ALAMOSE aims to educate undergraduate and graduate students on (i) what categories …
ALAMOSE aims to educate undergraduate and graduate students on (i) what categories of security weaknesses appear for artifacts used in DevOps, and (ii) how identified security weaknesses can be detected. ALAMOSE is funded by the U.S. National Science Foundation (NSF), and spearheaded by Akond Rahman at Auburn University. Please contact him with questions at akond@auburn.edu.
Follow the steps below to choose the most appropriate software to meet …
Follow the steps below to choose the most appropriate software to meet your needs: Identify what you want to achieve (discover data, analyze data, write a paper, etc.) Identify the necessary software features for your project (i.e. functional requirements) Identify logistics features of the software that are required, such as licensing, cost, time constraints, user expertise, etc. (i.e. non-functional requirements) Determine what software has been used by others with similar requirements Ask around (yes, really); find out what people like Find out what software your institution has licensed Search the web (e.g. directory services, open source sites, forums) Follow-up with independent assessment Generate a list of software candidates Evaluate the list; iterate back to Step 1 as needed As feasible, try a few software candidates that seem promising
There is no doubt that the quantum computer and the quantum internet …
There is no doubt that the quantum computer and the quantum internet have many profound applications, they may change the way we think about information, and they could completely change our daily life.
But how do a quantum computer and a quantum internet work? What scientific principles are behind it? What kind of software and protocols do we need for that? How can we operate a quantum computer and a quantum internet? And which disciplines of science and engineering are needed to develop a fully working system?
In a series of two MOOCs, we will take you through all layers of a quantum computer and a quantum internet. The first course will provide you with the scientific basis by explaining the first layer: the qubits. We will discuss the four types of qubits that QuTech research center at Delft University of Technology focuses on: topological qubits, Spin qubits, Trans qubits and NV Centre qubits. We will teach you the working principles of qubits and, at the same time, the working principles of a computer made of these qubits.
In the upcoming second course, we will introduce the other layers needed to build a quantum computer and a quantum internet, such as the micro-architecture, compilers, quantum error correction, repeaters and quantum algorithms.
These two courses offer you an opportunity to deepen your knowledge by continuing the journey started in our first MOOC, which focused on the applications of a quantum computer and a quantum internet.
Note that these courses offer a full overview of the layers of a quantum computer and a quantum internet, and therefore they will not go into too much detail per layer. For learners seeking to fully understand one specific topic we can recommend other courses authored by QuTech:
The CJK Dictionary Institute was originally established for Chinese, Japanese, and Korean …
The CJK Dictionary Institute was originally established for Chinese, Japanese, and Korean (CJK) resources, but has been expanded in recent years to other languages, including Arabic. The many Arabic resources available through the CJK Dictionary Institute include databases of proper nouns, transliteration programs, dictionaries, databases, articles related to transcription and translation issues, and more. The institute also provides software developers with dictionary data as well as consulting services.
This resource is a video abstract of a research paper created by …
This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:
"Microbiomes are more than just prokaryotes and viruses; they also contain important eukaryotes, including fungi and protists. However, eukaryotes are difficult to study using ‘shotgun’ metagenomics, as their signal is often overwhelmed by the prokaryotes. Some methods use eukaryote-specific marker genes, but they can’t detect eukaryotes that aren’t in the reference marker gene set, and such methods are not compatible with web-based tools for downstream analysis. But CORRAL (Clustering Of Related Reference ALignments) is designed to close those gaps. CORRAL identifies eukaryotes in metagenomic data based on alignments to eukaryote-specific marker genes and Markov clustering. It can detect microbial eukaryotes that are not included in the marker gene reference set. The process is even automated and can be carried out at scale. A recent paper demonstrates CORRAL’s sensitivity and accuracy with simulated datasets, mock community standards, and human microbiome datasets..."
The rest of the transcript, along with a link to the research itself, is available on the resource itself.
This resource is a video abstract of a research paper created by …
This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:
"The development of long-read sequencing has allowed for the generation of more complete and contiguous genomes in metagenomics studies. However, long-reads are more prone to sequencing errors than short-reads, and these errors can end up incorporated in the draft genomes. Combining short- and long-reads can overcome such errors, but is computationally taxing. To avoid this, researchers developed the ‘Hierarchical Clustering Based Hybrid Assembly (HCBHA) approach.’ This approach first groups the long- and short-reads into candidate bacterial haplotypes and then assembles each group separately, which reduces the computational demand . Researchers tested this framework on a microbiome from activated sludge, an important part of wastewater treatment. The highly complex microbiomes found in activated sludge remove pollutants from wastewater..."
The rest of the transcript, along with a link to the research itself, is available on the resource itself.
This resource is a video abstract of a research paper created by …
This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:
"High-quality reference genomes are needed to understand the physiology and function of uncultured microbes in complex ecosystems. Metagenomics has been an incredibly useful tool for studying microbial communities, but assigning sequence assemblies accurately to genomes is difficult in microbial species or strains that lack a reference genome. These 'consensus genomes' have lower resolution than those generated from cultured isolates. Combining single-cell genomics with metagenomics may allow us to overcome these methodological weaknesses. Thus, researchers recently developed a framework called SMAGLinker, which integrates single-cell genomes from microfluidic droplets and uses them as guides for metagenome assembly. Compared to metagenomics alone, SMAGLinker showed more precise contig binning and higher recovery rates of rRNA and plasmids in a mock microbial community. In human gut and skin microbiota samples, SMAGLinker returned more genomes than the conventional metagenomics frameworks..."
The rest of the transcript, along with a link to the research itself, is available on the resource itself.
6.035 is a course within the department’s “Computer Systems and Architecture” concentration. …
6.035 is a course within the department’s “Computer Systems and Architecture” concentration. This course analyzes issues associated with the implementation of high-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, basic program optimization techniques, the interaction of theory and practice, and using tools in building software. The course features a multi-person project on design and implementation of a compiler that is written in Java® and generates MIPS executable machine code. This course is worth 8 Engineering Design Points. This course was also taught as part of the Singapore-MIT Alliance (SMA) programme as course number SMA 5502 (Computer Language Engineering).
Suppose you want to build a computer network, one that has the …
Suppose you want to build a computer network, one that has the potential to grow to global proportions and to support applications as diverse as teleconferencing, video on demand, electronic commerce, distributed computing, and digital libraries. What available technologies would serve as the underlying building blocks, and what kind of software architecture would you design to integrate these building blocks into an effective communication service? Answering this question is the overriding goal of this book—to describe the available building materials and then to show how they can be used to construct a network from the ground up.
This unit covers application and system software, with a focus on healthcare …
This unit covers application and system software, with a focus on healthcare systems. It also describes the functions of operating systems, presents different operating systems, and defines the purpose and usage of file systems.
The first video in the Computer Software series, part of our Introduction …
The first video in the Computer Software series, part of our Introduction to Computers course. This video looks at the general types of software, software development, the software development life cycle, as well as explains what computer programers do.
6.823 is a course in the department’s “Computer Systems and Architecture” concentration. …
6.823 is a course in the department’s “Computer Systems and Architecture” concentration. 6.823 is a study of the evolution of computer architecture and the factors influencing the design of hardware and software elements of computer systems. Topics may include: instruction set design; processor micro-architecture and pipelining; cache and virtual memory organizations; protection and sharing; I/O and interrupts; in-order and out-of-order superscalar architectures; VLIW machines; vector supercomputers; multithreaded architectures; symmetric multiprocessors; and parallel computers.
CMS.611J / 6.073 Creating Video Games is a class that introduces students …
CMS.611J / 6.073 Creating Video Games is a class that introduces students to the complexities of working in small, multidisciplinary teams to develop video games. Students will learn creative design and production methods, working together in small teams to design, develop, and thoroughly test their own original digital games. Design iteration across all aspects of video game development (game design, audio design, visual aesthetics, fiction and programming) will be stressed. Students will also be required to focus test their games, and will need to support and challenge their game design decisions with appropriate focus testing and data analysis.
Students explore the concept of optical character recognition (OCR) in a problem-solving …
Students explore the concept of optical character recognition (OCR) in a problem-solving environment. They research OCR and OCR techniques and then apply those methods to the design challenge by developing algorithms capable of correctly "reading" a number on a typical high school sports scoreboard. Students use the structure of the engineering design process to guide them to develop successful algorithms. In the associated activity, student groups implement, test and revise their algorithms. This software design lesson/activity set is designed to be part of a Java programming class.
Testing is critical to any design, whether the creation of new software …
Testing is critical to any design, whether the creation of new software or a bridge across a wide river. Despite risking the quality of the design, the testing stage is often hurried in order to get products to market. In this lesson, students focus on the testing phase of the software/systems design process. They start by exploring existing examples of program testing using the CodingBat website, which contains a series of problems and challenges that students solve using the Java programming language. Working in teams, students practice writing test cases for other groups' code, and then write test cases for a program before writing the program itself.
This course is a fast-paced introduction to the C and C++ programming …
This course is a fast-paced introduction to the C and C++ programming languages, with an emphasis on good programming practices and how to be an effective programmer in these languages. Topics include object-oriented programming, memory management, advantages of C and C++, optimization, and others. Students are given weekly coding assignments and a final project to hone their skills. Recommended for programmers with some background and experience in other languages. This course is offered during the Independent Activities Period (IAP), which is a special 4-week term at MIT that runs from the first week of January until the end of the month.
This online interface processes MSA using four different modes. The 'Resolve' mode …
This online interface processes MSA using four different modes. The 'Resolve' mode provides tokenization and morphological analysis of the inserted text while the 'Inflect' mode lets users inflect words into the forms required by context. The 'Derive' mode allows users to derive words of similar meaning but different grammatical category. The 'Lookup' mode can lookup lexical entries by the citation form and nests of entries by the root; it also allows users to search in the English translations.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.