Despite the importance of regular expressions (RE), the topic is often given scant attention. This work-in-progress describes Learn Regex (LR), a web-based app designed to teach RE. In a gamified atmosphere with a comic book aesthetic that is deliberately inclusive, learners will be able to master RE in a manner that leverages key insights into how students best learn.
{"title":"Learn Regex: A Novel Tool for Learning Regular Expressions","authors":"Julie M. Smith","doi":"10.1145/3368308.3415425","DOIUrl":"https://doi.org/10.1145/3368308.3415425","url":null,"abstract":"Despite the importance of regular expressions (RE), the topic is often given scant attention. This work-in-progress describes Learn Regex (LR), a web-based app designed to teach RE. In a gamified atmosphere with a comic book aesthetic that is deliberately inclusive, learners will be able to master RE in a manner that leverages key insights into how students best learn.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129735169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Process oriented guided inquiry learning (POGIL) is a teaching technique that engages students in active learning and develops student process skills including critical thinking, problem solving, and teamwork. POGIL uses activities that are designed to guide students through questions to formulate patterns and relationships toward concept exploration. This paper describes the POGIL activities we developed for teaching Flooding Attack to the Software Defined Network (SDN) Data Plane, and our experience teaching this topic using POGIL These POGIL activities can be used by other educators in network security courses.
{"title":"Teaching Flooding Attack to the SDN Data Plane with POGIL","authors":"Hanan Alshaher, Xiaohong Yuan, S. Khorsandroo","doi":"10.1145/3368308.3415406","DOIUrl":"https://doi.org/10.1145/3368308.3415406","url":null,"abstract":"Process oriented guided inquiry learning (POGIL) is a teaching technique that engages students in active learning and develops student process skills including critical thinking, problem solving, and teamwork. POGIL uses activities that are designed to guide students through questions to formulate patterns and relationships toward concept exploration. This paper describes the POGIL activities we developed for teaching Flooding Attack to the Software Defined Network (SDN) Data Plane, and our experience teaching this topic using POGIL These POGIL activities can be used by other educators in network security courses.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121362903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Information technology (IT) is an application-oriented discipline. In this paper, we report a successful interdisciplinary collaboration that resulted in improved efficiency of the learning assessment of a chemistry class and helped the participating IT students grow professionally. The success encouraged us to seek more collaborations in the future. During the time when new technologies, such as AI and data mining, become more widely used in businesses and industry, the IT discipline is uniquely positioned to help solve problems that might arise in teaching and learning. The project provides a model based on which we will continue our collaboration through undergraduate research.
{"title":"An Interdisciplinary Collaboration Enhances Education in Both Disciplines and Generates Future Opportunities","authors":"Wei Jin, Ying Guo, David Marshall, G. Brown","doi":"10.1145/3368308.3415385","DOIUrl":"https://doi.org/10.1145/3368308.3415385","url":null,"abstract":"Information technology (IT) is an application-oriented discipline. In this paper, we report a successful interdisciplinary collaboration that resulted in improved efficiency of the learning assessment of a chemistry class and helped the participating IT students grow professionally. The success encouraged us to seek more collaborations in the future. During the time when new technologies, such as AI and data mining, become more widely used in businesses and industry, the IT discipline is uniquely positioned to help solve problems that might arise in teaching and learning. The project provides a model based on which we will continue our collaboration through undergraduate research.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125423528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The pandemic response disrupted higher education to include remote learning beginning mid-spring semester 2020 and is expected to continue in some form at least through fall. This paper reviews recent changes in higher education traditions from factors such as finance, competition, and higher education's value proposition. Some traditions such as changes in collocation have escalated during the pandemic. A vision emerges of some traditions likely to form a "new normal," post-pandemic. As a response example, this paper proposes use of "supplemental recordings" to continue learner engagement especially as remote learning becomes more common.
{"title":"The New Post-Pandemic Normal of College Traditions","authors":"Edward J. Glantz, Chris Gamrat","doi":"10.1145/3368308.3415375","DOIUrl":"https://doi.org/10.1145/3368308.3415375","url":null,"abstract":"The pandemic response disrupted higher education to include remote learning beginning mid-spring semester 2020 and is expected to continue in some form at least through fall. This paper reviews recent changes in higher education traditions from factors such as finance, competition, and higher education's value proposition. Some traditions such as changes in collocation have escalated during the pandemic. A vision emerges of some traditions likely to form a \"new normal,\" post-pandemic. As a response example, this paper proposes use of \"supplemental recordings\" to continue learner engagement especially as remote learning becomes more common.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128189051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jai W. Kang, Qi Yu, Edward P. Holden, E. Golen, Michael J. McQuaid
As we enter age of information, computational resources have become relatively inexpensive and seemingly limitless in their capabilities. Consequently, the field of data science has emerged as one of the key areas in industry among engineers, scientists, and IT professionals alike. In this paper, we derive a Data Analytics Body of Knowledge (DA-BoK) from the existing Data Science BoK (DS-BoK) as a means to provide data analytics content throughout the curriculum of an institution's undergraduate IT degree programs. A series of four Knowledge Areas are subdivided into Knowledge Units that can be introduced into existing IT courses through four embedding types, including lectures by example, labs, case studies, and projects. A case study is presented using our three IT programs as examples of how this content can be introduced at three levels of Bloom's Taxonomy (i.e. vocabulary, comprehension, application) through each of the embedding types. Finally, insights and guidance are provided on how to improve the proposed data analytics embedded IT curriculum in order to meet the demands of the modern data analytics pipeline in industry.
{"title":"Analytics Prevalent Undergraduate IT Program","authors":"Jai W. Kang, Qi Yu, Edward P. Holden, E. Golen, Michael J. McQuaid","doi":"10.1145/3368308.3415379","DOIUrl":"https://doi.org/10.1145/3368308.3415379","url":null,"abstract":"As we enter age of information, computational resources have become relatively inexpensive and seemingly limitless in their capabilities. Consequently, the field of data science has emerged as one of the key areas in industry among engineers, scientists, and IT professionals alike. In this paper, we derive a Data Analytics Body of Knowledge (DA-BoK) from the existing Data Science BoK (DS-BoK) as a means to provide data analytics content throughout the curriculum of an institution's undergraduate IT degree programs. A series of four Knowledge Areas are subdivided into Knowledge Units that can be introduced into existing IT courses through four embedding types, including lectures by example, labs, case studies, and projects. A case study is presented using our three IT programs as examples of how this content can be introduced at three levels of Bloom's Taxonomy (i.e. vocabulary, comprehension, application) through each of the embedding types. Finally, insights and guidance are provided on how to improve the proposed data analytics embedded IT curriculum in order to meet the demands of the modern data analytics pipeline in industry.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127216339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The technology workforce education system has changed dramatically in recent years, where the tech industry is offering certification-based academic programs to train future EmTech workforce. These programs usually work in collaboration with a non-profit university to provide specific skill training to different types of learners. In this Extended Abstract paper, we briefly highlight few of the most successful academia-industry partnership-based programs that have imparted important technical skills to thousands of learners to land jobs in EmTech.
{"title":"Cultivating Next Generation Emerging Technology Workforce through Academia-Industry Partnerships","authors":"Farzana Rahman, Elodie Billionniere","doi":"10.1145/3368308.3415428","DOIUrl":"https://doi.org/10.1145/3368308.3415428","url":null,"abstract":"The technology workforce education system has changed dramatically in recent years, where the tech industry is offering certification-based academic programs to train future EmTech workforce. These programs usually work in collaboration with a non-profit university to provide specific skill training to different types of learners. In this Extended Abstract paper, we briefly highlight few of the most successful academia-industry partnership-based programs that have imparted important technical skills to thousands of learners to land jobs in EmTech.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Classroom instruction in Cascading Style Sheets (CSS) can be made more rigorous and systematic when anchored by established, rule-governed typesetting principles from the International Typographic Style. This poster, which is prepared as an interactive website in the spirit of this year's online conference, outlines an instructional approach to CSS that requires students to apply a core set of typographic principles to a manageable, human-scaled subset of CSS properties. In this approach, students formally express a set of abstract but reasoned design principles as a collection of CSS style declarations.
{"title":"Enhancing CSS Instruction with Objective Typography","authors":"K. Stolley","doi":"10.1145/3368308.3415439","DOIUrl":"https://doi.org/10.1145/3368308.3415439","url":null,"abstract":"Classroom instruction in Cascading Style Sheets (CSS) can be made more rigorous and systematic when anchored by established, rule-governed typesetting principles from the International Typographic Style. This poster, which is prepared as an interactive website in the spirit of this year's online conference, outlines an instructional approach to CSS that requires students to apply a core set of typographic principles to a manageable, human-scaled subset of CSS properties. In this approach, students formally express a set of abstract but reasoned design principles as a collection of CSS style declarations.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131946303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gabriele Costa, M. Lualdi, M. Ribaudo, Andrea Valenza
Capture the flag (CTF) events challenge the skills of security experts. Although CTF are competitive events rewarding the winners with prizes and glory, their ultimate goal is to strengthen the competences of the participants. For this reason, they should attract new participants even among beginners. Nevertheless, CTF are often regarded as if they were exclusively for the security specialists. In this paper we introduce A NERD DOGMA as a CTF appetizer. Briefly, A NERD DOGMA is an entry-level CTF combined with an escape room game. The game was implemented as both an on-site facility and an online web application. Here, we describe the two implementations as well as two experiments, one of which carried out during the COVID-19 lockdown. We also discuss the preliminary results and the activities planned after these experiments.
{"title":"A NERD DOGMA: Introducing CTF to Non-expert Audience","authors":"Gabriele Costa, M. Lualdi, M. Ribaudo, Andrea Valenza","doi":"10.1145/3368308.3415405","DOIUrl":"https://doi.org/10.1145/3368308.3415405","url":null,"abstract":"Capture the flag (CTF) events challenge the skills of security experts. Although CTF are competitive events rewarding the winners with prizes and glory, their ultimate goal is to strengthen the competences of the participants. For this reason, they should attract new participants even among beginners. Nevertheless, CTF are often regarded as if they were exclusively for the security specialists. In this paper we introduce A NERD DOGMA as a CTF appetizer. Briefly, A NERD DOGMA is an entry-level CTF combined with an escape room game. The game was implemented as both an on-site facility and an online web application. Here, we describe the two implementations as well as two experiments, one of which carried out during the COVID-19 lockdown. We also discuss the preliminary results and the activities planned after these experiments.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133009375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of mobile devices for Internet usage has been rapidly increasing and thus the demand for wireless networks. There have been plenty of scenarios and cases that mobile consumers and businesses get into areas that do not have a reliable wireless coverage because of terrain, buildings and distance. Most of us had been a situation where we need Internet access desperately and the cellular network coverage is non-existent. For businesses using machine-to-machine communication, deploying an infrastructure network can be costly or be faced with too many regulatory issues. This can slow down deployment of machine-to-machine devices or stop it all together. When it comes to machine-to-machine communication or IoT devices, CatM was created as an LTE standard to address the needs of low data throughput at a cheap price point. The current implemented version of CatM is inefficient considering bandwidth utilization, and cellular carriers are already hard pressed for spectrum. Once a CatM device is activated, even when it is not transmitting, 17% of the available spectrum is reserved. Due to this spectrum reservation, this reduces overall speed for other users and reduces the number of users that can actively use the network. Then the issues everyone experiences, lack of coverage and a clean signal, due to terrain, buildings, regulations, costs and running backhaul, deploying cell sites everywhere is challenging. This is the reason why cellular coverage has dead spots or weak signal strength. With cellular spectrum costing billions of dollars, there is a more cost-effective way to utilize existing bandwidth. To improve upon already established ad-hoc networks, this paper will explores using nodes with an LTE connection and then sharing that LTE connection using BATMAN-Adv to nodes outside the coverage area of the cell site. An application for this could be smart meters located in the basements of houses. A meter might be outside the coverage of a local cell site but could communicate to another meter that is wirelessly visible. This would artificially expand the coverage of the cell site without having to invest in deploying more cell sites for a handful of nodes. The next step the paper will explore is redundancy. This is a critical issue, since missed data can be costly and frustrating. By allowing multiple nodes to share their cellular connection, this creates redundancy for when a node unexpectedly drops or if the local cell site has an outage. BATMAN-Adv is just one of many ad-hoc routing protocols available to be deployed. It was chosen because of its ability to run on Linux kernels out of the box without any modifications required. With the testing that was performed it is evident that BATMAN-Adv can support acceptable latency with solid throughput numbers. Further testing showed that in the event of a node or gateway failure, the protocol can reroute the traffic over another path. Layer 3 connections will drop and must be re-established, this is
{"title":"Machine-To-Machine Ad-Hoc Networking with a Redundant 4G LTE Gateway Using BATMAN-Adv","authors":"William B. Crowe, T. Oh","doi":"10.1145/3368308.3415438","DOIUrl":"https://doi.org/10.1145/3368308.3415438","url":null,"abstract":"The use of mobile devices for Internet usage has been rapidly increasing and thus the demand for wireless networks. There have been plenty of scenarios and cases that mobile consumers and businesses get into areas that do not have a reliable wireless coverage because of terrain, buildings and distance. Most of us had been a situation where we need Internet access desperately and the cellular network coverage is non-existent. For businesses using machine-to-machine communication, deploying an infrastructure network can be costly or be faced with too many regulatory issues. This can slow down deployment of machine-to-machine devices or stop it all together. When it comes to machine-to-machine communication or IoT devices, CatM was created as an LTE standard to address the needs of low data throughput at a cheap price point. The current implemented version of CatM is inefficient considering bandwidth utilization, and cellular carriers are already hard pressed for spectrum. Once a CatM device is activated, even when it is not transmitting, 17% of the available spectrum is reserved. Due to this spectrum reservation, this reduces overall speed for other users and reduces the number of users that can actively use the network. Then the issues everyone experiences, lack of coverage and a clean signal, due to terrain, buildings, regulations, costs and running backhaul, deploying cell sites everywhere is challenging. This is the reason why cellular coverage has dead spots or weak signal strength. With cellular spectrum costing billions of dollars, there is a more cost-effective way to utilize existing bandwidth. To improve upon already established ad-hoc networks, this paper will explores using nodes with an LTE connection and then sharing that LTE connection using BATMAN-Adv to nodes outside the coverage area of the cell site. An application for this could be smart meters located in the basements of houses. A meter might be outside the coverage of a local cell site but could communicate to another meter that is wirelessly visible. This would artificially expand the coverage of the cell site without having to invest in deploying more cell sites for a handful of nodes. The next step the paper will explore is redundancy. This is a critical issue, since missed data can be costly and frustrating. By allowing multiple nodes to share their cellular connection, this creates redundancy for when a node unexpectedly drops or if the local cell site has an outage. BATMAN-Adv is just one of many ad-hoc routing protocols available to be deployed. It was chosen because of its ability to run on Linux kernels out of the box without any modifications required. With the testing that was performed it is evident that BATMAN-Adv can support acceptable latency with solid throughput numbers. Further testing showed that in the event of a node or gateway failure, the protocol can reroute the traffic over another path. Layer 3 connections will drop and must be re-established, this is","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123462940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeremy Hajek, Mudassir M. Rashid, Mert Sevil, A. Çinar, Pablo Angel Alvarez Fernandez, Dhiraj Jain
Developing viable and robust software is an inescapable artifact of graduate research. The challenges lie in the complexities of developing, deploying, and securing software to support the research objectives. Combined with the transitive nature of students, the management of the software development and launch process is an arduous task. A standardized framework for developing and launching complex software is required. Within a university, individual departments do not typically possess the expertise, resources, software and infrastructure to translate research results to a viable product or tool. Extending upon the research of Hilton et al., [5] we designed a software development pipeline in an integrated multi-disciplinary research context. The integrated and collaborative software pipeline formulated from the onset of the project streamlines the development phase and provides an iterative feedback and testing environment. This approach is applied to the development of automated insulin delivery systems, with the synergistic efforts of interdisciplinary teams yielding a mobile application and server software solutions, and a framework for the iterative advancement of the software capabilities into the future.
{"title":"The Necessity of Interdisciplinary Software Development for Building Viable Research Platforms: Case Study in Automated Drug Delivery in Diabetes","authors":"Jeremy Hajek, Mudassir M. Rashid, Mert Sevil, A. Çinar, Pablo Angel Alvarez Fernandez, Dhiraj Jain","doi":"10.1145/3368308.3415377","DOIUrl":"https://doi.org/10.1145/3368308.3415377","url":null,"abstract":"Developing viable and robust software is an inescapable artifact of graduate research. The challenges lie in the complexities of developing, deploying, and securing software to support the research objectives. Combined with the transitive nature of students, the management of the software development and launch process is an arduous task. A standardized framework for developing and launching complex software is required. Within a university, individual departments do not typically possess the expertise, resources, software and infrastructure to translate research results to a viable product or tool. Extending upon the research of Hilton et al., [5] we designed a software development pipeline in an integrated multi-disciplinary research context. The integrated and collaborative software pipeline formulated from the onset of the project streamlines the development phase and provides an iterative feedback and testing environment. This approach is applied to the development of automated insulin delivery systems, with the synergistic efforts of interdisciplinary teams yielding a mobile application and server software solutions, and a framework for the iterative advancement of the software capabilities into the future.","PeriodicalId":374890,"journal":{"name":"Proceedings of the 21st Annual Conference on Information Technology Education","volume":"56 6 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123440692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}