Paper ID #26401How an NSF S-STEM LEAP Scholarship Program Can Inform a New Engi-neering ProgramDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor and Chair of Engineering Department at Utah Valley University. She re- ceived her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems De- sign, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of
Paper ID #27348How to Cultivate Computational Thinking-Enabled Engineers: A Case Studyon the Robotics Class of Zhejiang UniversityDr. Jingshan Wu, Zhejiang University Postdoctoral Fellow of Institute of China’s Science, Technology and Education Strategy, Zhejiang Uni- versity; Lecturer, School of Public Administration, Zhejiang University of Finance & EconomicsMs. Yujie Wang, Zhejiang University Postgraduate of Institute of China’s Science,Technology and Education Strate, Zhejiang UniversityMs. Hanbing Kong, Zhejiang University Hanbing Kong, PhD Deputy Director, the Research Center for S&T, Education Policy, and Associate
Paper ID #26533Board 29: Creating a Virtual Reality Simulation of Plasma Etcher to Facili-tate Teaching and Practice of Dry Etching in Nanotechnology EducationDr. Reza Kamali, Utah Valley University Dr. Reza Kamali-Sarvestani is an Associate Professor of Computer Engineering at Utah Valley University. He received his B.S. degree in Electrical Engineering from Shiraz University Iran, and M.S.E, Ph.D. degree in Electrical and Computer Engineering from University of Alabama in Huntsville in 2009, and 2011 respectively. He joined Utah Valley University (UVU) in 2012. He is currently working to develop a Virtual Reality course on
designed in the early 1980’s to reduceemissions by monitoring the performance of major engine component. The major component ofthe OBD is the Electronic Control Unit (ECU, Figure 3(a)), which receives inputs from varioussensors and control the actuators. OBDs provide digital trouble codes (DTCs) that can beaccessed via the Digital Link Connector (DLC, Figure 3(b)). (a) Components of OBD (b) OBD-II Port Figure 2. On-board Diagnostics (OBD)The latest version of OBD is OBD-II, which is available on all cars and light trucks built since1996. The OBD-II standard specifies the type of diagnostic connector and its pinout, theelectrical signaling protocols available, and the messaging
. Figure 5: System diagram for remote vacuum cleanerThe system has three main components: a mobile platform as the remote testbed system, alocal server is the gateway between the testbed and remote clients and the remote client. Themobile platform consists of a drive system, sensors for navigation, an embedded processor(Arduino board) for local control and data management, an XBee for wireless communicationwith the local server, and an IP camera for real time video. The IP camera has its owncommunication route via a WiFi channel. The video is then embedded within the GUI foruser monitoring. Images of completed mobile platform are shown in Figure 6. (b) Close up view of electronics. (a
Course Truck (1/16th scale) was used in this build 1. A Raspberry Pi 3B+ 2. A PCA9685 PWM controller. 3. A microSD card, at least 8GB in capacity. 4. SanDisk Extreme 32GB microSDHC card 5. An external battery to power Raspberry Pi. 6. A Pi Camera with ribbon cable. 7. An external battery to power Raspberry Pi. a. Mobile device power banks typically come with a USB A to Micro USB cable, which will fit the micro USB port on the Raspberry Pi. b. An Anker Astro E1 power bank was used in this build. 8. Dupont female to female jumper cables. a. This is to connect the Pi to PWM controller board. 9. A Pi Camera with ribbon cable. a. A fisheye lens is recommended, for a wider
sealed for proper operation or filtered with High-Efficiency ParticulateAbsorbing (HEPA) filtration1,2.6-Project main components(a)-MotorThe motor is a one stage, 120VAC, 6 inches inlet/outlet turbine-style motor that can provide anair exhaust of up to 980 CFM. It has the capability of being stepped down to 90VAC to provide aslower exhaust output. According to the calculations of supply CFM into the room (294CFM),this motor will be more than enough to make the isolation room negative. We will also be addingsingle phase Variable Frequency Drive (VFD) to further slow the CFM exhaust to reduce thequantity of air controlled, cool air, from escaping, therefore allowing more comfort for theisolated person.(b)-SensorDiff Press Click is an accurate
and LED gun. The gun consisted of a smallprotoboard Velcroed to a toy gun. The gun was comprised of a switch button, the CMOS buffergate and the infrared LED. Figure 2: System level view of the infrared laser tag systemThis project was programmed in C using the Keil µVision 4.0 IDE. The code was compiled inµVision using GNU Compiler Collection (GCC). The build was sent to the board using theboard’s built-in micro USB cable.Sending the SignalMain on the board initializes ports F, B, and C; the SysTick timer; and port C edge-triggeredinterrupts. After initialization, main sets the health bar color to green and uses the PortF_Outputfunction to output the code for the color green to DATA in the port F data register, which
. Cryptonote v2.0. Technical report, CryptoNote. Accessed: Oct. 21, 2019. [Online]. Available: https://cryptonote.org/whitepaper.pdf[18] S. Eskandari, A. Leoutsarakos, T. Mursch, and J. Clark. A First Look at Browser-based Cryptojacking. In Proc. of the IEEE Privacy and Security on the Blockchain Workshop, London, UK, Apr. 2018, [Online]. Available: https://arXiv:1803.02887[19] T. Zhang, Y. Zhang, and Ruby B. Lee, “CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds,” In Proc. of the International Symposium on Recent Advances in Intrusion Detection, Evry, France, Sep. 2016, doi: 10.1007/978-3-319-45719-2_6[20] Bitcoincharts. Accessed: Oct. 21, 2019. [Online]. Available: https://bitcoincharts.com
preparation for the oral proficiency exams. The negative skew in the Figure1(b) histogram and the mean quantified value of 2.86 support a moderate increase in studentreported motivation for independence in their work in preparation for the oral proficiency exams.Furthermore, student responses to these two questions are moderately correlated, with a highlysignificant (p-value of 1.91 ´ 10-36) correlation coefficient of 0.635. Thus, students who report anincrease in motivation to achieve a deeper understanding of the material due to the codinginterview intervention are also more likely to report approaching their work with higher levels ofindependence as a result of the oral proficiency exams. The coding interviews
-Driving Cars," 2018. [Online]. Available: https://www.autobytel.com/car-ownership/advice/10-benefits-of-self-driving-cars-121032/.[4] M. C. S. Y. D. Y. E. F. B Paden, "A Survey of Motion Planning and Control Techniques for Self-Driving Urban Vehicles," IEEE Transactions on Intelligent Vehicles, pp. 33-55, 2016.[5] L. Earnest, "Stanford Cart: How a Moon Rover Project was Blocked by a Politician but got Kicked by Football into a Self-Driving Vehicle," 6 3 2018. [Online]. Available: https://web.stanford.edu/~learnest/les/cart.html.[6] "No Hands Across America Journal," 1995. [Online]. Available: http://www.cs.cmu.edu/afs/cs/usr/tjochem/www/nhaa/Journal.html.[7] D. P. B. K. a. J. A. Todd Jochem, "PANS: A Portable Navigation Platform
Queues Building Structure Decision making Graph model Rule EngineFigure 1: a) Graph-based agent-oriented framework b) PF-based data assimilation frameworkTo support data assimilation of the graph-based agent-oriented model, we used the basic bootstrap filter[14] as the algorithm for the data assimilation which is also known as SMC methods or particle filters. Theobservations are the occupancy information which is collected by various sensors installed in the rooms. Inour framework, we consider only the node information as the state variable which reduces the size andcomplexity of the state for data assimilation. In the particle filters, particle represents a state, and eachparticle
,” Comput. Appl. Eng. Educ., vol. 26, no. 2, pp. 384–392, Mar. 2018.[21] X. Wang, Y. Bai, and G. C. Hembroff, “Hands-on Exercises for IT Security Education,” in Proceedings of the 16th Annual Conference on Information Technology Education - SIGITE ’15, 2015, pp. 161–166.[22] P. Deshpande, C. B. Lee, and I. Ahmed, “Evaluation of Peer Instruction for Cybersecurity Education,” in Proceedings of the SIGCSE Conference, 2019.[23] V. P. Janeja, C. Seaman, K. Kephart, A. Gangopadhyay, and A. Everhart, “Cybersecurity workforce development: A peer mentoring approach,” in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 2016, pp. 267–272.[24] W. Damon, “Peer education: The untapped potential,” J. Appl
. E. Coate, “TQM on campus: Implementing total quality management in a university setting.,” Bus. Off., vol. 24, no. 5, pp. 26–35, 1990.[4] L. R. Lattuca, P. T. Terenzini, and J. F. Volkwein, “Engineering change : A study of the impact of EC2000,” Exec. Summery, pp. 1–20, 2006.[5] P. E. Maher, J. L. Kourik, and B. O. Akande, “Achieving quality, excellence, and consistency in a global academy,” in PICMET 2010 TECHNOLOGY MANAGEMENT FOR GLOBAL ECONOMIC GROWTH, Jul. 2010, pp. 1–7.[6] M. Zahraee, G. Neff, and S. Scachitti, “Continuous Improvement Of Engineering Technology Programs Coming Soon To A University Near You,” St. Louis, Missouri, Jun. 2000, p. 9. Accessed: Jun. 09, 2020. [Online]. Available: https://peer.asee.org
. Wenk B. Lee J.Q Brown, M. Wang. High-area-throughput automated gigapixel imaging of whole prostate tumor resection surfaces using structured illumination microscopy. SPIE Photonics West - BIOS, pages 9313–15, 2015. [7] Computing Research Association. Generation cs: Computer science undergraduate enrollments surge since 2006, 2017. URL https://cra.org/data/Generation-CS/. [8] Miran Lipovaca. Learn You a Haskell for Great Good!: A Beginner’s Guide. URL http://learnyouahaskell.com/. [9] Alex Edgcomb, Frank Vahid, and Roman Lysecky. Students learn more with less text that covers the same core topics. In Proceedings of the 2015 IEEE Frontiers in Education Conference (FIE), FIE ’15, pages 1–5, Washington, DC, USA, 2015. IEEE
eliminated by adding nops another instruction. to the code Table 2 The interconnects among the topics a b c d e f g h i Remarks a N.A _ _ _ _ _ _ _ _ Fundamental topic b √ N.A _ _ _ _ _ _ _ Programming related c √ √ N.A _ _ _ _ _ _ Performance d √ √√√ _ N.A _ _ _ _ _ Datapath e √ √ √ _ N.A
, “Beginnings - Hybrid-Flexible Course Design.” https://edtechbooks.org/hyflex/book_intro (accessed Sep. 07, 2020).[3] B. J. Beatty, “Hybrid-Flexible Course Design Costs and Benefits for Hybrid-Flexible Courses and Programs Is the value worth the effort associated with Hybrid-Flexible course implementation? When is implementing a Hybrid-Flexible course worth the cost? The Value of a Student-Directed Hybrid,” EdTech Books, 2019.[4] “School closures caused by Coronavirus (Covid-19).” https://en.unesco.org/covid19/educationresponse (accessed Sep. 07, 2020).[5] C. R. Kinlaw, L. L. Dunlap, and J. A. D’Angelo, “Relations between faculty use of online academic resources and student class attendance,” Computers and
National Cybersecurity AwarenessMonth in October. The module was delivered as follows: 1. Students were placed in teams of four, and first part of the ‘four corners exercise was introduced. Teams were asked to discuss whether it’s ethical to hack, and then add their names under one of the four statements given the phrase “It is Ethical to Hack”. (students did not have to come to a unanimous agreement in their teams): a. Strongly agree b. Agree c. Strongly disagree d. Disagree 2. Case studies were handed out; each group had a different type of case study, all related to ethical hacking and how the
of educational research, 76(1), 1-62.Feden, P. D., & Vogel, R. M. (2003). Methods of teaching: Applying cognitive science to promote student learning: McGraw-Hill Humanities, Social Sciences & World Languages.Felder, R. M., & Brent, R. (2005). Understanding student differences. Journal of engineering education, 94(1), 57-72.Felder, R. M., & Silverman, L. K. (1988). Learning and teaching styles in engineering education. Engineering education, 78(7), 674-681.Felder, R. M., & Soloman, B. A. (n.d.). Index of Learning Styles. Retrieved from http://www.ncsu.edu/felder-public/ILSpage.html.Felder, R. M., & Soloman, B. A. (n.d.). Learning styles and strategies. Retrieved from
received SNR, to the thresholds in each state, each of which hascertain packet error probability. Each state can have a different threshold level, and depending ona given threshold, we associate an error probability with that state. In our approach we use threestate Markov chain model, where there are two good states, E (Excellent) and F (Fair), and asingle bad state, B. This gives us an insight for modeling wireless channels more accurately.Assuming that probability of transition from state E to state B and vice versa is very low, we canrepresent this with the diagram in Figure 1. PEF PFB
, it should be clarified Athat in this model, there are two paths that can be taken in Astin’s Model, either: 1) Inputs − → B CEnvironment → − Outputs; or directly via 2) Inputs →− Outputs. Since we do not know if there is a A B Cgreater impact of −→ to → − , or to go directly though → − , we later assess if there are differences interms of rankings when we run the inputs and environment variables alone to predict graduationrates, or as a combined set.DatabaseTo assess what variables are most
simplest case, given a new learning concept, ifstudent A considers it easy to understand, while student B considers it difficult to interpret,then the two students can be matched to learn from each other (i.e., student A teaches studentB). In a more complex scenario, students with diversified backgrounds can co-construct newcontextual understandings through peer-to-peer interactions. Within a small class where theinstructor knows every student well enough, peer instruction can be directly facilitated by theinstructor by means of manually forming study groups. However, this is no longer feasiblefor a large class that enrolls more than 100 students.Against this background, this paper presents a peer-to-peer learning platform (hereafterreferred to as
estimatethe volume of a 3-dimensional ball and a ten dimensional hyperball.Uniform random variable is special in Monte Carlo methods and in computation – most psuedorandom number generators are designed to generate uniform random numbers. In MATLAB, forexample, the following command generates an m by m array of U(0,1) uniform random numbers.x = rand(m,n);To generate an U(a,b) uniform random numbers, one can simply scale the U(0,1)random numbers byx=rand(m,n)*(b-a)+a;Almost all other languages used for scientific computation have similar random numbergenerators.Ex. 3. Determine the mean, variance and standard deviation of a U(a,b) random variable.Non-uniform distributions are those whose probability density functions are not constant. Severalsimple
. At first R = 1 Ω and C = 1 F, students can vary thesevalues to see the effect on the frequency response plots. The transfer function H(s) = Y(s) / X(s)can be derived by writing system equations in the frequency domain (or alternatively bytransforming system’s differential equation) and is given by:H(s) = - s / (s2 + 2s +1)To see what kind of filtering operation is performed on the input signal, students can plotfrequency response function H(ω) = H(s = jω) . This can be done in MATLAB using bodefunction:>> % Frequency Response Plots using MATLAB>> B = [-1 , 0] ;>> A = [1 , 2 , 1] ;>> SYS = tf (B , A)>> bode (SYS) ;>> Bode Diagram, H(s), Analog Filter
other was based on assessing the impact of VARK learning styles.Data Display The grading data obtained was tabulated using a Likert Scale. Likert Scale is shown in Appendix A. As mentioned earlier, grading was administered using Washington State University’s Rubric. This is shown Appendix B. Grading was holistic and qualitative. No quantitative grade points or percentages were recorded. Grading was recorded based on student’s perception, grasp and depth of understanding of the topic. Several “Primary Traits” or “Characteristics” were identified and assessed. EXCEL Spreadsheet data summary and a sample of
program are listed. Items (a) though (h) are more or less similarto Electronics Engineering Technology (EET) program and there is no need to cover them here.However, items (j) and (k) will be explained in detail. 2Courses in REET program include:(a)- COMMUNICATION SKILLS(b)- HUMANITIES, SOCIAL SCIENCES©- MATHEMATICS AND NATURAL SCIENCES(d)- PERSONAL AND PROFESSIONAL DEVELOPMENT(e)-TECH CORE COURSES(f)- AUTOMATION AND ELECTRICAL SYSTEMS(g)- INFORMATION SYSTEMS AND PROGRAMMING(h)- APPLICATION DEVELOPMENT(i)- TECHNOLOGY CAREER PREPARATION(j)- SENIOR PROJECT(k)-SPECIALIZED COURSESIn the following, specialized courses in REET program will be addressed.REET 100 Alternative Energy Technologies with LabThis
networking classes, and by default has computer systems connected through unmanaged switches. In the network hardware devices course students will transition from these unmanaged devices to managed routers and switches as the semester progresses. Students set up Ethernet cabling between network devices. Remembering whether the specific network cable is a straight-through or crossover is typically difficult to recall. A visual and rather appetizing cue in the form of a “burger” is suggested, as shown in Figure 2(b), with the router and network interface card (NIC) on the host computer serving as the slices of the sandwich. The hub serves as the protein of choice, and switch the topping. Network devices are arranged
, D Anguelov, D Erhan, V Vanhoucke, A Rabinovich. Going Deeper with Convolutions, Computer Vision and Pattern Recognition, 2015.7. C Szegedy, V Vanhoucke, S Ioffe, J Shlens, Z Wojna. Rethinking the Inception Architecture for Computer Vision, Computer Vision and Pattern Recognition, 2015.8. A G. Howard, M Zhu, B Chen, D Kalenichenko, W Wang, T Weyand, M Andreetto, H Adam. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications, Computer Vision and Pattern Recognition, 2017.9. Y Shibberu. Introduction to Deep Learning: A First Course in Machine Learning, ASEE Annual Conference & Exposition, Columbus, Ohio, 2017. https://peer.asee.org/2858210. TensorFlow Team, Installing Tensorflow on Windows
and a post-survey.A pre-survey occurs at the start of the class. It gives a baseline and normalizes pre-study biases.The post-survey measures how behaviors/attitudes change through the term. CON group wastreated to online videos, and authoritative traditional lectures. FC group was treated to onlinevideos, JiTT and peer-instruction. Surveys include quantitative (Likert) questions. Responses area 7-point scale [36]. Results are given in terms of mode and frequency. Results of Likert-stylequestions on student attitudes about lecture are given in Table 3-A on page 17. Students reportedon resource use in Table 3-B, and social integration in Table 3-C. Because the responses areordinal [37], [38], we are measuring differences in populations and
and indirect (amplified and/or reflected) attack methods 6. Quantifying the number of IoT bots in a botnet of unknown composition 7. Determining the resiliency of target systems during an attack and quantifying the number of devices a target system can withstand while remaining fully functionalAppendix A: Infrastructure Hardware DetailsAppendix B: Python ScriptsServer Side:#Script to establish a server side socket to test maximum bandwidth based on hardware resources#Using a file to send data for an extended period of timeimport socketimport os#VariablesB_size = int(raw_input("Enter the buffer size:\n"))Bind_port = int(raw_input("Enter the port number to connect on:\n"))#Establish the server and listen for connectionsdef