Paper ID #23065Modernizing Capstone Project: External and Internal ApproachesProf. Karen H. Jin, University of New Hampshire Karen H. Jin has been an Assistant Professor of Computer Science in Computing Technology program at UNH Manchester since Spring 2016. She previously taught as a lecturer for over ten years in University of Windsor and Dalhousie University. Her interest in computer science education research focuses on devel- oping new empirically supported theories and practices in teaching programming, software engineering and project-based learning with industrial relevance. She received her Ph.D. and M.Sc. in
the initial probability distribution by which the systembegins; (2) A, the transition matrix which shows the probabilities for the system to move betweenthe hidden states; and (3) B = bi (ot ), the emission matrix that shows the probability of generatingobservation ot when the system is in state qi. The first step to develop an HMM is to estimateparameter λ = (π0 , A, B). We apply the Baum-Welch algorithm that is an expected-maximizationmethod which starts with an initial guess for the parameters. This method then iterativelyimproves the estimations by calculating the likelihood of any sequence of observations given λ,until converging to optimal values (λ∗ ). After estimating model parameters, we use the Viterbialgorithm to estimate the
%20Low_Code%20Development%20Platforms.pdf?submissionGuid=83 c10178-9f4a-4980-8d27-2f20a0fcdaa1[8] D. Rani and R. Ranjan, “A Comparative Study of Saas, PaaS and IaaS in Cloud Computing,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 6, Jun. 2014.[9] B. P. Hehl and N. Saxena, “Applicability of RAD,” CS 575, Drexel University, 2005. [Online] Available: https://www.cs.drexel.edu/~bmitchel/course/cs575/classpres/w1/SaxenaHehlPaper.pdf[10] R. Jain, A. Chandrasekaran, and L. Castro, “Identifying Suitable Projects For Rapid Development: Some Proposed Selection Criteria,” International Journal of Management & Information Systems (IJMIS), vol. 19, no. 2, 2015
actual input data; it onlyrelies on n. Therefore, a lookup table can be pre-computed and loaded at runtime. We first definean algorithm in Python-based pseudocode that determines where samples should reside at eachstage of the algorithm, as in Figure 2. Figure. 2 Algorithm for computing table A of sample indices at each stage From this table, we can compute another table that explicitly states the destination indexthat a sample needs to be sent to. That is, using the new table B, calculated using the algorithm inFigure 3, during stage s, sample i in the current buffer should be sent to position B[s][i]. Figure. 3 Algorithm for determining table B, which contains the destination of the current stage's samples
. Zhang, S. Wilkinson-Flicker, A. Barmer, and E. D. V. Velez, “The condition of education 2015. nces 2015-144.” National Center for Education Statistics, 2015. [2] “AAC&U high-impact educational practices,” https://www.aacu.org/node/4084, accessed: 2020-02-11. [3] T. Perez, J. G. Cromley, and A. Kaplan, “The role of identity development, values, and costs in college STEM retention.” Journal of educational psychology, vol. 106, no. 1, p. 315, 2014. [4] M. J. Graham, J. Frederick, A. Byars-Winston, A.-B. Hunter, and J. Handelsman, “Increasing persistence of college students in STEM,” Science, vol. 341, no. 6153, pp. 1455–1456, 2013. [5] D. H. Schunk and F. Pajares, “Competence perceptions and academic functioning,” Handbook of
the probabilityat the given value or less. With this information, all the needed probabilities can becalculated. The syntax of the formula is =NORM.DIST( xo, µ, σ, TRUE) where, xo isthe value of the continuous random variable, µ is the mean and σ is the standarddeviation. The value TRUE request the cumulative probability for all x values in therange from -∞ ≤ x ≤ xo.Normal Distribution EXCEL Problem 1:The mean incubation time for a type of fertilized egg kept at 100.1°F is 21 days.Suppose that the incubation times are approximately normally distributed with a standarddeviation of 2 days.(a) What is the probability that a randomly selected fertilized egg hatches in less than 19 days?(b) What is the probability that a randomly selected
Science, vol. 22, no. 1, p.48-54, 2013.[8] Arduino Programming Certification Course, https://www.brainmeasures.com/certifications/1113/arduino- programming-certification.aspx[9] Thermoelectric Materials: Principles, Structure, Properties, and Applications, https://www.academia.edu/5923459/[10] Ssennoga T., Zhu J., Yan Y., Li B., " A comprehensive review of thermoelectric technology Materials: Principles, Structure, Properties and Applications", Elsevier Science.[11] BCS, Incorporated, "Waste Heat Recovery:Technology and Opportunities in U.S. Industry," U.S. Department of Energy’s Office of Energy Efficiency and Renewable Energy, Industrial Technologies Program (ITP), United States of America
opportunity to ask and get answers to anyquestions they had about their participation. The surveys were administered immediately afterthey viewed the captions through the specified caption display method. The participants wereassigned identification numbers to maintain confidentiality. Figure 4: A typical layout of the evaluation.All participants viewed three presentations in a randomized order. We randomized the order ofpresentations viewed by the participants to counterbalance them. After each presentation, themoderators stepped in and set up the system to display the next presentation. The first set of 5participants viewed presentation A, “Plastic Bag Ban in Bali” first, then B, “Black Lives MatterFounders”, and last, C
” ASEE- PSW 2018, Boulder, Co.8. N. Sharma, P. Scully-Power, and M. Blumenstein (2018) Shark Detection from Aerial Imagery Using Region-Based CNN, a Study. In: Mitrovic T., Xue B., Li X. (eds) AI 2018: Advances in Artificial Intelligence. AI 2018. Lecture Notes in Computer Science, vol 11320. Springer, Cham9. K. Jeremy, M. Johann, G. Kirk, H. Michael R (2016) ”Using unmanned aerial vehicles (UAVs) to investigate shark and ray densities in a shallow coral lagoon,” in Marine Ecology Progress Series, vol. 560, p. 237-242, November 2016.10. T. Ahilan, V.Aswin Adityan, S. Kailash (2015) ”Efficient Utilization of Unmanned Aerial Vehicles (UAV) for Fishing through Surveillance for Fishermen” in World Academy of Science, Engineering
; (b) Latinx students represent an increasing share of students in postsecondaryeducation; and (c) the rate of enrollment of Latinx students in postsecondary education has notkept pace with growth in the Latinx population in the U.S. [5,9].Data DashboardIn order to establish shared data management practices for measuring progress of collectiveefforts, a dashboard has been conceptualized to support the use of common measures andmanagement of the sets of data, which is a key component of the collective impact framework.This dashboard serves as a “meter” for institutions to track progress in their computingdisciplines, such as computer science or computer engineering, and to serve as a decision-makingtool to affect institutional/ departmental
order to increase the retention rate by 20% (6.5% per project year) from the base of 50.4% [4], starting spring 2018. Performance Indicators: o By September of each project year, The retention rate is expected to increase by 6.5% o By April 2020, at least 50% of CS graduating students will have a grade of B or better in the programming subject of computer science exit exam conducted by ETS. 3. Integrate an undergraduate research program to involve at least 12-20 junior and senior computer science students during the last 2 years of project, starting fall 2018. Performance Indicators: o Involve at least 3-5 students per semester in
Section 6.1.4 Accreditation Requirements for Computing ProgramsFor the most part, all four commissions of ABET follow a harmonized set of accreditation require-ments. These requirements differ in Student Outcomes (“describe what students are expected toknow and be able to do by the time of graduation”), Curriculum and Faculty criteria, as these tendto be most connected with the program’s discipline. The computing accreditation criteria are thuscomposed of eight categories divided into two parts: (a) general criteria, and (b) program-specificcriteria. The CAC program-specific criteria require that the general criteria be met, and provide upto three additional requirements for criterion 3 (student outcomes), criterion 5 (curriculum) and cri
camp impacting students’ camp-related experience,there appears to be a spill-over effect on students’ general school engagement. Figure 6summarizes these results. Significant differences between the pre- and post-levels werehighlighted in the graphs with asterisks. (a) Motivation (b) Perceived Competence Figure 5: Motivation and Competence (a) Homework Motivation (b) Self-Regulated Learning Figure 6: School Related Outcomes5.4 Gender differencesThere were substantially more boys (n = 42) who took part in the survey than girls (n = 19).Nonetheless, independent sample t-tests were
course, creating a data collection form for each course, and sharing a deadline for data collection;(b) Sending out email notifications of the data collection schedule to the all instructors;(c) Monitoring the data collection status and sending out reminder emails to the instructors who are late (Data from student survey, employer survey will be entered by the assessment coordinator.); and(d) Performing automatic statistical analysis for collected data using the given criteria and formula to determine whether or not each SO is met. The SO evaluation criteria and formula can be changed. All the information from the process can be visible to all faculty so they are aware of the entire process.Establishment of Specialty Groups and
-minute video on how to do something? Students often learnmaterial more deeply by teaching other people the material.” Students in 3-4 person teamsgenerated two videos on programming 1 material and one improvement video at the end of thesemester. This allows students to be value creators within this course and even create some of thecourse content. Students’ sign-up for the topics from instructor generated lists (figure 3) on afirst-come, first-serve on a CMS online forum during the second week of semester. Topic List A Topic List B Arrays Defining and Using Pointers 2D Arrays Arrays and
are team work, term paper andpresentations, simulation exercises, hands-on activities, and guest speaker series. These activities arewell liked by students and it helps them in their understanding of the subject matter and helps them insummer internships.The Concentration Approval Process – The approval process for course/minor/concentration/degreeprograms consists of the following six (6) sequential steps: (a) Approval by the Department/CollegeCurriculum Committee, (b) Approval by the ED. Policy Council, (c) Approval by the Faculty Senate, (d)Approval by the Board of Trustees and President, and Approval by the South Carolina Commission ofHigher Education (CHE) and SACSCOC if needed.Our cybersecurity concentration proposal went through all
that should be followedwhen dealing with an IoT environment. The process includes the following phases [15]: 1. Initialization: In this phase, preparatory steps are taken before ever interacting with any device at the incident scene. During this phase, investigators should: (a) Understand how the IoT ecosystem works. (b) Identify potential data sources: Data can be stored at various locations within an IoT environment such as on IoT devices themselves in the form of internal memory or SD Cards, smartphones, or even in the cloud. Identifying where data is stored would allow investigators to determine what devices to acquire, what forensic tools would be needed, as well as what legal
. 38-44). ACM.[9] Popoviciu, C., (2016, April 27). Moving towards a better (not just a bigger) Internet. APNIC blog. Retrieved September 2, 2018 from https://blog.apnic.net/?s=popoviciu.[10] Colitti, L., Gunderson, S., Kline, E., & Refice, T. (2010). Evaluating IPv6 adoption in the Internet. Passive and Active Measurement (pp. 141-150). Springer Berlin Heidelberg. doi:10.1007/978-3-642-12334-4_15[11] Nikkhah, M., Gurin, R., Lee, Y., & Woundy, R. (2011, December). Assessing IPv6 through web access a measurement study and its findings. In Proceedings of the Seventh Conference on emerging Networking EXperiments and Technologies (p. 26). ACM.[12] Dhamdhere, A., Luckie, M., Huffaker, B., Elmokashfi, A., & Aben, E
as access time, cycle time, area on chip, the totalnumber of instructions executed, total number of hits and miss-rates. The selected tools helped usto simulate cache and in depth understanding the design factors. We compared the obtained resultswith those reported in the literature. In most cases, the results were comparable, and in some casesslight improved were achieved.Bibliography1. Hill M.D, and Smith A.J. Evaluating Associativity in CPU Caches. In: IEEE Transactions on Computer, 1989.2. Arjun Malik A., Bhatia M.S, Wu P., Zhe Qi, Cache Coherency Case Study: Cache Pipeline, Multilevel, Hierarchical, Semester Project, Dept. Computer Science, BGHI, Ohio, 2017.3. Duska, B. M., Marwood D, and Feeley M. J. The Measured Access
applications in their dayto day activities - ranging from advanced manufacturing, banking, and healthcare; b) code nightsinvolving parents and community; c) high school student participation in competitions like theGreat Computer Challenge and the National Youth Cyber Defense Competition; and 3) Establishprofessional development experiences for high school CTE teachers through face to face anddistance learning workshops. 4Getting the Project StartedThe project officially started in fall 2019 and got its “kickoff” with a getting to know each otherafternoon at the Granby High School where project team, college students, teachers and studentsfrom the high school met in the school’s library. The high school
computing includes a number of steps for job seekers (synthesized from[11, 13, 28, 29, 31, 40]), as shown in Figure 2. Broadly, it entails interview preparation, aninterview process, and interview feedback and decisions. However, interview preparation beginsmonths or even years before the interview for the job seeker, and requires steps such as studyingdata structures, practicing programming, completing projects outside of schoolwork, or creating adigital portfolio (A). After completing an application (B), the applicant will then hear back fromthe employer/industry (C), and will likely be scheduled for an in situ evaluation (D). This typicallyinvolves completing a programming project, or a phone or video call interview, which may alsoinclude a
#2 clearly shows that the gradepattern is unaffected in pre-pandemic times. Table 1: List of required courses for school #1. Courses N1 D1 W1 N2 P1/P2 Description NW Fund. Database Fund. Web Fund. Interm. NW Prog. 1/2 Courses IT3-1 IT3-2 W2 P2 Description Junior IT1 Junior IT2 Interm. Web Prog 2 IT Major Data scale: 4=A, 3=B, 2=C, 1=D, 0=F 3 Courses/Semester/student=9 courses
complicated virtual environments. It is uncertain that the grant program will continue to offerfree credits in the future. Third, students create their own accounts and therefore usermanagement is a problem.In the future, we plan to develop more labs on commercial, public cloud systems and use VirtualPrivate Network (VPN) to connect students’ virtual machines with a central server to providebetter support and monitoring when needed. We are also considering integrating automaticassessment scripts through the central server on the public cloud to provide immediate feedback,which has been done successfully in some labs on our in-house, cloud-based systems.REFERENCES[1] D. Puthal, B. P. S. Sahoo, S. Mishra and S. Swain, "Cloud Computing Features, Issues
. Shenker, and J. Turner, “Openflow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008.[17] “Openflow specifications,” Retrieved March 18, 2018.[18] B. Pfaff, J. Pettit, T. Koponen, E. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar, K. Amidon, and M. Casado, “The design and implementation of open vswitch,” NSDI’15 Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, pp. 117–130, May 04 - 06, 2015.[19] “The Open vSwitch Database Management Protocol- RFC7047.” https://tools.ietf.org/html/rfc7047, 2012.[20] “Open vSwitch Database Schema.” http://openvswitch.org/ovs-vswitchd.conf.db.5.pdf, 2017.[21] “POX Wiki
Module B towebcams; 3) Debugging wifi: Turn on Power module to check if Wifi module is successfully paired; 4) Unplug Power module, then connect Test Modules and connect Power Supply to theother end of Test Modules to supply power to the system; Fig. 2 Hardware Architecture of Control Model on Smart Cars Fig. 3 Software Architecture of Control Model of Smart Cars 5) Debug Handwritten Number Recognition Module: put a handwritten number under thecamera to see if Test Modules can display numbers normally. If it is correct, tests pass; 6) Students write a simple input/output conversion program on PC, which converts inputsinto a signal format to control by Car Module (for example: "start": "input
/methods, some of which may be more cost-effective than traditional in-persontools/methods. By adopting proper tools and strategies, we believe that the quality of learning inonline courses can be comparable to, if not better than, that of learning in in-person courses.REFERENCES[1] K. Parker, L. Amanda, and K. Moore, "The digital revolution and higher education: Collegepresidents, public differ on value of online learning," Pew Internet & American Life Project(2011).[2] C. W. Starr, B. Manaris, and R. H. Stalvey, "Bloom's taxonomy revisited: specifyingassessable learning objectives in computer science," ACM SIGCSE Bulletin 40, no. 1 (2008):261-265.[3] P. Li, "Exploring virtual environments in a decentralized lab," ACM SIGITE Research in IT6
< 0.001 .979 3556.083 1.000 Lab 605.204 1 605.204 4.748 0.032 .057 4.748 .576 PPE 173.899 1 173.899 1.364 0.246 .017 1.364 .211Lab * PPE 307.181 1 307.181 2.410 0.125 .030 2.410 .335 Error 9943.074 78 127.475 Total 515395.000 82 Corrected 11345.720 81 Totala. R Squared=0.124 (Adjusted R Squared=0.090)b. Computed using alpha=0.054.6 Results of Factorial ANOVAFrom Table 3, we see that the interaction of lab enrollment by prior programming experience isnot statistically significant, but there is a statistically significant main effect for lab enrollment(F=4.748, df=1, 78, p=0.032). Effect z is very small for
/ what-is-hashing/, Retrieved: Jan 2021. [7] Prashant Ram, “How to set up a private Ethereum Blockchain and deploy a Solidity Smart Contract on the Blockchain in less than 20 mins!.” https://medium.com/blockchainbistro/ set-up-a-private-ethereum-blockchain-and-deploy-your-first-solidity-smart-contract-on-the-caa8334c343d, Retrieved: Jan 2021. [8] Jake Frankenfield, “Blockchain Wallet.” https://www.investopedia.com/terms/b/Blockchain-wallet.asp, Re- trieved: Jan 2021. [9] Blockgeeks, “Smart Contracts? A Beginner’s Guide to Smart Contracts.” https://blockgeeks.com/guides/ smart-contracts/, Retrieved: Jan 2021.[10] “How does a transaction get into the blockchain?.” https://www.euromoney.com/learning/blockchain-explained/ how
, Microsoft Certificated Professional, EMC Information Storage and Management, IPv6 Forum Certified Engineer (Gold), IPv6 Forum Certified Trainer (Gold), and Cisco Certified Academy Instructor. Dr. Pickard received his Ph.D. in Technology Management at Indiana State University. He also holds an MBA from Wayland Baptist Uni- versity and a B.S. in Professional Aeronautics from Embry-Riddle University. Research interests include: IPv6, IPv6 adoption, wireless sensor networks, and industry-academia partnerships.Mr. Dale Drummond, East Carolina University Dale Drummond is an Undergraduate Student at East Carolina University in the College of Engineer- ing and Technology. He is currently pursuing his Bachelor of Science in
, thefollowing items were identified as the reason for “ease-of-use” of blocks in programming: a) theyare easier to read, b) the shape and graphical cues help with how and where they can be used, c)they found it easier to compose and create programs with blocks, and d) blocks do not need muchmemorization as it is required for the text-based programming syntax. In addition to these fouritems, the authors found additional differences frequently repeated in students surveys (to answerresearch question 2 above) as: e) how Java was not as conducive to the use of trial-and-errorprogramming, f) lack of prefabricated commands in text-based programming, and g) there weremore items that were discussed in papers but not as frequent. Finally, related to the third