enrollment and high repeatrates. Table 1 shows that among the 3337 students enrolled in ME 311 during Fall 2007 toSummer 2014, 34% received a D, F, or withdrew (W).Table 1: Grade distribution for ME 311 students from Fall 2007 to Summer 2014 Grade Number of students A 302 (9%) B 658 (20%) C 1233 (37%) D/F/W 1144 (34%)A possible contributing factor to the bottleneck is the pedagogical approach. Prior to theredesign, instructors used a traditional lecture format and class time was divided betweenderivations, conceptual explanations, example problems, and assessments. Anecdotally, studentsreport that example problems are the most interesting part of the course, with derivations beingthe
animals in elementary school. In 2012 7th Iberian Conference on Information Systems and Technologies (CISTI) (pp. 1–6).[3] Braun, V., &Clarke,V.(2006). Using thematic analysis in psychology. Qualitative research in Psychology.[4] Bujak, K. R., Radu, I., Catrambone, R., MacIntyre, B., Zheng, R., & Golubski, G. (2013). A psychological perspective on augmented reality in the mathematics classroom. Computers & Education, 68, 536–544. doi:10.1016/j.compedu.2013.02.017[5] Chang, Y.-J., Chen, C.-H., Huang, W.-T., & Huang, W.-S. (2011). Investigating Students’ Perceived Satisfaction, Behavioral Intention, and Effectiveness of English Learning Using Augmented Reality. In Proceedings of the 2011 IEEE
/embedded-systems-shape-world-utaustinx-ut-6-10x. [Accessed 5 February 2017].[8] Alex Fosdick, "Introduction to Embedded Systems Software and Development Environments," Coursera, [Online]. Available: https://www.coursera.org/learn/introduction-embedded-systems.[9] B. Miller, "Understanding Entrepreneurship -- Part II -- New Beginnings," [Online]. Available: http://reputablejournal.com/understanding-entrepreneurship-2018-2.html.[10] M. Guzdial, B. Ericson, B. Morrison and M. Parker, "CS Principles: Big Ideas in Programming," [Online]. Available: http://interactivepython.org/runestone/static/StudentCSP/index.html.[11] B. Miller, D. Ranum, J. Elkner, A. B. Downey and C. Meyers, "How to Think Like a Computer Scientist
],which is a general function avail-able for most CAD software, and the tutorial has a reminder in the interface to help learners learnthis skill.Figure 1: Flow Chart of FreeCAD Intelligent Tutorial System Figure 2: An overall view of user interface Figure 3: Details on the top of the user interface (a) (b)Figure 4: (a) Details of the right-hand side of the user interface. (b) Goal model for pre-test,training section and post-test 1 and 2During the pre-test, the learner will be given five minutes to construct a given model, shown inFigure 4b. The solid model is a famous one that can be constructed from primitives by a con-structed solid geometry
. In each class, halfof the students completed Part 1 on paper and Part 2 on the computer, while the other half ofstudents did the reverse. Part 3 of each examination can be considered as the remaining 50-60%of each test and was completed in the same mode for both versions (A and B). Most of Part 3was completed on paper; however, some questions required the use of a computer. The resultsfrom Part 3 were not considered in this test mode study. The test breakdown is representedschematically in Figure 1, and represents the same structure of all three examinations used in thisstudy.Question phrasing and order on the same part (1 or 2) were identical, regardless of testing mode.The paper portions were created to be as aesthetically similar as
earlier activities related toChapters 5, 7 and 8 of the course textbook30). Groups were comprised of 4 students and weremostly self-selected; the same self-selected teams were used to complete all group activities(e.g., homework assignments and in-class group activities). Page 24.1332.6 (a) (b) Figure 2: (a) Ideal and (b) Real Pendulums Description: An ideal pendulum (shown in
. To furtherenhance the educational and behavioral impact of an educational video game, a researcher canleverage virtual reality. Virtual reality has illustrated its ability to stimulate strong emotionalresponses from users. Therefore, based on the provided background literature and research gap,the team has set the goal of evaluating the potential effect that a virtual reality educational gamehas on learning and behavior. It is the hope of the research team to provide evidence illustratingthe role that an educational virtual reality game has in supporting environmental education andbehavior.Bibliography[1] A. S. Goudie, The human impact on the natural environment: past, present, and future. John Wiley & Sons, 2013.[2] B. S. Halpern et
the realm of computer scienceeducation directed at women is logical. 13References:AAUW, T. S. (2000). Educating girls in the new computer age. American Association ofUniversity Women Educational Foundation, Washington, DC, USA.Ahuja, M. K., & Thatcher, J. B. (2005). Moving beyond intentions and toward the theory of trying:Effects of work environment and genderAshcraft, C., Eger, E., & Friend, M. (2012). Girls in iT: the facts. National Center for Women &IT. Boulder, CO.Azmi, S., Iahad, N. A., & Ahmad, N. (2015). Gamification in online collaborative learning forprogramming courses: A literature review. ARPN Journal of Engineering
Encyclopedia of Education (Third Edition). P. Peterson, E. Baker and B. McGaw. Oxford, Elsevier: 112-118.Baker, R. S. J. D. and K. Yacef (2009). "The State of Educational Data Mining in 2009: A Review and Future Visions " Journal of Educational Data Mining 1(1).Hall, M., E. Frank, G. Holmes, B. Pfahringer, P. Reutemann and I. H. Witten (2009). "The WEKA Data Mining Software: An Update." SIGKDD Explorations 11(1).Johnson, L., S. Adams-Becker, M. Cummins, V. Estrada, A. Freeman and H. Ludgate (2013). NMC Horizon Report: 2013 Higher Education Edition. Austin, Texas, The New Media Consortium.Macfadyen, L. P. and S. Dawson (2010). "Mining LMS data to develop an "early warning system" for educators: A proof of concept." Computers & Education
attributes of a good competition 4: a) incorporates significant course material from more than one discipline; b) provides success commensurate with care in design; c) requires increasing factual and procedural knowledge; d) requires exercising engineering judgment; e) does not require significant infrastructure; f) offers a spectacle;Academia and industry join forces to organize various design contests, from the course level 4, tothe international levels, giving students opportunities to grow professionally and to connect withtheir peers and potential employers. In the area of electrical and computer engineering andrelated majors, very popular contests are the contests sponsored by IEEE10. IEEE offers a varietyof
additional power supply. Finally, the PIC-PG2C programmer requiresIC-Prog,11 a freely available software, to download PIC HEX code to the PIC microcontroller.Note that the PIC HEX code is obtained from the PIC assembly code by using the MPASMassembler,12 also available for free. Page 12.512.4* Universal synchronous/asynchronous receiver and transmitter.† Pulse width modulation. (a) (b) Figure 2: (a) PIC-PG2C and a PIC and (b) PIC-PG2C with a PIC mounted2.3.PIC Development Board The PIC development board of this paper is created on a breadboard and consist of (i) aPIC16F74
redesigned advising process based on such feedback; we focused on ourEngineering Leadership program. The criteria for this selection was: 1) the cohorts within theprogram were well identified and documented, 2) the program was smaller (80 students) and newermaking it more flexible to adapt 3) the advisor(s)/faculty wanted to move to a three-pillar modelwhich focused on a) advising, b) mentoring, and c) professional development.A team involving four students from varying classifications, along with a student from a differentdepartment/college, was brought in to conduct focus groups around the challenges of the currentadvising process. Based on such, the team was re-aligned with the goal of conducting addition focusgroups of students about what type
patternrecognition are introduced in Pattern Recognition Module, as seen in Figure 2a. Abstraction is theprocess of filtering out, or ignoring, the characteristics of patterns that are not needed in order toconcentrate on those that are. Abstraction is also introduced as a module, as seen in Figure (a) Introduction page (b) Decomposition page Figure 12b. (a) Pattern Recognition page (b) Abstraction page Figure 2In CT, we refer to a step-by-step set of instructions as algorithms. An algorithm is a step-by-steplist of instructions that, if followed exactly, will solve the problem under
the fit, r = 0.444 and p < 10−5.We also investigated the correlation between students’ use of CN and the number of homeworkassignments that they skipped. Skipping homework assignments is a strong (negative) indicatorof engagement with the course. For the semester described in this paper, no student earned agrade of “B” or higher while skipping more than 3 of the 28 assignments. Figure 3 shows therelationship between skipped assignments and the number of anar seeds earned. Once again, wesee a clear correlation, in this case negative, between students’ effort on CN and their effort onthe homework. 30! R²#=#0.18979
possible.The experiments for the basic IoT training module are further discussed;(a) LED Switching over InternetThe goal of this experiment is to introduce students to the basic concept of IoT using LED.Although neither a sensor nor an actuator is needed for this experiment, students are expected toidentify that the IoT function required is control. For this experiment, students will be required toset up the system and independently use RF and Bluetooth as connectivity types. The studentsthen use the mobile/ web app to test their system. They will be required to record the actual stateof the LED when controlled from the app.(b) A/C Bulb Switching over InternetControlling an A/C bulb is a step ahead of controlling an LED. With this, the learner
, K.D., Newell, J.A., and Newell, H.L. (2003). Rubric Development for Assessment of Undergraduate Research: Evaluating Multidisciplinary Team Projects,” (CD) Proceedings of the American Society for Engineering Education Conference.6. Whitman, L. E., Malzahn, D. E., Chaparro, B. S., Russell, M., Langrall, R., Mohler, B. A. (2005). A comparison of group processes, performance, and satisfaction in face-to-face versus computer- mediated engineering student design teams. Journal of Engineering Education, 94(3), 327-334.7. Zhou, Z., Pazos, P. (2014). Managing Engineering Capstone Design Teams: Important Considerations and Success Factors. Proceedings of the 2014 Industrial and Systems Engineering Research
secondary method of submittinganswer choices. The informed consent screen provides students with information about the Page 26.516.5ongoing AIChE Concept Warehouse Study, Integration of Conceptual Learning Throughout theCore Chemical Engineering Curriculum and allows students to opt in. Figure 3: The home screen (a) with questions assigned and (b) when no questions have been assigned.When questions are assigned, students can navigate to the questions screen (Figure 5) by eitherclicking on the names of the classes with questions assigned or by clicking the questions buttonin the hidden menu. The questions screen
download, by logging in to the system with a username and password. Users canonly complete a competition once, and then go on to other competitions that the teacher orsystem administrator has activated. Competition results are sent to the server with data ontimes and scores. The application has a help function available for explaining how the gameworks. Each exercise has an overall score of one point if exercise is correct and zero if it’swrong as well as time used for completing it. Page 22.425.3Figure 2. Mobile Game Interface: (a) Login (b) Menus (c) Training access (d) Exercises, (e) An example of a Type 1 exerciseTwo types
resolve them, andwhat issues remained after the discussions. The timeline for the activity is tentative and will beadjusted as we gain experience with the system. (a) Login (b) Quiz Figure 1: Initial ScreensSince many students use smartphones regularly, we are implementing our system to be accessibleboth on smartphones as well as via the desktop. Figure 1 displays the initial screens as seen onan Android device. The login screen is standard and authenticates the user. Once the student haslogged in, he/she will see the current quiz, as in Fig. 1(b). The student will then be able to submit 2 It is not clear that it should be
course was developed and deployed makes it model forpossible replicated at other institutions.Bibliography1. Hansen, R. E. (1995). Five principles for guiding curriculum development practice: The case of technological teacher education. Journal of Industrial Teacher Education. 32(2). Winter 1995.2. Arnold, A & Flumerfelt, S. (2012). Interlacing Mission, Strategic Planning, and Vision to Lean: Powerful DNA for Change. AASA Journal of Scholarship and Practice, 9(1), 26 - 47.3. Emiliani, B., Kensington, C., & Most, U. S. (2005). Lean in higher education.Center for Lean Business Management. Available at http://www. superfactory. com/articles/lean_higher_ed. Aspx.4. Emiliani, M. L. (2004). Improving business school
question shown in Fig. 1 was usedIn answering this lead-in question, pick the one answer that you think is most correct and complete;and provide a brief justification of your choice.The static mechanism, when used inside a Java class, is used for the following reason: (a) The “static” keyword is used for only one purpose: to flag the main() function of the Java program so that the system will know that is where the execution should begin. The “static” mechanism is not used for anything else in Java (unlike in C++ which uses it for other purposes). (b) In some sense, “static” is essentially equivalent to declaring something to be “public” so that a variable or method of the class that is flagged as static can be used anywhere
final publication, the Spring 2009 is about half complete.At this stage, we are optimistic about the changes we have made to the Dynamic Systems &Control Course.Bibliography1. B. D. Coller, “Implementing a video game to teach principles of mechanical engineering,” Proceedings of the 2007 American Society for Engineering Education Annual Conference. 2007.2. S. S. Rao, Applied Numerical Methods for Engineers and Scientists, Prentice Hall, 2002.3. B. D. Coller & M. J. Scott, “Effectiveness of using a video game to teach a course in mechanical engineering,” (pre-print) 2008, available at www.ceet.niu.edu/faculty/coller4. B. D. Coller and D. J. Shernoff, “Video game-based education in mechanical engineering: A look at student
Universityincludes a culminating cornerstone design project. The project carried out by teams of fourstudents involves designing, building, testing, and demonstrating small autonomous roboticvehicles which must perform specified tasks while operating on a specially built robot course.To control the mechatronic elements of the course, a Raspberry Pi 2 Model B is used to drive anArduino (via a serial connection), an I/O Board (via I2C), and a PWM Board (via I2C). This setof boards is synchronized via the Raspberry Pi to a central PC, allowing the four regions of thecourse to run in parallel and provide the opportunity for competition between four robots.From the student perspective, the system is simplified and abstracted through a touch screeninterface that
Paper ID #15793Correlation of a Cantilever Beam Using Beam Theory, Finite Element Method,and TestsDr. Luis E Monterrubio, Robert Morris University Luis Monterrubio joined the Robert Morris University Engineering Department as an Assistant Professor in the Fall of 2013. He earned his B.Eng. from the Universidad Nacional Aut´onoma de M´exico, his M.A.Sc. from the University of Victoria, Canada, and his Ph.D. from the University of Waikato, New Zealand. All degrees are in Mechanical Engineering and both M.A.Sc. and Ph.D. studies are related with vibrations. After his Ph.D. he worked at the University of California, San Diego as
in the data, x – a vector of inputs {x1, x2,x3, …, xn} and multiplies each input by a weight {w1, w2, w3, … wn}. The general body of theneuron then adds the weighted inputs and a bias. The scaler result is passed through an outputfunction called the “activation function”. The scaler output of a trained network can be used fordata classification or for propagation to an input of a larger network in a method called pooling[10]. A mathematical model of the perceptron is shown in Equation 1 [7]. 𝑎 = 𝑓(∑'()* 𝑥i∙ 𝑤 i + b) (1)The value of the synaptic weights prior to training is normally randomized and is unimportant asthe value of the weights and bias are gradually
onAlternatives to Lecture in the Computer Science Classroom, Vol. 13 Issue 3, Art. No. 12, 2013.[20] S. Leutenegger and J. Edgington, "A Games First Approach to Teaching IntroductoryProgramming," SIGCSE technical symposium on Computer science education, 2007.[21] H.N. Mok, "Teaching Tip: The Flipped Classroom," Journal of Information SystemsEducation, 25(1), 7-11, 2014.[22] V. Norman and J. Adams, "Improving Non-CS Major Performance in CS1," SIGCSETechnical Symposium on Computer Science Education, pp. 558-562, 2015.[23] Pearson: MyProgrammingLab.https://www.pearsonmylabandmastering.com/myprogramminglab/. August 2017.[24] L. Porter, D. Bouvier, Q. Cutts, S. Grissom, C. Lee, R. McCartney, D. Zingaro, B. Simon,"A Multi-institutional Study of Peer
construucted based on o object-oriiented structuures. Interacctionswithin thhe virtual woorld occur baased on evennt and inform mation flow between b objeects. The objject-oriented approach off modeling iss helpful alsoo in the integgration of VR R environmeents to agentt- Page 15.111.6based holonic contro ol systems sinnce the majoor structural componentss of HMSs arre object-oriented MAS. The holonic control model involves agents and represents basic manufacturingand material handling components, including a manufacturing cell, a conveyor belt, an AGV, etc.For
for this lecture, but with more focus on cybersecurityconcepts and correlation with course activities. The lecture is always done toward the end of thesemester, as students are working on a course project that involves design and implementation ofa 3-bit CPU. Figure 7 shows the desired (end-product) of the course project which could be builtup using constitute components. From semester to semester, the various “functions” andopcodes of the CPU change. Figure 7: Example 3-bit CPU from PETGUI Component and Gate-Level DefinitionThe example in Figure 7 shows that two 3-bit numbers (A,B) are input along with a 2-bit opcode,which chooses 1 of 4 potential functions: NEGATE(A), AND(A,B), COMPARE(A,B), andADD(A,B). The PETGUI guest lecture
spread,” Technovation, vol. 25, no. 3, pp. 213–222, 2005.[2] O. B. Adedoyin and E. Soykan, “Covid-19 pandemic and online learning: the challenges and opportunities,” Interactive Learning Environments, pp. 1–13, 2020.[3] G. E. Prestera and L. A. Moller, “Facilitating Asynchronous Distance Learning: Exploiting Opportunities for Knowledge Building in Asynchronous Distance Learning Environments.,” 2001.[4] R. Blair and T. M. Serafini, “Integration of education: Using social media networks to engage students,” Systemics. Cybernetics, and Informatics, vol. 6, no. 12, pp. 28–31, 2014.[5] N. Buzzetto-More, “Student attitudes towards the integration of YouTube in online, hybrid, and web-assisted courses: An examination of the impact
panel on cyberinfrastructure. http://www.nsf.gov/od/oci/reports/atkins.pdf (accessed March 12, 2009). 16. Ainsworth, S., M. Honey, W.L. Johnson, K. Koedinger, B. Muramatsu, R. Pea, M. Recker, and S. Weimar. 2005. Cyberinfrastructure for Education and Learning for the Future: A Vision and Research Agenda. Page 14.592.13 http://www.cra.org/reports/cyberinfrastructure.pdf (accessed March 12, 2009).17. The National Science Foundation. 2007. Cyberinfrastructure Vision for 21st Century Discovery. http://www.nsf.gov/pubs/2007/nsf0728/nsf0728.pdf accessed (March 12, 2009).18. Borgman, C.L., H. Abelson