Paper ID #22172The Research Experience for Undergraduates (REU) Principal Investigators(PI) Guide: Development of a Best Practices WebsiteMs. Mariangely Iglesias Pena, Iowa State University Mariangely Iglesias Pena is an MS student in Human Computer Interaction at Iowa State University’s Virtual Reality Applications Center. Her background is in industrial design, which drives her interest in interactive and web design.Prof. Stephen B. Gilbert, Iowa State University Stephen B. Gilbert received a BSE from Princeton in 1992 and PhD from MIT in 1997. He has worked in commercial software development and run his own company. He
, Discuss the pros and cons of alternative technical solutions, and Debate possible evolutionary paths for the standard being analyzed.We propose six learning stages with specific learning objective in each stage. These aredescribed in continuation.3.1 ContextThe student needs to get familiar with the standard and the standardization mechanics. Theinstructor thus provides a) A high-level description of the standard with certain details, describing theoretical concepts and employed technologies, identifying relevant working parameters and expected system behaviors, b) The standard specifications and the relationships among the main and auxiliary documents, and c) The introduction to the software framework to be used
. Utilizing facial landmarks could increasethe size of a training dataset enough to take advantage of the power of a CNN.References[1]. Elfenbein, H. A., & Ambady, N. (2002b). Predicting workplace outcomes from the ability to eavesdrop on feelings. Journal of Applied Psychology, 87(5), 963-971.[2]. Galati, D., Miceli, R., & Sini, B. (2001). Judging and coding facial expression of emotions in congenitally blind children. International Journal of Behavioral Development, 25(3), 268-278.[3]. Darwin, C. (2005). The expression of emotion in man and animals. New York, NY: Appelton. (Original work published 1872)[4]. Ekman, P. & Friesen, W. (1977). Facial Action Coding System. New Jersey: Lawrence Erlbaum Association[5
microfabrication and nanotechnology. Boca Raton, FL: CRC Press, 2012. 10. B. Robertson, “Science 101: How Does an Electron Microscope Work?,” Science and Children, vol. 051, no. 01, pp. 76–78, 2013. 11. B. Smith, “The Differences Between Atomic Force Microscopy and Scanning Electron Microscopy,” AZoM.com, 01-Aug-2017. [Online]. Available: https://www.azom.com/article.aspx?ArticleID=11879. [Accessed: 01-Feb-2018]. 12. “Scanning Electron Microscopy (SEM),” Techniques, 26-May-2017. [Online]. Available: https://serc.carleton.edu/research_education/geochemsheets/techniques/SEM.html. [Accessed: 02-Feb-2018]. 13. G. Brake, “Buying a Pre-Owned SEM,” Lab Manager. [Online]. Available: http://www.labmanager.com
program.The authors are planning to extend this study in future work to include more universities especiallythose interested in offering interdisciplinary programs and study the technical content of thecybersecurity-related courses offered by their respective departments.6. References[1] Juniper Research©, "Cybercrime will Cost Businesses Over $2 Trillion by 2019," 2015. [Online]. Available: https://www.juniperresearch.com/press/press-releases/cybercrime- cost-businesses-over-2trillion.[2] SANS ICS, "Analysis of the Cyber Attack on the Ukrainian Power Grid: Defense Use Case," 2016. [Online]. Available: https://ics.sans.org/media/E- ISAC_SANS_Ukraine_DUC_5.pdf.[3] J. B.-S. H. R. R. a. U. Lee, "Anatomy of the Information Security Workforce
number of images increased rapidly. (a) An image example of the first problem (b) A puzzle example for the second problemFigure 1. Problem examples. The second problem contains two bridge-puzzles, one easy and the other of mediumdifficulty; please see Figure 1 (b) for example. The puzzle rules are (a) to connect each island,which is represented as a circle, with the number of bridges shown inside the circle; (b) there canonly be two bridges connecting two islands; (c) a bridge must not overlap with other bridges orislands; and (d) there must be continuous link between all islands, which means there cannot beisolated island. Figure 1 (b) presents a solution that satisfies the puzzle’s rules. When solving the second problem, the
Cognitive Psychology, vol. 19, no. 4-5, pp. 494–513, 2007. [5] S. Freeman, E. O’Connor, J. W. Parks, M. Cunningham, D. Hurley, D. Haak, C. Dirks, and M. P. Wenderoth, “Prescribed active learning increases performance in introductory biology,” CBE-Life Sciences Education, vol. 6, no. 2, pp. 132–139, 2007. [6] S. Freeman, D. Haak, and M. P. Wenderoth, “Increased course structure improves performance in introductory biology,” CBE-Life Sciences Education, vol. 10, no. 2, pp. 175–186, 2011. [7] R. Heradio, L. de la Torre, D. Galan, F. J. Cabrerizo, E. Herrera-Viedma, and S. Dormido, “Virtual and remote labs in education: A bibliometric analysis,” Computers & Education, vol. 98, pp. 14–38, 2016. [8] M. Ergezer, B. Kucharski, and A
Council for 2018.Dr. Naupaka B. Zimmerman, University of San FranciscoMr. Jonah M. Duckles, Software Carpentry Jonah Duckles works to accelerate data-driven inquiry by catalyzing digital skills and building organiza- tional capacity. As a part of the leadership team, he helped to grow Software and Data Carpentry into a financially sustainable non-profit with a robust organization membership in 10 countries. In his career he has helped to address challenging research problems in long-term technology strategy, GIS & remote sensing data analysis, modeling global agricultural production systems and global digital research skills development.Tracy K. Teal, The Carpentries c American Society for
Paper ID #22838A Flipped Active-learning Class to Support Diverse Students in a Large In-troduction to Programming ClassProf. Laura Kay Dillon, Michigan State University Laura Dillon is a professor and past Chair of Computer Science at Michigan State University (MSU); before joining MSU, she was a professor at the University of California, Santa Barbara. Her research centers on formal methods in software engineering, specification, and analysis of concurrent software systems. An ACM Distinguished Scientist, Laura has served on numerous editorial boards, program committees, funding panels, and advisory committees—most
frequently mentioned difficulties with procrastination and timemanagement (Figure 1.b). (a) (b)Figure 1 - Word cloud representation of responses regarding (a) strengths and (b) weaknesses as students.Students were also asked to describe the most interesting fact or concept learned in a class insideand outside of their major, respectively. Figure 2.a represents a word cloud representation ofanswers pertaining to concepts learned inside their major. Interestingly, human-related topicswere by far the most common answer provided, a pattern that is likely quite different than thatobserved in students taking standard programming or engineering courses. With respect toconcepts
Paper ID #23289Crafting the Future of Computing Education in CC2020: A WorkshopDr. Stephen T Frezza, Gannon University Deacon Steve Frezza, PSEM is a professor of Software Engineering and chair of the Computer and In- formation Science department at Gannon University in Erie, PA. His research interests include Global Software Engineering, Affective Domain Learning, Engineering Education Research, as well as Philos- ophy of Engineering and Engineering Education. He is regularly involved in supporting the regional entrepreneurial ecosystem, as well as projects that serve the regional community. He is an active member
Paper ID #24012Designing Undergraduate Data Science Curricula: A Computer Science Per-spectiveDr. Predrag T. Tosic, University of Idaho Predrag Tosic is an early mid-career researcher with a unique mix of academic research, industrial and DOE lab R&D experiences. His research interests include AI, data science, machine learning, intelli- gent agents and multi-agent systems, cyber-physical/cyber-secure systems, distributed coordination and control, large-scale complex networks, internet-of-things/agents, and mathematical and computational models and algorithms for ”smart” transportation, energy and other grids. He is
of educational research, 76(1), 1-62.Feden, P. D., & Vogel, R. M. (2003). Methods of teaching: Applying cognitive science to promote student learning: McGraw-Hill Humanities, Social Sciences & World Languages.Felder, R. M., & Brent, R. (2005). Understanding student differences. Journal of engineering education, 94(1), 57-72.Felder, R. M., & Silverman, L. K. (1988). Learning and teaching styles in engineering education. Engineering education, 78(7), 674-681.Felder, R. M., & Soloman, B. A. (n.d.). Index of Learning Styles. Retrieved from http://www.ncsu.edu/felder-public/ILSpage.html.Felder, R. M., & Soloman, B. A. (n.d.). Learning styles and strategies. Retrieved from
simplest case, given a new learning concept, ifstudent A considers it easy to understand, while student B considers it difficult to interpret,then the two students can be matched to learn from each other (i.e., student A teaches studentB). In a more complex scenario, students with diversified backgrounds can co-construct newcontextual understandings through peer-to-peer interactions. Within a small class where theinstructor knows every student well enough, peer instruction can be directly facilitated by theinstructor by means of manually forming study groups. However, this is no longer feasiblefor a large class that enrolls more than 100 students.Against this background, this paper presents a peer-to-peer learning platform (hereafterreferred to as
, D Anguelov, D Erhan, V Vanhoucke, A Rabinovich. Going Deeper with Convolutions, Computer Vision and Pattern Recognition, 2015.7. C Szegedy, V Vanhoucke, S Ioffe, J Shlens, Z Wojna. Rethinking the Inception Architecture for Computer Vision, Computer Vision and Pattern Recognition, 2015.8. A G. Howard, M Zhu, B Chen, D Kalenichenko, W Wang, T Weyand, M Andreetto, H Adam. MobileNets: Efficient Convolutional Neural Networks for Mobile Vision Applications, Computer Vision and Pattern Recognition, 2017.9. Y Shibberu. Introduction to Deep Learning: A First Course in Machine Learning, ASEE Annual Conference & Exposition, Columbus, Ohio, 2017. https://peer.asee.org/2858210. TensorFlow Team, Installing Tensorflow on Windows
and indirect (amplified and/or reflected) attack methods 6. Quantifying the number of IoT bots in a botnet of unknown composition 7. Determining the resiliency of target systems during an attack and quantifying the number of devices a target system can withstand while remaining fully functionalAppendix A: Infrastructure Hardware DetailsAppendix B: Python ScriptsServer Side:#Script to establish a server side socket to test maximum bandwidth based on hardware resources#Using a file to send data for an extended period of timeimport socketimport os#VariablesB_size = int(raw_input("Enter the buffer size:\n"))Bind_port = int(raw_input("Enter the port number to connect on:\n"))#Establish the server and listen for connectionsdef
Paper ID #23065Modernizing Capstone Project: External and Internal ApproachesProf. Karen H. Jin, University of New Hampshire Karen H. Jin has been an Assistant Professor of Computer Science in Computing Technology program at UNH Manchester since Spring 2016. She previously taught as a lecturer for over ten years in University of Windsor and Dalhousie University. Her interest in computer science education research focuses on devel- oping new empirically supported theories and practices in teaching programming, software engineering and project-based learning with industrial relevance. She received her Ph.D. and M.Sc. in
the probabilityat the given value or less. With this information, all the needed probabilities can becalculated. The syntax of the formula is =NORM.DIST( xo, µ, σ, TRUE) where, xo isthe value of the continuous random variable, µ is the mean and σ is the standarddeviation. The value TRUE request the cumulative probability for all x values in therange from -∞ ≤ x ≤ xo.Normal Distribution EXCEL Problem 1:The mean incubation time for a type of fertilized egg kept at 100.1°F is 21 days.Suppose that the incubation times are approximately normally distributed with a standarddeviation of 2 days.(a) What is the probability that a randomly selected fertilized egg hatches in less than 19 days?(b) What is the probability that a randomly selected
opportunity to ask and get answers to anyquestions they had about their participation. The surveys were administered immediately afterthey viewed the captions through the specified caption display method. The participants wereassigned identification numbers to maintain confidentiality. Figure 4: A typical layout of the evaluation.All participants viewed three presentations in a randomized order. We randomized the order ofpresentations viewed by the participants to counterbalance them. After each presentation, themoderators stepped in and set up the system to display the next presentation. The first set of 5participants viewed presentation A, “Plastic Bag Ban in Bali” first, then B, “Black Lives MatterFounders”, and last, C
order to increase the retention rate by 20% (6.5% per project year) from the base of 50.4% [4], starting spring 2018. Performance Indicators: o By September of each project year, The retention rate is expected to increase by 6.5% o By April 2020, at least 50% of CS graduating students will have a grade of B or better in the programming subject of computer science exit exam conducted by ETS. 3. Integrate an undergraduate research program to involve at least 12-20 junior and senior computer science students during the last 2 years of project, starting fall 2018. Performance Indicators: o Involve at least 3-5 students per semester in
Section 6.1.4 Accreditation Requirements for Computing ProgramsFor the most part, all four commissions of ABET follow a harmonized set of accreditation require-ments. These requirements differ in Student Outcomes (“describe what students are expected toknow and be able to do by the time of graduation”), Curriculum and Faculty criteria, as these tendto be most connected with the program’s discipline. The computing accreditation criteria are thuscomposed of eight categories divided into two parts: (a) general criteria, and (b) program-specificcriteria. The CAC program-specific criteria require that the general criteria be met, and provide upto three additional requirements for criterion 3 (student outcomes), criterion 5 (curriculum) and cri
. Shenker, and J. Turner, “Openflow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008.[17] “Openflow specifications,” Retrieved March 18, 2018.[18] B. Pfaff, J. Pettit, T. Koponen, E. Jackson, A. Zhou, J. Rajahalme, J. Gross, A. Wang, J. Stringer, P. Shelar, K. Amidon, and M. Casado, “The design and implementation of open vswitch,” NSDI’15 Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, pp. 117–130, May 04 - 06, 2015.[19] “The Open vSwitch Database Management Protocol- RFC7047.” https://tools.ietf.org/html/rfc7047, 2012.[20] “Open vSwitch Database Schema.” http://openvswitch.org/ovs-vswitchd.conf.db.5.pdf, 2017.[21] “POX Wiki
, Microsoft Certificated Professional, EMC Information Storage and Management, IPv6 Forum Certified Engineer (Gold), IPv6 Forum Certified Trainer (Gold), and Cisco Certified Academy Instructor. Dr. Pickard received his Ph.D. in Technology Management at Indiana State University. He also holds an MBA from Wayland Baptist Uni- versity and a B.S. in Professional Aeronautics from Embry-Riddle University. Research interests include: IPv6, IPv6 adoption, wireless sensor networks, and industry-academia partnerships.Mr. Dale Drummond, East Carolina University Dale Drummond is an Undergraduate Student at East Carolina University in the College of Engineer- ing and Technology. He is currently pursuing his Bachelor of Science in
to Increase Engagement in the Classroom: science. Communications of the ACM (Jun. 2001), 44(6), A Case Study in Science and Engineering; Proceedings of pp.27-30. DOI= http://doi.acm.org/10.1145/376134.376145 the American Society for Engineering Education ASEE;[10] Roberts, E.S., Kassianidou, M. and Irani, L., 2002. Columbus, OH; June 2017 Encouraging women in computer science. ACM SIGCSE [24] Khan, A. Egbue, O, Palkie, B. (2016); Active learning: Bulletin – Women and Computing (Jun. 2002), 34(2), 84-88. Engaging students to maximize learning in an online course; DOI= http://doi.acm.org/10.1145/543812.543837 EJEL- Electronic Journal of e
was subsequently excluded from any application or acceptance calculation, but was included in new enrollments, declared majors, and graduations. b Net Increase Percent: 100 percent equals no change, above 100% indicates a net increase; for example, 122% represents a 22% increase above the pre-program year. Values ≥ 200% represent a doubling (or more) of raw numbers for the category and group represented in the row.More salient to this study, substantial growth was also observed in the number of women’sapplications, acceptances, new enrollments, and declared majors across the seven schools.Comparing the pre-program year (AY 2011-2012) with the post-program year (AY 2014-2015),both the number of women who applied
Hardware/Software, report presentation, Started the project Student A ECET purchasing, data Fall 2017 Sp, Su, Fa 2017 collection and analyzing Hardware, Worked on the Student B ECET purchasing, manual Summer 2017 project Sp, Su 2017 preparation
Paper ID #21251Teaching Directory Services: Topics, Challenges, and ExperiencesDr. Yu Cai, Michigan Technological University Dr. Yu Cai is an associate professor and program chair in the Computer Network and System Adminis- tration (CNSA) program at the School of Technology, Michigan Technological University. His current research interests include cyber security and medical informatics. He is particularly interested in applying his research and techniques to real-life applications. He has been a consultant to many companies includ- ing IBM and Ford. Dr. Cai serves in editorial boards of several international journals. He
Paper ID #24002Teaching Theoretical Computer Science and Mathematical Techniques to Di-verse Undergraduate Student PopulationsDr. Predrag T. Tosic, University of Idaho Predrag Tosic is an early mid-career researcher with a unique mix of academic research, industrial and DOE lab R&D experiences. His research interests include AI, data science, machine learning, intelli- gent agents and multi-agent systems, cyber-physical/cyber-secure systems, distributed coordination and control, large-scale complex networks, internet-of-things/agents, and mathematical and computational models and algorithms for ”smart” transportation
Paper ID #23139Magnitude Museum: Game-based Learning for Nanosizes, Dimensions, andNanotechnology TerminologyDr. Reza Kamali-Sarvestani, Utah Valley UniversityBrian Durney, Utah Valley University Brian Durney teaches computer science at Utah Valley University. His research interests are educational games and game AI. c American Society for Engineering Education, 2018 Magnitude Museum: Game-Based Learning for Nanosizes, Dimensions, and Nanotechnology TerminologyAbstractMagnitude Museum is an educational game that helps students develop a sense of scale andunderstand the
proper skills to operateand manage their networks. Broadband wireless networks and big data systems are twoimportant technologies that current STEM students need to learn, comprehend and master tosatisfy the market needs. Design and implementation of an academic big-data system andbroadband wireless testbed for instruction and research purposes is a difficult task. In this work,challenges facing the design and implementation of a mobile networks and big-data lab areevaluated. This work aims at providing a comprehensive reporting about an experience gainedfrom designing and implementing an academic lab of big-data system used for broadbandwireless networks traffic analysis and management. Challenges facing the project team duringthe