This is intended as an introduction to embedded controllers for students in …
This is intended as an introduction to embedded controllers for students in Electrical Engineering and Technology at the AAS and/or BS level. It begins with a discussion of the C programming language and then shifts to using the open source Arduino hardware platform. Uses both the Arduino library and more direct coding of the controller.
This course introduces the theory of error-correcting codes to computer scientists. This …
This course introduces the theory of error-correcting codes to computer scientists. This theory, dating back to the works of Shannon and Hamming from the late 40’s, overflows with theorems, techniques, and notions of interest to theoretical computer scientists. The course will focus on results of asymptotic and algorithmic significance. Principal topics include:
Construction and existence results for error-correcting codes. Limitations on the combinatorial performance of error-correcting codes. Decoding algorithms. Applications in computer science.
Ethical Hacking is a course in our IT Cyber Security Program created …
Ethical Hacking is a course in our IT Cyber Security Program created by Syeda Ferdous Ara Begum. This course teaches students how to properly secure a network by introducing them to various methodologies and techniques of attacking and disabling a network. Students will receive a hands-on practical approach in penetration testing measures and ethical hacking. Coursework is supplemented by hands-on exercises of attacking and disabling a network, and the use of appropriate tools for defense and countermeasures, with emphasis on teaching students to use what they learn ethically and legally. Students will be required to sign the White Hat Oath. All course content created by Syeda Ferdous Ara Begum. Content added to OER Commons by Jordana Shaw.
This video aims to delve into the human problems brought out by …
This video aims to delve into the human problems brought out by issues in artificial intelligence, specifically with respect to bias. It is suitable for classroom use or as a standalone video for those who wish to understand the issue more deeply than is conventionally covered. For classroom use, we recommend watching the chapterized version of the video and working through the teaching materials provided for each chapter.
This course introduces the tools of philosophical ethics through application to contemporary …
This course introduces the tools of philosophical ethics through application to contemporary issues concerning technology. It takes up current debates on topics such as privacy and surveillance, algorithmic bias, the promise and peril of artificial intelligence, automation and the future of work, and threats to democracy in the digital age from the perspective of users, practitioners, and regulatory/governing bodies.
Students are introduced to the concepts of digital organisms and digital evolution. …
Students are introduced to the concepts of digital organisms and digital evolution. They learn about the research that digital evolution software makes possible, and compare and contrast it with biological evolution.
A hypothetical scenario is introduced in which the class is asked to …
A hypothetical scenario is introduced in which the class is asked to apply their understanding of the forces that drive natural selection to prepare a proposal along with an environmental consulting company to help clean up an area near their school that is contaminated with trichloroethylene (TCE). Students use the Avida-ED software application to test hypotheses for evolving (engineering) a strain of bacteria that can biodegrade TCE, resulting in a non-hazardous clean-up solution. Conduct this design challenge activity after completion of the introduction to digital evolution activity, Studying Evolution with Digital Organisms.
Midterm Exam Review for the course "CS 217 – Probability and Statistics …
Midterm Exam Review for the course "CS 217 – Probability and Statistics for Computer Science" delivered at the City College of New York in Spring 2019 by Evan Agovino as part of the Tech-in-Residence Corps program.
Practice Final Exam for the course "CS 217 – Probability and Statistics …
Practice Final Exam for the course "CS 217 – Probability and Statistics for Computer Science" delivered at the City College of New York in Spring 2019 by Evan Agovino as part of the Tech-in-Residence Corps program.
In an effort to build the capacity of the students and faculty …
In an effort to build the capacity of the students and faculty on the topics of bias and fairness in machine learning (ML) and appropriate use of ML, the MIT CITE team developed capacity-building activities and material. This material covers content through four modules that an be integrated into existing courses over a one to two week period.
In this middle school and high school unit, students compare and constrast …
In this middle school and high school unit, students compare and constrast Arctic expeditions of the past (1893-1896 Fram expedition) and the present (2019-2020 MOSAiC expedition) to prepare for the Arctic of the future.
Final Project Assignment for the course: CSCI 49378: Intro to Distributed Systems …
Final Project Assignment for the course: CSCI 49378: Intro to Distributed Systems and Cloud Computing. Delivered at Hunter College in Spring 2020 by Bonan Liu as part of the Tech-in-Residence Corps program.
COURSE DESCRIPTION & PREREQUISITES Seminars focus on topics of general interest while developing key academic foundations (reading, information literacy, creative and critical thinking, technological literacy, and either writing or quantitative literacy). Quantitative-focused seminars integrate assignments that require the use and understanding of quantitative information/evidence.
This course will explore the parallels between dance and coding and will culminate in creating an electronic dance using basic tools from dance choreography, eDance costumes, and basic coding skills. No previous dance or coding experience is needed.
COURSE GOALS: FYS 207: ILLUMINATING THE CODE OF DANCE
Students will convert relevant information into various mathematical forms Students will solve a problem (creating an illuminated dance) using strategies across the disciplines of dance and computer science Students will put into practice knowledge of coding, iteration and abstraction and will be expressing themselves through choreography and dance.
Students design and create flow charts for the MIT App Inventor tutorials …
Students design and create flow charts for the MIT App Inventor tutorials in this computer science activity about program analysis. In program analysis, which is based on determining the behavior of computer programs, flow charts are an important tool for tracing control flow. Control flow is a graphical representation of the logic present in a program and how the program works. Students work through tutorials, design and create flow charts about how the tutorials function, and present their findings to the class. In their final assessment, they create an additional flow chart for an advanced App Inventor tutorial. This activity prepares students with the knowledge and skills to use App Inventor in the future to design and create Android applications.
Inspired by the work of the architect Antoni Gaudi, this research workshop …
Inspired by the work of the architect Antoni Gaudi, this research workshop will explore three-dimensional problems in the static equilibrium of structural systems. Through an interdisciplinary collaboration between computer science and architecture, we will develop design tools for determining the form of three-dimensional structural systems under a variety of loads. The goal of the workshop is to develop real-time design and analysis tools which will be useful to architects and engineers in the form-finding of efficient three-dimensional structural systems.
Foundations of Computation is a free textbook for a one-semester course in …
Foundations of Computation is a free textbook for a one-semester course in theoretical computer science. It has been used for several years in a course at Hobart and William Smith Colleges. The course has no prerequisites other than introductory computer programming. The first half of the course covers material on logic, sets, and functions that would often be taught in a course in discrete mathematics. The second part covers material on automata, formal languages, and grammar that would ordinarily be encountered in an upper level course in theoretical computer science.
Freebookcentre.net's computer science section contains links to many technical books offered free …
Freebookcentre.net's computer science section contains links to many technical books offered free online, either as html pages or downloadable pdfs. Books are arranged by subject: Data Structures and Algorithms, Compiler Design, Object Oriented Programming, Operating Systems, Computation Theory, Artificial Intelligence, and others.
Noted scientist Stephen Wolfram shares his perspective of how the unexpected results …
Noted scientist Stephen Wolfram shares his perspective of how the unexpected results of simple computer experiments have forced him to consider a whole new way of looking at processes in our universe. (86 minutes)
In this MS/HS unit supported by NASA, students engage with online interactives, …
In this MS/HS unit supported by NASA, students engage with online interactives, authentic datasets, and citizen science protocols to construct models and explanations for the unit driving question, "How do landscapes recover after a wildfire?"
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.