Updating search results...

Search Resources

2968 Results

View
Selected filters:
  • Computer Science
Deep  Learning for CyberSecurity
Unrestricted Use
CC BY
Rating
0.0 stars

Deep Learning For CyberSecurityDeep learning, a subfield of AI based on multiple layers of artificial neural networks, has established a key role in solving complicated cybersecurity problems due to its ability to manage complex data structures, its automatic feature extraction, and its efficiency in recognizing patterns and correlations

Subject:
Computer Science
Material Type:
Reading
Author:
SWETHA A
Date Added:
03/30/2023
The Deep Physiological Connections That Form Among Choir Singers
Unrestricted Use
CC BY
Rating
0.0 stars

This resource is a video abstract of a research paper created by Research Square on behalf of its authors. It provides a synopsis that's easy to understand, and can be used to introduce the topics it covers to students, researchers, and the general public. The video's transcript is also provided in full, with a portion provided below for preview:

"A new study from the Max Planck Institute for Human Development unveils the deep bodily connections that can form among choir singers Researchers tracked different physiological variables as a choir sung and used algorithms to uncover connections between them Aside from a blending of voices, they found that choir singers’ heart rates and breathing patterns sync up when performing as a group This merging was coupled to the vocalization patterns of the singers The conductor’s hand movements also caused a shared physiological response among the singers In essence, the work suggests that a choir can be considered a type of coherent physiological entity… or, as the researchers suggest, a superorganism Viktor Müller, Julia A.M. Delius, Ulman Lindenberger. Complex networks emerging during choir singing..."

The rest of the transcript, along with a link to the research itself, is available on the resource itself.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Reading
Provider:
Research Square
Provider Set:
Video Bytes
Date Added:
09/20/2019
Deepfakes Lesson Remix, Adding Media Literacy
Unrestricted Use
Public Domain
Rating
0.0 stars

Students examine what deepfakes are and how media literacy can help us create solutions for media mishaps (such as deepfakes). Throughout this lesson, students will use critical thinking skills in order to understand manipulated media content.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Lesson Plan
Module
Reading
Author:
Shana Ferguson
Ragan White and
Date Added:
04/18/2022
Deep into Pharo
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

Pharo is a clean, innovative, open-source, live-programming environment.

Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.

You will explore the language with chapters on exceptions, blocks, small integers, and floats.

You will discover tools such as profilers, Metacello and Gofer.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Author:
Alexandre Bergel
Damien Cassou
Jannik Laval
Stéphane Ducasse
Date Added:
11/08/2018
Defend Dissent
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Digital Suppression and Cryptographic Defense of Social Movements

Short Description:
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material—from surveillance used against contemporary US protests to the African National Congress’s use of partially manual encryption in fighting apartheid in South Africa in the 80s. This book can be read linearly, or you can pick and choose what you would like to learn about. Each chapter is prefaced with what you should read first (for background) and concludes with what you might want to read next. También disponible en Español Data dashboard

Word Count: 67802

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Political Science
Social Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Glencora Borradaile
Date Added:
03/29/2021
Delay Insentitive Circuits -- Structures, Semantics, and Strategies
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The design of concurrent distributed hardware systems is a major challenge for engineers today and is bound to escalate in the future, but engineering education continues to emphasize traditional tools of logic design that are just not up to the job. For engineers tackling realistic projects, improvised attempts at synchronization across multiple clock domains have long been a fact of life. Prone to hazards and metastability, these ad hoc interfaces could well be the least trustworthy aspects of a system, and typically also the least able to benefit from any readily familiar textbook techniques of analysis or verification.

Progress in the long run depends on a change of tactics. Instead of the customary but inevitably losing battle to describe complex systems in terms of their stepwise time evolution, taking their causal relationships and handshaking protocols as a starting point cuts to the chase by putting the emphasis where it belongs. This way of thinking may call for setting aside a hard earned legacy of practice and experience, but it leads ultimately to a more robust and scalable methodology.

Delay insensitive circuits rely on local coordination and control from the ground up. The most remarkable consequence of adhering to this course is that circuits can get useful things done without any clock distribution network whatsoever. Because a handshake acknowledgment concludes each interaction among primitive components and higher level subsystems alike, a clock pulse to mark them would be superfluous. This effect can bring a welcome relief to projects whose timing infrastructure would otherwise tend to create more problems than it solves.

The theory of delay insensitive circuits is not new but has not yet attracted much attention outside of its research community. At best ignored and at worst discouraged in standard curricula, this topic until now has been accessible only by navigating a sea of conference papers and journal articles, some of them paywalled. Popular misconceptions and differing conventions about terminology and notation have posed further barriers to entry. To address this need, this book presents a unified account of delay insensitive circuits from first principles to cutting edge concepts, subject only to an undergraduate-level understanding of discrete math. In an approachable tutorial format with numerous illustrations, exercises, and over three hundred references, it guides an engineering professional or advanced student towards proficiency in this extensive field.

Subject:
Applied Science
Career and Technical Education
Computer Science
Electronic Technology
Engineering
Material Type:
Textbook
Author:
Dennis Furey
Date Added:
07/16/2019
Deleting Dystopia: Re-Asserting Human Priorities in the Age of Surveillance Capitalism
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Short Description:
Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Long Description:
The IT revolution has brought many surprises. Among them is the fact that intensive surveillance and the related abuse of personal data have fallen into the hands of powerful digital oligarchies. Accounts of the increasingly repressive uses of advanced technologies and the subsequent ‘dumbing down’ of entire populations cast dark shadows over future prospects that are beginning to look increasingly dystopian.

Deleting Dystopia confirms that the existential threats posed by the misuse of advanced digital technologies are real. But, in place of apathy and fatalism, Slaughter explores ways of understanding the threat, conceptualising solutions and identifying strategies that lead away from digital authoritarian futures towards those funded on humanly viable values and practices.

Word Count: 53352

ISBN: 978-0-6487698-7-3

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Applied Science
Computer Science
Education
Material Type:
Textbook
Provider:
University of Southern Queensland
Author:
Richard A. Slaughter
Date Added:
09/01/2021
Delftse Foundations of Computation
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Delft University of Technology
Author:
Neil Yorke-Smith
Stefan Hugtenburg
Date Added:
11/01/2018
Delftse Foundations of Computation 2nd Edition
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Delftse Foundations of Computation is a textbook for a one quarter introductory course in theoretical computer science. It includes topics from propositional and predicate logic, proof techniques, set theory and the theory of computation, along with practical applications to computer science. It has no prerequisites other than a general familiarity with computer programming.

Subject:
Applied Science
Computer Science
Material Type:
Textbook
Provider:
Delft University of Technology
Author:
Neil Yorke-Smith
Stefan Hugtenburg
Date Added:
08/25/2022
Democratizing Machine Learning: Creating Open Educational Materials for the Public
Unrestricted Use
Public Domain
Rating
0.0 stars

The resource described is a guide for individual research scholars in machine learning who want to create open educational materials for the public. It provides tips and recommendations on how to develop effective educational materials for machine learning, including starting with the basics, providing examples, using interactive tools, focusing on practical applications, emphasizing ethics and social responsibility, and providing additional resources. The goal of this resource is to help research scholars in machine learning to share their knowledge with a broader audience and contribute to the democratization of knowledge in the field.

Subject:
Computer Science
Material Type:
Homework/Assignment
Author:
Aswin premnath
Date Added:
04/01/2023
Desalination Exploration
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

SYNOPSIS: In this lesson, students explore different methods of desalination.

SCIENTIST NOTES: This lesson teaches students about potable water scarcity and then explores desalination as a possible solution in water-stressed areas. Desalination technologies are introduced, and energy and environmental costs of desalination are discussed. A video resource explores a novel desalination technology, the Solar Dome, being built in Saudi Arabia. Students are tasked with designing and building their own solar still, and opportunity is given for design optimization. This lesson is recommended for teaching.

POSITIVES:
-This lesson can be multidisciplinary and can be completed in engineering, computer science, digital art, English or science classes.
-Students and teachers are given voice and multiple areas of choice in this lesson.
-Students become agents of change in their own communities, identifying problems and solutions.
-Students and teachers can make this conceptual, practical, or hands-on.
-This lesson can be spread out over several days and be considered a mini-unit.

ADDITIONAL PREREQUISITES:
-Students should be familiar with the basics of climate change.
-Students should be familiar with the basic scientific concepts of osmosis.
-Students should be familiar with basic engineering concepts like scaling and design.

DIFFERENTIATION:
-Students can work independently or in a group with adjusted requirements.
-Teachers can use subject and grade level vocabulary already being worked on or learned in class. Teachers can add vocabulary words in the glossary slide of the Teacher Slideshow.
-To further develop practical science or engineering skills, students can work together to create and implement a workable desalination solution at the school, home, or community level. Students can lead a workshop for family, an environmental club, or the community.
-Some students may wish to communicate their advocacy via social media. Make sure to follow all school rules and monitor students’ progress if you allow this in the classroom.

Subject:
Applied Science
Computer Science
Material Type:
Lesson Plan
Provider:
SubjectToClimate
Author:
Yen-Yen Chiu
Date Added:
06/30/2023
Design Challenge The Ring of Fire- Exploring Volcanoes
Unrestricted Use
CC BY
Rating
0.0 stars

During this lesson, students will gain an understanding of the different ways that volcanoes can erupt, as well as how land forms over time as a result of volcanoes. Students will integrate and exhibit learning by designing a model of a volcano that simulates heat sensing and vibration of a volcanic eruption. The Ring of Fire is a 40,000 km stretch of ocean and land along the edges of the Pacific Ocean.Tectonic plates break apart and then crash back together. This causes many earthquakes and volcanoes along the ring of fire.755 of the earth’s volcanoes occur in this area, as well as 80% of earthquakesCreate a system and model of a cinder cone volcano that simulates heat sensing and the vibration of a volcanic eruption. 

Subject:
Computer Science
Environmental Science
Special Education
Material Type:
Activity/Lab
Lesson Plan
Author:
Lori Blantz
Rachael Haverstick
Date Added:
07/21/2021
Design Your Own Nano-Polymer Smartphone Case
Read the Fine Print
Educational Use
Rating
0.0 stars

Students design and create their own nano-polymer smartphone or tablet case. Students choose their design, mix their nano-polymer (based in silicone) with starch and add coloring of their choice. While thinking critically about their design, students embed strings in the nano-polymer to optimize both case strength and flexibility. Students may apply strings in a variety of ways in order to maximize their individual design’s potential. Determining the best mixing ratio is also key for success in this challenge.

Subject:
Applied Science
Computer Science
Engineering
Physical Science
Physics
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
MakerChallenges
Author:
Fatih Gozuacik
Date Added:
03/07/2019
Design and Analysis of Algorithms
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is an intermediate algorithms course with an emphasis on teaching techniques for the design and analysis of efficient algorithms, emphasizing methods of application. Topics include divide-and-conquer, randomization, dynamic programming, greedy algorithms, incremental improvement, complexity, and cryptography.

Subject:
Applied Science
Computer Science
Engineering
Mathematics
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Demaine, Erik
Devadas, Srini
Lynch, Nancy
Date Added:
02/01/2015
Design and Analysis of Algorithms
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Techniques for the design and analysis of efficient algorithms, emphasizing methods useful in practice. Topics include sorting; search trees, heaps, and hashing; divide-and-conquer; dynamic programming; greedy algorithms; amortized analysis; graph algorithms; and shortest paths. Advanced topics may include network flow, computational geometry, number-theoretic algorithms, polynomial and matrix calculations, caching, and parallel computing.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Moshkovitz, Dana
Tidor, Bruce
Date Added:
02/01/2012
Designing An App
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This task ties into our school PBL Unit on body apps system design.  The task asks students to design screens for an app using the Marvel App.

Subject:
Computer Science
Educational Technology
Material Type:
Lesson Plan
Author:
Troy Staudt
Date Added:
04/05/2017
Designing Computational Biology Workflows with Perl
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This material introduces Linux File System structures and demonstrates how to use commands to communicate with the operating system through a Terminal program. Basic program structures and system() function of Perl are discussed. A brief introduction to gene-sequencing terminology and file formats are given.

Subject:
Applied Science
Computer Science
Material Type:
Lecture Notes
Provider:
CUNY Academic Works
Provider Set:
Queensborough Community College
Author:
Esma Yildirim
Yildirim Esma
Date Added:
05/01/2019