American Society for Engineering Education, 2015 Focus on Social Learning in a First-Year Technical Writing Class: a Canadian Case-Study The University of British Columbia, CanadaAbstract: Incorporation of writing assignments into the first-year curriculum is a keyopportunity for engineering educators. The topics of sustainable consumption and design,environmental issues and global engineering were introduced into a first-year engineeringcommunication course in the Faculty of Applied Science at the University of British Columbia,Vancouver. This successful initiative was further expanded to include writing reflection papers,proposals and research reports on community service learning
-analysis and reflection. Emig describes the simple act ofreading one’s own writing as a valuable learning moment in which “information from the pro-cess is immediately and visibly available as that portion of the product already written.” Review-ing a set of writings collected over time, then, creates an opportunity to extend the learning pro-cess. Both instructors and students benefit from the act of collecting artifacts because they repre-sent the changes and growth that accompany learning. When integrated in a purposeful way ap-propriate to a given discipline, WTL deepens student understanding, improves student engage-ment, increases retention, and makes students active participants in the learning process10,11.1.2 WTL and computational
tasks for the upcoming week. This is furthersolidified by weekly status reports that provide additional reflection on the project progress,outline problems, and highlight effort expended. In addition, students are required to draft aProblem Statement, Requirements Specification, Functional Design, Project Plan, and Test Plan.The nature of the projects varies widely from continuing a previous project with well-definedexpectations to venturing into uncharted waters with only a vague sense of a reasonabledestination. Thus all of these documents are flexible in their nature. For example, the test plancould be for the final product or for a milestone. Either way it will contain similar complexityand comprehensiveness. Assessment for this semester
and texts as resulting from typified behaviors, knowledge, and actions of agiven community of practice: “[T]o write, to engage in any communication is to participate in acommunity; to write well is to understand the conditions of one’s own participation with thatcommunity and determine the success or failure of communication”11. As such, genres reflect thevalue systems of individual organizations (e.g., a stand alone business) and also large scalecommunities (e.g., engineers). Being a proficient writer means becoming intimatelyknowledgeable of the conditions of participation in a given community of practice. According toJames Dubinsky, “our work [as professors] involves more than teaching our students strategies orforms; it also
real-life constraints and customer needs — all of which are constructivist in nature. Page 26.1354.7 • Constructivism promotes hands-on learning. Thus, in addition to having traditional classrooms for lectures, GalvanizeU/UNH has multiple places (including labs and computer workstations) where students can experiment and work on their class and capstone projects, meet in teams to discuss their work, reflect on issues, meet with industry representatives, meet with faculty informally, etc. • All students work as part of a community from the beginning. Current industry and/or
Group C 3.47 1.19 Group D 3.24 1.33Team online discussion makes me reflect on the course content Group A 2.88 1.24in a deeper level. Group B 2.72 1.06 Group C 2.75 1.32 Group D 2.91 1.42I frequently respond to the post from my group members through Group A 3.53 1.45online discussion. Group B 3.28 1.11
significant proportion ofstudents to fail in exams, which consisted mostly of simulating the execution of thealgorithms for a given input. Usually, students made two types of errors: simple involuntarymistakes and errors that reflect a lack of understanding of the algorithm. After applying themethodology, the former were less common, and the latter were infrequent. We started usingthe methodology in the II semester of 2010 (in our college, I semester goes from March toJune and II semester from August to November). Tables 1 and 2 show the average grades forTest 1 applied during the II semester of 2009-2010 and the I semester of 2010-2011 (beforeand after applying the methodology, in each case). This test is about analysis of algorithmsand sorting
://swtuopproxy.museglobal.com/MuseSessionID=fd925b9615e67115f7e6173 a6599d7e2/MuseHost=proquest.umi.com/MusePath/pqdweb?index=0&did=1454 942261&SrchMode=2&sid=1&Fmt=3&VInst=PROD&VType=PQD&RQT=309 &VName=PQD&TS=1258783964&clientId=13118[8] Kirby, P., Gile, C., & Fossner, L. (2006). Data warehouse architectures must reflect business consensus. Forrester. Retrieved from Microsoft Library[9] Longman, C. (2008). Why Master Data Management is Such a Challenge. DM Review, 18(11), 18-20[10] Loshin, D. (2008). Master Data Management. Morgan Kaufmann, CA: San Francisco[11] Lucas, A. (2010). TOWARDS CORPORATE DATA QUALITY MANAGEMENT. Portuguese Journal of Management Studies, 15 (2
, this imperfection inmeasuring can convincingly reflect the real overhead in a real system.5.1 Hash FunctionsIn the first set of experiments, we measured the H(VM) with several major CryptographicHashing Functions [12]. We chose different hash function to be able to compare them and chosethe best match for our proposed Architecture. Results of H(VM)’s Execution time are shown inthe Table 2. As seen from the results, the CPU processing time of hashing is basically linear tothe size of the VM templates. SHA-384 and SHA-512 has similar processing time due to the factthe construction of the hashing are very similar. An interesting to note was SHA-256 processtime is actually longer time than SHA-384 and SHA-512. This is because SHA-384 and SHA-512
andBriggs developed the MBTI tests for understanding preferences, and successors to the MBTItest3 are still widely used to today. Similarly David Kolb’s experiential learning theory4 promotesmultimodal learning based on a cycle of concrete experience, reflective observation, abstractconceptualization and active experimentation. All of these experiential learning modes can beenhanced by engaging the students with interactions with hardware modules. Small low-costcomputing platforms, such as the Arduino microcontroller and related devices, provide a way tophysically encapsulate many of the learning concepts related to IT and students can program,control and interact with these systems in a very direct physical fashion, involving not only sightbut
. These software enabled devices allowed students to take notes,draw charts and diagrams. Afterwards the results were measured through student feedback. The Page 26.1592.3results of the experiment were satisfactory as more than 85% of the students thought that usingthe tablets contributed positively towards their active learning experience. Instructors observedthat the level of interaction and enthusiasm increased greatly among students. While it is difficultto provide accurate result values that reflect the amount of increase in student performance in theclassroom, the high level of attendance, which was observed, was certainly a good indicator
. Despite thebenefits of an approach teaching problem-solving skills first, the transition from pre-programming problem-solving courses to courses in which students should master a full-fledgeprogramming language remains a challenge 18, 22. This is reflected in the number of students(44%) who did not have an acceptable performance in either concepts or skills (Figures 4 and 5).Even though those students had passed a previous problem solving course, they find thetransition to a learning environment that uses a full-fledge programming language like Javadifficult.According to Mayer 17, in addition to the cognitive and metacognitive aspects of problemsolving, other aspects like motivation and engagement are also important determinants of studentsuccess
information, funding sources, government entity, etc.) of information they seek. This preference will drive the use of the corresponding web site seed along with the presentation of the associated keywords to the user as defined by the attribute property also in the ontology. And third, the refined list of keywords, instead of all the keywords under a given topic, is used by the application for the searches. Figure 9 contains a sample mockup of the modified search application including the Page 26.1358.14 Figure 9 - Sample Search Application Mock-up user’s ability to set the search aspect. Note the categories reflect
to succeed.AcknowledgementsThis work was supported by a National Science Foundation grant (#1203206) to the NationalCenter for Women and Information Technology, and a National Science Foundation grant(#062444) for Project PRiSE. Any opinions, findings, conclusions, or recommendationsexpressed in this paper are the authors’ and do not necessarily reflect the views of the National Page 26.328.16Science Foundation.References1. The White House. (2011). Women and girls in science, technology, engineering, and math (STEM). Retrieved from http://www.whitehouse.gov/sites/default/files/microsites/ostp/ostp-women-girls-stem-november2011.pdf2
courses if those courses fit intotheir schedule and academic requirements. This interest was expected given that the students wereenrolled in an upper-division elective course.Over the course of the three interviews, students’ responses showed low self-efficacy levels whenasked about performing various cybersecurity related tasks, with comments such as “I’m not sureI could do that” being common. Meanwhile interest levels seemed to grow, reflected in commentssuch as “That was really cool!”. For some students, self-efficacy levels decreased over the courseof the semester. Given that students admitted to having very little knowledge of cybersecurity atthe beginning of the semester, this was not totally unexpected as students became aware of
profession, yet it israrely included in sophomore and junior level courses. Reflecting on our own prior efforts todevelop writing assignments for such courses, we became curious about the extent to which themost popular engineering textbooks include writing prompts and related writing activities. Thisquestion seemed particularly important given that textbooks often play critical roles inengineering curricula and courses. Textbooks often influence how courses are structured, andreading assignments and homework problems are frequently assigned directly from textbooks.In this project, we systematically searched for and analyzed writing-based problems in sixpopular fluid mechanics textbooks, with a focus on chapters with similar technical content
views that enable users to search and make the data meaningful.This event cycle3 reflects the processes involved in turning events and their logs into usefulinformation, regardless of the implementation.Further System ExplanationThe core of this methodology utilizes search or data mining technologies. There are many toolsthat provide the ability to analyze large amounts of data and produce usable information. Toolscurrently available include: Splunk4, Apache Solr, and Elasticsearch Foundations’ ELK stack(Elasticsearch, Logstash, and Kibana). Each of these tools has the ability to take textual data andparse it into desired fields of information. For the purpose of this paper, we will be using theELK stack as our software of choice.Our