Asee peer logo
Well-matched quotation marks can be used to demarcate phrases, and the + and - operators can be used to require or exclude words respectively
Displaying results 1 - 30 of 41 in total
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Vuk Marojevic, Virginia Tech; Antoni Gelonch-Bosch, Universitat Politècnica de Catalunya; Jeffrey Reed, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
valuable addition tothe electrical engineering curriculum.We argue that the reasons behind the technical choices, their impact on the resource consumptionand the performance versus flexibility tradeoffs are relevant for cellular communicationsstandards education. Moreover, project management, team work, development of realisticexpectations and practical solutions are skills that are much demanded by industry in addition todomain-specific technical specialization. We therefore propose a methodology for teachingstandards that creates favorable conditions for developing those skills.The combination of lecture-centered education [2] with laboratory-centered approaches [3], [4],has been adopted in the engineering curriculum when the Conceive, Design
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Elena Filatova, City University of New York; Deborah Hecht, Center for Advanced Study in Education
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #33834Using Data Science to Create an Impact on a City Life and to EncourageStudents from Underserved Communities to Get into STEMProf. Elena Filatova, City University of New York Assistant Professor at CUNY, New York City College of Technology, Department of Computer Systems Technology. Director of the Bachelor of Science in Data Science program.Dr. Deborah Hecht, Center for Advanced Study in Education As Director of the Center for Advanced Study in Education, at the CUNY Graduate Center I am involved in a wide range of educational evaluations of funded and local projects. I also mentor graduate students interested
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Margaret Ellis, Virginia Tech; Catherine T. Amelink, Virginia Tech; Stephen H. Edwards, Virginia Tech; Clifford A. Shaffer, Virginia Tech
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
ConclusionThe course uses a variety of problem-solving strategies and encourages practice, exploration, andtinkering to increase students’ comfort not only with their technical skills but also with theirability to acquire new skills. Students can thus approach future coursework, research, andinternships with some introductory experience with version control, security, command line tools,web development, and user-centered design. The course is significantly composed of classworkactivities so that students are highly engaged and regularly expected to work with their peers.Furthermore, this course could be a gateway for students to engage in more computing experienceoutside of their college coursework: hackathons, online coding challenges, computing clubs
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Zhijiang Dong, Middle Tennessee State University; Joshua Lee Phillips, Middle Tennessee State University; Eric Oslund, Middle Tennessee State University; Chrisila Pettey, Middle Tennessee State University; Catherine E. Brawner, Research Triangle Educational Consultants
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
undergraduate research, which is one of fivehigh-impact practices found by Brownell and Lynn to improve engagement and retention incollege students [10]. We support 10 students to participate in summer research each year andencourage our Scholars to seek summer research opportunities in other schools.The third component provides funding for up to 10 students each year to attend professionalconferences such as The Richard Tapia Celebration of Diversity in Computing, The GraceHopper Celebration of Women in Computing, and other conferences that students haveexpressed interest in. Attending a professional conference is an effective approach to recruit andretain students, particularly URSs in computing majors [11], [12].In the rest of the paper, we share
Conference Session
Computing Research
Collection
2018 ASEE Annual Conference & Exposition
Authors
Deng Cao, Central State University; Cadance Lowell, Central State University; Augustus Morris, Central State University
Tagged Divisions
Computing and Information Technology
soybean oligosaccharides before joining Central State University in 1989. Dr. Lowell maintains a re- search program in directed energy weed control. She mentors undergraduate students in funded research projects who have gone on to present at local, state and national conferences.Dr. Augustus Morris, Central State University Dr. Augustus Morris is the Chair of the Manufacturing Engineering department at Central State Univer- sity, Wilberforce, OH. He is also the Program Director of the NSF funded grant, Implementing Pathways for STEM Retention and Graduation (IPSRG). His research interests include robotic applications in agri- culture, haptic devices, high altitude balloon payload design, and cellulose-based composite
Conference Session
Computing Research II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Mysore Narayanan, Miami University
Tagged Divisions
Computing and Information Technology
accomplish a mode valueof at least 4 initially. Of course, the ultimate goal is to attain a mode value of 5 in all thefour.VARK Data Analysis Looking at the bar chart displayed in Appendix F we see that Visual (V) andKinesthetic (K) modes recorded Likert Scale mode values of 5. This is to be expected in an engineering classroom. We need to remember that we aretrying to assess the impact of delivery styles. Topics in the area of Advanced EngineeringMathematics are best learnt when students actually see and do. Hands – on learning tools helped the students understand the material better. Thisincluded Power Point Presentations, EXCEL spreadsheet exercises, Problem – Solving Sessions,Practical Applications, Mathematical Analogies
Conference Session
Computing & Information Technology: Curriculum and Assessment
Collection
2018 ASEE Annual Conference & Exposition
Authors
Predrag T. Tosic, University of Idaho; Julie Beeston, University of Idaho
Tagged Divisions
Computing and Information Technology
]. Predictions for the near future are that this demand for data-skilled talentwill continue to grow, whereas the supply (from colleges and universities training the nextgeneration of data scientists and analysts) will not be able to keep up with that pace (for one suchstudy see, e.g., [3]).To fill in that gap, graduate programs at several leading research universities have created newtracks within the existing graduate programs, or in a few cases new degree programs entirely,focusing on data science and analytics [4]. These programs are led and taught by the existingfaculty ranging from Mathematics & Statistics to Computer Science to Business Schools.However, while training MS and PhD level Data Scientists is important, by itself it is unlikely
Conference Session
Cyber Technology
Collection
2019 ASEE Annual Conference & Exposition
Authors
Nikunja Swain P.E., South Carolina State University; Biswajit Biswal, South Carolina State University
Tagged Divisions
Computing and Information Technology
CAC of ABET accreditedComputer Science Program. Our Computer Science curriculum requires 124 credit hours of course workwith 9 credit hours CS Advanced Electives and 9 hours general electives. We decided to use these 18elective hours for our cybersecurity concentration curriculum courses without increasing thegraduation/degree requirement of 124 credit hours. With this curriculum structure, our cybersecurityconcentration graduates have a solid background both in Computer Science and Cybersecurity.We used evidence based practices such as review of existing cybersecurity curriculum in other academicinstitutions, discussion with our industry partners and scholarly literate to develop courses for thisconcentration. We discussed the findings from
Conference Session
Computing and Information Technology Division Technical Session 3
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Alberto Cureg Cruz, California State University, Bakersfield; Antonio-Angel L. Medel, California State University Bakersfield; Anthony Chistoper Bianchi, California State University, Bakersfield; Vincent Wong On, California State University, Bakersfield; Melissa Danforth, California State University, Bakersfield
Tagged Divisions
Computing and Information Technology
Chair for the IEEE Conference on Automatic Face and Gesture Recognition (FG) 2018 and 2020. His work on automatic facial expression analysis by computer vision algorithms was featured in Motor Trend Magazine in 2014, 2015 and 2016 for the Best Driver Car of the Year event. Dr. Cruz obtained a few awards for dissemination of research to the greater public (NSF Com- munity Award (2013) and NSF Judges Choice Award (2012) in NSF IGERT Video/Poster Competition). He is a member of the American Society for Engineering Education (ASEE), the Association for Com- puting Machinery (ACM), the Institute of Electrical and Electronics Engineers (IEEE), and the American Society of Agricultural and Biological Engineers (ASABE
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Ciprian Popoviciu, East Carolina University; Philip J. Lunsford II, East Carolina University; John Pickard, East Carolina University; Colby Lee Sawyer, East Carolina University; Jarvis Woodburn; Zachary Ryan Zynda, East Carolina University; Dale Drummond, East Carolina University
Tagged Divisions
Computing and Information Technology
managementcan become a challenge when issues occur. On one hand, current IT organizations are not well equippedto manage service overlays such as SaaS based solutions. On the other hand, SaaS based deliveryrelies on the good functioning of multiple management domains without cross domain visibility.In this paper we detail the work of designing and implementing a management platform for a conferencingservice launched by East Carolina University and distributed over multiple admin domains. The projectoffered a collaboration opportunity between students, graduate and undergraduate, from two distinctdepartments: Information and Computer Technology [1], and Computer Science [2]. The task assigned tothe team was to deploy a monitoring solution enabling
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
James K. Nelson Jr. P.E., Texas A&M University; Brent L. Donham, Texas A&M University-Commerce
Tagged Divisions
Computing and Information Technology
member of the American Society for Engineering Education and the SAFE Association. Prior to receiving his Ph.D. in 1983, Dr. Nelson worked as a design engineer in industry and taught as an adjunct professor at the University of Houston and Texas A&M University at Galveston. In industry he was primarily involved in design of floating and fixed structures for the offshore petroleum industry. After receiving his Ph.D., Dr. Nelson joined the civil engineering faculty at Texas A&M University. He joined the civil engineering faculty at Clemson University in 1989 as Program Director and founder of the Clemson University Graduate Engineering Programs at The Citadel and became Chair of Civil Engineering in 1998. In
Conference Session
Computing and Information Technology Division Technical Session 9
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Wendi M. Kappers, Embry-Riddle Aeronautical University, Daytona Beach; Martha Nanette Harrell, Arkansas Tech University
Tagged Divisions
Computing and Information Technology
, Karanjaindicated, was a possible issue with the development of information security best practices. If theCOO fails to understand or is not aware of security issues, the proper resources may not beallocated to the security of the information assets. CIO reporting is also a concern. By ensuringthe CIO reports to the CEO, the CEO is more likely to be provided a clear picture of thealignment of the technical and business aspects of the organization but miss security concerns.As mentioned, CEOs are concerned with the overall success of the organization and must rely onthe other C-Suite staff for input to assist with organization decisions. Conflict, then,can occurwhen security governance and corporate governance do not align. As continued adoption of
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Asuman Cagla Acun Sener, University of Louisville; Jeffrey Lloyd Hieb, University of Louisville; Olfa Nasraoui , University of Louisville
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
Paper ID #25702Using a Data Science Pipeline for Course Data: A Case Study Analyzing Het-erogeneous Student Data in Two Flipped ClassesAsuman Cagla Acun Sener, University of Louisville Asuman Cagla Acun Sener holds B.S. and M.S. degrees in Computer Science and Computer Engineer- ing. She is currently pursuing a doctoral degree in Computer Science at Knowledge Discovery & Web Mining Lab, Department of Computer Science and Computer Engineering, University of Louisville. She is also working as a graduate assistant. Her research interests are educational data mining, visualization, predictive modeling and
Conference Session
Topics in Computing and Information Technology-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Farshid Marbouti, San Jose State University; Valerie A. Carr, San Jose State University; Belle Wei, San Jose State University; Morris E. Jones Jr., San Jose State University; Amy Strage
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
and introduces students to a second programming language, R, whichis commonly used for data analysis purposes.4. Program AssessmentOne of our programmatic concerns was to develop pedagogical practices that were best suited tothe needs of students we aimed to attract. In order to monitor the impact of our efforts, wedesigned surveys and conducted focus groups to gather students’ feedback about the courses andthe ACBSS program in general. In this section, we briefly report assessment results including(1) surveys completed by ENGR 120 students at the end the of Fall 2016 and 2017 semesters, (2)focus group results conducted by an external evaluator for ENGR 121 in Spring 2017, and (3)focus group results for ENGR 122 in Fall 2017.In addition to
Conference Session
Computing and Information Technology Division Technical Session 5
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Shinelle Hutchinson, Purdue University, West Lafayette; Yung Han Yoon, Purdue University, West Lafayette; Neesha Shantaram; Umit Karabiyik, Purdue University, West Lafayette
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
have been incorporated into all facets of life, from the medicalindustry to transportation and it has even made its way into our homes. These devices have accessto vast amounts of data, especially personal data. However, due to the compact nature of thesedevices, insufficient effort has been made to incorporate security into their design. With that inmind, IoT devices are treasure-troves of potential evidentiary data for forensic investigators,especially when these devices are used to aid in criminal activities. Concerning IoT devices, thereis a need to investigate these devices to find answers to questions such as, what data can berecovered from these devices along with their respective smartphone applications? What methodswould be best
Conference Session
Computing and Information Technology Division Technical Session 4
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Stephanie J. Lunn, Florida International University; Monique S. Ross, Florida International University; Zahra Hazari, Florida International University; Mark A. Weiss, Florida International University; Michael Georgiopoulos, University of Central Florida; Ken Christensen P.E., University of South Florida; Tiana Solis, Florida International University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
from FIU.Dr. Monique S. Ross, Florida International University Monique Ross, Assistant Professor in the School of Computing and Information Sciences and STEM Transformation Institute at Florida International University, designs research focused on broadening par- ticipation in computer science through the exploration of: 1) race, gender, and disciplinary identity; 2) discipline-based education research (with a focus on computer science and computer engineering courses) in order to inform pedagogical practices that garner interest and retain women (specifically Black and His- panic women) in computer-related engineering fields.Prof. Zahra Hazari, Florida International University Zahra Hazari is an Associate Professor
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Sin Ming Loo, Boise State University; Liljana Babinkostova
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
two offerings of the course were students fromComputer Science, Electrical Engineering, and Mechanical Engineering while the program is alsoopen to students from Civil Engineering and Mathematics. The curriculum was structured whereall credit hours earned contribute to their graduation requirements. The introductory course is anelective course. The objective is not for students to be security experts, rather it is about knowingenough to understand cyber threat impacts to the system design process, understand how to protectagainst such threats, and be able to know when to call the cybersecurity experts. Although thereare many degree programs in cybersecurity as a major and research in cyber physical systemrelated to smart infrastructure &
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Jeremy Straub, North Dakota State University
Tagged Divisions
Computing and Information Technology
particular, his research has recently focused on cybersecurity topics including intrusion detection and forensics, robotic command and control, aerospace command and 3D printing quality assurance. Straub is a member of Sigma Xi, the AAAS, the AIAA and several other technical societies, he has also served as a track or session chair for numerous conferences. American c Society for Engineering Education, 2021 Creation of a Class to Teach Software EntrepreneurshipAbstractThis paper presents the design and implementation of a class for teaching softwareentrepreneurship. The class focused on teaching students the basics entrepreneurial venturedevelopment and how
Conference Session
Tools and Techniques
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
should not be considered a production-based environmentnor interfere with such an environment that serves the entire campus and its constituents. Theyrecommend that the lab may be best served by a joint venture or contract directly with a cellularprovider that may offer an avenue to provide coverage in an area that is not impacted by theuniversity DAS.According to design concepts of cellular networks both DAS and small-cell systems can coexist.Each system can use different frequency band from a different MSPs. This design will mitigateany form of interference between the running production systems serving the universityconstituents and the lab test-bed. Another solution is using carful coverage design to providespecific areas for lab small-cells
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Tamer Omar, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona; Kristina Rigden, California State Polytechnic University, Pomona; Thomas Ketseoglou, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
Research Education: A Report on the First Year of a NSF-sponsored Cyber-physical System Cybersecurity Research Experience for Undergraduates Program," in ASEE Annual Conference & Exposition , Tampa, Florida, 2019.[15] N. V. Ivankova, J. W. Creswell and S. L. Stick, "Using Mixed-Methods Sequential Explanatory Design: From Theory to Practice," Field Methods, vol. 18, no. 1, p. 3–20, 2006.[16] S. R. Terrell, "Mixed-methods research methodologies," The Qualitative Report, 2012.[17] J. W. Creswell, Research Design.: Qualitative, Quantitative, Mixed Methods Approaches, University of Nebraska-Lincoln, 2016.[18] O. M. Mugenda, Research methods: Quantitative and qualitative approaches, African Centre for Technology Studies, 1999.
Conference Session
Computing Technology Applications-II
Collection
2018 ASEE Annual Conference & Exposition
Authors
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
Tagged Divisions
Computing and Information Technology
On-Campus.  The availability of research labs to provide the required resources for programs.  The qualification of faculty instructing in the program.  The relationship of the institution with government & private sector.  Availability of scholarships & grants to students.  Location proximity of the institution to tech areas, government defense agencies, and hubs of corporate activity.  NSA CAE Designation: CAE designations provides indicators to the quality of the program.Table 1 provides a list of the universities, their available programs, and related information. Forpurpose of the quantitative analysis in this study, a Boolean variable Y or N is used to indicatethe availability or
Conference Session
Topics in Computing
Collection
2019 ASEE Annual Conference & Exposition
Authors
Alka R. Harriger, Purdue University; Suyash Agrawal, Purdue University; Arjun Shakdher, Purdue University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
current research is focused towards Rapid Application Development.Arjun Shakdher, Purdue University Arjun Shakdher is currently a graduate student in the department of Computer and Information Tech- nology at Purdue University. He has been working as a Graduate Research Assistant since 2017 on an NSF-funded program called TECHFIT, focused on Computational Thinking. His interest lies in Software Development, Cloud Engineering, Machine Learning, Network/Cyber Security, Analytics, Data Science and IT Project Management. He has previously worked as a Software Development Engineer at Ericsson and is an incoming Cloud Engineer at Amazon (2019). c American Society for Engineering Education, 2019
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Natasha Smith P.E., University of Virginia
Tagged Divisions
Computing and Information Technology
homework, with quickfeedback. A final hurdle was that this was the author’s first time teaching Vibrations. Therefore,it was necessary to prioritize lesson plan preparation over delivery logistics. This precluded timeintensive efforts such as learning complicated software or prerecording lectures in an instructionallab environment.Mastery learning (or learner-centric) techniques introduced by Bloom in the 1970s and expandedby researchers over the last half century have an established track record for enhancing studentlearning.1–3 In particular, periodic formative assignments are necessary and should be designed sothat students reflect on mistakes and adjust their learning efforts as needed. Within the Vibrationscourse, the mechanisms for formative
Conference Session
Curriculum and Assessment II
Collection
2019 ASEE Annual Conference & Exposition
Authors
Jingshan Wu, Zhejiang University; Yujie Wang, Zhejiang University; Hanbing Kong, Zhejiang University; Ling Zhu, Zhejiang University
Tagged Divisions
Computing and Information Technology
; algorithm design and solution implementation. Digital Leadership: To initiate and guide computation-related innovation. In other words, those essential soft skills or ways of thinking for a digital age, including system thinking, interdisciplinary or integration skills, innovation and entrepreneurship, multi-cultural teamwork and collaboration skills. Figure 1. The Framework of CT-ENGIII. Case Study: The Robotics Class of Zhejiang University1. Research Design(1) Research MethodThis research adopts the single case study method. Case study research design is anin-depth practical investigation of a current event in the actual context (Yin, 2009).According to (Siggelkow,2007; Gaya H.J& Smith E.E.,2016), a
Conference Session
Computing and Information Technology Division Technical Session 8
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Jorge Crichigno, University of South Carolina; Elias Bou-Harb, University of Texas at San Antonio; Elie Kfoury, University of South Carolina; Jose Gomez, University of South Carolina; Antonio Mangino, University of Texas at San Antonio
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
cyber-crimes impacting citizens and businesses. Dr. Bou-Harb holds a Ph.D. degree in computer science from Concordia University in Montreal, Canada, which was executed in collaboration with Public Safety Canada, Industry Canada and NCFTA Canada. His research and development activities and interests focus on operational cyber security, attacks’ detection and char- acterization, malware investigation, cyber security for critical infrastructure and big data analytics. Dr. Bou-Harb has authored more than 80 refereed publications in leading security and data science venues, has acquired state and federal cyber security research grants valued at more than $4M, and is the recipient of 5 best research paper awards, including
Conference Session
Computing and Information Technology Division Technical Session 6
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Bonnie Achee, Southeastern Louisiana University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
attendance at the university upon graduation. With 95% of campersindicating that the camp met or exceeded expectations, this is best summed up in the words ofthe camper who commented “I really didn’t have a favorite part, I really just enjoyed all of it!”References[1] J. Faber, L. Grzech, M. Mahmoud, & K. Becker, (2020, June), “The Effect of Summer Engineering Camps on Students’ Interest in STEM” in 2020 ASEE Virtual Annual Conference, Virtual On line . 10.18260/1-2--35309[2] L. Scinski, “Beyond the Classroom: The Impact of Informal STEM Experiences on Student Attitudes and Interest,” University of California, San Diego, United States -- California, 2014.[3] M. Mahmoud, K. Becker, M. Longhurst, R. Dupont, N. Mesner, J
Conference Session
Computing and Information Technology Division Technical Session 2
Collection
2021 ASEE Virtual Annual Conference Content Access
Authors
Te-shun Chou, East Carolina University; Tijjani Mohammed, East Carolina University
Tagged Topics
Diversity
Tagged Divisions
Computing and Information Technology
environments that allowed for interaction among each environment, whichmade the learning system as a whole more like a realistic network environment. The systemcould be used in any cybersecurity related undergraduate and graduate courses. It would helpstudents understand the latest cybersecurity technologies. Furthermore, it would provide on-campus and distance education students with opportunities to learn and practice cyberattack andcyber defense techniques used in the real world.In order to maximize the positive impact of the system on cybersecurity education, a two-dayworkshop was held at East Carolina University (ECU) in the summer of 2019. The workshopwas hosted by the Department of Technology Systems (TSYS) and executed in a train-the
Conference Session
Curriculum and Assessment I
Collection
2019 ASEE Annual Conference & Exposition
Authors
Peter J. Clarke, Florida International University; Debra Lee Davis, Florida International University; Ingrid A. Buckley, Florida Gulf Coast University; Geoff Potvin, Florida International University; Mandayam Thirunarayanan, Florida International University; Edward L. Jones, Florida A&M University/Florida State University
Tagged Divisions
Computing and Information Technology
environment in the classroom. In 124th American Society for Engineering Education (ASEE). ASEE, 2017. Paper No. 19953. [9] Peter J. Clarke, Debra L. Davis, Raymond Chang-Lau, and Tariq M. King. Impact of using tools in an under- graduate software testing course supported by WReSTT. ACM Trans. Comput. Educ., 17(4):18:1–18:28, August 2017.[10] Michael Prince. Does active learning work? a review of the research. Journal of Engineering Education, 93(3):223–231, 2004.[11] Barbara Leigh Smith and Jean T. MacGregor. What is Collaborative Learning? In A.S. Goodsell, M.R. Ma- her, and V. Tinto, editors, Collaborative Learning: A Sourcebook for Higher Education. National Center on Postsecondary Teaching, Learning, and Assessment
Conference Session
Computing and Information Technology Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Mia Minnes, University of California, San Diego; Sheena Ghanbari Serslev, University of California, San Diego ; Madison Edwards
Tagged Divisions
Computing and Information Technology
lack that would prevent them from being hired? Radermacher et al. [18] documented hurdlesfacing recent graduates. They write that the greatest challenges for recent graduates involve effectivelycommunicating with customers and coworkers, using software tools and configuration managementsystems, and creating unit tests for code. Also, the most common issues preventing students fromobtaining a position at a company were a lack of problem-solving abilities and project experience. EricBrechner, Director of Microsoft Development Training, voices similar concerns about the inadequatepreparation of CSE college graduates transitioning to full-time positions and cites the following as areasof needed preparation: software design and analysis; writing
Conference Session
Computing and Information Technology Division Technical Session 7
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Radana Dvorak, University of Portland; Heather Dillon, University of Portland; Nicole Ralston, University of Portland; Jeffrey Matthew Welch, University of Portland
Tagged Divisions
Computing and Information Technology
, Heather Dillon worked for the Pacific Northwest National Laboratory (PNNL) as a senior research engineer.Dr. Nicole Ralston Dr. Nicole Ralston is an Assistant Professor and co-Director of the Multnomah County Partnership for Education Research (MCPER) in the School of Education at the University of Portland in Portland, Ore- gon. She received her Ph.D. in Educational Psychology with an emphasis in Measurement, Statistics, and Research Design from the University of Washington. An elementary school teacher at heart, she now teaches educational research and STEM methods to undergraduate and graduate students. Her research fo- cus involves bringing active learning strategies to STEM, best practices of research-practice