMS DataDr. Abdulmalek Al-Gahmi, Weber State University Dr. Abdulmalek Al-Gahmi is an associate professor at the School of Computing Department of Weber State University. His teaching experience involves courses on object-oriented programming, full-stack web development, computer graphics, algorithms and data structures, and machine learning. He holds a Ph.D. in Computer Science from New Mexico State University, M.S. in Computer Science, M.A. in Extension Education, and B.S. in Electrical Engineering. ©American Society for Engineering Education
between the User, Botpress, Whatsapp API, and Meta Developer Platform4. System Architecture & DesignThis section outlines the key requirements for developing a phishing detection chatbot for WhatsApp. Bydefining functional, non-functional, and technical specifications, we ensure a secure, scalable, and efficientsolution for real-time phishing detection.The WhatsPhish architecture is designed to automate phishing detection in WhatsApp conversations,ensuring users can quickly identify and mitigate potential threats. The system integrates multiplecomponents, including VirusTotal for external threat validation, OpenAI’s NLP model for languageanalysis, Botpress for dialogue management, and an internal phishing dataset for immediate filtering
. Her research interests include gender issues in the academic sci ©American Society for Engineering Education, 2023 Rule Based Database System for Airplane Maintenance Reza Sanati-Mehrizy Cody Strange Afsaneh Minaie Professor Student Professor College of Engineering and Technology Utah Valley UniversityAbstractOrganizations have many business rules (constraints) to implement in their dailyoperations. This is done mainly by action assertions traditionally implemented inprocedural logic buried deeply within user’s application program in a form that isvirtually unrecognizable
University. His interests include numerical methods, differential equations and exploring new ways of teaching common mathematics topics. Dr. Camp is currently the WeBWorK Administrator at Louisiana Tech, a position he finds both challenging and rewarding. He received his Ph.D. in Mathematics from Virginia Tech in 2003. Page 13.1327.1© American Society for Engineering Education, 2008 USING A WEB-BASED HOMEWORK SYSTEM TO IMPROVE ACCOUNTABILITY AND MASTERY IN CALCULUSAbstractHomework is a standard part of most calculus courses. Designing out-of-class assignments thatfoster individual accountability
University Na Li is a PhD candidate in informatics at Penn State University. Her research focuses on human computer interaction, instructional design and learning science. Her research areas range from scalable online learning, human-computer interaction to computer-supported collaborative work and learning.David Benjamin Hellar, The Pennsylvania State University D. Benjamin Hellar, Ph.D. is the Manager of Data Empowered Learning for Penn State Information Technology, a data science and learning analytics team that supports the institution’s student success initiatives and data strategy. ©American Society for Engineering Education, 2025 Data-Informed instruction: pedagogical responses and
AC 2009-2020: NETWORK PARTICLE TRACKING (NPT) FOR ECOSYSTEMTHERMODYNAMICS AND RISK ANALYSISErnest Tollner, University of Georgia, AthensJohn Schramski, University of Georgia Building on a distinguished and a uniquely diverse career in both public and private industry Dr. Schramski is a member of both the Environmental Engineering Faculty and the Systems & Engineering Ecology Research Program at the University of Georgia. Among other areas, his research and pedagogical pursuits include ecosystem energetics, industrial ecology, ecological network analysis, and engineering education curriculum. Currently, his engineering education research includes his restructuring of the traditional
, mobile computing, networks, operatingsystems, digital forensics, philosophy/ethics, programming languages, software engineering,statistics/probability, and web programming 18 . Course content may range from cryptography, andthe mathematical principles and algorithms used to protect data to system-level protocols 4 .Additionally, the goals of courses vary dramatically, such as teaching cybersecurity as practicalvocation skills, as good engineering practices, or as academic theories.The methods used to teach these courses are just as varied as their goals. Some courses focus onlaboratory-based, experimental operations 6,14 . Others are lecture-based and involve the reviewand discussion of literature, and still others are challenge based courses
project j provides benefits per unitof cost. Selecting projects in decreasing order of their B/C ratio until funds are exhausted usuallyresults in a selection of projects of a quality very similar to that of the binary programming for-mulation [1]. The heuristic does not include incremental analyses designed to insure selectionsidentical to PW. Its success nonetheless indicates that a project's B/C ratio is an indicator of itsquality in a limited resource environment. Page 4.212.3Rate of Return. The internal rate of return (IRR) of a project is defined to be the interest ratethat would be paid by a savings account receiving c0 dollars
of Engineering program in Materials Science and Engineering in Fall 2025.Ananya Singh, The University of Toledo Ananya Singh is a Bachelor’s student at the University of Toledo, majoring in Computer Science and Engineering. She is an undergraduate research assistant at the RIM Lab, where her research focuses on machine learning and its applications in IoT. Her work includes integrating AI with IoT systems to develop innovative solutions for real-world problems such as wildfire detection, where she led the development of drone-based sensing systems and predictive analytics for early fire alerts. Ananya has co-authored research paper in the areas of explainable AI, autonomous systems, and drone technology. She
, activelistening, and conflict management. As such, using academic controversy was a naturalextension of the pedagogical framework for the leadership course. Over several semesters, the course activities were designed to direct students' attention tothe role of ethics in computing by confronting them with controversial situations framed asethical dilemmas. The instructors, with input from students as one of the in-class course groupassignments, selected current and challenging topics that represented ethical dilemmas incomputing. The leadership course followed the constructive academic controversyimplementation format from Johnson and Johnson [39] that incorporates the five essentialelements of formal cooperative learning mentioned above. Each of
. V. ACKNOWLEGEMENTSFig. 17. Number concentration (NC) and mass concentration (MC) of sand We are indebted to lab manager Ami Rath at Wentworth,in the air chamber. who went above and beyond to make sure we had everything we needed. REFERENCES[1] P. Naughton, "History of Cleanrooms," Ashrae Journal, vol. 61, (11), pp. 38–54, November 2019.[2] D. H. Erickson, "Cleanroom Design", Washington State University, June 1987.[3] U.S. Department of Health and Human Services et al, "Guidance for industry sterile drug products produced by aseptic processing
Paper ID #48454Student perception on Inquiry Based Learning Ordinary Differential EquationcourseDr. Thiwanka Nethali Fernando, University of Virginia Professor Nethali Fernando’s research interests are in machine learning and in projects that combine data science with pedagogy. Prior to joining the Center for Applied Mathematics at UVA Engineering she served as a postdoctoral research associate and adjunct teaching faculty at The University of Texas at Arlington and as a lecturer at Northern Arizona University. Professor Fernando is originally from Sri-Lanka and earned her bachelor’s degree in mathematics from the University
. Unlike most upper-year engineering courses, our computer networks course isrelatively light on mathematics, and instead focuses on protocols, algorithms, and systems-levelthinking. Lectures and tutorials are dedicated to teaching the relevant concepts and problem-solving skills, while laboratory sessions are centered on hands-on design and analysis. Studentsare paired for the labs and are required to complete two large socket programming projects in theC language. In this section, we discuss the key challenges that we faced in the online delivery ofour course. We analyze these challenges, explain the actions we took to address them, and drawconnections to the literature.The first challenge we faced on the teaching side was determining how to
Belonging: S-STEM Programs’ Practices & Empirically Based Recommendations (S-STEM REC American Association for the Advancement of Science, 2023).[7] S. Cheryan, E. J. Lombard, L. Hudson, K. Louis, V. C. Plaut, and M. C. Murphy, “Double isolation: Identity expression threat predicts greater gender disparities in computer science,” Self Identity, vol. 19, no. 4, pp. 412-434, 2020, doi: 10.1080/15298868.2019.1609576.[8] A. Garr-Schultz, G. A. Muragishi, T. A Mortejo, and S. Cheryan, “Masculine defaults in academic Science, Technology, Engineering, and Mathematics (STEM) fields,” Psychological Sciences in the Public Interest, vol. 24, no. 1, pp. 1-9, 2023, doi: 10.1177/15291006231170829.[9] S. Rodriguez
, in December 2012. He received his Ph.D. in Electrical Engineering and Computer Science Department from the Uni- versity of Toledo, Toledo, OH. He worked in the Hardware Oriented Security Lab at the University of Toledo and served as Project Manager with General Electric GE. His research interests include hardware- oriented security and Trust, Machine Learning Algorithms, Optimization Techniques, Neural Networks, and their applications. ©American Society for Engineering Education, 2023 Studies of Autonomous UAV-UGV Teams in Construction Applications: A Survey from Advances and Challenges Perspective Coradino Colasurd
Paper ID #17164Integrated (Private) Cloud Computing Environment for Access to SpecializedCampus-bound Software Applications - Pilot StudyDr. Emil H Salib, James Madison University Professor in the Integrated Science & Technology Department at James Madison University. Current Teaching - Networking & Security and Cyber Intelligence Security. Current Research - Private Cloud Computing, Internet of Things (IoT), Mobile IPv6 and Design for Motivation CurriculumIan Healey, ASIS InternationalMr. Alexander Ryan ChamberlainMrs. Livia S Griffith c American Society for Engineering Education, 2016
Beverages Pvt. Ltd. and Saint-Gobain India Pvt. Ltd. (Research & Development). His interest in areas such as improvement in instructional techniques, faculty perspectives and teaching methodologies, drove him towards the domain of Engineering Education. Specifically, the question of how engineering education can be made more effective and engaging fascinated and motivated him to pursue research in this domain. He is working with his major professor on an NSF funded project dealing with communities and relationships that enable and empower faculty and students in engineering.Deborah Moyaki, University of Georgia Deborah Moyaki is a doctoral candidate in the Engineering Education and Transformative Practice program
Parson, PhD is an Associate Professor of Educational and Organizational Leadership. Her Ph.D. is in Teaching & Learning, Higher Education from the University of North Dakota. Laura’s research seeks to identify where and how institutional disjunctures occur in higher education for women and members of minoritized groups. She is a qualitative methodologist, with a focus on ethnographic and discourse methods of inquiry.Dr. Sushil Adhikari, Auburn University Dr. Sushil Adhikari is a Professor in the Biosystems Engineering Department and the Center for Bioenergy and Bioproducts Director at Auburn University. He is the Co-Principal Investigator of the NSF REU site: Research experience through collaborative teams in
. Suining He received the NSF CAREER Award in 2023, Google Research Scholar Program Award and NVIDIA Applied Research Accelerator Program Award in 2021, and two UConn Research Excellence Program (REP) Awards in 2022 and 2020, and held the Google PhD Fellowship in Mobile Computing in 2015, HKUST School of Engineering (SENG) PhD Research Fellowship Award in 2015–2016, and Hong Kong Telecom Institute of Information Technology (HKTIIT) Post-Graduate Excellence Scholarship in 2016. His scholarly works appear in WWW, SenSys, UbiComp, INFOCOM, TKDE, and TMC, and received the IEEE MASS Best Paper Runner-up Award in 2020 and IEEE RTSS Outstanding Paper Award in 2021. He was ranked among the Stanford’s World’s Top 2
metacognition. Thus,our future work may be 1) how to encourage students to use CompassX more frequently and 2)how to further measure such behavioral data more accurately. CompassX is publicly available athttps://compassx.ucsd.edu/compassx and we have designed the tool such that newinstructors can manage their own classes and set of questions. We encourage instructorsinterested in using the tool to reach out to the authors of this paper.2 Related WorkWe leveraged the prior work in this section to optimize the learning benefits of CompassX andguide our intervention. Specifically, we developed our metacognitive features to align withZimmerman’s Cyclical Phases Model, which has been investigated in multiple prior research forlearning course concepts. The
Paper ID #15354A Tool for Checking Attendance of Students in Classroom AutomaticallyProf. Taekyoung Kwon, Seoul National University Ted ”Taekyoung” Kwon is a professor with Department of Computer Science and Engineering, Seoul National University (SNU). Before joining SNU, he was a Postdoctoral Research Associate at University of California Los Angeles and City University New York. He obtained BS, MS and PhD at SNU in 1993, 1995, 2000, respectively. During his graduate program, he was a visiting student at IBM T.J. Watson Research Center and at University of North Texas. He was a visiting professor at Rutgers University
Technion – Israel Institute of Technology, Haifa, Israel, in 2019, his master’s in curriculum management with a thesis and with honors from Bar-Ilan University, Ramat Gan, Israel, in 2013, and both his B.Sc. degrees in biology and in psychology as part of the Neuroscience track from Tel-Aviv University, Tel Aviv-Jaffa, Israel, in 2009. In 2019, he joined the New Engineering Education Transformation program at the School of Engineering, Massachusetts Institute of Technology (MIT), Cambridge, MA. As of 2023, he is also Digital Education Lecturer with the Department of Aeronautics and Astronautics in the same school, and Expert-in-residence with the MIT Abdul Latif Jameel World Education Lab. His work has been
Paper ID #45814Community Engaged Researchers Share Insights into Successes and Cautions[Traditional Research Paper]Dr. Angela R Bielefeldt, University of Colorado Boulder Angela Bielefeldt is a professor at the University of Colorado Boulder in the Department of Civil, Environmental, and Architectural Engineering (CEAE) and Director of the Engineering Education Program. She is a Fellow of the American Society for Engineering Education (ASEE) and a licensed Professional Engineer in Colorado. ©American Society for Engineering Education, 2025 Community Engaged Researchers Share Insights into
2006-2009: CYBER DEFENSE COMPETITIONDouglas Jacobson, Iowa State University Dr. Doug Jacobson Associate Professor Department of Electrical and Computer Engineering Iowa State University Ames, IA 50011Nate Evans, Iowa State University Nate Evans Computer Engineering Student Department of Electrical and Computer Engineering Iowa State University Ames, IA 50011 Page 11.386.1© American Society for Engineering Education, 2006 Cyber Defense CompetitionAbstractThe world today is becoming more and more reliant on the use of information technology. Hencethe world is becoming potentially more
Paper ID #16718A Benchmarking Study of Clustering Techniques Applied to a Set of Charac-teristics of MOOC ParticipantsMs. Rosa Cabedo, Universidad Politecnica de Madrid Rosa Cabedo is Engineer in Computer Science and currently Ph.D. Student at Technical University of Madrid (Spain) in the field of Open Education. The final purpose of her research is the identification and analysis of the profiles of language MOOC participants and the features of language learning (interaction, feedback, evaluation, certification) in order to adequate the design to MOOC format to facilitate the linguistic and communicativa competences
design is based upon the special mathematics background, most IT/computerrecommended computing curriculum by IEEE Computer science departments in major universities offer the courseSociety/ACM Task Force, also referred to as CC2001. A for graduate students. However, we have designed theset of lab activity experiments have been presented that course to be offered for junior/senior level undergraduatecan be adopted very easily in a traditional fifteen week IT students [4].semester offering. Unlike the IT program at UAE University, most CS programs require
AC 2012-3817: DEVELOPMENT OF NANOSCALE VIRTUAL REALITYSIMULATIONS FOR THE TEACHING OF NANOTECHNOLOGYDr. Xiaobo Peng, Prairie View A&M University Xiaobo Peng is an Associate Professor in the Department of Mechanical Engineering at Prairie View A&M University. His research interests include CAD/CAM, haptics, solid modeling, virtual reality, and virtual product design. Peng is a member of ASEE and ASME.Mr. Blesson Isaac, Prairie View A&M UniversityDr. Richard Thomas Wilkins, Prairie View A&M University Department of Electrical and Computer Engineering Page 25.463.1 c American
Paper ID #38009Pushing the Boundaries of Interdisciplinary CollaborationNandini Sharma, Department of Communication Studies, Organizational Communication andTechnology, The University of Texas at AustinJeffrey William Treem, Department of Communication Studies, Organizational Communication andTechnology, The University of Texas at AustinMegan Kenny Feister, Communication Program, Organizational Communication, California StateUniversity Channel Islands © American Society for Engineering Education, 2022 Powered by www.slayte.com1 Pushing the Boundaries of Interdisciplinary