presentations.Peer evaluation is a collaborative learning strategy that asks students to reflect on contributionsmade by colleagues on group work. Peer evaluation encourages students to critically examine thework of peers and reflect on the quality of the work. It often involves the use of a detailed rubricor checklist as a guide [17]. Peer evaluation is an important strategy to keep student teammembers honest about their contributions to team deliverables. Students on project teams in ourcourses evaluate the contributions made by each team member when submitting a milestonedocument or a software prototype.Authentic AssessmentIt is difficult to use traditional paper or digital tests in hybrid classes containing both in-personand online students. Authentic
emphasized in the traditionalcurriculum. Student reflection and exit survey data examined student learning experiences alongwith the challenges of implementing skills they have learned. Students described the benefits oflearning an effective socially engaged design process to plan their projects, engaging withstakeholders to gather important information regarding their needs, learning recommendedpractices in idea generation, and creating prototypes before coding. On the other hand, studentsdescribed perceived challenges including lacking experience in socially engaged design skillsthat may impact their ability to implement skills from the workshops effectively, identifying andconnecting with stakeholders who could provide meaningful information, and
currently ina new round of participant recruitment. Our data in this paper reflects the findings from ourinitial round of data collection.The traditional educational environment considered in this study includes several of theuniversity’s low-level undergraduate coding classes. They are made up primarily of computer-focused majors and consist of undergraduates of all ages and skill levels. The non-traditionaleducational environments follow two avenues: meetups and bootcamps. Coding meetups andworkshops serve a wider range of individuals than university courses, involving people from alldifferent walks of life, skill, and experience. Our primary non-traditional object of observation,meetups consist of small, intimate groups discussing their
for the curriculum revision were identified to be:1. Content modernization to reflect changing needs and practices in software engineering2. Cohesive alignment of vertical progression that links each year of study3. Increased integration of course concepts and collaborative pedagogy4. Keep current with leading-edge technologies and approaches5. Student-focused to provide skills and knowledge needed to thrive in industry or graduate programs6. Raise department profile and increase competitiveness with other software engineering programsThe degree program objectives were identified as a) to graduate future software engineers aspractitioners, researchers, developers and collaborators, b) to integrate fundamental knowledgeand applied skills
design reflections), along with targetedinstruction to improve students’ writing and communication skills.In the Electrical Engineering program, both Capstone I and Capstone II courses are designated asWriting Enriched courses, satisfying this university requirement.Computer Engineering Senior Design Project Course (ECE 4800)Computer Engineering students at UVU are required to complete a one-semester capstone designcourse as part of their graduation requirements. This project-based course focuses on theintegrated design of hardware and software systems through collaborative team efforts, offeringstudents a substantial, hands-on engineering experience reflective of industry practices.Additionally, it satisfies the ABET accreditation requirement
by LLM suggestionsThe Halstead Measure, evaluated after implementing LLM-suggested changes to Expertiza, demonstratedreductions in difficulty, effort, and time. All approved changes adhered to proper code design principlesand caused no errors in Expertiza. The Halstead difficulty, which indicates how challenging the code is toread or write, decreased by 9.66. The Halstead time, estimating the time required to implement and fullyunderstand the software, decreased by 2047.5 minutes. This reduction highlights the substantial additionaltime previously required to implement and comprehend Expertiza. Adhering to principles like methodinheritance and minimizing unnecessary operators and operands, the code now reflects improved designand therefore
begun to address how computing education needs to change to reflect the newprofessional landscape graduates are entering where employees are expected to seamlesslyintegrate GenAI tools into their workflows for improved efficiency. Some faculty are providingGenAI tools to be used during the course, such as Harvard’s CS50 Duck Debugger, allowingstudents to practice leveraging such tools. Others are diving into the deeper pedagogicalimplications, such as Agarwal and colleagues [12], who highlight that teachers might need toshift focus from students' ability to write code from scratch to students' ability to critique code,potentially through the use of refute-style assessments.Turning to the students themselves, researchers conducted surveys to get
motivate studentsto design game software products and use software engineering techniques to solve real-worldprogramming problems. The investigators included small group activities with the expectationthat students would provide written or oral summaries (either live in-person or virtually usingvideo) of the strategies used to complete their tasks and their lessons learned. We encouragedstudents to reflect on the lessons learned from game design exercises either in writing or orallyfor in-person classes. We shifted to authentic assessment techniques and introduced the use ofmore frequent, lower stakes graded activities in both courses.Gamification was introduced in our revised courses as a means of promoting rewards forcompleting tasks. Students
an Introductory Computing Course Stephanos Matsumoto smatsumoto@olin.edu Olin College of EngineeringAbstractIn this paper, we conduct a qualitative study to describe how focusing more on softwareengineering skills, code quality, and reflection on programming practices in an introductorycomputing course has led to improvements in students’ experience and learning outcomes. Ourwork took place during the summer and fall of 2020 at Olin College of Engineering, a small,undergraduate-only engineering college in Massachusetts. We describe how, motivated bydifficulties in developing and assessing code quality in students work, we
faculty hierarchy. hierarchical structure of Scrum encourage junior faculty to participate more? Scrum Team member considerations of Analyzing benefits, drawbacks, considerations Scrum. Is it helpful? successes, and challenges. Scrum process Team member understanding of How well did the faculty understanding Scrum processes (backlog, point understand the Scrum process? delegation, sprints, standups etc.). How did this reflect in the Include references to them using
after extensive usage. The scraper uses APIs from each recruiting website and sends arequest looking for jobs based on queries passed. The API returns multiple pages of jobs, wherepages are sorted by relevance to our queries, and fetches them page by page until the desirednumber of jobs has been retrieved [53].Computing degrees enable graduates to pursue multiple career options. To reflect this, we havecollected jobs from five different fields common for computing graduates to work in. These fieldswere selected based on public data released by universities such as Carnegie Mellon and Universityof Southern California about where their CS graduates go after graduation[8, 49]. These five fieldsare: • Cyber Security (CYS) • Data Science
for wording survey questions inan accessible manner [40]. Our survey instrument consists of three parts, which we explain ingreater detail below.Terminology. Our survey begins with an assessment of participants’ understanding of softwareengineering terminology. This section of the survey begins with the following prompt: This section of the survey asks about how you understand terms from the field of software engineering. To ensure that your response reflects your understanding, please do not look up the meaning of these terms until you have completed the survey. Consider each of the following topics within the context of developing software. What words, phrases, or concepts come to mind?The survey then presents each
support reflective learning andcommunication in computing courses [1].The goal of this work is twofold: 1. Provide a retrospective analysis of a novel instructional model, offering sufficient detail for other educators to adopt, adapt, or extend the approach. 2. Demonstrate the effectiveness of this modified instructional approach in addressing stagna- tion in content delivery, preparing students for the rapidly evolving field of computer science.In a field as rapidly changing as computer science, modifications to the methods of instruction mayhelp intrinsically prepare students for this rapidly changing ecosystem.Theoretical FrameworkConstructivism as an educational theoretical framework has often been applied to the sub-field
questions on the UI. Ask a maximum of 10 questions requiring The number of survey questions is at most 10 user input. [12,13]. Display a ranked list of recommended items A list of recommended products is generated based on initial user input. and displayed, and reflects the data acquired from the multiple-choice survey questions. The product type, skin type, and product highlights match the user input data in the output list. Display a maximum of 15 ranked
design and implementation course.Given the importance of security to Software Engineering, it is imperative that the programs continue toimprove teachings in this area. This review, while thorough in some regards, was also very limited inthat it only could look at catalog entries and curricula. In evaluating programs, evaluators review a morethorough self-study which may better reflect the teaching of security within the program. This may be apessimistic view of the situation, as the catalog entries may not be entirely current due to institutionalpolicies and individual instructors may include topics that are not explicitly called out in the catalog.What is concerning, however, is that these limitations do not appear to be present for other core
Sky Texture within in Blender. To explain, the computer graphics modelproposed by Wikkie and Hosek [48, 49] was adopted to simulate the sky background. To achievethe desired result, we first tuned the turbidity parameter, denoted as t, which influences theatmospheric conditions. According to [49], t = 2 yields a very clear, arctic-like sky; t = 6represents a sky on a warm moist day; and t = 10 leads to a slightly hazy day. The results of thesky background under different t values are shown in Figure 6a to c. Next, we tuned the groundalbedo parameter, denoted as g, which measures the reflective properties of the Earth's surface.Lower values of g produce a darker sky background; higher values create a brighter or whitetexture in the sky [49
more manageable. Wewill be testing several submission patterns over the next few terms including shortening thesubmission window and requiring a submission to be made by the initial due date. We are alsoplanning to perform more analysis on the quality of student work by comparing submissions toprojects under specifications grading to those submitted with a traditional grading scheme.Finally, we will be making additional modifications to deal with larger course sizes and will besurveying students to investigate their views of specifications grading.[1] D. Clark and R. Talbert, Grading for Growth. 2023.[2] E. Dosmar and J. Williams, “Student Reflections on Learning as the Basis for Course Grades,” in 2022 ASEE Annual Conference &
offer a more accurate reflection of how security istaught. It is hoped that this review presents a pessimistic view, since catalog entries may beoutdated, and individual instructors often include content beyond what is officially documented.As a study, this review is limited in scope. Although it analyzed 81 programs, this representsfewer than one-quarter of all accredited computer science programs. Moreover, while manycomputer science programs pursue accreditation, it is not as universal as it is in engineeringdisciplines. Although the programs were randomly selected, it remains difficult to determinewhether the sample is truly representative of the broader set of accredited programs.Furthermore, data were collected over a period, which
, IsraelIntroductionCollaboration in Computer Science courses has several benefits. It allows students with diversebackgrounds and perspectives to come together and understand the subject material holisticallyand comprehensively. Working in a team encourages students to exchange ideas, expertise, andbest practices, which helps them learn from one another and not only from the teaching staff.When students work on programming assignments in a team, it allows students to peer reviewtheir team members’ code. Peer evaluation and feedback help improve the work’s overall qualityand also reflects developers’ workflow in real-world software development projects. Moreover, acollaborative environment encourages students to be accountable for their and their teammembers’ work
accustomed totraditional processes like a waterfall model. Though done with a relatively small number ofstudents in a short timeframe, the authors report positive outcomes on employee understandingof agile principles.We intend to continue developing an agile mindset in our students by fostering teaching andlearning in an agile fashion. Our work started with the Continuous Assessment Platform [26] forcontinuous learning feedback and now extends to more critical inquiry activities that emphasizeproblem-solving that eliminates waste, encourages tight feedback loops through experimentation,and asks students to reflect on agile ways of thinking and doing.References 1. A. Przybylek, and W. Kowalski. "Utilizing online collaborative games to facilitate
environment like Gazebo based ROS provided. The simulation also did not considerother environmental factors like wind, obstacles, etc. making the simulation less reflective of areal life flight. It was difficult to control the flight path due to the lack of a direct control system,instead relying on a separate console to send simple commands to the flight control system. Thismade it difficult to perform complicated maneuvers. It was also difficult to track the variousparameters of the flight, such as fuel, coordinates, altitude, etc. due to them being displayed oncemore on a separate monitor window. This made running the simulation more arduous andinconvenient.Despite these drawbacks, the convenient setup and ease of running cybersecurity tests
their academic journey. These projects foster self-directed learning, encouraging students to develop problem-solving skills, troubleshooting issues,research solutions independently, and interpret complex or poorly documented materials.Feedback from students and their final presentations reflect a strong sense of accomplishment andincreased confidence in their engineering capabilities. Senior capstone design projects continue toserve as a vital component of electrical engineering education and align with the standardsestablished by the Accreditation Board for Engineering and Technology (ABET). Overall,students’ feedback and their final project presentation indicate that they have pride in their projectaccomplishments and have gained confidence
-proving Undergraduate STEM Education (IUSE) program under Award Numbers DUE-1562773(Florida Gulf Coast University), DUE-1525112, DGE-2114911, and CNS-2246004 (Florida Inter-national University). Any opinions, findings, conclusions, or recommendations expressed in thismaterial are those of the authors and do not necessarily reflect the views of Cyber Florida or theNSF.References [1] Steve Morgan. Cybercrime To Cost The World $10.5 Trillion Annually By 2025, Nov. 2020. https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/ [Online] (Accessed Dec. 2024). [2] Cayley Wetzig. 5 Alarming Cybersecurity Facts and Statistics, Nov. 2022. https://thrivedx.com/resources/article/cyber-security-facts-statistics
camp followed roughly the same schedule, with a half-day module dedicated fora particular computing topic. Seven modules were delivered during the technical sessions asdescribed in the next section, with the final afternoon of the last day reserved for a showcasewhere participants could demonstrate their favorite projects to family and friends. Each daystarted with a setup/warm-up period and ended with a teardown/reflection, usually done with aKahoot (www.kahoot.com) as these online quiz games were familiar to the participants. Eachmodule was broken into 2 sessions divided by a break, with the first session usually involving“follow-me” style instruction, and the second on independent work.The university classroom used for the camp has