received his M.S. in Computer Science from the University of Florida in 2016 and a B. Tech. in Computer Science & Engineering from Jaypee University of Engineering and Technology, India in 2015. American c Society for Engineering Education, 2021 Reflection and Transformational Learning in a Data Structures and Algorithms ClassAbstractReflective practice is the process of using one’s beliefs and prior experiences to analyze a problem;it is making meaning from experience. The process starts with noticing and naming the problem,continues to analyzing the problem, and finishes with forming new beliefs in order to solve theproblem. Reflective
) communicating effectively, (4) recognizing ethical andprofessional responsibilities and considering the impact of engineering solutions, (5) functioningon a team in an inclusive environment, (6) analyzing and interpreting data, and (7) acquiring andapplying new knowledge [10].This paper describes the course module activities that help students succeed in completing theresearch report, the components of the research report, and grading checklists used by studentsfor creating successful deliverables and by instructors for grading guidance. This paper alsodescribes the assessment of students’ reports and student feedback in a reflection assignment.The paper ends with a discussion and conclusions.The Cross-Cultural Design Module and Cross-Cultural UI
categorize students along the model’s active-reflectivedimension as reflective, active, or “in-between” (neutral) learners. Students were partneredthroughout the semester with a variety of partners with attention to mixing and matching theirpreferred learning styles to determine any effects of partnering.This study took place across three sections of a sophomore-level programming class in a mid-size, public university in the western United States. The sample included approximately 100primarily second-year mechanical engineering undergraduate students. The course is a requiredprogramming course using MATLAB. A weekly quiz was administered across each of thesections differently. This was done to test the relationship between strategy and
data for a planned multiple semester longer term project.This paper contains (1) motivation and goals for this work, (2) outcomes and learning objectives,(3) instructions on how to design this kind of assignment, (4) the video assignment write up, (5)the rubric for the video, (6) the rubric for peer feedback, and (7) the rubric for reflection. Thispaper focuses on the structure and instruments used during the course.About the CourseArtificial Intelligence (AI) is being used to tackle more and more of the real-world problemsaround us. EECS 4901 Special Topics: Introduction to Artificial Intelligence will introducestudents to the fundamentals of Artificial Intelligence (AI). During this course students will lookat various problems being solved
University of California, San Diego sserslev@ucsd.edu Madison Edwards Chemistry and Biochemistry University of California, San Diego m4edward@ucsd.edu Abstract This study explores how industry internships, paired with scaffolded reflection, shape student attitudes and learning behaviors. Building upon the literature on student motivation, we seek to answer the following question: how do internships influence student attitudes towards their studies and their future approaches towards learning? Data at three critical points in a student
Work-in-Progress: Engaging First-Year Students in Programming 1 During COVID-19AbstractDuring the Fall 2020 semester, it became even more important than before to engage students inthe “classroom” whether that be in-person, online, or a hybrid model. This paper will introducevarious entrepreneurial mindset (EM) techniques to engage students that could be adapted to anyengineering course. All the techniques have suggestions for adapting to a fully online course aswell as working for an in-person or hybrid class. The first activity presented will be name signswith badges that will promote (1) setting, evaluating, and achieving goals, (2) self-reflection, (3)considering a problem from multiple viewpoints, and (4
could enhance student learning of the subject particularly in computer programming.To this end, programmable robots could be utilized to supplement programming activities thatencourage and motivate students to apply their creative thinking and programming skills todevise solutions for real-world problems. Since developing a computer program to instruct arobot provides an immediate feedback as whether the program has accomplished its job, itengages students in both learning and reflection processes.This paper presents the application of an affordable programmable robot in three computerprogramming classes; namely, Computer Science and Information Systems: An Overview (CS0),Programming I (CS1), and Programming II (CS2). Also, the survey results
faculty or vice versa. We decided that it was mostimportant to have motivated and engaging faculty members for the course; on the other hand, webelieved that every faculty member can relate their area of expertise to the Cyber World. Hence,after forming our instructor-team, we sat down to find overlaps between their areas of expertiseand cyber issues. This resulted in a lecture series of 8 topics developed and delivered by facultyfrom four colleges: the College of Arts and Sciences, the College of Business, the TagliatelaCollege of Engineering, and the Henry C. Lee College of Criminal Justice and ForensicScience.Each of the topics is summarized below and reflects the instructor’s expertise under the umbrellaof Cyber World (topics are in order):1
accessed. Flood attacks happen when a system receives too much traffic forthe server to buffer, causing them to slow down to the point of stopping.Distributed denial of service (DDoS) attacks occur when multiple devices are leveraged into abotnet and used to target a single system. Flooding attack methods are used in DDoS strikes toincrease the volume of traffic aimed at the target. DDoS attacks can also be reflected andamplified to further increase the volume of traffic generated.Generally speaking, reflected DDoS attacks are any attack where the attacker spoofs the sourceIP address to be the address of the intended target and amplified attacks are any attack where theoriginal attack is enhanced by use of another protocol, redirection, or spoofed
reflecting on a Capstone experience with the purpose ofsuggestions for improving the experience. The contrast of the ACM literature and the ASEEliterature is that software projects tend to be more focused on design and verification, where theengineering papers tend to have more focus on process such as funding and project launch. Inboth the ACM and ASEE literature review it was most common for Capstone experiences tospan two semesters with some literature suggesting that going to a two-semester program wouldbe beneficial [11].In the literature, the following common question groups were observed, and informed theanalysis and narrative of the case studies in this work: • Project format: How are projects assigned? Are students working independently
into the school curriculum necessitates changes in policyincluding addressing significant issues around infrastructure, and providing teachers the resourcesthat develop a cogent understanding of computational thinking as well as relevant and appropriateexemplars of age appropriate cases [6]. Such focus would promote core concepts essential toeffective computational thinking development such as designing solutions to problems throughabstraction, automation, algorithmic thinking, data collection and data analysis; implementingdesigns; testing and debugging; modeling, running simulations, conducting systems analysis;reflecting on processes and communicating ideas; recognizing abstraction and moving betweenlevels; innovation, exploration and
● Room (e.g. BL 266A) ● Instructor (e.g. “Jack H”)In the application, these columns are renamed to standard titles and new columns are added. Theprogram has been written in a modular format to allow easy substitution of titles. The outputspreadsheet is shown in Figure 2. In addition to renaming the columns, a few basic calculationshave been made. This includes changing the time from AM/PM to military formats. The timedurations have been calculated. This requires some correction for academic practices such as 50minutes = 1 hour and a 3-hour laboratory might be 2 hours and 45 minutes. It is worth notingthat the durations of ECET 452 and EE 311 are not an even or half and the times for thesecourses will need to be adjusted. The weight reflects
.,ComputerEngineeringCurricula2016:CurriculumGuidelinesforUndergraduate DegreeProgramsinComputerEngineering(CE2016); http://www.acm.org/binaries/content/assets/education/ce2016-finalreport.pdf.Accessed 2017August30.[6] ACMetal.,ComputerEngineering2004:CurriculumGuidelinesforUndergraduateDegree ProgramsinComputerEngineering(CE2004); http://www.acm.org/education/education/curric_vols/CE-Final-Report.pdf.Accessed2017 August30.[7] ACMetal.,InformationTechnologyCurricula2017:CurriculumGuidelinesforUndergraduate DegreeProgramsinInformationTechnology(IT2017);[8] Exter, M. E. & Turnage, N. M. Exploring experienced professionals’ reflections on computing education. Transactions on Computing Education, 12 (3), 2012.
individual space.In the group space, usually in the classroom, the instructor can focus on more complex learningoutcomes. The time and activities in the classroom can be broken down into several phases: (1)opening minutes: connecting with pre-class preparation, keeping students accountable for thepreparation, and clarifying misconceptions, (2) middle of class: conducting the group activity,and (3) the closing minutes: debriefing the activity and reflection on issues and learning.The post-group activity can be a continuation or extension of the in-class activity. The reader isreferred to Talbert’s book (2017) for an extensive discussion of the history and pedagogy offlipped learning as well as detailed instructions about how to design lessons and
been in practice for a very long time.Scholars have defined Problem-based learning as minds-on, hands-on, focused, experientiallearning (Wilkerson & Gijselaers, 1996). Instructors are considered to serve as problem solvingcolleagues assigned with the responsibility of promoting interest and enthusiasm for learning Aproblem-based curriculum is significantly different from the traditional discipline centeredcurriculum (Woods, 1994). Instructors are also encouraged to act as cognitive coaches who can nurture anenvironment that can support open inquiry (Barrows, 2000). It is important that the aims andobjectives of problem-based learning are reflected in every aspect of the learning environmentcreated. Problem-based curriculum should
GRAM model to continuously improve faculty pedagogyin their own discipline by integrating their own expertise into the institution’s pedagogical goals[28]. Another proposal is for teachers to simply reflect on their experience in the class andidentify areas for improvement [33]. Zahraee et al. adds more structure to this approach byasking faculty members to set their own goals and then reflect on their performance meetingthose goals over the last year [6].Three more situation-specific professional development aspects of faculty CI are also addressed:accreditation, quality management, and curriculum design [24]. Faculty’s training to effectivelyperform and complete accreditation-related tasks and activities is relevant for those programsthat
in the form of learning objects and tutorials, and can be configured to use variouscombinations of LESs. We describe how LESs are integrated into the F2F and online activities ofa software testing class. The results of a study we conducted that integrates LESs into the F2F ac-tivities of a software testing class show the potential positive impact such a pedagogical approachcan have on CS/IT/SE classes.1 IntroductionDue to the ubiquitous nature of computing in the 21st century, there is a great demand for a work-force that is knowledgeable in the areas of Computer Science (CS), Information technology (IT)and Software Engineering (SE). This fact is reflected in the large number of jobs expected inCS/IT/SE in the coming years. As a result
. Other programs reflecting Wei’s international reach include the college’s Poverty Alleviation/Service-Learning program and Engineers Without Borders. This global perspective is rooted in a vision of SJSU as a preeminent producer of forward-thinking problem-solvers. With this goal in mind, Wei has established the Silicon Valley Engineering Scholarship, a program that provides $5,000 of annual support for high-achieving students to pursue engineering careers. Wei is also a Principal Contributor to CSU (California State University) Engineering Academies, a statewide program that helps high schools better motivate and prepare students for the rigors of engineering education. Moreover, she supports the creation of high
alsoincludes a push-button to manually open and close the mandibles. The transmitter includes fourother momentary push-button switches that are used for various functions: • Yellow - alternating among operational modes (auto, manual walk, and manual head), and acknowledging messages the robot sends to the LCD • Green – sends a command to the robot to perform a dance • Blue – sends a command to the robot to go into pre-attack mode by crouching down and opening mandibles as a warning to the intruder of a potential attack • Red – sends a command to the robot to go into full attack mode by leaping forward towards the intruder to bite (body changes red to reflect
in item wording,such as the addition of a neutral response option.6 A Retrospective Pre-Post Test (RPT)methodology [19] was used on six items to reduce rater bias and to increase evaluationefficiency for the classroom. Surveys asked participants to provide ratings of agreement pre-and-post taking the CTL course on statements related to their interest in a career in computerscience, plans to major in computer science, plans to earn a degree in computer science, andfeelings of belonging in both Intro CS and the CTL. Students in the CTL were also asked toprovide ratings of expertise in computer science both pre-and-post CTL. As all wereconcurrently taking Intro CS, ratings on these surveys reflect impact of the combination of IntroCS with the
related to an ability toidentify, formulate, and solve electrical engineering problems, which students have 50.00%‘strongly agree’ and 39.30% ‘agree’ of statement. Question 2 is “I understand fundamentalbuilding blocks to design a memory, control unit, processor system of computer, alighted to anability to design electrical systems, components, or processes to meet desired needs, reflects at7.14% of disagree. It is because that this class has no lab sessions associated with it. Studentshave no opportunity to perform lab and course project. Moreover, in comparison with theinstructor’s previous experience teaching this course with a traditional project-based method (i.e.no student-centered and no back-and-forth module for reflection and adjustments
homework, with quickfeedback. A final hurdle was that this was the author’s first time teaching Vibrations. Therefore,it was necessary to prioritize lesson plan preparation over delivery logistics. This precluded timeintensive efforts such as learning complicated software or prerecording lectures in an instructionallab environment.Mastery learning (or learner-centric) techniques introduced by Bloom in the 1970s and expandedby researchers over the last half century have an established track record for enhancing studentlearning.1–3 In particular, periodic formative assignments are necessary and should be designed sothat students reflect on mistakes and adjust their learning efforts as needed. Within the Vibrationscourse, the mechanisms for formative
Paper ID #30213Curri: A Curriculum Visualization System that Unifies CurricularDependencies with Temporal Student DataDr. Stephen Michael MacNeil, University of California San Diego Stephen’s research focuses on how people collaboratively make sense of complex, ’wicked’ problems. Wicked problems are dynamic and constantly changing. They involve multiple stakeholders, often with conflicting requirements. To address these challenges, Stephen develops sociotechnical systems that col- lect, organize, and use data to support reflection and collective action. He received his Ph.D. at UNC in Charlotte and is currently a
NTP analogy, the telnet protocol offers a network administrator aquick way to set up a text-based console connection between a computer and a network deviceuses port 23. It can be shown visually as an individual (I) being able to establish a quick andconvenient connection with a network hardware device. The Network News Transfer Protocol(NNTP) uses port 119. It would seem like a problematic port number to memorize; however, ifone imagines looking at this number reflected in the mirror, it would be “911” -- which forreasons yet unclear to the author -- is what most news these days is. An open newspaper showsthe 119 port number with images and text regarding the news of the day. Email is an extensiveglobe-spanning system which can be shown by a
-12 curriculums. As computational thinking (CT) coursesbecome common in K-12 education [11]–[18], some higher education institutions also startedoffering computational thinking courses to students from any majors [4], [19]. At its heart, thismovement reflects that computational thinking is everywhere and for everyone [20]. Various studies reported using text-based computer-programming- [13], [21]–[25], visualcomputer-programming [26]–[28], and puzzle instructional approaches [11], [29]–[31] to teachcomputational thinking. Most of these studies reported a positive impact on learning computingprinciples and an increase of interest in computer science in male and female students [12], [26],[28]. On the other hand, one study argues that
. Nextwe incorporate sklearn 40 so students can execute and explore the results of machine learningalgorithms. To prepare for machine learning content students watch bots videos 14 and they arealso assigned some ethics reflection prompts in response to Cathy O’Neil’s TED Talk 35 .The common thread across topics is the problem-solving heuristics shown in Figure 1. Weintroduce these early on and revisit them with each topic and explicitly point out when we areusing a strategy, or trying several of them, to solve a problem. For example we point out the useof concrete examples for solving encoding problems, developing algorithms, and initially usinghard-coded values in incremental web development. Another example is how students areexposed to
(UndergraduateResearch Experience and Creative Activity) program to work on an extension to the summerresearch project during the academic year. Four participants from summer 2020 received a teamURECA grant ($4000) to continue working on an extension of their summer project for the2020-2021 academic year. While these post-summer activities were encouraging, they wereperformed by non-scholars and therefore may not be reflective of the potential positive impact ofthe summer research program on S-STEM scholars.4.3 Conference AttendanceSending college students, especially underrepresented students, to attend a professionalconference like the Grace Hopper Celebration of Women in Computing and the Richard TapiaCelebration of Diversity in Computing has become more and
, no. 1 (2009): 4-10.[4] P. Li, "Virtual lab approaches for information and computer technology education," In OnlineLearning for STEM Subjects: International Examples of Technologies and Pedagogies in Use,M. Childs and R. Soetanto, Ed. Routledge, 2017, pp. 112-126.[5] K. M. Ala-Mutka, “A survey of automated assessment approaches for programmingassignments,” Computer Science Education, 15(2), pp. 83-102, 2005.[6] D. Kumar, "REFLECTIONS Tools from the education industry," ACM Inroads 9, no. 3, pp.22-24, 2018.[7] P. Li and L. Toderick, ”An Automatic Grading and Feedback System for E-Learning inInformation Technology Education,” Proceedings of 2015 ASEE Annual Conference &Exposition, Seattle, Washington. 10.18260/p.23518.[8] E. F. Gehringer
away from release, MySpace was the new social media platform [2], Amazonjust launched what would eventually become a major cloud service provider called Amazon WebServices [3], and Skype had just released its Beta communication software using VoIP [4].The NWCET list, thorough as it was in 2003, has by 2019 become outdated. But even thoughthe list is no longer reflective of the realities of the IT workforce, some educational institutionsstill use them as a reference point. An updated and future-facing revision is essential. The “ITSkill Standards 2020 and Beyond” (ITSS) project, funded by the National Science Foundation’sAdvanced Technological Education program, will provide that revision by creating an updatedset of employer-led, future-facing