This course is a fast-paced introduction to the C and C++ programming …
This course is a fast-paced introduction to the C and C++ programming languages, with an emphasis on good programming practices and how to be an effective programmer in these languages. Topics include object-oriented programming, memory management, advantages of C and C++, optimization, and others. Students are given weekly coding assignments and a final project to hone their skills. Recommended for programmers with some background and experience in other languages. This course is offered during the Independent Activities Period (IAP), which is a special 4-week term at MIT that runs from the first week of January until the end of the month.
In diesem kurzen Video stelle ich euch eine kleine Klasse vor, die …
In diesem kurzen Video stelle ich euch eine kleine Klasse vor, die eine beliebige Website herunterladen kann :) Viel Spaß! Download des Quellcodes: http://goo.gl/3IWdZ
Software Carpentry lección para control de versiones con Git Para ilustrar el …
Software Carpentry lección para control de versiones con Git Para ilustrar el poder de Git y GitHub, usaremos la siguiente historia como un ejemplo motivador a través de esta lección. El Hombre Lobo y Drácula han sido contratados por Universal Missions para investigar si es posible enviar su próximo explorador planetario a Marte. Ellos quieren poder trabajar al mismo tiempo en los planes, pero ya han experimentado ciertos problemas anteriormente al hacer algo similar. Si se rotan por turnos entonces cada uno gastará mucho tiempo esperando a que el otro termine, pero si trabajan en sus propias copias e intercambian los cambios por email, las cosas se perderán, se sobreescribirán o se duplicarán. Un colega sugiere utilizar control de versiones para lidiar con el trabajo. El control de versiones es mejor que el intercambio de ficheros por email: Nada se pierde una vez que se incluye bajo control de versiones, a no ser que se haga un esfuerzo sustancial. Como se van guardando todas las versiones precedentes de los ficheros, siempre es posible volver atrás en el tiempo y ver exactamente quién escribió qué en un día en particular, o qué versión de un programa fue utilizada para generar un conjunto de resultados en particular. Como se tienen estos registros de quién hizo qué y en qué momento, es posible saber a quién preguntar si se tiene una pregunta en un momento posterior y, si es necesario, revertir el contenido a una versión anterior, de forma similar a como funciona el comando “deshacer” de los editores de texto. Cuando varias personas colaboran en el mismo proyecto, es posible pasar por alto o sobreescribir de manera accidental los cambios hechos por otra persona. El sistema de control de versiones notifica automáticamente a los usuarios cada vez que hay un conflicto entre el trabajo de una persona y la otra. Los equipos no son los únicos que se benefician del control de versiones: los investigadores independientes se pueden beneficiar en gran medida. Mantener un registro de qué ha cambiado, cuándo y por qué es extremadamente útil para todos los investigadores si alguna vez necesitan retomar el proyecto en un momento posterior (e.g. un año después, cuando se ha desvanecido el recuerdo de los detalles).
SYNOPSIS: In this lesson, students conduct research on electric bicycles and electric …
SYNOPSIS: In this lesson, students conduct research on electric bicycles and electric cars, choose one of these technologies, and create a video promoting its use as a climate solution.
SCIENTIST NOTES: Over the course of their use, electric cars are far more environmentally friendly than conventional automobiles. This lesson examines those benefits as well as how to make cities friendlier to bikes and other commuting options. The external resources in this lesson have passed our scientific review process.
POSITIVES: -Students must use hard data to promote either electric bicycles or electric cars. -Students record quick, informative videos as their assessment in this lesson plan.
ADDITIONAL PREREQUISITES: -Students should have a basic understanding of climate change. They should know that burning fossil fuels creates greenhouse gases and that greenhouse gases are heating up the planet. -There are fourteen total images in the Inquire section. Feel free to disregard some of them based on your needs. -Many students assume that electric cars do not create emissions at all. Students will learn: -There are embedded emissions from the manufacturing of electric cars. -Electric cars that use electricity generated by fossil fuels (coal, oil, and gas) are still creating emissions. -Your students will need access to devices to record their advertisements. Students can record themselves on iPods, iPads, laptops, or other school devices. Depending on your school's phone policy, you can have your students use their own devices.
DIFFERENTIATION: -Be sensitive to the socioeconomic situation of your students. Some students' families may not own bicycles or cars or be able to afford electric bicycles or electric cars. -Creating the advertisement can be done as a homework assignment. -Students may want to include drawings, puppets, props, or other creative items in their advertisements. Encourage their creative expression!
In this course, the student will learn the theoretical and practical aspects …
In this course, the student will learn the theoretical and practical aspects of algorithms and Data Structures. The student will also learn to implement Data Structures and algorithms in C/C++, analyze those algorithms, and consider both their worst-case complexity and practical efficiency. Upon successful completion of this course, students will be able to: Identify elementary Data Structures using C/C++ programming languages; Analyze the importance and use of Abstract Data Types (ADTs); Design and implement elementary Data Structures such as arrays, trees, Stacks, Queues, and Hash Tables; Explain best, average, and worst-cases of an algorithm using Big-O notation; Describe the differences between the use of sequential and binary search algorithms. (Computer Science 201)
This course provides an introduction to the fundamental principles and techniques of …
This course provides an introduction to the fundamental principles and techniques of software development that have greatest impact on practice. Topics include capturing the essence of a problem by recognizing and inventing suitable abstractions; key paradigms, including state machines, functional programming, and object-oriented programming; use of design patterns to bridge gap between models and code; the role of interfaces and specification in achieving modularity and decoupling; reasoning about code using invariants; testing, test-case generation and coverage; and essentials of programming with objects, functions, and abstract types. The course includes exercises in modeling, design, implementation and reasoning.
This course is a computationally focused introduction to elliptic curves, with applications …
This course is a computationally focused introduction to elliptic curves, with applications to number theory and cryptography. While this is an introductory course, we will (gently) work our way up to some fairly advanced material, including an overview of the proof of Fermat’s last theorem.
This book contains roughly three parts. The first 11 chapters discussthe JavaScript …
This book contains roughly three parts. The first 11 chapters discussthe JavaScript language itself. The next eight chapters are about webbrowsers and the way JavaScript is used to program them. Finally,two chapters are devoted to Node.js, another environment to programJavaScript in.Throughout the book, there are five project chapters, which describelarger example programs to give you a taste of real programming. Inorder of appearance, we will work through building an artificial life simulation,a programming language, a platform game, a paint program,and a dynamic website.
You can use an iframe to embed this interactive tool into websites. …
You can use an iframe to embed this interactive tool into websites. Students can use the slider to select the cognitive styles they use to interact with technology. If they need to submit their cognitive styles to you, they can take a screenshot.
Mia Epner, who works on security for a US national intelligence agency, …
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This video explains 256-bit encryption, public and private keys, SSL & TLS and HTTPS.
Based on James Cook University Library's Endnote and PRISMA video (CC BY-SA …
Based on James Cook University Library's Endnote and PRISMA video (CC BY-SA licence), this learning object is a brief video, a document with the codes and formulas, and a downloadable EndNote library with the PRISMA groups set-up
Lagrangian and Bond Graph Methods Short Description: This open education resource presents …
Lagrangian and Bond Graph Methods
Short Description: This open education resource presents effective system modelling methods, including Lagrangian and bond graph, and the application of a relevant engineering software tool, 20-sim. The content is designed for engineering students and professionals in the field to support their understanding and application of these methods for modelling, simulation, and design of engineering systems. The text also includes videos showing selected worked-out examples.
Long Description: This textbook emphasizes the fundamentals of modelling methods—including Lagrangian and bond graph—and introduces a software tool for modelling and simulation to support the design of common engineering systems. This approach minimizes the time-consuming effort of manipulating and extracting system equations and writing computer code for integrating and finding their solution. We believe that our approach helps both students and professionals currently working in the field to become more productive engineers. Videos of selected worked-out examples help the reader understand the topic and applications for real-world engineering systems. This book comprises of 11 chapters.
Word Count: 41611
ISBN: 978-1-990132-09-4
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
Engineering and Technology for the Better Good of Society PIT-OER is intended …
Engineering and Technology for the Better Good of Society PIT-OER is intended to train engineering technology students to leverage the power of select technologies aligned to the public interest applications and targeted public works institutions.This PIT-OER consists of four modules:Module 1: Project Management Methods with Applications to Public Works.Module 2: Technology and Ethics: “Are You Conflicted?”. Module 3: 3D Printing Applied to Everyday Public Interest and to Public Work Institutions.Module 4: How “Open” is Open Source Content: The Do’s and Don’t of Using Open Source Software, OSS. Each module is organized with lecture, assessment, and laboratory experiments. The modules are course materials for TECH-100, Introduction to Engineering and Technology, of Queensborough Community College.
This research resource suggests you some best sites of dataset collection which …
This research resource suggests you some best sites of dataset collection which some of you might have known earlier. In the research field of machine learning, it is always tough to find the related dataset and if found it is always hard to filter some. Now that technologies have imporved, this article suggests some well known resources to collect your dataset related to your research.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.