Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 31 - 60 of 86 in total
Conference Session
Emerging Computing and Information Technologies
Collection
2014 ASEE Annual Conference & Exposition
Authors
Charles B. Owen, Michigan State University; Sarah Coburn, Michigan State University; Jordyn Castor
Tagged Divisions
Computing & Information Technology
rubber bands. Wire allowed the instructor tocreate links that reflected those on the drawing, with bends and a single, sturdy line. Rubber Page 24.1167.6bands allowed the student to modify the diagram herself. Roles were indicated on associationsusing smaller Post-it notes, also with Braille.A set of foam symbols was found at a local craft store that included several symbols close to theUML symbols used on edges. Figure 3 shows some of these symbols and their correspondingUML element. The zero, one, and star symbols represented the most common multiplicities.Inheritance was indicated using a triangle. Composition was indicated with the two
Conference Session
POTPOURRI
Collection
2013 ASEE Annual Conference & Exposition
Authors
Jeffrey Chastine, Southern Polytechnic State University
Tagged Divisions
Computing & Information Technology
render anaugmented view, similar to the helmets used in virtual reality. Using an HMD, the user viewsthe physical world through transparent glass capable of reflecting virtual information, oralternatively, using the two small displays in helmet that display a video stream of theenvironment. While providing an immersive experience, they are prohibitively expensive formany universities. An alternative to HMDs is to use smart mobile devices that serve as awindow through which to view the augmented world. By pointing the device at an area ofinterest, the video stream from the built-in camera can be sent to the display, providing the userwith a mediated view of the world. This view provides no depth information, but can still serveas a foundation for
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
factors can be made easier byorthogonal factor rotation. We used the varimax rotation method with Kaiser normalization.2.3 Cluster AnalysisAfter the factors or components underlying the different conceptual categories have beenidentified, it is possible to derive scores for each student on each factor. We used hierarchicalcluster analysis, using the Euclidian distance as a proximity measurement, to classify students’factor scores and to group students in different clusters reflecting their responses to conceptualassessments. The number of clusters was determined by inspection of the dendrogram, a displayrepresenting visually the distances at which clusters are combined
Conference Session
Information and Network Security
Collection
2013 ASEE Annual Conference & Exposition
Authors
Krystal S Corbett, Cyber Innovation Center; Chuck Gardner, New Orleans Military and Maritime Academy; Anthony Joseph Taffaro Jr., New Orleans Military and Maritime Academy; Marvin Nelson, Benton High School
Tagged Divisions
Computing & Information Technology
. The cadets have found these topicsengaging and have participated with excitement in the projects and discussions that centeraround the topics. The cadets enjoy discussing and learning about the various topics in computerscience, especially the discussions on networking. Using the networking project provided byNICERC, the cadets became the nodes and lines of communication while others acted as the“Man in the Middle” or the “Denial of Service.” This enhanced their understanding of sendingmessages through cyberspace and threats that exist.Cyber Science is one course which has been accepted readily and enthusiastically by both theCyber Science instructors and the NOMMA administration. This excitement is reflected in thecadets’ interest and desire
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Reneta Davina Lansiquot, New York City College of Technology; Ashwin Satyanarayana, New York City College of Technology; Candido Cabo, New York City College of Technology/CUNY
Tagged Divisions
Computing & Information Technology
different courses of the sametype. The lack of transfer is likely due to multiple factors. Students may have forgotten some of thematerial learned in a previous course; students may not perceive the connections; students may seethe connections but are unable to use the material in meaningful ways in a different context; or thepedagogical approach used by instructors may not be conducive to transfer.3Approaches used to facilitate transfer of learning include the use of reflective writings,contextualization of learning experiences, and application of learning to real life. Multiplestrategies have been suggested to encourage transfer 3: making the need for transfer of learningexplicit to students, advising students to take courses in the appropriate
Conference Session
Emerging Computing and Information Technologies II
Collection
2016 ASEE Annual Conference & Exposition
Authors
Yujian Fu P.E., Alabama A&M University; Md Hossain Shuvo, Alabama A&M University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, demonstrate thecapability of mobile platform specially the Android platform which bear the testimony thatmobile platform can be made efficient in controlling robot.Preliminariesi. UMLUnified Modeling Language28 widely known as UML is a software engineering tool used formodeling software systems. Fundamentally it is used as a tool for analyzing, designing andimplementing software intensive systems. UML provides a visual representation of the systemwhich reflects the standard and interactive organization or system’s elements. From thebeginning till now, there are several versions of UML have been evolved and UML 2.0 is usedfor the modeling of our system. UML offers two types of system modeling, one is structural orstatic modeling which require the
Conference Session
Topics in Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Wei Zheng, Jackson State University; Jianjun Yin, Jackson State University; Yanhua Cao, Jackson State University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
Group C 3.47 1.19 Group D 3.24 1.33Team online discussion makes me reflect on the course content Group A 2.88 1.24in a deeper level. Group B 2.72 1.06 Group C 2.75 1.32 Group D 2.91 1.42I frequently respond to the post from my group members through Group A 3.53 1.45online discussion. Group B 3.28 1.11
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2014 ASEE Annual Conference & Exposition
Authors
Norman Pestaina, Florida International University; Tiana Solis, Florida International University; Peter J. Clarke, Florida International Univeristy
Tagged Divisions
Computing & Information Technology
. Table 2 shows the data for four semesters, µ – mean and σ –standard deviation.Specifically: Page 24.199.10• Spring 2011 – Addition of specific examples in check-mark criteria for both SO (a) Foundations, and SO (b) CS Core. This may account for improved statistics for SO (b) post Fall 2010.• Fall 2011 - Incorporation of the 2nd Tier Teamwork Peer Rating Rubric, to seed the SO (f) Teamwork ratings. The change in the rating probably reflects a more realistic assessment in Fall 2010 and Spring 2011• Fall 2011 - Incorporation of the 2nd Tier Presentation Skills Rubric, to seed the SO (g) Communication ratings
Conference Session
Curricular Issues in Computing and Information Technology Programs I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Ali Salehnia, South Dakota State University; Shieva Salehnia
Tagged Divisions
Computing & Information Technology
professional conduct,” “to accept responsibility in makingdecisions consistent with…[the] welfare of the public,” and to promptly disclose “factors thatmight endanger the public or the environment” (IEEE Code of Ethics, Section 1.1).As we believe that software developers are engineers and scientists, they should abide by suchguidelines, and produce reliable and safe products. Ethical issues play a big role in the analysisand development of software and application products. ]13], discuss the need for theinformation-systems person to receive training in ethical implications, and argue that theexistence of professional codes of practice is a clear indication that ethical neutrality is notpossible. They contend, "Self-reflection by systems analysis on
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Arturo Camacho, University of Costa Rica
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
significant proportion ofstudents to fail in exams, which consisted mostly of simulating the execution of thealgorithms for a given input. Usually, students made two types of errors: simple involuntarymistakes and errors that reflect a lack of understanding of the algorithm. After applying themethodology, the former were less common, and the latter were infrequent. We started usingthe methodology in the II semester of 2010 (in our college, I semester goes from March toJune and II semester from August to November). Tables 1 and 2 show the average grades forTest 1 applied during the II semester of 2009-2010 and the I semester of 2010-2011 (beforeand after applying the methodology, in each case). This test is about analysis of algorithmsand sorting
Conference Session
Emerging Computing and Information Technologies I
Collection
2016 ASEE Annual Conference & Exposition
Authors
Araceli Martinez Ortiz, Texas State University - San Marcos; Mina Guirguis, Texas State University
Tagged Divisions
Computing & Information Technology
9 different sessions of this class taught by 6 instructors. Two course modules were delivered to one session of CS1428 and the following week the students received the survey and the results were compared to the survey results from students who did not receive the modules (under the same instructor and different ones as well). All surveys were conducted within a10 day window around the end of November. In one module, the focus was on Computer Science big picture and the other focused on cyber warfare (as explained above in details). Another aspect that was not reflected in the results was the amount of interest the student developed from these modules. The students approached the faculty who delivered those modules after class and described
Conference Session
Potpourri
Collection
2014 ASEE Annual Conference & Exposition
Authors
Jeremy Webb, Department of Mechanical and Biomedical Engineering Boise State University; Inanc Senocak, Boise State University; Dazhi Yang, Boise State University
Tagged Divisions
Computing & Information Technology
as a combination of conduction in the fluid and thebulk motion of the fluid in our study. The convection simulation (Fig. 6) shows fluidmolecules removing energy from solid molecules as students vary the wind speed.Figure 6.Molecular simulation of convection heat transfer.The radiation module (Fig. 7) explains the concept as the interaction between moleculesand photons in our study. The radiation simulation depicts a water molecule absorbing,reflecting, or being transparent to different wavelengths of radiation. Students are able tochange the temperature of a solid object that acts as an energy source. As students changethe temperature of the source the amount of energy emitted increases and thewavelengths of the energy change
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Cory Brozina, Virginia Tech; David B. Knight, Virginia Tech Department of Engineering Education
Tagged Divisions
Computing & Information Technology
, the graduate student wasable to take MOOC courses for credit and most likely learn material that would have otherwisebeen unavailable on campus. The weekly meeting with his faculty advisor required the studentto summarize and distill information from the MOOCs as well as reflect upon the educationaldelivery mechanism’s effectiveness. From this experience, the student also determined that therecan be a variety in quality and level of rigor with each MOOC; thus, he would recommend thatmultiple MOOCs be included in a course plan to increase the likelihood that valuable learningcan take place across courses. For example, though the E-Learning and Digital Cultures courseappeared rigorous in the description, the actual execution of the course was
Conference Session
Potpourri
Collection
2012 ASEE Annual Conference & Exposition
Authors
Afsaneh Minaie, Utah Valley University; Ali Sanati-Mehrizy, Pennsylvania State University; Paymon Sanati-Mehrizy, University of Pennsylvania; Reza Sanati-Mehrizy, Utah Valley University
Tagged Divisions
Computing & Information Technology
during a weekly scheduledtime for each student. At the end of the semester, they turn in a final written report and a finalpresentation which is evaluated by several faculties from the department. The follow are sampleSenior Design Projects which reflect common student projects2.Sample Project 1: Teleoperated RoverThe objective of this project was to design a remotely-controlled and highly mobile robot toallow an individual to remotely see and interact with others or the environment. The robotchosen for this project was the Lynxmotion Rover robot1 (Figure 1). The robot chassis wasmade from heavy-duty anodized aluminum structural brackets and laser-cut lexan panels. It usedfour 12.0 V dc gear head motors and 4.75 “tires and wheels”8
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Erin Shaw, University of Southern California; Michael Crowley, University of Southern California; Jaebong Yoo, University of Southern California; Hao Xu, University of Southern California; Jihie Kim, University of Southern California
Tagged Divisions
Computing & Information Technology
recently addedto the workflow suite using a classifier based onmachine learning13.The instructor also suggested that, analogous to showing initial posts and response posts BY thestudent, we might show response posts TO the students’ posts, and, furthermore, break thesedown by role, i.e. whether the response was from a student, assistant, or instructor. Related tothis, the instructor suggested that we show the thread length for response (or answer). He alsowanted to know, if an answer was good, why were there more answers? This table has not yetbeen updated to reflect the results of the investigation.Scholarly SignificanceThere is an emphasis today on data-driven instruction; the data referred to typically ranges fromsummative, standardized exam
Conference Session
Emerging Information Technologies
Collection
2012 ASEE Annual Conference & Exposition
Authors
Robert E. Efimba P.E., Howard University; Tori Rhoulac Smith, Howard University
Tagged Divisions
Computing & Information Technology
based on the performance of thestudent members on the prerequisite test, given in the first week of class, or the most recentexam. To the extent possible, the teams also reflect diversity of major, gender, and evennationality. Teams are shuffled and students are assigned to different teams from one assignmentto the next, in order to maximize networking in the class. Sometimes, students are allowed tomake up their own teams, but diversity is still required. For example, in a Statics class of 25students in Fall 2011, students divided themselves into 5 teams, each with two men and threewomen, from at least two majors, most of whom were mechanical and chemical engineeringstudents, with a few civil and electrical engineering majors.Each team is
Conference Session
Embedded Systems and Mobile Computing
Collection
2014 ASEE Annual Conference & Exposition
Authors
Javad Shakib, DeVry University, Pomona; Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing & Information Technology
Mini Breadboard $10.00 CodeWarrior Freescale free Total $298.00 Table 1: Bill of Materials for ECET-365course project with Tower Fig 2. Robotic Car with TowerThe Dragon Plus-2 Board with the MC9S12DG256B microcontroller is different in somerespects from the Tower Board (MC9S12G128), and the algorithm, physical design and codescreated reflect that. The two groups who used the Dragon board had to make continual changesto each part in order to achieve the best performance from their microcontroller, sensors, and caroperation. Their kit came with the H-Bridges, the sensor module
Conference Session
Emerging Computing and Information Technologies
Collection
2013 ASEE Annual Conference & Exposition
Authors
Dhana Rao, Marshall University; Rajeev K Agrawal, North Carolina A&T University (Tech); Venkat N Gudivada, Marshall University
Tagged Divisions
Computing & Information Technology
remainder of the paper is organized as follows. Tools for the first three tasks in the researchworkflow are discussed in section 3. Section 4 presents tools for analyzing and interpretingresults, and writing research papers. Our reflections on this work and future research are indicatedin section 5.3 Literature Search, Review, and AssessmentWhen students embark on research, often they have no clear cut ideas about which area or topicsthey want to investigate. At best they will have one or two key phrases (e.g., comparative genomicanalyses) to begin their exploration. This is also true with seasoned researchers who want to forayinto emerging areas (e.g., bigdata visual analytics). A first step in this scenario is to get acquaintedwith the
Conference Session
Curricular Issues in Computing and Information Technolog Programs
Collection
2013 ASEE Annual Conference & Exposition
Authors
Brian R. King, Bucknell University; Ashwin Satyanarayana, New York City College of Technology
Tagged Divisions
Computing & Information Technology
quite pleased to work on an interesting, relevant large-scaledataset of their choice, and see how the methods taught would work in practice; their enthusiasmwas reflected in the results obtained.6.2 Reflection and DiscussionOne of the biggest challenges we faced with the design of the course was from the unexpectedinterest from non-CS majors. While this was a pleasing observation, it did require us toreconsider the depth of some material, and perhaps consider some different techniques in thefuture, as the interest is continuing to expand. We are strongly considering offering two variantsof the course: one course would be the existing data mining course as an elective for thecomputer science major, with a prerequisite of taking a course on data
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Damla Turgut, University of Central Florida; Lisa Massi, University of Central Florida; Salih Safa Bacanli, University of Central Florida; Neda Hajiakhoond Bidoki, University of Central Florida
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
mentor (11variables) on the post-survey is 4.35 (out of 5) with std = 0.97. An inspection of the Q-Qplots and histogram graphs for the remaining five variables (v2, v4, v5, v8, and v12) forwhich the confidence interval were not computed (variables not normally distributed) showone or two outliers. These outliers could be a reflection of the type of research project andthe student’s academic level.Table 2 (Evaluation 1): CISE REU Survey Constructs Differences df Std. Error 95% confidence interval Mean SmdConstructs
Conference Session
Emerging Computing and Information Technologies II
Collection
2017 ASEE Annual Conference & Exposition
Authors
Joseph William Beckman, Purdue University; Melissa Jane Dark, Purdue University; Pratik Kashyap, Purdue University; Sumra Bari, Purdue University, School of Electrical and Computer Engineering; Samuel S. Wagstaff Jr, Purdue University; Yingjie Chen, Purdue Polytechnic Institute; Baijian Yang, Purdue Polytechnic Institute
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
form. Thequestions are also re-designed in order to attempt to maximize activation related to cryptographyconcepts by maximizing the effort subjects exert to answer the question. We expect that thesechanges to the fMRI methods will add to our understanding of where cryptography concepts areprocessed in the brain.AcknowledgmentsThis material is based upon work supported by the National Science Foundation under Grant No.1500046. Any opinions, findings, and conclusions or recommendations expressed in thismaterial are those of the author(s) and do not necessarily reflect the views of the NationalScience Foundation.ReferencesAlvarez, J. A., & Emory, E. (2006). Executive function and the frontal lobes: a meta-analyticreview. Neuropsychology
Conference Session
Emerging Computing and Information Technologies I
Collection
2017 ASEE Annual Conference & Exposition
Authors
Brian Patrick, Brigham Young University; Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
audience time only masked the significance of the usability data with an activity thatdid not reflect usability, but merely represented passive reception. All tasks were re-analyzed and certainprocedures were modified to focus on activities that indicated differences in usability. The testing timeoverall has been reduced from the initial design of several hours per user (four platforms, nine tests) toabout 20 minutes per platform or about 45 minutes for a complete single user experience (two platforms,three tests). It would have been difficult and expensive to recruit a statistically significant number ofusers to complete a set of tasks lasting several hours per user.One of the difficulties of measuring cross-platform occurs when the app
Conference Session
Potpourri
Collection
2016 ASEE Annual Conference & Exposition
Authors
Jinyi Zhang, Purdue University; Pan Fengjian, Purdue University, West Lafayette; Mrigank S. Jha, Purdue University, West Lafayette; Pranav Marla, Purdue University; Kee Wook Lee, Purdue University; David B Nelson, Purdue University, West Lafayette; Yung-Hsiang Lu, Purdue University
Tagged Divisions
Computing & Information Technology
  detection  tools,  such  as  Moss  [10], may  also  be  integrated  for  instructors  as they become necessary. Moreover,  besides record every single  operation  of  students  and   program  execution  settings,  it  is  possible  to  store  copies  of students’  code  to  understand  their  progress.  The  information  will  be  valuable  for  future  studies on how students learn and debug their programs.   Acknowledgement  We  want  to  thank  the  AWS  Cloud   Credits  for  Research  and  the  Microsoft  Azure  for   Research Program.  This  project  is  supported  in  part  by  NSF  ACI­1535108.  Any  opinions,  findings,  and  conclusions  or  recommendations  in  this  materials  are  those of the authors and do not necessarily reflect  the
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Gholam Ali Shaykhian, -; Mohd Abdelgadir Khairi, Najran University; Jinan Ziade ABD, University of Phoenix
Tagged Divisions
Computing & Information Technology
://swtuopproxy.museglobal.com/MuseSessionID=fd925b9615e67115f7e6173 a6599d7e2/MuseHost=proquest.umi.com/MusePath/pqdweb?index=0&did=1454 942261&SrchMode=2&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309 &VName=PQD&TS=1258783964&clientId=13118[8] Kirby, P., Gile, C., & Fossner, L. (2006). Data warehouse architectures must reflect business consensus. Forrester. Retrieved from Microsoft Library[9] Longman, C. (2008). Why Master Data Management is Such a Challenge. DM Review, 18(11), 18-20[10] Loshin, D. (2008). Master Data Management. Morgan Kaufmann, CA: San Francisco[11] Lucas, A. (2010). TOWARDS CORPORATE DATA QUALITY MANAGEMENT. Portuguese Journal of Management Studies, 15 (2
Conference Session
Emerging Computing and Information Technologies I
Collection
2015 ASEE Annual Conference & Exposition
Authors
Forough Sheikh-Ansari, Purdue University; Baijian Yang, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
, this imperfection inmeasuring can convincingly reflect the real overhead in a real system.5.1 Hash FunctionsIn the first set of experiments, we measured the H(VM) with several major CryptographicHashing Functions [12]. We chose different hash function to be able to compare them and chosethe best match for our proposed Architecture. Results of H(VM)’s Execution time are shown inthe Table 2. As seen from the results, the CPU processing time of hashing is basically linear tothe size of the VM templates. SHA-384 and SHA-512 has similar processing time due to the factthe construction of the hashing are very similar. An interesting to note was SHA-256 processtime is actually longer time than SHA-384 and SHA-512. This is because SHA-384 and SHA-512
Conference Session
Topics in Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Richard G. Helps, Brigham Young University
Tagged Divisions
Computing & Information Technology
andBriggs developed the MBTI tests for understanding preferences, and successors to the MBTItest3 are still widely used to today. Similarly David Kolb’s experiential learning theory4 promotesmultimodal learning based on a cycle of concrete experience, reflective observation, abstractconceptualization and active experimentation. All of these experiential learning modes can beenhanced by engaging the students with interactions with hardware modules. Small low-costcomputing platforms, such as the Arduino microcontroller and related devices, provide a way tophysically encapsulate many of the learning concepts related to IT and students can program,control and interact with these systems in a very direct physical fashion, involving not only sightbut
Conference Session
Curricular Issues in Computing and Information Technology Programs II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Mohamed Abdelrahman, Texas A&M University-Kingsville; Mohamed Abdelsalam Salem, Text Scope; Mais Nijim, Texas A&M Kingsville
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. These software enabled devices allowed students to take notes,draw charts and diagrams. Afterwards the results were measured through student feedback. The Page 26.1592.3results of the experiment were satisfactory as more than 85% of the students thought that usingthe tablets contributed positively towards their active learning experience. Instructors observedthat the level of interaction and enthusiasm increased greatly among students. While it is difficultto provide accurate result values that reflect the amount of increase in student performance in theclassroom, the high level of attendance, which was observed, was certainly a good indicator
Conference Session
Emerging Computing and Information Technologies II
Collection
2015 ASEE Annual Conference & Exposition
Authors
Candido Cabo, New York City College of Technology/City University of New York
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
. Despite thebenefits of an approach teaching problem-solving skills first, the transition from pre-programming problem-solving courses to courses in which students should master a full-fledgeprogramming language remains a challenge 18, 22. This is reflected in the number of students(44%) who did not have an acceptable performance in either concepts or skills (Figures 4 and 5).Even though those students had passed a previous problem solving course, they find thetransition to a learning environment that uses a full-fledge programming language like Javadifficult.According to Mayer 17, in addition to the cognitive and metacognitive aspects of problemsolving, other aspects like motivation and engagement are also important determinants of studentsuccess
Conference Session
Information and Network Security
Collection
2015 ASEE Annual Conference & Exposition
Authors
Kristine Donate, Florida Atlantic University; Ravi T. Shankar, Florida Atlantic University; Diana Mitsova, Florida Atlantic University; Francis Xavier McAfee, Florida Atlantic University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
information, funding sources, government entity, etc.) of information they seek. This preference will drive the use of the corresponding web site seed along with the presentation of the associated keywords to the user as defined by the attribute property also in the ontology. And third, the refined list of keywords, instead of all the keywords under a given topic, is used by the application for the searches. Figure 9 contains a sample mockup of the modified search application including the Page 26.1358.14 Figure  9  -­  Sample  Search  Application  Mock-­up   user’s ability to set the search aspect. Note the categories reflect
Conference Session
Potpourri
Collection
2015 ASEE Annual Conference & Exposition
Authors
Gretchen G. Achenbach, National Center for Women & IT; Leslie G. Cintron PhD, University of Virginia; J McGrath Cohoon, University of Virginia; Philip Michael Sadler, Harvard Smithsonian Center for Astrophysics; Gerhard Sonnert, Harvard University
Tagged Topics
Diversity
Tagged Divisions
Computing & Information Technology
to succeed.AcknowledgementsThis work was supported by a National Science Foundation grant (#1203206) to the NationalCenter for Women and Information Technology, and a National Science Foundation grant(#062444) for Project PRiSE. Any opinions, findings, conclusions, or recommendationsexpressed in this paper are the authors’ and do not necessarily reflect the views of the National Page 26.328.16Science Foundation.References1. The White House. (2011). Women and girls in science, technology, engineering, and math (STEM). Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp-women-girls-stem-november2011.pdf2