Paper ID #22172The Research Experience for Undergraduates (REU) Principal Investigators(PI) Guide: Development of a Best Practices WebsiteMs. Mariangely Iglesias Pena, Iowa State University Mariangely Iglesias Pena is an MS student in Human Computer Interaction at Iowa State University’s Virtual Reality Applications Center. Her background is in industrial design, which drives her interest in interactive and web design.Prof. Stephen B. Gilbert, Iowa State University Stephen B. Gilbert received a BSE from Princeton in 1992 and PhD from MIT in 1997. He has worked in commercial software development and run his own company. He
, 2018. [Online]. Available: https://search.proquest.com/docview/1272087912?pq-origsite=gscholar.[5] C. Frank, J. McGuffee, and C. Thomas, “Early undergraduate cybersecurity research,” J. Comput. Sci. Coll., vol. 32, no. 1, pp. 46–51, 2016, Accessed: Sep. 23, 2018. [Online]. Available: https://dl.acm.org/citation.cfm?id=3007235.[6] V. P. Janeja, C. Seaman, K. Kephart, A. Gangopadhyay, and A. Everhart, “Cybersecurity workforce development: A peer mentoring approach,” in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Sep. 2016, pp. 267–272, doi: 10.1109/ISI.2016.7745487.[7] P. Deshpande, C. B. Lee, and I. Ahmed, “Evaluation of Peer Instruction for Cybersecurity Education,” 2019, doi
. Hendler, N. Shadbolt, W. Hall, T. Berners-Lee, and D. Weitzner. Web science: an interdisciplinary approach to understanding the web. Communications of the ACM, 51(7):60–69, 2008.[12] T. E. Jacobson and B. L. Mark. Separating wheat from chaff: Helping first-year students become information savvy. The Journal of General Education, 49(4):256–278, 2000.[13] P. Korovessis, S. Furnell, M. Papadaki, and P. Haskell-Dowland. A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2):5, 2017.[14] C. Lestch. College IT experts and students have opposing views on cybersecurity. https://edscoop. com/college-it-experts-and-students-have-opposing-views-on-cybersecurity
, Discuss the pros and cons of alternative technical solutions, and Debate possible evolutionary paths for the standard being analyzed.We propose six learning stages with specific learning objective in each stage. These aredescribed in continuation.3.1 ContextThe student needs to get familiar with the standard and the standardization mechanics. Theinstructor thus provides a) A high-level description of the standard with certain details, describing theoretical concepts and employed technologies, identifying relevant working parameters and expected system behaviors, b) The standard specifications and the relationships among the main and auxiliary documents, and c) The introduction to the software framework to be used
section.2. CyberSec LabsIn the learning system, a GUI application was designed to help learners navigate the system [5].In total, eight CyberSec labs were designed: Web defacement lab, Remote secure login lab, FTPserver DoS lab, Patch management lab, Backdoor lab, SQL injection (SQLi) lab, Honeypot lab,and Secure plain text traffic labs. Each lab included two sub-labs (attack and defense) andobjectives were included in each of the labs. Figure 1a displays the GUI application and Figure1b shows the two sub-lab buttons after clicking the Secure remote login lab. Table 1 shows theCyberSec labs and their corresponding objectives.(a) (b) Figure 1. (a) CLaaS GUI application (b) Sub-labs of
, "SimPlus: An Experimental Simulation Tool", in Proceedings of the 2004 American Society for Engineering Education Annual Conference (ASEE'04), June 2004, Salt Lake City, Utah. Session 2420.8. Rajaei, H. Eid E., Kannungo, D., Ringerberg, J., 2011, "JSimPlus: A Tool for Teaching Simulation Techniques", in the 14th Communications and Networking Simulation Symposium, CNS'11, sponsored by ACM/SCS, April 4-11, Boston.9. Law, A. 2007, “Simulation Modeling & Analysis”, 4th Ed, McGraw Hill10. Harrell C, Ghosh B, and Bowden R, 2012 “Simulation Using ProModel”, 3rd Ed, McGraw Hill11. Chamberlain T, 2013, “Learning OMNeT++, Packt Publisher12. Virdis A, 2019 “Recent Advances in Network Simulation, the OMNeT Environment and its
. Behav. Organ., vol. 76, no. 1, pp. 90–112, Oct. 2010, doi: 10.1016/j.jebo.2010.02.015.[15] B. C. Martin, J. J. McNally, and M. J. Kay, “Examining the formation of human capital in entrepreneurship: A meta-analysis of entrepreneurship education outcomes,” J. Bus. Ventur., vol. 28, no. 2, pp. 211–224, Mar. 2013, doi: 10.1016/j.jbusvent.2012.03.002.[16] C. Jones and J. English, “A contemporary approach to entrepreneurship education,” Educ. + Train., vol. 46, pp. 416–423, Oct. 2004, doi: 10.1108/00400910410569533.[17] E. A. Rasmussen and R. Sørheim, “Action-based entrepreneurship education,” Technovation, vol. 26, no. 2, pp. 185–194, Mar. 2006, doi: 10.1016/j.technovation.2005.06.012.[18] U. Hytti, P
science and IT play increasingly important role in the Chinese economy, just as theydo in the U.S. It is important for all to understand how future computer scientists and engineersare educated in China. References[1] X. Li and B. Lunt, “Undergraduate computing education in China - a brief status and perspective,” in Proceedings of the 7th conference on Information technology education, Minneapolis, MN, USA, October 19 - 21, 2006, New York: ACM, 2006, pp. 35-38.[2] Working Group for Software Engineering Curriculum, Guidelines for undergraduate curriculum of applied software engineering majors, 2016. Original in Chinese, 高等学校本 科软件工程专业应用型人才培养指导意见 2016 年.[3] X. Zhou, “Some historic notes of
Paper ID #34578Curricular Improvement Through Course Mapping: An Application of theNICE FrameworkDr. Ida B. Ngambeki, Purdue University, West Lafayette Dr. Ida Ngambeki is an Assistant Professor of Computer and Information Technology at Purdue Univer- sity. Dr. Ngambeki graduated from Smith College with a B.S. in Engineering and from Purdue University with a PhD in Engineering Education. Dr. Ngambeki’s research is focused on the intersection of human behavior and computing, specifically how educational and policy interventions can be used to improve human interactions with technology. Dr. Ngambeki’s key areas of research
eight (10) classes, Person, Student, Professor, Admin, StudentLogIn,ProfessoryLogin, Course, Grading, StudentRegistration, Payment and the aggregate classStudentInfSys. While classes Student holds the information of each individual student profile (a) (b) (c) Figure 2. Some classes defined in UML (a) Class Student Login; (b) Class Professor Login; (c) Class Student Registration. © American Society for Engineering Education, 2021 2021 ASEE Conferencewhich includes person info, academic records, financial info, etc.. Class Professor carries theprofessor’s individual info, teaching assignment, and grading
15th of each month, so itwould have two pay periods for each month.Payment Class: The payment class represents a payment from the company to a payable entity(either an employee or a vendor). The payment includes information about the payment amount,the date of the payment, and a reference to the recipient of the payment. (a) Payment class (b) PayPeriod class (c) PayableEntity class Figure 2. A selected class definition in UML Class model (a) Payment class (b) PayPeriod class (c) PayableEntity class.PayableEntity Class: An abstract class containing information about a potential payee, and theirpayment information. It
& Beilock, 2012). There is a lotof evidence that math anxiety robs individual’s working memory (Beilock & Willingham, 2014).The working memory's "space" or capacity is some fixed amount that varies from person toperson. It is used to solve problems and reason. If part of the working memory is occupied byanxiety, it is taking away from the fixed capacity that can be used to come up with a solution(Beilock, 2008). There is also neurological data that supports these findings (Young, Wu, &Menon, 2012).Attribution: How students attribute their failures and successes is also tightly linked to howstudents perform. A study looked at twelve factors to which most influenced success in acomputer programming course (B. C. Wilson & Shrock
MB LPDDR2 (shared with video) 1, 2, or 4 MB LPDDR3 (shared with video) Ethernet Ports 10/100 fast ethernet 10/100/100 gigabit ethernet Wireless 2.4 GHz 802.11n, Bluetooth 4.0 n/a USB Ports 4 USB 2.0, 1 USB micro B (for power) 2 USB 2.0 A, 1 USB 3.0 Storage MicroSD (though can boot from USB MicroSD, eMMC Medium flash drive or external hard drive with a change in boot configuration) Power Supply 5V, 2.5 A max (micro USB B) 5V, 3A max (3.5 mm Barrel Connector)Software and
demand area ofcybersecurity applications. It will offer collaboration among three colleges (CoE, CoS, CBA) toleverage from delivered student knowledge transfer and deliver an effective, two-semester projectbased course.CLASS OBJECTIVES & RESEARCH QUESTIONSThe class objectives are summarized into four folds: 1. Student engagement in interdisciplinary work of frontier technologies and its cybersecurity related aspects. a. Build interdisciplinary teams comprising of three to six students from the Computer Science (CS), Electrical and Computer Engineering (ECE), and Computer Information Systems (CIS) departments to get involved in projects studying frontier technologies and their cybersecurity aspects. b
Technical Symposium on Computing Science Education, New York, NY USA, 2016.[3] C. Watson and F. W. B. Li, "Failure rates in introductory programming revisited," in Proceedings of the 2014 conference on Innovation & technology in computer science education, New York, NY USA, 2014.[4] T. Beaubouef and J. Mason, "Why the high attrition rate for computer science students: some thoughts and observations," ACM SIGCSE Bulletin, vol. 37, no. 2, pp. 103-106, June 2005.[5] D. Teague and P. Roe, "Collaborative Learning – Towards A Solution for Novice Programmers," in Proceedings of the Tenth Australasian Computing Education Conference, Wollongong, Australia, January, 2008.[6] P. Fotaris, T. Mastoras, R. Leinfellner and Y
. Utilizing facial landmarks could increasethe size of a training dataset enough to take advantage of the power of a CNN.References[1]. Elfenbein, H. A., & Ambady, N. (2002b). Predicting workplace outcomes from the ability to eavesdrop on feelings. Journal of Applied Psychology, 87(5), 963-971.[2]. Galati, D., Miceli, R., & Sini, B. (2001). Judging and coding facial expression of emotions in congenitally blind children. International Journal of Behavioral Development, 25(3), 268-278.[3]. Darwin, C. (2005). The expression of emotion in man and animals. New York, NY: Appelton. (Original work published 1872)[4]. Ekman, P. & Friesen, W. (1977). Facial Action Coding System. New Jersey: Lawrence Erlbaum Association[5
). The resized image is either saved for database, or processed by a real timeface recognition system, which will be discussed in the following sections. The basics of facedetection using Haar Cascades can be found at [8]. Fig.2 shows the web camera screen with adetected face frame and saved face image (96x96 pixels). (a) (b) Fig.2 Fact detection: (a) video screen with a green rectangle identifying a detected face; (b) cropped face image for database or face recognition.2.3 Face Recognition After the face detection, we can assume that the images either for database or for recognitionare face-concentrated and resized to 96x96 pixels (e.g. Fig.2
received his M.S. in Computer Science from the University of Florida in 2016 and a B. Tech. in Computer Science & Engineering from Jaypee University of Engineering and Technology, India in 2015. American c Society for Engineering Education, 2021 Reflection and Transformational Learning in a Data Structures and Algorithms ClassAbstractReflective practice is the process of using one’s beliefs and prior experiences to analyze a problem;it is making meaning from experience. The process starts with noticing and naming the problem,continues to analyzing the problem, and finishes with forming new beliefs in order to solve theproblem. Reflective
microfabrication and nanotechnology. Boca Raton, FL: CRC Press, 2012. 10. B. Robertson, “Science 101: How Does an Electron Microscope Work?,” Science and Children, vol. 051, no. 01, pp. 76–78, 2013. 11. B. Smith, “The Differences Between Atomic Force Microscopy and Scanning Electron Microscopy,” AZoM.com, 01-Aug-2017. [Online]. Available: https://www.azom.com/article.aspx?ArticleID=11879. [Accessed: 01-Feb-2018]. 12. “Scanning Electron Microscopy (SEM),” Techniques, 26-May-2017. [Online]. Available: https://serc.carleton.edu/research_education/geochemsheets/techniques/SEM.html. [Accessed: 02-Feb-2018]. 13. G. Brake, “Buying a Pre-Owned SEM,” Lab Manager. [Online]. Available: http://www.labmanager.com
bit challenging but they really enjoy doing this kind of work.References: 1. J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005. 2. A. Perkins, “Business Rules = Meta Data”, the proceedings of the: Technology of Object-Oriented Languages and Systems, IEEE, 2000. 3. Catherine M. Ricardo, “Database Illuminated”, Third Edition, Jones & Bartlett Learning, 2017. 4. Mullins C. S. 1995, “The procedural DBA.” Database Programming & Design 812 (December): 40-45. 5. Rennhackkamp, M 1996, “Trigger Happy.” DBMS9,5 (May): 89-91, 95. 6. “Using Triggers and Compound Triggers in Oracle 11g”, https://dbanotes.com/using-triggers-and-compound
program.The authors are planning to extend this study in future work to include more universities especiallythose interested in offering interdisciplinary programs and study the technical content of thecybersecurity-related courses offered by their respective departments.6. References[1] Juniper Research©, "Cybercrime will Cost Businesses Over $2 Trillion by 2019," 2015. [Online]. Available: https://www.juniperresearch.com/press/press-releases/cybercrime- cost-businesses-over-2trillion.[2] SANS ICS, "Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case," 2016. [Online]. Available: https://ics.sans.org/media/E- ISAC_SANS_Ukraine_DUC_5.pdf.[3] J. B.-S. H. R. R. a. U. Lee, "Anatomy of the Information Security Workforce
design in a step-by-step fashion. An excerpt of the guided study is shown inFigure 5. The remainder of the guided study includes additional practice problems. Figure 5. A Guided Study Application and Creation QuestionOther topics covered in guided studies were: models and architectures, reverse engineering,functional dependencies, normal forms, normalization, physical database design, and B+trees.4. Evaluation of ImpactThe impact of adding guided studies to a flipped course can be gauged in a few different ways:completion rate (Zingaro et al. 2013, Garcia 2018) and student satisfaction (Maher et al. 2013)are two metrics that have been used in previous studies. Completion rates for all 10 guidedstudies were nearly 100% for the
objectives are to keep themodules complete and independent so that they can be easily integrated into the courses. Eachmodule package consists of instructions, lab exercises and solutions, and assessment methods.The modules were also designed to incorporate the National Initiative for CybersecurityEducation (NICE) Cybersecurity Workforce Framework (NCWF) topics of Cyber Threat andVulnerabilities, Risk Management and Software Reverse Engineering [9].The purpose of this paper is a) to describe a set of six security modules that was implemented ina Computer Science 1 course during the fall semester of 2019 at Texas A&M University-SanAntonio and b) to report the results of evaluating teaching effectiveness of implementing thesecurity modules with
review,” Electronics, vol. 9, no. 2, p. 272, 2020.[15] M. Prakash and A. Abdrabou, “On the fidelity of ns-3 simulations of wireless multipath tcp connections,” Sensors, vol. 20, no. 24, p. 7289, 2020.[16] N. Kuse and B. Jaeger, “Network simulation with ns-3,” Network, vol. 67, 2020.[17] N. Jovanovi´c and A. Zaki´c, “Network simulation tools and spectral graph theory in teaching computer network,” Computer Applications in Engineering Education, vol. 26, no. 6, pp. 2084–2091, 2018.[18] Q. Gu, Y. Zhang, and H. Yang, “Application of “computer network teaching platform+ flipped teaching model” in online education-taking “information technology teaching method” as an example,” in International Conference on Machine Learning and Big
'15 Proceedings of the 46th ACM Technical Symposium on Computer ScienceEducation, Kansas City, 2015.[9] Sahin A., Cavlazoglu, B., & Zeytuncu, Y. E. (2015). Flipping a College Calculus Course: ACase Study. Educational Technology & Society, 18 (3), 142–152.[10] Khribi, M. K., Jemni, M., & Nasraoui, O. (2008, July). Automatic recommendations for e-learning personalization based on web usage mining techniques and information retrieval. InAdvanced Learning Technologies, 2008. ICALT'08. Eighth IEEE International Conference on(pp. 241-245). IEEE.[11] Khribi, M. K., Jemni, M., & Nasraoui, O. (2015). Recommendation systems forpersonalized technology-enhanced learning. In Ubiquitous learning environments andtechnologies (pp. 159-180
late IT project or one thatgoes above the projected budgeted amount can be very detrimental to the organization’s success.Whereas, the duties of the CRO differ slightly as they are typically responsible for many of thesame duties as the CIO in terms of understanding the corporate landscape and ongoing securityprojects. However, their field of expertise is more of governance. As data and devices converge,the role of the CRO and their management responsibilities seem to vary across the landscapewithin the given literature. Nevertheless, the CRO has become a mainstay within the executiveleadership team, and according to Karanja and Rosso [6], the CRO provides a voice within threemanagerial roles: (a) interpersonal, (b) informational, and (c
number of images increased rapidly. (a) An image example of the first problem (b) A puzzle example for the second problemFigure 1. Problem examples. The second problem contains two bridge-puzzles, one easy and the other of mediumdifficulty; please see Figure 1 (b) for example. The puzzle rules are (a) to connect each island,which is represented as a circle, with the number of bridges shown inside the circle; (b) there canonly be two bridges connecting two islands; (c) a bridge must not overlap with other bridges orislands; and (d) there must be continuous link between all islands, which means there cannot beisolated island. Figure 1 (b) presents a solution that satisfies the puzzle’s rules. When solving the second problem, the
Cognitive Psychology, vol. 19, no. 4-5, pp. 494–513, 2007. [5] S. Freeman, E. O’Connor, J. W. Parks, M. Cunningham, D. Hurley, D. Haak, C. Dirks, and M. P. Wenderoth, “Prescribed active learning increases performance in introductory biology,” CBE-Life Sciences Education, vol. 6, no. 2, pp. 132–139, 2007. [6] S. Freeman, D. Haak, and M. P. Wenderoth, “Increased course structure improves performance in introductory biology,” CBE-Life Sciences Education, vol. 10, no. 2, pp. 175–186, 2011. [7] R. Heradio, L. de la Torre, D. Galan, F. J. Cabrerizo, E. Herrera-Viedma, and S. Dormido, “Virtual and remote labs in education: A bibliometric analysis,” Computers & Education, vol. 98, pp. 14–38, 2016. [8] M. Ergezer, B. Kucharski, and A
,” Journal of EngineeringEducation, vol. 100, no. 1, January 2011.[3] K. Beddoes and M. Borrego, “Feminist Theory in Three Engineering Education Journals:1995-2008,” Journal of Engineering Education, vol. 100, no. 2, April 2011.[4] L. R. Lattuca, D. B. Knight, H. Kyoung Ro, B. Novoselich. “Supporting the Development ofEngineers’ Interdisciplinary Competence.” Journal of Engineering Education, vol. 106, no. 1,January 2017.[5] M.A. Boden, M. A. Mind as machine: A history of cognitive science. Oxford University Press,2006.[6] M. Moack, “Difference Engine Leaves Computer History Museum,” Mountain View Voice,January 28, 2016[7] J. J. O’Connor, E. F. Robertson, "Luigi Federico Menabrea," MacTutor History ofMathematics archive, University of St Andrews
outcome.Faculty also provide a table for each course that shows a summary of the raw data for the directevidence that each assessment instrument generates. Let’s take CSET 4100 Server-SideProgramming as an example. An assessment on the need for continuous improvement couldinclude: a) Questions in two homework assignments involving Java web application anddeployment to reveal mastery of CAC and ETAC outcome 4; b) Two programming assignmentsinvolving Java server-side scripting designed to reveal mastery of CAC and ETAC outcome1. Figure 1: University of Toledo CSET Curriculum Computer Science & Engineering Technology Curriculum - Full Time (Effective Fall 2013