Open Access. Powered by Scholars. Published by Universities.®

Engineering Education Commons

Open Access. Powered by Scholars. Published by Universities.®

1235 Full-Text Articles 1850 Authors 317212 Downloads 64 Institutions

All Articles in Engineering Education

Faceted Search

1235 full-text articles. Page 1 of 39.

Reading And Engineering: Elementary Students’ Co-Application Of Comprehension Strategies And Engineering Design Processes, Amy Wilson-Lopez, Stacie Gregory, Victor Larsen 2017 Utah State University

Reading And Engineering: Elementary Students’ Co-Application Of Comprehension Strategies And Engineering Design Processes, Amy Wilson-Lopez, Stacie Gregory, Victor Larsen

Journal of Pre-College Engineering Education Research (J-PEER)

For decades, researchers have asserted that K–12 teachers should embed reading comprehension instruction within each academic discipline, including ‘‘technical subjects’’ such as engineering. Recently, this assertion has become a source of controversy among researchers and practitioners who believe that time spent on teaching reading comprehension strategies may detract from time spent on more authentic activities such as engineering design. The purpose of this exploratory study was to investigate whether and how elementary students’ applications of comprehension strategies overlapped with their application of engineering design processes. The authors provided comprehension strategy instruction to 57 third- and fifth-grade students as they ...


Disciplinary Differences In Out-Of-School High School Science Experiences And Influence On Students’ Engineering Choices, Allison Godwin, Gerhard Sonnert, Philip M. Sadler 2017 Purdue University

Disciplinary Differences In Out-Of-School High School Science Experiences And Influence On Students’ Engineering Choices, Allison Godwin, Gerhard Sonnert, Philip M. Sadler

Journal of Pre-College Engineering Education Research (J-PEER)

Participation from a variety of students is important to the long-term growth of the engineering field. Much of the research on engineering recruitment or career choice has focused on engineering as a whole, even though engineering disciplines are varied in student participation and focus. This work examines how students’ out-of-school interests and experiences in high school predict the likelihood of choosing a career in a particular engineering discipline. Out-of-school experiences offer more unstructured ways for students to meaningfully engage with science and engineering outside of the confines of the classroom. These experiences offer opportunities to spark particular science interests not ...


Simulation To Application. The Use Of Computer Simulations To Improve Real-World Application Of Learning, Wendi M. Kappers, Stephanie L. Cutler 2017 Embry-Riddle Aeronautical University - Worldwide

Simulation To Application. The Use Of Computer Simulations To Improve Real-World Application Of Learning, Wendi M. Kappers, Stephanie L. Cutler

Wendi Kappers

Simulations have been used in training and education for years to aid students in gaining the skills needed to complete a task in a low risk environment. However, students can have trouble connecting the skills used in the simulated working environments to skills that are needed to be applied in the real-world environment, referred to as adaptive transfer. The simulations referred to in this study are simulated environments that mirror students kill application, not a simulation of an event that is meant to aid students in the development of concept knowledge around the demonstrated event. This study examines students' ability ...


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman 2017 Embry-Riddle Aeronautical University - Worldwide

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Wendi Kappers

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two ...


Improving The Player's Recruiting Process By Using Scenario Based Analysis Methodology, Dotan I. Shvorin, Kevin M. Taaffe 2017 Clemson University

Improving The Player's Recruiting Process By Using Scenario Based Analysis Methodology, Dotan I. Shvorin, Kevin M. Taaffe

Dotan Shvorin

High performance physical characteristics can be found today in most of the potential recruitsfor any athletic program and it has become increasingly dificult to select the right candidatebased solely on these characteristics. As a result there is a growing need for a recruiter to evaluatethe decision-making capability of a player in order to understand the mind of the player inaddition to the player physical assessment. We employ scenario-based analysis to evaluate suchdecision-making capabilities while enabling any recruiting to customize the potential candidateevaluation, based on the specific program's needs. The proposed method provides a platformfor decision making evaluation within a ...


Table Of Contents, 2016 University of Tennessee, Knoxville

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor, 2016 University of Tennessee, Knoxville

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene 2016 Advanced Technology Insights, LLC (ATI)

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen 2016 Korea Advanced Institute of Science and Technology

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan 2016 Middlebury Institute of International Studies (MIIS)

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein 2016 University of Tennessee, Knoxville

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame 2016 University of Tennessee

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Student Competition Cover, 2016 University of Tennessee, Knoxville

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed 2016 University of Dhaka

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Table Of Contents, 2016 University of Tennessee, Knoxville

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk, 2016 University of Tennessee, Knoxville

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga 2016 Installation and Licensing Directorate of Nuclear Material Nuclear Energy Agency

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear ...


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan 2016 National Nuclear Energy Agency of Indonesia (BATAN)

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of India’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa 2016 Department of Nuclear Engineering and Engineering Physics, Universitas Gadjah Mada, Yogyakarta, Indonesia

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to ...


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr 2016 The University of the Witwatersrand, Johannesburg

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Digital Commons powered by bepress