. Hendler, N. Shadbolt, W. Hall, T. Berners-Lee, and D. Weitzner. Web science: an interdisciplinary approach to understanding the web. Communications of the ACM, 51(7):60–69, 2008.[12] T. E. Jacobson and B. L. Mark. Separating wheat from chaff: Helping first-year students become information savvy. The Journal of General Education, 49(4):256–278, 2000.[13] P. Korovessis, S. Furnell, M. Papadaki, and P. Haskell-Dowland. A toolkit approach to information security awareness and education. Journal of Cybersecurity Education, Research and Practice, 2017(2):5, 2017.[14] C. Lestch. College IT experts and students have opposing views on cybersecurity. https://edscoop. com/college-it-experts-and-students-have-opposing-views-on-cybersecurity
science and IT play increasingly important role in the Chinese economy, just as theydo in the U.S. It is important for all to understand how future computer scientists and engineersare educated in China. References[1] X. Li and B. Lunt, “Undergraduate computing education in China - a brief status and perspective,” in Proceedings of the 7th conference on Information technology education, Minneapolis, MN, USA, October 19 - 21, 2006, New York: ACM, 2006, pp. 35-38.[2] Working Group for Software Engineering Curriculum, Guidelines for undergraduate curriculum of applied software engineering majors, 2016. Original in Chinese, 高等学校本 科软件工程专业应用型人才培养指导意见 2016 年.[3] X. Zhou, “Some historic notes of
MB LPDDR2 (shared with video) 1, 2, or 4 MB LPDDR3 (shared with video) Ethernet Ports 10/100 fast ethernet 10/100/100 gigabit ethernet Wireless 2.4 GHz 802.11n, Bluetooth 4.0 n/a USB Ports 4 USB 2.0, 1 USB micro B (for power) 2 USB 2.0 A, 1 USB 3.0 Storage MicroSD (though can boot from USB MicroSD, eMMC Medium flash drive or external hard drive with a change in boot configuration) Power Supply 5V, 2.5 A max (micro USB B) 5V, 3A max (3.5 mm Barrel Connector)Software and
Technical Symposium on Computing Science Education, New York, NY USA, 2016.[3] C. Watson and F. W. B. Li, "Failure rates in introductory programming revisited," in Proceedings of the 2014 conference on Innovation & technology in computer science education, New York, NY USA, 2014.[4] T. Beaubouef and J. Mason, "Why the high attrition rate for computer science students: some thoughts and observations," ACM SIGCSE Bulletin, vol. 37, no. 2, pp. 103-106, June 2005.[5] D. Teague and P. Roe, "Collaborative Learning – Towards A Solution for Novice Programmers," in Proceedings of the Tenth Australasian Computing Education Conference, Wollongong, Australia, January, 2008.[6] P. Fotaris, T. Mastoras, R. Leinfellner and Y
design in a step-by-step fashion. An excerpt of the guided study is shown inFigure 5. The remainder of the guided study includes additional practice problems. Figure 5. A Guided Study Application and Creation QuestionOther topics covered in guided studies were: models and architectures, reverse engineering,functional dependencies, normal forms, normalization, physical database design, and B+trees.4. Evaluation of ImpactThe impact of adding guided studies to a flipped course can be gauged in a few different ways:completion rate (Zingaro et al. 2013, Garcia 2018) and student satisfaction (Maher et al. 2013)are two metrics that have been used in previous studies. Completion rates for all 10 guidedstudies were nearly 100% for the
'15 Proceedings of the 46th ACM Technical Symposium on Computer ScienceEducation, Kansas City, 2015.[9] Sahin A., Cavlazoglu, B., & Zeytuncu, Y. E. (2015). Flipping a College Calculus Course: ACase Study. Educational Technology & Society, 18 (3), 142–152.[10] Khribi, M. K., Jemni, M., & Nasraoui, O. (2008, July). Automatic recommendations for e-learning personalization based on web usage mining techniques and information retrieval. InAdvanced Learning Technologies, 2008. ICALT'08. Eighth IEEE International Conference on(pp. 241-245). IEEE.[11] Khribi, M. K., Jemni, M., & Nasraoui, O. (2015). Recommendation systems forpersonalized technology-enhanced learning. In Ubiquitous learning environments andtechnologies (pp. 159-180
feel you have a better understanding?” and“After learning RTX, which of the following areas do you feel you have a better understanding?”There are seven response options to the above two questions (A. System boot up B. IRQ set upC. Process/thread communication and synchronization D. Event driven design pattern E. Taskscheduling F. Memory management G. CPU architecture).4.3 Data Analysis and Discussion on the ResultsIn our RTOS class, there were 21 students. All of them were given the survey. A total of 20students responded to the survey and there was no missing data. All their data were used foranalysis. The data was analyzed using descriptive statistics, such as median and range, becausethe data was not normal distributed. We used Wilcoxon
Paper ID #26915Gender Equality in the Information Systems and Technology Fields: A Com-prehensive Diagnosis at the School of Engineering of the University of MinhoProf. Rosa Maria Castro Fernandes Vasconcelos, University of Minho Rosa Maria de Castro Fernandes Vasconcelos is a Associate Professor at the Department of Textile Engi- neering since 2005. Degree in Textile Engineering by the University of Minho. Professor at the University of Minho since 1984. PhD in Engineering –Technology and Textile Chemistry by the University of Minho in 1993. Rieter Award, 1993. Responsible for several curricular units in the integrated
Southern Queensland. Retrieved from http://eprints.usq.edu.au/ 2992/1/Cater-Steel_Tan_Summary_of_ITIL_Adoption_Survey_Responses.pdf8. Cater-Steel, A., Toleman, M., & Tan, W. G. (2006, December). Transforming IT service management: The ITIL impact. Paper presented at the 17th Australasian Conference on Information Systems, Adelaide, Australia. Retrieved from http://eprints.usq.edu.au/1612/1/Cater-Steel_Toleman_Tan.pdf9. Cervone, F. (2008). ITIL: A framework for managing digital library services. OCLC Systems & Services, 24(2), 87-90. doi:10.1108/1065075081087543010. Chan, Y. E., & Reich, B. H. (2007). IT alignment: What have we learned? Journal of Information Technology, 22, 297-315. doi:10.1057
tackleproblems in small groups under the supervision of a tutor [13]. The problems are presented as a setof events (significant or otherwise) that are associated with reality. These events are analyzed anddiscussed by the group in term of the fundamental principles, mechanisms and processes. PBL hasthe potential to significantly increase student performance in the classroom by: (a) activating priorknowledge; (b) elaborating on prior knowledge through discussion; (c) restructuring of knowledge;(d) learning in context; and (e) engaging in open-ended discussion thereby increasing the student’scuriosity [13].Social Interaction is an approach that enhances knowledge acquisition through social activities,such as students establishing meaningful dialogue
Paper ID #27073Design of a Bluetooth-Enabled Wireless Pulse OximeterDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor and Chair of Engineering Department at Utah Valley University. She re- ceived her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems De- sign, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of Computer Science Department at
Paper ID #25423Work in Progress: A Web-Based Tool to Assess Computational ThinkingProf. Alka R. Harriger, Purdue University Alka Harriger joined the faculty of the Computer and Information Technology Department (CIT) in 1982 and is currently a Professor of CIT. For the majority of that time, she taught software development courses. From 2008-2014, she led the NSF-ITEST funded SPIRIT (Surprising Possibilities Imagined and Real- ized through Information Technology) project. From 2013-2018, she co-led with Prof. Brad Harriger the NSF-ITEST funded TECHFIT (Teaching Engineering Concepts to Harness Future Innovators and
Foundation [CollaborativeResearch: Florida IT Pathways to Success (Flit-Path) NSF# 1643965, 1643931, 1643835]. Anyfindings, conclusions, and recommendations expressed in this work do not necessarily reflect theviews of the National Science Foundation.References[1] A. Hogan and B. Roberts, “Occupational employment projections to 2024,” Mon. Labor Rev., 2017.[2] “Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Computer Programmers, on the Internet at https://www.bls.gov/ooh/computer-and- information-technology/computer-programmers.htm (visited January 29, 2019).” .[3] X. Chen, Stem Attrition: College Students & apos Paths into and Out of StemFields. Statistical Analysis Report
Paper ID #26401How an NSF S-STEM LEAP Scholarship Program Can Inform a New Engi-neering ProgramDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor and Chair of Engineering Department at Utah Valley University. She re- ceived her B.S., M.S., and Ph.D. all in Electrical Engineering from University of Oklahoma. Her research interests include gender issues in the academic sciences and engineering fields, Embedded Systems De- sign, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining and Databases.Dr. Reza Sanati-Mehrizy, Utah Valley University Reza Sanati-Mehrizy is a professor of
Paper ID #27348How to Cultivate Computational Thinking-Enabled Engineers: A Case Studyon the Robotics Class of Zhejiang UniversityDr. Jingshan Wu, Zhejiang University Postdoctoral Fellow of Institute of China’s Science, Technology and Education Strategy, Zhejiang Uni- versity; Lecturer, School of Public Administration, Zhejiang University of Finance & EconomicsMs. Yujie Wang, Zhejiang University Postgraduate of Institute of China’s Science,Technology and Education Strate, Zhejiang UniversityMs. Hanbing Kong, Zhejiang University Hanbing Kong, PhD Deputy Director, the Research Center for S&T, Education Policy, and Associate
Paper ID #26533Board 29: Creating a Virtual Reality Simulation of Plasma Etcher to Facili-tate Teaching and Practice of Dry Etching in Nanotechnology EducationDr. Reza Kamali, Utah Valley University Dr. Reza Kamali-Sarvestani is an Associate Professor of Computer Engineering at Utah Valley University. He received his B.S. degree in Electrical Engineering from Shiraz University Iran, and M.S.E, Ph.D. degree in Electrical and Computer Engineering from University of Alabama in Huntsville in 2009, and 2011 respectively. He joined Utah Valley University (UVU) in 2012. He is currently working to develop a Virtual Reality course on
-Driving Cars," 2018. [Online]. Available: https://www.autobytel.com/car-ownership/advice/10-benefits-of-self-driving-cars-121032/.[4] M. C. S. Y. D. Y. E. F. B Paden, "A Survey of Motion Planning and Control Techniques for Self-Driving Urban Vehicles," IEEE Transactions on Intelligent Vehicles, pp. 33-55, 2016.[5] L. Earnest, "Stanford Cart: How a Moon Rover Project was Blocked by a Politician but got Kicked by Football into a Self-Driving Vehicle," 6 3 2018. [Online]. Available: https://web.stanford.edu/~learnest/les/cart.html.[6] "No Hands Across America Journal," 1995. [Online]. Available: http://www.cs.cmu.edu/afs/cs/usr/tjochem/www/nhaa/Journal.html.[7] D. P. B. K. a. J. A. Todd Jochem, "PANS: A Portable Navigation Platform
Queues Building Structure Decision making Graph model Rule EngineFigure 1: a) Graph-based agent-oriented framework b) PF-based data assimilation frameworkTo support data assimilation of the graph-based agent-oriented model, we used the basic bootstrap filter[14] as the algorithm for the data assimilation which is also known as SMC methods or particle filters. Theobservations are the occupancy information which is collected by various sensors installed in the rooms. Inour framework, we consider only the node information as the state variable which reduces the size andcomplexity of the state for data assimilation. In the particle filters, particle represents a state, and eachparticle
,” Comput. Appl. Eng. Educ., vol. 26, no. 2, pp. 384–392, Mar. 2018.[21] X. Wang, Y. Bai, and G. C. Hembroff, “Hands-on Exercises for IT Security Education,” in Proceedings of the 16th Annual Conference on Information Technology Education - SIGITE ’15, 2015, pp. 161–166.[22] P. Deshpande, C. B. Lee, and I. Ahmed, “Evaluation of Peer Instruction for Cybersecurity Education,” in Proceedings of the SIGCSE Conference, 2019.[23] V. P. Janeja, C. Seaman, K. Kephart, A. Gangopadhyay, and A. Everhart, “Cybersecurity workforce development: A peer mentoring approach,” in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), 2016, pp. 267–272.[24] W. Damon, “Peer education: The untapped potential,” J. Appl
eliminated by adding nops another instruction. to the code Table 2 The interconnects among the topics a b c d e f g h i Remarks a N.A _ _ _ _ _ _ _ _ Fundamental topic b √ N.A _ _ _ _ _ _ _ Programming related c √ √ N.A _ _ _ _ _ _ Performance d √ √√√ _ N.A _ _ _ _ _ Datapath e √ √ √ _ N.A
received SNR, to the thresholds in each state, each of which hascertain packet error probability. Each state can have a different threshold level, and depending ona given threshold, we associate an error probability with that state. In our approach we use threestate Markov chain model, where there are two good states, E (Excellent) and F (Fair), and asingle bad state, B. This gives us an insight for modeling wireless channels more accurately.Assuming that probability of transition from state E to state B and vice versa is very low, we canrepresent this with the diagram in Figure 1. PEF PFB
. At first R = 1 Ω and C = 1 F, students can vary thesevalues to see the effect on the frequency response plots. The transfer function H(s) = Y(s) / X(s)can be derived by writing system equations in the frequency domain (or alternatively bytransforming system’s differential equation) and is given by:H(s) = - s / (s2 + 2s +1)To see what kind of filtering operation is performed on the input signal, students can plotfrequency response function H(ω) = H(s = jω) . This can be done in MATLAB using bodefunction:>> % Frequency Response Plots using MATLAB>> B = [-1 , 0] ;>> A = [1 , 2 , 1] ;>> SYS = tf (B , A)>> bode (SYS) ;>> Bode Diagram, H(s), Analog Filter
other was based on assessing the impact of VARK learning styles.Data Display The grading data obtained was tabulated using a Likert Scale. Likert Scale is shown in Appendix A. As mentioned earlier, grading was administered using Washington State University’s Rubric. This is shown Appendix B. Grading was holistic and qualitative. No quantitative grade points or percentages were recorded. Grading was recorded based on student’s perception, grasp and depth of understanding of the topic. Several “Primary Traits” or “Characteristics” were identified and assessed. EXCEL Spreadsheet data summary and a sample of
networking classes, and by default has computer systems connected through unmanaged switches. In the network hardware devices course students will transition from these unmanaged devices to managed routers and switches as the semester progresses. Students set up Ethernet cabling between network devices. Remembering whether the specific network cable is a straight-through or crossover is typically difficult to recall. A visual and rather appetizing cue in the form of a “burger” is suggested, as shown in Figure 2(b), with the router and network interface card (NIC) on the host computer serving as the slices of the sandwich. The hub serves as the protein of choice, and switch the topping. Network devices are arranged
actual input data; it onlyrelies on n. Therefore, a lookup table can be pre-computed and loaded at runtime. We first definean algorithm in Python-based pseudocode that determines where samples should reside at eachstage of the algorithm, as in Figure 2. Figure. 2 Algorithm for computing table A of sample indices at each stage From this table, we can compute another table that explicitly states the destination indexthat a sample needs to be sent to. That is, using the new table B, calculated using the algorithm inFigure 3, during stage s, sample i in the current buffer should be sent to position B[s][i]. Figure. 3 Algorithm for determining table B, which contains the destination of the current stage's samples
Science, vol. 22, no. 1, p.48-54, 2013.[8] Arduino Programming Certification Course, https://www.brainmeasures.com/certifications/1113/arduino- programming-certification.aspx[9] Thermoelectric Materials: Principles, Structure, Properties, and Applications, https://www.academia.edu/5923459/[10] Ssennoga T., Zhu J., Yan Y., Li B., " A comprehensive review of thermoelectric technology Materials: Principles, Structure, Properties and Applications", Elsevier Science.[11] BCS, Incorporated, "Waste Heat Recovery:Technology and Opportunities in U.S. Industry," U.S. Department of Energy’s Office of Energy Efficiency and Renewable Energy, Industrial Technologies Program (ITP), United States of America
are team work, term paper andpresentations, simulation exercises, hands-on activities, and guest speaker series. These activities arewell liked by students and it helps them in their understanding of the subject matter and helps them insummer internships.The Concentration Approval Process – The approval process for course/minor/concentration/degreeprograms consists of the following six (6) sequential steps: (a) Approval by the Department/CollegeCurriculum Committee, (b) Approval by the ED. Policy Council, (c) Approval by the Faculty Senate, (d)Approval by the Board of Trustees and President, and Approval by the South Carolina Commission ofHigher Education (CHE) and SACSCOC if needed.Our cybersecurity concentration proposal went through all
. 38-44). ACM.[9] Popoviciu, C., (2016, April 27). Moving towards a better (not just a bigger) Internet. APNIC blog. Retrieved September 2, 2018 from https://blog.apnic.net/?s=popoviciu.[10] Colitti, L., Gunderson, S., Kline, E., & Refice, T. (2010). Evaluating IPv6 adoption in the Internet. Passive and Active Measurement (pp. 141-150). Springer Berlin Heidelberg. doi:10.1007/978-3-642-12334-4_15[11] Nikkhah, M., Gurin, R., Lee, Y., & Woundy, R. (2011, December). Assessing IPv6 through web access a measurement study and its findings. In Proceedings of the Seventh Conference on emerging Networking EXperiments and Technologies (p. 26). ACM.[12] Dhamdhere, A., Luckie, M., Huffaker, B., Elmokashfi, A., & Aben, E
Module B towebcams; 3) Debugging wifi: Turn on Power module to check if Wifi module is successfully paired; 4) Unplug Power module, then connect Test Modules and connect Power Supply to theother end of Test Modules to supply power to the system; Fig. 2 Hardware Architecture of Control Model on Smart Cars Fig. 3 Software Architecture of Control Model of Smart Cars 5) Debug Handwritten Number Recognition Module: put a handwritten number under thecamera to see if Test Modules can display numbers normally. If it is correct, tests pass; 6) Students write a simple input/output conversion program on PC, which converts inputsinto a signal format to control by Car Module (for example: "start": "input
at the University of Western Ontario. I earned my PhD, MS, and BS in Electrical & Computer Engineering from Michigan State University in East Lansing. Before completing my PhD, I joined Intel Incorporation to work on the P6 line of processors and chipsets. While pursuing my PhD, I developed a financial web application that helped colleges at Michigan State University to streamline their finances.Matthew Schweinefuss c American Society for Engineering Education, 2019 Data-Driven Investigation of Curiosity in Student Text Responses1. IntroductionLearning how to learn and apply new knowledge is a vital skill students need to develop. Astudent’s