11th IEEE Integrated STEM Education Conference — Live Keynotes 9 AM - 12:30 PM US EST
Track 2 — Full Papers I
A STEM Program Designed, Developed and Delivered for Upper Primary School Pupils in Singapore
Lee Kar Heng (TBSS Center for Electrical and Electronics Engineering & Cong Ty TNHH Cong Nghe va Giam Sat Radar TBSS, Singapore)
Assessment of Systems Requirements Specification Skills Based on an Industry Body of Knowledge
Andres Fortino (NYU & Autonomous Professional Development, USA); Tanusha Virodula (NYU, USA)
Background - We selected the International Institute of Business Analysts (IIBA) as a vendor-neutral book of knowledge and, knowledge structure for BA (Business Analyst) professionals as well as a well-developed credential in the profession. We used a well-documented process to align a university curriculum to the industry needs, following similar work for project management and data analytics.
Research questions - To align the curriculum to the IIBA BABOK, we asked: (1) whether students graduating from the program had acquired adequate business analysis and systems requirements competencies; and (2) If they had not, how the curriculum be modified to help students acquire those competencies.
Methods - The curriculum was reviewed, and we assured initially that topical coverage of the pertinent course of study aligned adequately with the IIBA BABOK (Business Analysis book of Knowledge) knowledge structure. Results - Using the existing curriculum, we found that a majority of the students were able to pass the assessment based on the IIAB BABOK at the end of their program of study. The exam results were sufficiently granular to allow us to make modifications to the curriculum and course contents to improve the passing rate in future trials.
Using Coding Competitions to Develop STEM Skills in Graduate Education
Andres Fortino (NYU & Autonomous Professional Development, USA); Maria Rivera (NYU, USA)
Background - University credit-bearing education is often streamlined to cover increasing amounts of subject matter knowledge in class. It is not usually possible for faculty to take time from their curriculum to develop basic analytics skills, such as the use of R or Python for business analytics. Extra-curricular skills-building activities are an effective vehicle to develop these skills outside class.
Research questions - Do extra-curricular workshops to learn coding result in successful learning? Would a coding contest after the workshop drive attendance? What are the elements of a successful workshop and coding contest, and what are acceptable metrics and levels of performance for these contests?
Methods - Coding workshops were developed and offered as extra-curricular opportunities for students in a STEM graduate program. After the coding workshops, short-duration coding contests were launched. The goal of the contest was to develop text analytic tools that could be used by the students to advance their academic careers. Attendance in the workshop as a percent of the student body and quality and number of coding contest submissions was a metric of success. Contest participation and successful submissions were a second metric.
Results - Two workshops were run with concurrent contests. An average of 10% of the student body registered, and 5% attended. Contest submissions were received, and in each case, at least one submission yielded a usable tool. The tools were subsequently used by students in their job search and to conduct research.
Educating & Training STEM IT Professionals Based on the CDIO Standards Evolution
Alexander Zamyatin (Tomsk State University, Russia)
Comprehensive analysis of IEEE 802.11ah for Wireless Communication Networks
Aws Zuheer Yonis, Abdulrahman Tareed and Hamza Dweig (Ninevah University, Iraq)
To Be Determined
Track 3 — Full Papers II
The Science and Technology Wing: An Experiment for In-residence STEM Undergraduate Education
Jorge Santiago-Aviles and M'hamed Bokreta (University of Pennsylvania, USA); Geraldine Light (Walden University, USA)
Implementing Blended Learning in K-12 Programming Course: Lesson Design and Student Feedback
Shuhan Zhang (The University of Hong Kong, China); Chunyu Cui (Tencent Education Center for Innovation and Cooperation, China)
Math & Crafts, Educational Activities: 400 Indigenous Kids Learning Math from Engineers and Scientists
Ernesto Vega Janica (IEEE Standards Association, USA)
Note: due to COVID-19 global pandemic, prerecorded and remote classes will be provided.
Asymptotics for Iterating the Lusztig-Vogan Bijection for GL_n on Dominant Weights
Yuxiao Wang (Princeton International School of Mathematics and Science, USA)
In this paper, we will pursue a new direction: we will iterate the algorithm proposed by Achar and Rush. We first present some basic properties of Type A Lusztig-Vogan Bijection and its iteration. Then. we explore the iteration on inputs of small length (2, 3, and 4), and the complexity of the result motivates us to modify the way of measuring the iteration for large inputs. With our new definition, we prove the asymptotic behavior between the number of iterations for input and the length of the input and obtain a recursive formula to compute the slope of the asymptote. Finally, we propose two possible directions to continue the work in our paper. The paper serves as another contribution to understanding the Lusztig-Vogan Bijection from a combinatorial perspective and a first step in understanding the iterative behavior of the Type A Lusztig-Vogan Bijection.
Broadening Participation in Computer Science through Sheltered Instruction Pedagogy
Patricia A Morreale (Kean University, USA); Mayra S Bachrach (1000 Morris Ave, USA); Gail Verdi (Kean University, USA)
On the Generational Behavior of Gaussian Binomial Coefficients at Roots of Unity
Yuxiao Wang and Quanlin Chen (Princeton International School of Mathematics and Science, USA)
We will first present some useful tools in relating the integral q-binomial coefficients with usual binomial coefficients as well as interesting combinatorial objects in their own rite. We will then present our main result, formulating and proving a generational relationship between these integral q-binomial coefficients and usual binomial coefficients mod p. Finally, we will discuss the related combinatorial properties of integral q-binomial coefficients and their cousins with our definition in the first part.
To Be Determined
Track 4 — Full Papers III
An Examination of Industry Standards of Success within Penetration Testing Groups
Mollie Ducoste, Rachel Bleiman, Trinh Nguyen and Aunshul Rege (Temple University, USA)
Curriculum to Broaden Participation in Cybersecurity for Middle School Teachers and Students
Laurin Buchanan (Secure Decisions, USA); Lori Scarlatos and Nataliia Telendii (Stony Brook University, USA)
BEAT: Branding and Entrepreneurship of Assistive Technology for Social Good
Zhigang Zhu (The City University of New York, USA); Gerardo Blumenkrantz (The City College of New York, USA); Katherine Olives (Zahn Innovation Center, USA)
Shane Murphy and Mihir Patel (US Military Academy, USA); John R Rogers (USMA, USA)
Taking STEM Enrichment Camps Virtual: Strategies & Reflections from Quick Pivot due to COVID-19
Rebecca Lowe, Adrienne Smith and Christie Prout (Cynosure Consulting, USA); Guenter Maresch, Christopher Bacot and Lura Sapp (North Florida College, USA)
To Be Determined
Track 6 — Full Papers IV
A new method for disinfection and sterilization of air and objects using an electrified mist
Helena Ai He and Kenneth He (Princeton International School of Mathematics and Science, USA)
If two veils of mist with different polarities (negative and positive) are used, they will attract and continuously discharge in the air. Upon spraying this mist on objects, the mist particles will deposit on the surface of the object, forming a thin water film. Similar to thunderstorms, there will be a large number of negative ions generated, which will adsorb viruses or germs. This is similar to the pulsed electric field sterilization technology in food processing. The mist particles can discharge with electric field strength 10-50kV/cm, pulse width 100μs, and pulse frequency up to 2000Hz. This destroys the cell membrane or virus surface protein structure. Theoretically, my method can also be safely used for the disinfection of the face, hands, and respiratory tract. Currently, two prototypes are being assembled, and a series of experiments will be carried out. Preliminary tests have shown that the average sterilization rate of the electrified mist exceeds 91% efficiency.
Understanding electronics and CT in school - a simplified method for drawing and building electronic circuits for the micro-bit and breadboards
Bjarke K M K Pedersen, Jacob Nielsen and Jørgen Larsen (University of Southern Denmark, Denmark)
Training Workers to Thrive in Future Technology-Driven Environments: A Blueprint
Wenbing Zhao (Cleveland State University, USA)
Retention of Undergraduate Women in Engineering: Key Factors and Interventions
Wenbing Zhao and Xiongyi Liu (Cleveland State University, USA)
Augmented Reality Technology Projects of Tea Culture for China's Secondary Students
Hongyu Chen, Dan Sun, Xue Zhang and Yan Li (Zhejiang University, China)
To Be Determined
Track 7 — Full Papers V
Experiences on Incorporating Market Experiments into Energy System Education
Bolun Xu (Columbia University, USA)
Identifying Positive Catalysts in the STEM Career Pipeline
Daniel C Appel (US Air Force Research Laboratory, Kirtland AFB, NM & AEgis Technologies Group Inc., USA); Ralph Tillinghast (US Army & CCDC Armaments Center, Picatinny Arsenal, NJ, USA); Mo Mansouri (Stevens Institute of Technology, USA)
STEM-Coding Using Drones
Justine Horst (University of Wisconsin-Platteville, USA); Mehdi Roopaei (University of Wisconsin - Platteville, USA)
Adapting a STEM Robotics Program to the Covid-19 Pandemic - an application for Systems Engineering
Neville E. Jacobs (IEEE Baltimore Section, USA); Eric V Sudano (Eric V. Sudano System Solutions LLC, USA); Dwight Bues (SAIC Corp., USA); Gennaro Avvento (Gennaro J. Avvento Technical Services LLC & Lockheed Martin (Retired), USA); Ralph Tillinghast (US Army & CCDC Armaments Center, Picatinny Arsenal, NJ, USA)
Water Footprint at Schools with Arduino Project: STEM and Sustainable Development Goals
Otacilio Antunes Santana (Federal University of Pernambuco & DBR | PROFCIAMB, Brazil); Caina Silva (Federal University of Pernambuco, Brazil); Mayara Lima (Federal Rural University of Pernambuco, Brazil)
Immersive Technology in Integrating STEM Education
Mehdi Roopaei (University of Wisconsin - Platteville, USA); Emilee Klaas (1 University Plaza, Platteville, WI, USA)
To Be Determined
Track 8 — Full Papers VI
A Voice Assistant for IoT Cybersecurity
Jeffrey Chavis (Johns Hopkins University Applied Physics Laboratory, USA); Malcolm K Doster, Jr. (Charles Herbert Flowers High School, USA); Michelle S Feng (The Bryn Mawr School & Johns Hopkins University Applied Physics Laboratory, USA); Syeda J Zeeshan (Atholton High School, USA); Samantha Fu (Johns Hopkins University, USA); Elizabeth Aguirre (Johns Hopkins University); Antonio Davila (American University, USA); Kofi Nyarko (Morgan State University, USA); Aaron Kunz, Tracy Herriotts and Daniel P Syed (Johns Hopkins University Applied Physics Laboratory, USA); Lanier Watkins (Johns Hopkins University Information Security Institute, USA); Anna Buczak (Johns Hopkins University Applied Physics Laboratory, USA); Aviel Rubin (Johns Hopkins University, USA)
pervasive in the home, office, hospital, and many other userfacing
environments (UFEs) as more devices are networked to
improve functionality. However, this explosion of networked
devices in UFEs necessitates that security systems become easier
to help users remain aware of the security of the devices on their
network. Users may not have the skills or the time needed to
continuously monitor networks of increasing complexity using
common open-source tools. Specifically, they are not likely to fully
comprehend the data that those tools present, nor are they likely
to have a working knowledge of the tools needed to monitor and
protect their IoT-enabled network environments. This paper
explores development of a system that uses ambient computing to
facilitate network security monitoring and administration. Our
system is designed to combine machine-learning-enriched device
awareness and dynamic visualization of IoT networks with a
natural language query interface enabled by voice assistants to
greatly simplify the process of providing awareness of the security
state of the network. The voice assistant integrates knowledge of
devices on the network to communicate status and concerns in a
manner that is easily comprehensible. These capabilities will help
to improve the security of UFEs while lowering the associated
cognitive load on the users. This paper outlines continued work in
progress toward building this capability as well as initial results
on the efficacy of the system.
The Go-Light Game as a Tool for Enhancing the Mental Skills Required in STEM Learning
William R English, PE (LLLEI & DCPS, District of Columbia Public Schools, USA)
To facilitate the use of the Go Game for the intended purpose, the game was scaled down from the full-sized 19 x 19 board with 361 stones to smaller, "Go-Light Game" boards of either 8 x 8 or 7 x 7 and a corresponding 64 or 49 stones. The Go-Light game play time, 15 to 30 minutes, is intended to be compatible with high school student schedules and interest spans. Unlike Chess, the Go Game can be scaled down in complexity under the same rules of play. Another adaptation to the high school context was to make the Go Light Game board and stones relatively inexpensive and portable.
Initial experiences with student Go Game play in diverse groups of Washington DC high school students are presented. Initial experiences demonstrate that the game has the power to attract, engage, and stimulate mental and social learning activity in a wide range of high school students in ways beneficial to STEM learning and career advancement.
Confirmation of the general assertion, "the Go Game can be an especially useful tool in developing the mental capabilities to contain and apply STEM knowledge", requires further systematic play research and corresponding student cognitive performance testing.
How Do Students Learn Best? A Case Study of EGR244: Digital Logic Design
Golnoosh Kamali (Johns Hopkins University, USA)
Performance of Modified LMS Control Algorithm for Smart Antennas
Salah Dauga (UD, USA)
Index Terms-Adaptive algorithm, Adaptive filters, least mean squares algorithm, Sign error algorithm, modified least square algorithm.
In this paper, LMS algorithms are used by means of the ability of an adaptive antenna array with a number of elements for interference rejection. The effect on interference rejection of a wide range of factors in an antenna array is observed. As predicted from antenna theory, the predominant lobe and other lobe widths are reduced. The results of Simulation indicate LMS algorithms are efficient.
Use of Rubric and Assessment to Encourage Self-regulated Learning
Abrar Habib, Mona Ismail and Nuha Alzayani (University of Bahrain, Bahrain)
To Be Determined