This course includes basic theory and examples
- Subject:
- Applied Science
- Computer Science
- Mathematics
- Statistics and Probability
- Material Type:
- Activity/Lab
- Lecture Notes
- Author:
- Sagar Khairnar
- Date Added:
- 05/17/2020
This course includes basic theory and examples
In this module, middle and high school teachers explore a model inquiry-based STEM social justice lesson involving statistics and its implementation to understand the role of questioning techniques in delivering inquiry-based lessons, building depth of knowledge and understanding student thinking. In this module, teachers will:
-- Evaluate their own questioning skills
-- Report, monitor and reflect on their own questioning skills
-- Learn new questioning skills while gaining exposure to an inquiry-based, social justice STEM lesson
-- Understand the role of questioning skills in building student exposure to Depth of Knowledge levels 3/4 level thinking
A two-day introduction to modern evidence-based teaching practices, built and maintained by the Carpentry community.
New materials for a course on Categorical Data Analysis using Stata statistical software.
The goal of this class is to prove that category theory is a powerful language for understanding and formalizing common scientific models. The power of the language will be tested by its ability to penetrate into taken-for-granted ideas, either by exposing existing weaknesses or flaws in our understanding, or by highlighting hidden commonalities across scientific fields.
An introduction and examples of how to use the Chi square test. The test is used when analyzing assocation between two categorical variables and when comparing proportions. The idea behind the test is to compare the observed frequencies with the expected frequencies, if the two variables are unrelated.
Introduction:
Groundwater is key to Texas future and economy. The resource has long been a focus of legislative and economic interest. In the earliest days, the resource was viewed as 'occult and hidden.' That sense of mystery remains even as groundwater becomes more critical to the water resource picture for the state.
Since 1951, the state conducts regional water planning with the involvement of citizen stakeholders. Let's use your science-based knowledge of groundwater flow to see if you can find the right balance for both protecting and planning for groundwater use.
Our Case:
This week we will evaluate a historic court case from June 13, 1904. The case of East versus Texas Central Railroad Company is the Texas Supreme Ruling that provides the foundation for Texas groundwater law -- Rule of Capture.
In the appendix, you will find the following figures to help you determine whether or not Mr. East's well was impacted by the railroad company's pumping:
Platt map showing well locations and possible distances
Schematics of the well dimensions, along with simplified subsurface geology in the area.
In addition, you will be interested in knowing that the Geologic Atlas of Texas shows that the wells were likely completed in the Pawpaw Formation, which is a thick calcareous clay unit in the lower sections and cemented sand in the upper part. Lithologies in the area are reported to yield limited to moderate amounts of water in shallow wells. You can expect that the formation was an unconfined unit and assume that the East well is down-gradient from the Railroad well.
Assignment Part One:
1. Using the information from our last lecture, what do you think a reasonable transmissivity rate might be for the Pawpaw formation?
a. Estimate a transmissvity for a cemented sand unit.
b. Use this value as your first estimate in calculations to calculate the potential drawdown with Jacob's equation. This calculates the drawdown in an nonleaky artesian aquifer, sa, given the observed water table drawdowns.
sa = swt -- (s2st/2m)
c. Calculate swt using a correction equation.
Swt = m-(m2-2msa)1/2
Where m is the initial saturated thickness, which you may estimate at 30 ft.
2. How much water do you estimate that the railroad can extract before the well is impacted? Complete a diagram showing estimated drawdown (ft) on the y-axis and distances from the Railroad well (ft) using different transmissivity values and different distances. What do you discover about the case?
3. With your hydrogeologic analysis, do you believe that the East well was impacted by the railroad well? Can you explain how significant the impact may or may not have been?
Climate Considerations:
Is it possible that climate conditions could have impacted conditions in the well? Visit the Greenleaf website ([greenleaf.unl.edu/downloads/scPDSI.zip]) and access data for Palmer Drought Severity Indices. Looking at this data, complete the next questions.
Assignment Part 2:
4. Looking at the drought severity index maps of Texas from October 1900 to September 1902. What kind of implications might climate conditions have had on the groundwater conditions?
5. If climate conditions worsened, what do you think would happen to the wells?
Reference:
Mace, R.E., Ridgeway, C., and Sharp, J.M., 2004, Groundwater is no longer secret and occult - A historical and hydrogeologic analysis of the East case, 100 Years of Rule of Capture: From East to Groundwater Management, ed. Mullican, W.F. and Schwarz, S., Report 361, Texas Water Development Board, 63-86 pp.
Appendix -- support documents:
Figure 1 shows that Mr. East lived in Denison County, TX. The inset is a plan view map showing the potential locations of the wells in the town.
(in supporting documents)
Figure 2: Schematic of well dimensions and simplified geology.
(In supporting documents)
(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)
Do you sometimes feel that you do not belong in this program, or some of its courses? The instructors assure you that you do belong! To help combat that sense of imposter syndrome that you might be feeling, let's explore the notion that your cognitive styles of learning are similar to your peers' learning styles.
You may already know that OSU and other universities have studied course materials and technical tools to make improvements that level the playing field amongst you and your peers. Programs such as Cognitive Style Heuristics and GenderMag/InclusiveMag study differences in how people problem-solve while learning new technical skills. The projects' core methods of finding bias bugs in software and materials is to apply personas that represent different sets of cognitive facets.
Explore the Facets and Personas by clicking on the tabs at the top, then analyze which persona fits you best, by taking the Survey.
Your selection data will disappear after refreshing the page, or closing the browser. It will not be saved and collected.
This is an interview with Dr. Joy Morris, Professor at the Department for Mathematics and Computer Sciences at the University of Lethbridge on her Open Educational Practices, including the publications of her own textbooks under CC-BY-NC-SA and her open work in the community.
This is a graduate-level course in combinatorial theory. The content varies year to year, according to the interests of the instructor and the students. The topic of this course is hyperplane arrangements, including background material from the theory of posets and matroids.
This course serves as an introduction to major topics of modern enumerative and algebraic combinatorics with emphasis on partition identities, young tableaux bijections, spanning trees in graphs, and random generation of combinatorial objects. There is some discussion of various applications and connections to other fields.
In the first part of this video introduction to combinatorics, we introduce factorial notation to efficiently describe the ways we can arrange distinguishable objects in a row. Next, we count the combinations of L objects that can be grabbed from a container of L + N total objects. Finally, we use the formula for combinations to derive the binomial theorem.
Combinatorics is an upper-level introductory course in enumeration, graph theory, and design theory.
his book is an introduction to combinatorial mathematics, also known as combinatorics. The book focuses especially but not exclusively on the part of combinatorics that mathematicians refer to as “counting.” The book consists almost entirely of problems. Some of the problems are designed to lead you to think about a concept, others are designed to help you figure out a concept and state a theorem about it, while still others ask you to prove the theorem. Other problems give you a chance to use a theorem you have proved. From time to time there is a discussion that pulls together some of the things you have learned or introduces a new idea for you to work with. Many of the problems are designed to build up your intuition for how combinatorial mathematics works. There are problems that some people will solve quickly, and there are problems that will take days of thought for everyone. Probably the best way to use this book is to work on a problem until you feel you are not making progress and then go on to the next one. Think about the problem you couldn’t get as you do other things. The next chance you get, discuss the problem you are stymied on with other members of the class. Often you will all feel you’ve hit dead ends, but when you begin comparing notes and listening carefully to each other, you will see more than one approach to the problem and be able to make some progress. In fact, after comparing notes you may realize that there is more than one way to interpret the problem. In this case your first step should be to think together about what the problem is actually asking you to do. You may have learned in school that for every problem you are given, there is a method that has already been taught to you, and you are supposed to figure out which method applies and apply it. That is not the case here. Based on some simplified examples, you will discover the method for yourself. Later on, you may recognize a pattern that suggests you should try to use this method again.
In this course students will learn about Noetherian rings and modules, Hilbert basis theorem, Cayley-Hamilton theorem, integral dependence, Noether normalization, the Nullstellensatz, localization, primary decomposition, DVRs, filtrations, length, Artin rings, Hilbert polynomials, tensor products, and dimension theory.
This website is a unique advanced-level comprehensive self-study source for statistical time series analysis, which introduces two major paradigm shifts initiated in the recent past and provides access to all the literature required to become an accomplished scholar in this subject area,
This course is offered to graduates and is a project-oriented course to teach new methodologies for designing multi-million-gate CMOS VLSI chips using high-level synthesis tools in conjunction with standard commercial EDA tools. The emphasis is on modular and robust designs, reusable modules, correctness by construction, architectural exploration, and meeting the area, timing, and power constraints within standard cell and FPGA frameworks.
In this exercise, students use whole-rock major- and trace-element compositions of volcanic rocks to explore the origins of compositional variation in igneous suites. Large datasets from the Yellowstone and Crater Lake calderas are downloaded from the GEOROC database, imported into Excel spreadsheets, and graphed to learn about the different petrogeneses of these two volcanic suites.
(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)
6.844 is a graduate introduction to programming theory, logic of programming, and computability, with the programming language Scheme used to crystallize computability constructions and as an object of study itself. Topics covered include: programming and computability theory based on a term-rewriting, “substitution” model of computation by Scheme programs with side-effects; computation as algebraic manipulation: Scheme evaluation as algebraic manipulation and term rewriting theory; paradoxes from self-application and introduction to formal programming semantics; undecidability of the Halting Problem for Scheme; properties of recursively enumerable sets, leading to Incompleteness Theorems for Scheme equivalences; logic for program specification and verification; and Hilbert’s Tenth Problem.
Topics in surface modeling: b-splines, non-uniform rational b-splines, physically based deformable surfaces, sweeps and generalized cylinders, offsets, blending and filleting surfaces. Non-linear solvers and intersection problems. Solid modeling: constructive solid geometry, boundary representation, non-manifold and mixed-dimension boundary representation models, octrees. Robustness of geometric computations. Interval methods. Finite and boundary element discretization methods for continuum mechanics problems. Scientific visualization. Variational geometry. Tolerances. Inspection methods. Feature representation and recognition. Shape interrogation for design, analysis, and manufacturing. Involves analytical and programming assignments.
This course was originally offered in Course 13 (Department of Ocean Engineering) as 13.472J. In 2005, ocean engineering subjects became part of Course 2 (Department of Mechanical Engineering), and this course was renumbered 2.158J.