Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 39 in total
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, "SimPlus: An Experimental Simulation Tool", in Proceedings of the 2004 American Society for Engineering Education Annual Conference (ASEE'04), June 2004, Salt Lake City, Utah. Session 2420.8. Rajaei, H. Eid E., Kannungo, D., Ringerberg, J., 2011, "JSimPlus: A Tool for Teaching Simulation Techniques", in the 14th Communications and Networking Simulation Symposium, CNS'11, sponsored by ACM/SCS, April 4-11, Boston.9. Law, A. 2007, “Simulation Modeling & Analysis”, 4th Ed, McGraw Hill10. Harrell C, Ghosh B, and Bowden R, 2012 “Simulation Using ProModel”, 3rd Ed, McGraw Hill11. Chamberlain T, 2013, “Learning OMNeT++, Packt Publisher12. Virdis A, 2019 “Recent Advances in Network Simulation, the OMNeT Environment and its
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
demand area ofcybersecurity applications. It will offer collaboration among three colleges (CoE, CoS, CBA) toleverage from delivered student knowledge transfer and deliver an effective, two-semester projectbased course.CLASS OBJECTIVES & RESEARCH QUESTIONSThe class objectives are summarized into four folds: 1. Student engagement in interdisciplinary work of frontier technologies and its cybersecurity related aspects. a. Build interdisciplinary teams comprising of three to six students from the Computer Science (CS), Electrical and Computer Engineering (ECE), and Computer Information Systems (CIS) departments to get involved in projects studying frontier technologies and their cybersecurity aspects. b
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Weidong Kuang, University of Texas Rio Grande Valley; Abhijit Baul, University of Texas Rio Grande Valley
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
). The resized image is either saved for database, or processed by a real timeface recognition system, which will be discussed in the following sections. The basics of facedetection using Haar Cascades can be found at [8]. Fig.2 shows the web camera screen with adetected face frame and saved face image (96x96 pixels). (a) (b) Fig.2 Fact detection: (a) video screen with a green rectangle identifying a detected face; (b) cropped face image for database or face recognition.2.3 Face Recognition After the face detection, we can assume that the images either for database or for recognitionare face-concentrated and resized to 96x96 pixels (e.g. Fig.2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jeong Yang, Texas A&M University-San Antonio; Brandon Earwood, Texas A&M University-San Antonio; Young Rae Kim, Texas A&M University-San Antonio; Akhtar Lodgher, Texas A&M University - San Antonio
Tagged Divisions
Computing and Information Technology
objectives are to keep themodules complete and independent so that they can be easily integrated into the courses. Eachmodule package consists of instructions, lab exercises and solutions, and assessment methods.The modules were also designed to incorporate the National Initiative for CybersecurityEducation (NICE) Cybersecurity Workforce Framework (NCWF) topics of Cyber Threat andVulnerabilities, Risk Management and Software Reverse Engineering [9].The purpose of this paper is a) to describe a set of six security modules that was implemented ina Computer Science 1 course during the fall semester of 2019 at Texas A&M University-SanAntonio and b) to report the results of evaluating teaching effectiveness of implementing thesecurity modules with
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
late IT project or one thatgoes above the projected budgeted amount can be very detrimental to the organization’s success.Whereas, the duties of the CRO differ slightly as they are typically responsible for many of thesame duties as the CIO in terms of understanding the corporate landscape and ongoing securityprojects. However, their field of expertise is more of governance. As data and devices converge,the role of the CRO and their management responsibilities seem to vary across the landscapewithin the given literature. Nevertheless, the CRO has become a mainstay within the executiveleadership team, and according to Karanja and Rosso [6], the CRO provides a voice within threemanagerial roles: (a) interpersonal, (b) informational, and (c
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jared Oluoch, University of Toledo
Tagged Divisions
Computing and Information Technology
outcome.Faculty also provide a table for each course that shows a summary of the raw data for the directevidence that each assessment instrument generates. Let’s take CSET 4100 Server-SideProgramming as an example. An assessment on the need for continuous improvement couldinclude: a) Questions in two homework assignments involving Java web application anddeployment to reveal mastery of CAC and ETAC outcome 4; b) Two programming assignmentsinvolving Java server-side scripting designed to reveal mastery of CAC and ETAC outcome1. Figure 1: University of Toledo CSET Curriculum Computer Science & Engineering Technology Curriculum - Full Time (Effective Fall 2013
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
included bothvoice and screen capture of the pdf notes. During the lecture, online students were muted but theycould type questions using the chat feature. Zoom also facilitated online office hours which wereheld Tuesday through Thursday of each week (on the same days assignments were due.) Duringthese sessions, students could connect by voice (through computer microphones or by calling in)or through the chat feature.Student Performance and FeedbackAlmost all students excelled in the class, with the lowest overall grade awarded at a B-. Thisdid not indicate they found it too easy. Eighty-one percent of the students self-reported workingover 10 hours per week for the class (10+ hours was the highest option) and over half of themmentioned either a
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
, latency, packet ACL Storage Security Queues congestion control loss monitoring Science DMZ sFlow / Netflow capability Friction-free path L1 L2/L3 L4 L5 Security Non friction-free path (a) (b)Fig. 3. (a) A Science DMZ co-located to the regular enterprise network. Notice the absence
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #30661Cybersecurity Awareness and Training Through a Multidisciplinary OSINTCourse ProjectAlyssa Mendlein, Temple University Alyssa is a PhD student in the Department of Criminal Justice at Temple University. She earned a Bachelor of Arts in Psychology from Boston University and a Master of Philosophy in Criminological Research from the University of Cambridge. She is now working on an NSF CAREER grant for Dr. Aunshul Rege, exploring adversarial decision-making and cybersecurity education innovation.Ms. Thuy-Trinh Nguyen, Temple University Trinh is a PhD student in the Department of Criminal Justice at Temple
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
Paper ID #29604Deploying a Network Management Overlay for Education Video Conferenc-ingServicesCiprian Popoviciu, East Carolina University Dr. Ciprian Popoviciu has over 22 years of experience working in various technical and leadership roles in the IT industry. He founded and led Nephos6, the first company to enable OpenStack for IPv6 and deployit in production. Prior to starting Nephos6 he managed the architecture team of Cisco’s Engineering Infrastructure Services organization where he defined the strategy and led the execution of the internal DC consolidation and transition to cloud. For the past 17 years Ciprian
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #29158Incorporating Practical Computing Skills into a Supplemental CS2Problem Solving CourseProf. Margaret Ellis, Virginia Tech Assistant Professor of Practice, Computer Science Department, Virginia Tech My research interests include examining ways to improve engineering educational environments to facil- itate student success, especially among underrepresented groups.Dr. Catherine T. Amelink, Virginia Tech Dr. Amelink is Acting Vice Provost for Learning Systems Innovation and Effectiveness, Virginia Tech. She is also an affiliate faculty member in the Departments of Engineering Education and Educational
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
James K. Nelson Jr. P.E., Texas A&M University; Brent L. Donham, Texas A&M University-Commerce
Tagged Divisions
Computing and Information Technology
Paper ID #29122Partnership to Prepare Students for Careers in the Emerging Field ofCybersecurityDr. James K. Nelson Jr. P.E., Texas A&M University Dr. James K. Nelson received a Bachelor of Civil Engineering degree from the University of Dayton in 1974. He received the Master of Science and Doctor of Philosophy degrees in civil engineering from the University of Houston. During his graduate study, Dr. Nelson specialized in structural engineering. He is a registered professional engineer in three states, a Chartered Engineer in the United Kingdom, and a fellow of the American Society of Civil Engineers. He is also a
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephen Michael MacNeil, University of California, San Diego; Mohsen M. Dorodchi, University of North Carolina at Charlotte; Erfan Al-Hossami, University of North Carolina at Charlotte; Aileen Benedict, University of North Carolina at Charlotte; Devansh Desai, University of North Carolina at Charlotte; Mohammad Javad Mahzoon, Core Compete Inc.
Tagged Divisions
Computing and Information Technology
Paper ID #30213Curri: A Curriculum Visualization System that Unifies CurricularDependencies with Temporal Student DataDr. Stephen Michael MacNeil, University of California San Diego Stephen’s research focuses on how people collaboratively make sense of complex, ’wicked’ problems. Wicked problems are dynamic and constantly changing. They involve multiple stakeholders, often with conflicting requirements. To address these challenges, Stephen develops sociotechnical systems that col- lect, organize, and use data to support reflection and collective action. He received his Ph.D. at UNC in Charlotte and is currently a
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Yuzhong Shen, Old Dominion University; Anthony W. Dean, Old Dominion University; Rafael Landaeta, Old Dominion University
Tagged Divisions
Computing and Information Technology
designed in the early 1980’s to reduceemissions by monitoring the performance of major engine component. The major component ofthe OBD is the Electronic Control Unit (ECU, Figure 3(a)), which receives inputs from varioussensors and control the actuators. OBDs provide digital trouble codes (DTCs) that can beaccessed via the Digital Link Connector (DLC, Figure 3(b)). (a) Components of OBD (b) OBD-II Port Figure 2. On-board Diagnostics (OBD)The latest version of OBD is OBD-II, which is available on all cars and light trucks built since1996. The OBD-II standard specifies the type of diagnostic connector and its pinout, theelectrical signaling protocols available, and the messaging
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Abul K. M. Azad, Northern Illinois University
Tagged Divisions
Computing and Information Technology
. Figure 5: System diagram for remote vacuum cleanerThe system has three main components: a mobile platform as the remote testbed system, alocal server is the gateway between the testbed and remote clients and the remote client. Themobile platform consists of a drive system, sensors for navigation, an embedded processor(Arduino board) for local control and data management, an XBee for wireless communicationwith the local server, and an IP camera for real time video. The IP camera has its owncommunication route via a WiFi channel. The video is then embedded within the GUI foruser monitoring. Images of completed mobile platform are shown in Figure 6. (b) Close up view of electronics. (a
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Afsaneh Minaie, Utah Valley University; Reza Sanati-Mehrizy, Utah Valley University; Benjamin Chambers
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Course Truck (1/16th scale) was used in this build 1. A Raspberry Pi 3B+ 2. A PCA9685 PWM controller. 3. A microSD card, at least 8GB in capacity. 4. SanDisk Extreme 32GB microSDHC card 5. An external battery to power Raspberry Pi. 6. A Pi Camera with ribbon cable. 7. An external battery to power Raspberry Pi. a. Mobile device power banks typically come with a USB A to Micro USB cable, which will fit the micro USB port on the Raspberry Pi. b. An Anker Astro E1 power bank was used in this build. 8. Dupont female to female jumper cables. a. This is to connect the Pi to PWM controller board. 9. A Pi Camera with ribbon cable. a. A fisheye lens is recommended, for a wider
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Radana Dvorak, University of Portland; Heather Dillon, University of Portland; Nicole Ralston, University of Portland; Jeffrey Matthew Welch, University of Portland
Tagged Divisions
Computing and Information Technology
National Cybersecurity AwarenessMonth in October. The module was delivered as follows: 1. Students were placed in teams of four, and first part of the ‘four corners exercise was introduced. Teams were asked to discuss whether it’s ethical to hack, and then add their names under one of the four statements given the phrase “It is Ethical to Hack”. (students did not have to come to a unanimous agreement in their teams): a. Strongly agree b. Agree c. Strongly disagree d. Disagree 2. Case studies were handed out; each group had a different type of case study, all related to ethical hacking and how the
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Leila Zahedi, Florida International University; Stephanie J. Lunn, Florida International University; Samira Pouyanfar, Microsoft; Monique S. Ross, Florida International University; Matthew W. Ohland, Purdue University, West Lafayette
Tagged Divisions
Computing and Information Technology
, it should be clarified Athat in this model, there are two paths that can be taken in Astin’s Model, either: 1) Inputs − → B CEnvironment → − Outputs; or directly via 2) Inputs →− Outputs. Since we do not know if there is a A B Cgreater impact of −→ to → − , or to go directly though → − , we later assess if there are differences interms of rankings when we run the inputs and environment variables alone to predict graduationrates, or as a combined set.DatabaseTo assess what variables are most
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mohammad Rafiq Muqri, DeVry University, Pomona
Tagged Divisions
Computing and Information Technology
estimatethe volume of a 3-dimensional ball and a ten dimensional hyperball.Uniform random variable is special in Monte Carlo methods and in computation – most psuedorandom number generators are designed to generate uniform random numbers. In MATLAB, forexample, the following command generates an m by m array of U(0,1) uniform random numbers.x = rand(m,n);To generate an U(a,b) uniform random numbers, one can simply scale the U(0,1)random numbers byx=rand(m,n)*(b-a)+a;Almost all other languages used for scientific computation have similar random numbergenerators.Ex. 3. Determine the mean, variance and standard deviation of a U(a,b) random variable.Non-uniform distributions are those whose probability density functions are not constant. Severalsimple
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Alireza Kavianpour, DeVry University, Pomona
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
program are listed. Items (a) though (h) are more or less similarto Electronics Engineering Technology (EET) program and there is no need to cover them here.However, items (j) and (k) will be explained in detail. 2Courses in REET program include:(a)- COMMUNICATION SKILLS(b)- HUMANITIES, SOCIAL SCIENCES©- MATHEMATICS AND NATURAL SCIENCES(d)- PERSONAL AND PROFESSIONAL DEVELOPMENT(e)-TECH CORE COURSES(f)- AUTOMATION AND ELECTRICAL SYSTEMS(g)- INFORMATION SYSTEMS AND PROGRAMMING(h)- APPLICATION DEVELOPMENT(i)- TECHNOLOGY CAREER PREPARATION(j)- SENIOR PROJECT(k)-SPECIALIZED COURSESIn the following, specialized courses in REET program will be addressed.REET 100 Alternative Energy Technologies with LabThis
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Franz J. Kurfess, California Polytechnic State University, San Luis Obispo; Maria Pantoja, California Polytechnic State University, San Luis Obispo; Irene Humer, California Polytechnic State University, San Luis Obispo
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
” ASEE- PSW 2018, Boulder, Co.8. N. Sharma, P. Scully-Power, and M. Blumenstein (2018) Shark Detection from Aerial Imagery Using Region-Based CNN, a Study. In: Mitrovic T., Xue B., Li X. (eds) AI 2018: Advances in Artificial Intelligence. AI 2018. Lecture Notes in Computer Science, vol 11320. Springer, Cham9. K. Jeremy, M. Johann, G. Kirk, H. Michael R (2016) ”Using unmanned aerial vehicles (UAVs) to investigate shark and ray densities in a shallow coral lagoon,” in Marine Ecology Progress Series, vol. 560, p. 237-242, November 2016.10. T. Ahilan, V.Aswin Adityan, S. Kailash (2015) ”Efficient Utilization of Unmanned Aerial Vehicles (UAV) for Fishing through Surveillance for Fishermen” in World Academy of Science, Engineering
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Elsa Q. Villa, University of Texas at El Paso; Ann C. Gates, University of Texas at El Paso; Sanga Kim, University of Texas at El Paso ; David S. Knight, University of Washington
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
; (b) Latinx students represent an increasing share of students in postsecondaryeducation; and (c) the rate of enrollment of Latinx students in postsecondary education has notkept pace with growth in the Latinx population in the U.S. [5,9].Data DashboardIn order to establish shared data management practices for measuring progress of collectiveefforts, a dashboard has been conceptualized to support the use of common measures andmanagement of the sets of data, which is a key component of the collective impact framework.This dashboard serves as a “meter” for institutions to track progress in their computingdisciplines, such as computer science or computer engineering, and to serve as a decision-makingtool to affect institutional/ departmental
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Bin Cong, California State University at Fullerton; Christopher Ryu, California State University at Fullerton; Raman Menon Unnikrishnan, California State University at Fullerton
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
course, creating a data collection form for each course, and sharing a deadline for data collection;(b) Sending out email notifications of the data collection schedule to the all instructors;(c) Monitoring the data collection status and sending out reminder emails to the instructors who are late (Data from student survey, employer survey will be entered by the assessment coordinator.); and(d) Performing automatic statistical analysis for collected data using the given criteria and formula to determine whether or not each SO is met. The SO evaluation criteria and formula can be changed. All the information from the process can be visible to all faculty so they are aware of the entire process.Establishment of Specialty Groups and
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
that should be followedwhen dealing with an IoT environment. The process includes the following phases [15]: 1. Initialization: In this phase, preparatory steps are taken before ever interacting with any device at the incident scene. During this phase, investigators should: (a) Understand how the IoT ecosystem works. (b) Identify potential data sources: Data can be stored at various locations within an IoT environment such as on IoT devices themselves in the form of internal memory or SD Cards, smartphones, or even in the cloud. Identifying where data is stored would allow investigators to determine what devices to acquire, what forensic tools would be needed, as well as what legal
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hassan Rajaei, Bowling Green State University
Tagged Divisions
Computing and Information Technology
as access time, cycle time, area on chip, the totalnumber of instructions executed, total number of hits and miss-rates. The selected tools helped usto simulate cache and in depth understanding the design factors. We compared the obtained resultswith those reported in the literature. In most cases, the results were comparable, and in some casesslight improved were achieved.Bibliography1. Hill M.D, and Smith A.J. Evaluating Associativity in CPU Caches. In: IEEE Transactions on Computer, 1989.2. Arjun Malik A., Bhatia M.S, Wu P., Zhe Qi, Cache Coherency Case Study: Cache Pipeline, Multilevel, Hierarchical, Semester Project, Dept. Computer Science, BGHI, Ohio, 2017.3. Duska, B. M., Marwood D, and Feeley M. J. The Measured Access
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Vukica M. Jovanovic, Old Dominion University; Murat Kuzlu, Old Dominion University; Otilia Popescu, Old Dominion University; Abdul Rahman Badawi, Old Dominion University; Deborah Kay Marshall, Norfolk Public Schools; Salih Sarp, Old Dominion University; Spyridoula Tsouganatou, Old Dominion University; Petros J. Katsioloudis, Old Dominion University; Linda Vahala, Old Dominion University; Hongyi Michael Wu, Old Dominion University
Tagged Divisions
Computing and Information Technology
applications in their dayto day activities - ranging from advanced manufacturing, banking, and healthcare; b) code nightsinvolving parents and community; c) high school student participation in competitions like theGreat Computer Challenge and the National Youth Cyber Defense Competition; and 3) Establishprofessional development experiences for high school CTE teachers through face to face anddistance learning workshops. 4Getting the Project StartedThe project officially started in fall 2019 and got its “kickoff” with a getting to know each otherafternoon at the Granby High School where project team, college students, teachers and studentsfrom the high school met in the school’s library. The high school
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Peng Li, East Carolina University
Tagged Divisions
Computing and Information Technology
complicated virtual environments. It is uncertain that the grant program will continue to offerfree credits in the future. Third, students create their own accounts and therefore usermanagement is a problem.In the future, we plan to develop more labs on commercial, public cloud systems and use VirtualPrivate Network (VPN) to connect students’ virtual machines with a central server to providebetter support and monitoring when needed. We are also considering integrating automaticassessment scripts through the central server on the public cloud to provide immediate feedback,which has been done successfully in some labs on our in-house, cloud-based systems.REFERENCES[1] D. Puthal, B. P. S. Sahoo, S. Mishra and S. Swain, "Cloud Computing Features, Issues
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Caleb James O'Malley, University of Florida; Ashish Aggarwal, University of Florida
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
< 0.001 .979 3556.083 1.000 Lab 605.204 1 605.204 4.748 0.032 .057 4.748 .576 PPE 173.899 1 173.899 1.364 0.246 .017 1.364 .211Lab * PPE 307.181 1 307.181 2.410 0.125 .030 2.410 .335 Error 9943.074 78 127.475 Total 515395.000 82 Corrected 11345.720 81 Totala. R Squared=0.124 (Adjusted R Squared=0.090)b. Computed using alpha=0.054.6 Results of Factorial ANOVAFrom Table 3, we see that the interaction of lab enrollment by prior programming experience isnot statistically significant, but there is a statistically significant main effect for lab enrollment(F=4.748, df=1, 78, p=0.032). Effect z is very small for
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Lina Battestilli, North Carolina State University; Sarah Korkes, North Carolina State University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
be directly measured. Except for Q2, the treatmentgroup took slightly longer than the control group. T-test results show that the difference between (a) Number of Submissions (b) Time (in minutes) between a student’s First and Last Attempt Figure 2: Submission Details per Questionthe groups was statistically significant for Q2(p=0.019), Q4(p=0.003), Q7(p=0.004) andQ8(p=0.04). So the treatment group had more submissions on the Apply and Analyze-typequestions and also took longer to complete.Code Quality (RQ2)We also inspected the quality of the students solutions. The solutions for Analyze and Apply typeexercises results in very similar solutions
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Stephany Coffman-Wolph, Ohio Northern University; Kimberlyn Gray, West Virginia University Institute of Technology
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
. This first year will serve as a pilot to gain insight and feedback into the survey andassignment.Below is the table containing KEEN framework category [3], KEEN related course outcomes[4], and the artifact(s) that will be used to assess each outcome. Appendix B provides theInstructor/Peer Video Rubric and Self-Reflection Rubric and appendix C contains the surveysgiven to the students. Category of KEEN KEEN Related Course Assessment Plan Related Course Outcome [4] Outcome [3] Related to Curiosity Take ownership of, and express Grade on Video interest in topic/expertise/project. Communication Present technical information Grade from rubric on these portions