, 2018. [Online]. Available: https://search.proquest.com/docview/1272087912?pq-origsite=gscholar.[5] C. Frank, J. McGuffee, and C. Thomas, “Early undergraduate cybersecurity research,” J. Comput. Sci. Coll., vol. 32, no. 1, pp. 46–51, 2016, Accessed: Sep. 23, 2018. [Online]. Available: https://dl.acm.org/citation.cfm?id=3007235.[6] V. P. Janeja, C. Seaman, K. Kephart, A. Gangopadhyay, and A. Everhart, “Cybersecurity workforce development: A peer mentoring approach,” in 2016 IEEE Conference on Intelligence and Security Informatics (ISI), Sep. 2016, pp. 267–272, doi: 10.1109/ISI.2016.7745487.[7] P. Deshpande, C. B. Lee, and I. Ahmed, “Evaluation of Peer Instruction for Cybersecurity Education,” 2019, doi
section.2. CyberSec LabsIn the learning system, a GUI application was designed to help learners navigate the system [5].In total, eight CyberSec labs were designed: Web defacement lab, Remote secure login lab, FTPserver DoS lab, Patch management lab, Backdoor lab, SQL injection (SQLi) lab, Honeypot lab,and Secure plain text traffic labs. Each lab included two sub-labs (attack and defense) andobjectives were included in each of the labs. Figure 1a displays the GUI application and Figure1b shows the two sub-lab buttons after clicking the Secure remote login lab. Table 1 shows theCyberSec labs and their corresponding objectives.(a) (b) Figure 1. (a) CLaaS GUI application (b) Sub-labs of
. Behav. Organ., vol. 76, no. 1, pp. 90–112, Oct. 2010, doi: 10.1016/j.jebo.2010.02.015.[15] B. C. Martin, J. J. McNally, and M. J. Kay, “Examining the formation of human capital in entrepreneurship: A meta-analysis of entrepreneurship education outcomes,” J. Bus. Ventur., vol. 28, no. 2, pp. 211–224, Mar. 2013, doi: 10.1016/j.jbusvent.2012.03.002.[16] C. Jones and J. English, “A contemporary approach to entrepreneurship education,” Educ. + Train., vol. 46, pp. 416–423, Oct. 2004, doi: 10.1108/00400910410569533.[17] E. A. Rasmussen and R. Sørheim, “Action-based entrepreneurship education,” Technovation, vol. 26, no. 2, pp. 185–194, Mar. 2006, doi: 10.1016/j.technovation.2005.06.012.[18] U. Hytti, P
Paper ID #34578Curricular Improvement Through Course Mapping: An Application of theNICE FrameworkDr. Ida B. Ngambeki, Purdue University, West Lafayette Dr. Ida Ngambeki is an Assistant Professor of Computer and Information Technology at Purdue Univer- sity. Dr. Ngambeki graduated from Smith College with a B.S. in Engineering and from Purdue University with a PhD in Engineering Education. Dr. Ngambeki’s research is focused on the intersection of human behavior and computing, specifically how educational and policy interventions can be used to improve human interactions with technology. Dr. Ngambeki’s key areas of research
eight (10) classes, Person, Student, Professor, Admin, StudentLogIn,ProfessoryLogin, Course, Grading, StudentRegistration, Payment and the aggregate classStudentInfSys. While classes Student holds the information of each individual student profile (a) (b) (c) Figure 2. Some classes defined in UML (a) Class Student Login; (b) Class Professor Login; (c) Class Student Registration. © American Society for Engineering Education, 2021 2021 ASEE Conferencewhich includes person info, academic records, financial info, etc.. Class Professor carries theprofessor’s individual info, teaching assignment, and grading
15th of each month, so itwould have two pay periods for each month.Payment Class: The payment class represents a payment from the company to a payable entity(either an employee or a vendor). The payment includes information about the payment amount,the date of the payment, and a reference to the recipient of the payment. (a) Payment class (b) PayPeriod class (c) PayableEntity class Figure 2. A selected class definition in UML Class model (a) Payment class (b) PayPeriod class (c) PayableEntity class.PayableEntity Class: An abstract class containing information about a potential payee, and theirpayment information. It
& Beilock, 2012). There is a lotof evidence that math anxiety robs individual’s working memory (Beilock & Willingham, 2014).The working memory's "space" or capacity is some fixed amount that varies from person toperson. It is used to solve problems and reason. If part of the working memory is occupied byanxiety, it is taking away from the fixed capacity that can be used to come up with a solution(Beilock, 2008). There is also neurological data that supports these findings (Young, Wu, &Menon, 2012).Attribution: How students attribute their failures and successes is also tightly linked to howstudents perform. A study looked at twelve factors to which most influenced success in acomputer programming course (B. C. Wilson & Shrock
received his M.S. in Computer Science from the University of Florida in 2016 and a B. Tech. in Computer Science & Engineering from Jaypee University of Engineering and Technology, India in 2015. American c Society for Engineering Education, 2021 Reflection and Transformational Learning in a Data Structures and Algorithms ClassAbstractReflective practice is the process of using one’s beliefs and prior experiences to analyze a problem;it is making meaning from experience. The process starts with noticing and naming the problem,continues to analyzing the problem, and finishes with forming new beliefs in order to solve theproblem. Reflective
bit challenging but they really enjoy doing this kind of work.References: 1. J. A. Hoffer, M. B. Prescott and F. R. McFadden, “Modern Database Management”, Seventh Edition, Prentice Hall, 2005. 2. A. Perkins, “Business Rules = Meta Data”, the proceedings of the: Technology of Object-Oriented Languages and Systems, IEEE, 2000. 3. Catherine M. Ricardo, “Database Illuminated”, Third Edition, Jones & Bartlett Learning, 2017. 4. Mullins C. S. 1995, “The procedural DBA.” Database Programming & Design 812 (December): 40-45. 5. Rennhackkamp, M 1996, “Trigger Happy.” DBMS9,5 (May): 89-91, 95. 6. “Using Triggers and Compound Triggers in Oracle 11g”, https://dbanotes.com/using-triggers-and-compound
review,” Electronics, vol. 9, no. 2, p. 272, 2020.[15] M. Prakash and A. Abdrabou, “On the fidelity of ns-3 simulations of wireless multipath tcp connections,” Sensors, vol. 20, no. 24, p. 7289, 2020.[16] N. Kuse and B. Jaeger, “Network simulation with ns-3,” Network, vol. 67, 2020.[17] N. Jovanovi´c and A. Zaki´c, “Network simulation tools and spectral graph theory in teaching computer network,” Computer Applications in Engineering Education, vol. 26, no. 6, pp. 2084–2091, 2018.[18] Q. Gu, Y. Zhang, and H. Yang, “Application of “computer network teaching platform+ flipped teaching model” in online education-taking “information technology teaching method” as an example,” in International Conference on Machine Learning and Big
,” Journal of EngineeringEducation, vol. 100, no. 1, January 2011.[3] K. Beddoes and M. Borrego, “Feminist Theory in Three Engineering Education Journals:1995-2008,” Journal of Engineering Education, vol. 100, no. 2, April 2011.[4] L. R. Lattuca, D. B. Knight, H. Kyoung Ro, B. Novoselich. “Supporting the Development ofEngineers’ Interdisciplinary Competence.” Journal of Engineering Education, vol. 106, no. 1,January 2017.[5] M.A. Boden, M. A. Mind as machine: A history of cognitive science. Oxford University Press,2006.[6] M. Moack, “Difference Engine Leaves Computer History Museum,” Mountain View Voice,January 28, 2016[7] J. J. O’Connor, E. F. Robertson, "Luigi Federico Menabrea," MacTutor History ofMathematics archive, University of St Andrews
carefully evaluate andselect keywords for indexing publications to improve the research topic relevancy and publicationvisibility for broader impact.References [1] J. Webster and R. T. Watson, “Analyzing the past to prepare for the future: Writing a literature review,” MIS quarterly, vol. xiii-xxiii, 2002. [2] A. Ortiz-Cordova and B. J. Jansen, “Classifying web search queries in order to identify high revenue generating customers,” Journal of the American Society for Information Sciences and Technology, vol. 63, no. 7, pp. 1426–1441, 2012. [3] G. Chen and L. Xiao, “Selecting publication keywords for domain analysis in bibliometrics: A comparison of three methods,” Journal of Informetrics, vol. 10, no. 1, pp. 212–223, 2016. [4] H. N
included (seeAppendix B) though the presentation is part of one overall grade. Students must complete theoral presentation in order to receive credit for the written report.The objectives of the report assignment and module are four-fold. Upon completion of thisreport and module, students should be able to: I. Increase their understanding of cross-cultural values related to rhetorical and design decisions as they pertain to UI design and human behavior as well as their respect for diversity, equity, and inclusion (DEI) in communication, design, and the engineering workplace. II. Gain an understanding of how to apply a modified content analysis to analyze website UIs and formulate results. III. Explain research
-reviewed journal and conference publications in grid and cloud computing. In the past, he designed and implemented a cloud-based public health informatics infrastruc- ture. He is a founding member of the School of Engineering at Istanbul Bilgi University, and was the chair of its Computer Engineering Department. He also designed an adaptive resource-matching frame- work for large-scale, autonomous grid computing environments, using epidemic dissemination protocols. He is the founding director of Engineers Without Borders International, Turkey branch. At the industry, Dr. Erdil has worked in management and software engineering roles for more than a decade at various organizations, including Fidelity National Information
[4] C. Latulipe, A. Rorrer, and B. Long, “Longitudinal data on flipped class effects on performance in cs1 and retention after cs1,” in Proceedings of the 49th ACM Technical Symposium on Computer Science Education, ser. SIGCSE ’18. New York, NY, USA: Association for Computing Machinery, 2018, p. 411–416. [Online]. Available: https://doi.org/10.1145/3159450.3159518 [5] L. Deslauriers, L. S. McCarty, K. Miller, K. Callaghan, and G. Kestin, “Measuring actual learning versus feeling of learning in response to being actively engaged in the classroom,” Proceedings of the National Academy of Sciences, vol. 116, no. 39, pp. 19 251–19 257, 2019. [Online]. Available: https://www.pnas.org/content/116/39/19251 [6] D. Gross, E
Paper ID #32281Self-assessment of Knowledge Levels in the Subjects of Cyber Attacks andDefense in a Cybersecurity Awareness Education WorkshopDr. Te-Shun Chou, East Carolina University Dr. Te-Shun Chou is a Professor in the Department of Technology Systems (TSYS) at East Carolina University (ECU). He received his Bachelor degree in Electronics Engineering at Feng Chia University and both Master’s degree and Doctoral degree in Electrical Engineering at Florida International Univer- sity. He serves as the program coordinator of the Master program in Network Technology for TSYS and the lead faculty of Digital Communication
work at a college student conference.5. References[1] C. Herreid, "Case Studies in Science: A Novel Method of Science Education.," Journal of Research in Science Teaching, pp. 221-229, 1994.[2] V. Lee, "What is inquiry-guided learning?," New Directions for Teaching and Learning, 2012.[3] J. L. David, "What Research Says About Project-Based Learning," Educational Leadership, pp. 80-82, 2008.[4] R. D. De Veaux, M. Agarwal, M. Averett, B. S. Baumer, A. Bray, T. C. Bressoud, L. Bryant, L. Z. Cheng, A. Francis, R. Gould, A. Y. Kim, M. Kretchmar, Q. Lu, A. Moskol, D. Nolan, R. Pelayo, S. Raleigh , R. Sethi, M. Sondjaja, N. Tiruviluamala, P. X. Uhlig, T. M. Washington, C. L. Wesley, D. White and P. Ye, "Curriculum Guidelines for
. & Dorward, (2018, June), “Factors Influencing the Interest Level of Secondary Students going into STEM fields and their parents’ perceived interest in STEM “ in 2018 ASEE Annual Conference & Exposition , Salt Lake City, Utah. 10.18260/1-2--30507[4] P. Sexton, M. Wade, & B. Watford, “ Engineering Summer Camps: Do They Increase Engineering Enrollments?” in 2003 ASEE Annual Conference, Nashville, Tennessee. 10.18260/1-2--12574[5] A. Genau, “Initiation of Summer Camp Program as Outreach and Recruiting Tool” in 2014 ASEE Annual Conference & Exposition, Indianapolis, Indiana. 10.18260/1-2--20646[6] M. Schilling, & M. Pinnell, M. “The Effectiveness of Engineering Camps as Pre-college
), ar33. https://doi.org/10.1187/cbe.14-11-0206Wylie, C. D., Neeley, K. A., & Helmke, B. P. (2020). WIP: Undergraduate research experiences survey (URES) and engineering identity. ASEE Annual Conference and Exposition, Conference Proceedings, 2020-June. https://www.asee.org/public/conferences/172/papers/30991/viewAppendix – Survey Responses
Paper ID #34162Design and Development of a 3D-printed Hexapod RobotDr. Afsaneh Minaie, Utah Valley University Afsaneh Minaie is a Professor and Chair of the Engineering Department at Utah Valley University. She received her B.S., M.S., and Ph.D. all in Electrical Engineering from the University of Oklahoma. Her re- search interests include gender issues in the academic sciences and engineering fields, Embedded Systems Design, Mobile Computing, Wireless Sensor Networks, Nanotechnology, Data Mining, and Databases.Mr. Justin Limb Justin Limb is a graduate of Utah Valley University with a B.S. in Computer Engineering and A.A.S
) to “Extremely Supportive” (4), as shown in Figure 6B. Mostoften, students reported that their home environment was extremely supportive (61.2%).Figure 6: Number of friends students reported having in computing (A.), and how supportive theirhome environment is towards computing (B.)5.2.2 Variations in Cultural Experiences by Gender, Race, and EthnicityAlthough we did examine the prevalence of cultural experiences across all students, suchmeasures fail to account for the nuances that may exist between students of different genders,races, and ethnicities. Scholars have previously discussed the importance of applying critical racetheory when conducting quantitative research to create a more accurate picture of individualexperiences [46
Paper ID #32990A Study of Differential Equation Solver Suites and Real-worldApplications Using Python, Maple, and MatlabDr. Mohammad Rafiq Muqri, DeVry University, Ontario, CA Dr. Mohammad R. Muqri is a Professor in College of Engineering and Information Sciences at DeVry University. He received his M.S.E.E. degree from University of Tennessee, Knoxville. His research interests include modeling and simulations, algorithmic computing, data analytics, analog and digital signal processing. American c Society for Engineering Education, 2021A study of Differential equation
sealed for proper operation or filtered with High-Efficiency ParticulateAbsorbing (HEPA) filtration1,2.6-Project main components(a)-MotorThe motor is a one stage, 120VAC, 6 inches inlet/outlet turbine-style motor that can provide anair exhaust of up to 980 CFM. It has the capability of being stepped down to 90VAC to provide aslower exhaust output. According to the calculations of supply CFM into the room (294CFM),this motor will be more than enough to make the isolation room negative. We will also be addingsingle phase Variable Frequency Drive (VFD) to further slow the CFM exhaust to reduce thequantity of air controlled, cool air, from escaping, therefore allowing more comfort for theisolated person.(b)-SensorDiff Press Click is an accurate
and LED gun. The gun consisted of a smallprotoboard Velcroed to a toy gun. The gun was comprised of a switch button, the CMOS buffergate and the infrared LED. Figure 2: System level view of the infrared laser tag systemThis project was programmed in C using the Keil µVision 4.0 IDE. The code was compiled inµVision using GNU Compiler Collection (GCC). The build was sent to the board using theboard’s built-in micro USB cable.Sending the SignalMain on the board initializes ports F, B, and C; the SysTick timer; and port C edge-triggeredinterrupts. After initialization, main sets the health bar color to green and uses the PortF_Outputfunction to output the code for the color green to DATA in the port F data register, which
. Cryptonote v2.0. Technical report, CryptoNote. Accessed: Oct. 21, 2019. [Online]. Available: https://cryptonote.org/whitepaper.pdf[18] S. Eskandari, A. Leoutsarakos, T. Mursch, and J. Clark. A First Look at Browser-based Cryptojacking. In Proc. of the IEEE Privacy and Security on the Blockchain Workshop, London, UK, Apr. 2018, [Online]. Available: https://arXiv:1803.02887[19] T. Zhang, Y. Zhang, and Ruby B. Lee, “CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds,” In Proc. of the International Symposium on Recent Advances in Intrusion Detection, Evry, France, Sep. 2016, doi: 10.1007/978-3-319-45719-2_6[20] Bitcoincharts. Accessed: Oct. 21, 2019. [Online]. Available: https://bitcoincharts.com
preparation for the oral proficiency exams. The negative skew in the Figure1(b) histogram and the mean quantified value of 2.86 support a moderate increase in studentreported motivation for independence in their work in preparation for the oral proficiency exams.Furthermore, student responses to these two questions are moderately correlated, with a highlysignificant (p-value of 1.91 ´ 10-36) correlation coefficient of 0.635. Thus, students who report anincrease in motivation to achieve a deeper understanding of the material due to the codinginterview intervention are also more likely to report approaching their work with higher levels ofindependence as a result of the oral proficiency exams. The coding interviews
. E. Coate, “TQM on campus: Implementing total quality management in a university setting.,” Bus. Off., vol. 24, no. 5, pp. 26–35, 1990.[4] L. R. Lattuca, P. T. Terenzini, and J. F. Volkwein, “Engineering change : A study of the impact of EC2000,” Exec. Summery, pp. 1–20, 2006.[5] P. E. Maher, J. L. Kourik, and B. O. Akande, “Achieving quality, excellence, and consistency in a global academy,” in PICMET 2010 TECHNOLOGY MANAGEMENT FOR GLOBAL ECONOMIC GROWTH, Jul. 2010, pp. 1–7.[6] M. Zahraee, G. Neff, and S. Scachitti, “Continuous Improvement Of Engineering Technology Programs Coming Soon To A University Near You,” St. Louis, Missouri, Jun. 2000, p. 9. Accessed: Jun. 09, 2020. [Online]. Available: https://peer.asee.org
. Wenk B. Lee J.Q Brown, M. Wang. High-area-throughput automated gigapixel imaging of whole prostate tumor resection surfaces using structured illumination microscopy. SPIE Photonics West - BIOS, pages 9313–15, 2015. [7] Computing Research Association. Generation cs: Computer science undergraduate enrollments surge since 2006, 2017. URL https://cra.org/data/Generation-CS/. [8] Miran Lipovaca. Learn You a Haskell for Great Good!: A Beginner’s Guide. URL http://learnyouahaskell.com/. [9] Alex Edgcomb, Frank Vahid, and Roman Lysecky. Students learn more with less text that covers the same core topics. In Proceedings of the 2015 IEEE Frontiers in Education Conference (FIE), FIE ’15, pages 1–5, Washington, DC, USA, 2015. IEEE
, “Beginnings - Hybrid-Flexible Course Design.” https://edtechbooks.org/hyflex/book_intro (accessed Sep. 07, 2020).[3] B. J. Beatty, “Hybrid-Flexible Course Design Costs and Benefits for Hybrid-Flexible Courses and Programs Is the value worth the effort associated with Hybrid-Flexible course implementation? When is implementing a Hybrid-Flexible course worth the cost? The Value of a Student-Directed Hybrid,” EdTech Books, 2019.[4] “School closures caused by Coronavirus (Covid-19).” https://en.unesco.org/covid19/educationresponse (accessed Sep. 07, 2020).[5] C. R. Kinlaw, L. L. Dunlap, and J. A. D’Angelo, “Relations between faculty use of online academic resources and student class attendance,” Computers and
and a post-survey.A pre-survey occurs at the start of the class. It gives a baseline and normalizes pre-study biases.The post-survey measures how behaviors/attitudes change through the term. CON group wastreated to online videos, and authoritative traditional lectures. FC group was treated to onlinevideos, JiTT and peer-instruction. Surveys include quantitative (Likert) questions. Responses area 7-point scale [36]. Results are given in terms of mode and frequency. Results of Likert-stylequestions on student attitudes about lecture are given in Table 3-A on page 17. Students reportedon resource use in Table 3-B, and social integration in Table 3-C. Because the responses areordinal [37], [38], we are measuring differences in populations and