Updating search results...

Applied Science Textbooks and Full Courses

2953 affiliated resources

Search Resources

View
Selected filters:
Database, Internet, and Systems Integration Technologies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course addresses information technology fundamentals, including project management and software processes, data modeling, UML, relational databases and SQL. Topics covered include internet technologies, such as XML, web services, and service-oriented architectures. This course provides an introduction to security and presents the fundamentals of telecommunications and includes a project that involves requirements / design, data model, database implementation, website, security and data network. No prior programming experience required.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Kocur, George
Date Added:
09/01/2013
Database Security -Exercise and Case study Solution
Unrestricted Use
CC BY
Rating
0.0 stars

Database Security is the utmost key part for any type of database, .for example financial information, personal information, employee information and enterprise information. This book will cover following topics such as creating and altering database user, password profiling, various privileges and virtual private database. All the topics are implemented by using oracle 11g software. Especially for readers this book will give clarity about database security concepts such as Authorization, Authentication and Access control. The practical part using oracle provides how to carry out database security concepts technically for the reader.

Subject:
Applied Science
Computer Science
Material Type:
Activity/Lab
Case Study
Full Course
Interactive
Textbook
Unit of Study
Date Added:
04/11/2017
Database Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course relies on primary readings from the database community to introduce graduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, query optimization, and transactions. It is designed for students who have taken 6.033 (or equivalent); no prior database experience is assumed, though students who have taken an undergraduate course in databases are encouraged to attend.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Curino, Carlo
Madden, Samuel
Morris, Robert
Stonebraker, Michael
Date Added:
09/01/2010
Database Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course relies on primary readings from the database community to introduce graduate/undergraduate students to the foundations of database systems, focusing on basics such as the relational algebra and data model, schema normalization, query optimization, transactions, and other more advanced topics. No prior database experience is assumed, though students who have taken an undergraduate course in databases are encouraged to attend.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Kraska, Tim
Madden, Samuel
Date Added:
09/01/2023
Daylighting
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course explores natural and electric lighting that integrates occupant comfort, energy efficiency and daylight availability in an architectural context. Students are asked to evaluate daylighting in real space and simulations, and also high dynamic range photography and physical model building.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Engineering
Environmental Science
Environmental Studies
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
Reinhart, Christoph
Date Added:
02/01/2012
Day of AI
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This resource is to support teachers and educators to run Day of AI activities in their classrooms through curriculum packages and teacher training, all of which is available at no cost to participants.
Developed by leading faculty and educators from MIT RAISE, the curriculum features up to four hours of hands-on activities that engage kids in creative discovery, discussion, and play as they learn the fundamentals of AI, investigate the societal impact of these technologies, and bring artificial intelligence to life through lessons and activities that are accessible to all, even those with no computer science or technical background.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
None, MIT RAISE
Date Added:
02/01/2022
Decision Making Under Uncertainty: Introduction to Structured Expert Judgment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In an increasingly data-driven world, data and its use aren’t always all it’s cracked up to be. This course aims to address the critical lack of any or appropriate data in many areas where complex decisions need to be made.

For instance, how can you predict volcano activity when no eruptions have been recorded over a long period of time? Or how can you predict how many people will be resistant to antibiotics in a country where there is no available data at national level? Or how about estimating the time needed to evacuate people in flood risk areas?

In situations like these, expert opinions are needed to address complex decision-making problems. This course, aimed at researchers and professionals from any academic background, will show you how expert opinion can be used for uncertainty quantification in a rigorous manner.

Various techniques are used in practice. They vary from the informal and undocumented opinion of one expert to a fully documented and formal elicitation of a panel of experts, whose uncertainty assessments can be aggregated to provide support for complex decision making.

In this course you will be introduced to state-of-the-art expert judgment methods, particularly the Classical Model (CM) or Cooke’s method, which is arguably the most rigorous method for performing Structured Expert Judgment.

CM, developed at TU Delft by Roger Cooke, has been successfully applied for over 30 years in areas as diverse as climate change, disaster management, epidemiology, public and global health, ecology, aeronautics/aerospace, nuclear safety, environment and ecology, engineering and many others.

Subject:
Applied Science
Engineering
Mathematics
Statistics and Probability
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
TU Delft OpenCourseWare
Author:
Dr. A.M. Hanea
Dr. ir. G.F. Nane
Prof. dr. R.M. Cooke
Date Added:
02/14/2020
Decision Making in Large Scale Systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course is an introduction to the theory and application of large-scale dynamic programming. Topics include Markov decision processes, dynamic programming algorithms, simulation-based algorithms, theory and algorithms for value function approximation, and policy search methods. The course examines games and applications in areas such as dynamic resource allocation, finance and queueing networks.

Subject:
Applied Science
Computer Science
Economics
Engineering
Social Science
Material Type:
Full Course
Provider Set:
MIT OpenCourseWare
Author:
De Farias, Daniela
Date Added:
02/01/2004
Decolonization and Justice: An Introductory Overview
Unrestricted Use
CC BY
Rating
0.0 stars

Short Description:
'Decolonization and Justice: An Introductory Overview' emerged from the undergraduate students’ final assignment in JS-419 on Advanced Seminar in Criminal Justice at the University of Regina's Department of Justice Studies, Canada. This book focused on decolonization of multiple justice-related areas, such as policing, the court system, prison, restorative justice, and the studies of law and criminology. This is quite likely one of the few student-led book projects in Canada covering the range of decolonization topics. Ten student authors explored the concept of decolonization in law, policing, prison, court, mental health, transitional justice and restorative justice. We are grateful to receive funding support from the University of Regina’s OER Publishing Program Small Project Grant, which enabled us to hire a professional copy editor for the book.

Long Description:
‘Decolonization and Justice: An Introductory Overview’ emerged from the undergraduate students’ final assignment in JS-419 on Advanced Seminar in Criminal Justice at the University of Regina’s Department of Justice Studies, Canada. This book focused on decolonization of multiple justice-related areas, such as policing, the court system, prison, restorative justice, and the studies of law and criminology. This is quite likely one of the few student-led book projects in Canada covering the range of decolonization topics. Ten student authors explored the concept of decolonization in law, policing, prison, court, mental health, transitional justice and restorative justice. We are grateful to receive funding support from the University of Regina’s OER Publishing Program Small Project Grant, which enabled us to hire a professional copy editor for the book.

Word Count: 79111

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Career and Technical Education
Criminal Justice
English Language Arts
General Law
Health, Medicine and Nursing
Law
Reading Literature
Material Type:
Textbook
Provider:
University of Regina
Author:
Charmine Cortez
Geena Holding
Hamza Said
Jenna Smith
Kayla Schick
Kudzai Mudyara
Megan Korchak
Muhammad Asadullah
Nicola Kimber
Noor Shawush
Stephanie Dawndyck
Date Added:
01/14/2022
Deep into Pharo
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Pharo is a clean, innovative, open-source, live-programming environment.

Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.

You will explore the language with chapters on exceptions, blocks, small integers, and floats.

You will discover tools such as profilers, Metacello and Gofer.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alexandre Bergel
Damien Cassou
Jannik Laval
Stéphane Ducasse
Date Added:
11/08/2018
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Digital Suppression and Cryptographic Defense of Social Movements

Short Description:
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s. This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next. También disponible en Español Data dashboard

Word Count: 67802

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Political Science
Social Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Glencora Borradaile
Date Added:
03/29/2021
Defining Real-World Problems With the D.I.S. Method: Describe, Inquire, State
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course introduces the D.I.S. method to structure and define real-world problems. The D.I.S., which stands for “Describe, Inquire, State," is a domain-agnostic method for structuring (or defining) ill-structured problems.

Subject:
Applied Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Berman, Claire
Lavi, Rea
Paz, Alejandro
Date Added:
02/01/2024
Delay Insentitive Circuits -- Structures, Semantics, and Strategies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The design of concurrent distributed hardware systems is a major challenge for engineers today and is bound to escalate in the future, but engineering education continues to emphasize traditional tools of logic design that are just not up to the job. For engineers tackling realistic projects, improvised attempts at synchronization across multiple clock domains have long been a fact of life. Prone to hazards and metastability, these ad hoc interfaces could well be the least trustworthy aspects of a system, and typically also the least able to benefit from any readily familiar textbook techniques of analysis or verification.

Progress in the long run depends on a change of tactics. Instead of the customary but inevitably losing battle to describe complex systems in terms of their stepwise time evolution, taking their causal relationships and handshaking protocols as a starting point cuts to the chase by putting the emphasis where it belongs. This way of thinking may call for setting aside a hard earned legacy of practice and experience, but it leads ultimately to a more robust and scalable methodology.

Delay insensitive circuits rely on local coordination and control from the ground up. The most remarkable consequence of adhering to this course is that circuits can get useful things done without any clock distribution network whatsoever. Because a handshake acknowledgment concludes each interaction among primitive components and higher level subsystems alike, a clock pulse to mark them would be superfluous. This effect can bring a welcome relief to projects whose timing infrastructure would otherwise tend to create more problems than it solves.

The theory of delay insensitive circuits is not new but has not yet attracted much attention outside of its research community. At best ignored and at worst discouraged in standard curricula, this topic until now has been accessible only by navigating a sea of conference papers and journal articles, some of them paywalled. Popular misconceptions and differing conventions about terminology and notation have posed further barriers to entry. To address this need, this book presents a unified account of delay insensitive circuits from first principles to cutting edge concepts, subject only to an undergraduate-level understanding of discrete math. In an approachable tutorial format with numerous illustrations, exercises, and over three hundred references, it guides an engineering professional or advanced student towards proficiency in this extensive field.

Subject:
Applied Science
Career and Technical Education
Computer Science
Electronic Technology
Engineering
Material Type:
Textbook
Author:
Dennis Furey
Date Added:
07/16/2019
Deleting Dystopia: Re-Asserting Human Priorities in the Age of Surveillance Capitalism
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Short Description:
Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Long Description:
The IT revolution has brought many surprises. Among them is the fact that intensive surveillance and the related abuse of personal data have fallen into the hands of powerful digital oligarchies. Accounts of the increasingly repressive uses of advanced technologies and the subsequent ‘dumbing down’ of entire populations cast dark shadows over future prospects that are beginning to look increasingly dystopian.

Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Word Count: 53352

ISBN: 978-0-6487698-7-3

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Education
Material Type:
Textbook
Provider:
University of Southern Queensland
Author:
Richard A. Slaughter
Date Added:
09/01/2021
Delft Design Approach
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In our daily lives we use hundreds or even thousands of products and services. They are all designed, some with more success than others. The ‘Delft Design Approach’ is a structured approach that helps designers to tackle complex design challenges: from formulating a strategic vision, to mapping user behaviors, their needs and their environment, to developing and selecting meaningful proposals for products and services.

DDA691x offers a college-level introduction to the Delft Design Approach through lectures and exercises on design fundamentals and 6 methods. You will understand basic models and concepts that underlie the Delft approach. You will also develop the capability to use 6 basic methods in a design context. You will do so by applying the methods to realistic design challenges and by reflecting on your own performance by comparing it to that of expert designers as well as through peer discussion.

Subject:
Applied Science
Engineering
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
TU Delft OpenCourseWare
Author:
Dr. Jaap Daalhuizen
Date Added:
08/01/2018
The Delft Sand, Clay & Rock Cutting Model
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In dredging, trenching, (deep sea) mining, drilling, tunnel boring and many other applications, sand, clay or rock has to be excavated. This book gives an overview of cutting theories. It starts with a generic model, which is valid for all types of soil (sand, clay and rock) after which the specifics of dry sand, water saturated sand, clay, atmospheric rock and hyperbaric rock are covered. For each soil type small blade angles and large blade angles, resulting in a wedge in front of the blade, are discussed. For each case considered, the equations/model for the cutting forces, power and specific energy are given. The models are verified with laboratory research, mainly at the Delft University of Technology, but also with data from literature.

Subject:
Applied Science
Career and Technical Education
Engineering
Maritime Science
Material Type:
Textbook
Author:
Sape A. Miedema
Date Added:
01/24/2019
The Delftia Book
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Short Description:
A book created by students to learn about this unique microbe...

Word Count: 4024

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Textbook
Date Added:
01/26/2024
Delftse Foundations of Computation 2nd Edition
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Delft University of Technology
Author:
Neil Yorke-Smith
Stefan Hugtenburg
Date Added:
08/25/2022
Dentistry Environment Essentials
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Short Description:
The setting where dental procedures take place is a unique environment. The design of a dental clinic or surgery is purposefully built to promote ergonomic practice, safe procedures, efficiency and facilitates infection control. This book aims to introduce the dental environment and give practical guidance on how to navigate the equipment, instruments, procedures and how to stay safe. All dental team members require an appreciation and understanding of the principles in this book to ensure patients receive the safest and most pleasant experience when receiving dental treatment.

Long Description:
The setting where dental procedures take place is a unique environment. The design of a dental clinic or surgery is purposefully built to promote ergonomic practice, safe procedures, efficiency and facilitates infection control. This book aims to introduce the dental environment and give practical guidance on how to navigate the equipment, instruments, procedures and how to stay safe. All dental team members require an appreciation and understanding of the principles in this book to ensure patients receive the safest and most pleasant experience when receiving dental treatment.

Word Count: 10352

ISBN: 978-1-74272-369-3

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Textbook
Provider:
University of Queensland
Date Added:
01/24/2022