The theoretical frameworks of Hartree-Fock theory and density functional theory are presented …
The theoretical frameworks of Hartree-Fock theory and density functional theory are presented in this course as approximate methods to solve the many-electron problem. A variety of ways to incorporate electron correlation are discussed. The application of these techniques to calculate the reactivity and spectroscopic properties of chemical systems, in addition to the thermodynamics and kinetics of chemical processes, is emphasized. This course also focuses on cutting edge methods to sample complex hypersurfaces, for reactions in liquids, catalysts and biological systems.
This course is an introduction to principles and techniques of visual communication, …
This course is an introduction to principles and techniques of visual communication, and provides opportunities for science and engineering majors to acquire practical skills in the visual computer arts, in a studio environment. Students will learn how to create graphics for print and web, animations, and interactive media, and how to use these techniques to effectively communicate scientific and engineering concepts for learning and teaching. This class involves three hands-on creative projects, which will be presented in class.
Through ongoing partnership with teachers across New York City, New Visions has …
Through ongoing partnership with teachers across New York City, New Visions has developed this course map for a high school biology course fully designed to the Next Generation Science Standards (NGSS) and the New York State Science Learning Standards (NYSSLS). Each unit follows a common structure: students engage with an anchor phenomenon and develop questions; go through sequences of learning and sense-making to develop and iterate on answers to those questions; then complete a three-dimensional performance task.
This unit explores Performance Expectations MS- LS2-4, LS2-5 by having students collect …
This unit explores Performance Expectations MS- LS2-4, LS2-5 by having students collect local ecosystems data with a variety of computational tools: pH sensors, turbidity, oxygen levels and temperature – and to develop a presentation to communicate how and why their stream is a healthy habitat, or not!
Students encounter people who are computer scientists, and they learn definitions of …
Students encounter people who are computer scientists, and they learn definitions of computer science. Students learn the difference between input and output devices, and they creatively invent a new device that combines input and output.
This book is intended for use by future teachers, written from the …
This book is intended for use by future teachers, written from the perspective of students who have taken Science Methods II. The student authors gathered and created resources to help prospective elementary cience teachers better understand science and feel confident in your abilities as a future teacher. This book is divided into five parts which align with the Science Methods II course:
Physics Space Science Earth Science Climate Science Course Materials and Pedagogy
Within each part, the material is broken down into smaller chapters. Here you will find written explanations, video links, glossary terms, key takeaways, and practice quizzes to help you understand the material. This book is designed to be a flexible resource; use it as much or as little as you need throughout the course.
This course focuses on science and technology policy—it will examine the science …
This course focuses on science and technology policy—it will examine the science and technology innovation system, including case studies on energy, computing, advanced manufacturing, and health sectors, with an emphasis on public policy and the federal government’s role in that system.
Students download the software needed to create Arduino programs and make sure …
Students download the software needed to create Arduino programs and make sure their Arduino microcontrollers work correctly. Then, they connect an LED to the Arduino and type up and upload programs to the Arduino board to 1) make the LED blink on and off and 2) make the LED fade (brighten and then dim). Throughout, students reflect on what they've accomplished by answering questions and modifying the original programs and circuits in order to achieve new outcomes. A design challenge gives students a chance to demonstrate their understanding of actuators and Arduinos; they design a functioning system using an Arduino, at least three actuators and either a buzzer or toy motor. For their designs, students sketch, create and turn in a user's manual for the system (text description, commented program, detailed hardware diagram). Numerous worksheets and handouts are provided.
Short Description: This book explores the history, present, and future of library …
Short Description: This book explores the history, present, and future of library science, both in theory and in practice. It examines the place of the librarian as arbiter of information access in a constantly-changing and modernizing global community.
Word Count: 24034
(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)
As technology becomes ever integrated into our food system and everyday life, …
As technology becomes ever integrated into our food system and everyday life, our food industry and supply become ever more vulnerable to attack. Cyber attacks continue to threaten large and small companies, government agencies, individuals, and food and agriculture. This module, ‘Securing the Food Industry,’ aims to introduce the idea of cyberbiosecurity through a lecture format along with three case studies allowing students to interact and think through the concepts and materials. This module was built for implementation into college level courses with connection or interest in the food industry, food science, and agriculture as well as and technology courses focused on real world applications. The lecture starts by introducing the amount of technology in food science and the food industry then transitions into concerns about security. After discussing multiple subtypes of security already integrated into the food industry, cyberbiosecurity is introduced. The term and definition are discussed before the categories of cyber attacks are introduced. The lecture relates these ideas back to the food industry before sharing a few real-life examples of detrimental cyber-attacks. The lecture concludes are explain the impact a cyber attack can cause, who is responsible for preventing and recovering from these attacks, as well as suggested practices to reduce vulnerabilities. Three theoretical but realistic case studies with discussion questions follow the lecture. These studies were written to act as small group discussion starters but could be used for whole class discussion, individual writing assignments, or other applications. A list of additional resources can be found with the course material. This list provides a small sampling of additional documents which discuss cyberbiosecurity. The resources listed at the end of the lecture are not included in the additional resources document but also provide helpful information in the exploration and understanding of cyberbiosecurity. Food science resources are also included in this document to provide additional background around the food industry portion of this course material.
Securing the Food Industry is an open educational resource (OER). Instructors reviewing, adopting, or adapting the module should indicate their interest at https://forms.gle/orFRGhYs8owBP7gD6.
In this lesson, students will explore the accelerometer and its capabilities. They’ll …
In this lesson, students will explore the accelerometer and its capabilities. They’ll become familiar with its events and properties, as well as create multiple programs utilizing the accelerometer similar to those they’ve likely come across in real world applications.
In this video from Science City, meet Eduardo Torres-Jara, a postdoctoral associate …
In this video from Science City, meet Eduardo Torres-Jara, a postdoctoral associate in electrical engineering and computer science at the MIT Artificial Intelligence Lab. He describes his work on innovative robots that use tactile feedback to locate and grasp objects.
PhET provides fun, free, interactive, research-based science and mathematics simulations. We extensively …
PhET provides fun, free, interactive, research-based science and mathematics simulations. We extensively test and evaluate each simulation to ensure educational effectiveness. These tests include student interviews and observation of simulation use in classrooms. The simulations are written in Java, Flash or HTML5, and can be run online or downloaded to your computer. All simulations are open source (see our source code). Multiple sponsors support the PhET project, enabling these resources to be free to all students and teachers.
Ongoing technological developments have made it easier than ever before for scientists …
Ongoing technological developments have made it easier than ever before for scientists to share their data, materials, and analysis code. Sharing data and analysis code makes it easier for other researchers to re-use or check published research. These benefits will only emerge if researchers can reproduce the analysis reported in published articles, and if data is annotated well enough so that it is clear what all variables mean. Because most researchers have not been trained in computational reproducibility, it is important to evaluate current practices to identify practices that can be improved. We examined data and code sharing, as well as computational reproducibility of the main results, without contacting the original authors, for Registered Reports published in the psychological literature between 2014 and 2018. Of the 62 articles that met our inclusion criteria, data was available for 40 articles, and analysis scripts for 37 articles. For the 35 articles that shared both data and code and performed analyses in SPSS, R, Python, MATLAB, or JASP, we could run the scripts for 31 articles, and reproduce the main results for 20 articles. Although the articles that shared both data and code (35 out of 62, or 56%) and articles that could be computationally reproduced (20 out of 35, or 57%) was relatively high compared to other studies, there is clear room for improvement. We provide practical recommendations based on our observations, and link to examples of good research practices in the papers we reproduced.
In Bootstrap:Data Science, students form their own questions about the world around …
In Bootstrap:Data Science, students form their own questions about the world around them, analyze data using multiple methods, and write a research paper about their findings. The module covers functions, looping and iteration, data visualization, linear regression, and more. Social studies, science, and business teachers can utilize this module to help students make inferences from data. Math teachers can use this module to introduce foundational concepts in statistics, and it is aligned to state and national standards.
Computational analyses are playing an increasingly central role in research. Journals, funders, …
Computational analyses are playing an increasingly central role in research. Journals, funders, and researchers are calling for published research to include associated data and code. However, many involved in research have not received training in best practices and tools for sharing code and data. This course aims to address this gap in training while also providing those who support researchers with curated best practices guidance and tools.This course is unique compared to other reproducibility courses due to its practical, step-by-step design. It is comprised of hands-on exercises to prepare research code and data for computationally reproducible publication. Although the course starts with some brief introductory information about computational reproducibility, the bulk of the course is guided work with data and code. Participants move through preparing research for reuse, organization, documentation, automation, and submitting their code and data to share. Tools that support reproducibility will be introduced (Code Ocean), but all lessons will be platform agnostic.Level: IntermediateIntended audience: The course is targeted at researchers and research support staff who are involved in the preparation and publication of research materials. Anyone with an interest in reproducible publication is welcome. The course is especially useful for those looking to learn practical steps for improving the computational reproducibility of their own research.
The student compiles oil field well data, including spatial locations and digital …
The student compiles oil field well data, including spatial locations and digital well logs, for analysis of subsurface, oil reservoir stratigraphy and lithology using computer spatial technologies software, Geoplus Petra. The students create well log cross sections, make lithologic picks, construct structure and isopach maps, and evaluate lithologic properties, including gross reservoir quality from petrophysical logs. These data are used to interpret depositional environment of the subject formation and make predictions for well bore perforations for oil production. The key value of the exercise is an introduction to the use of computer software to analyze geological data, guided by sedimentologic and stratigraphic insights, and make predictions for resource exploitation.
(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)
8th Grade Science teacher Peter Hill from King Middle School in Maine …
8th Grade Science teacher Peter Hill from King Middle School in Maine shares a quick strategy tool and strategy he refers to as "word cloud". The "word cloud" is generated by a computer program that takes words from an article and generates a "cloud" with different sizes of words with the size emphasizing the frequency of the word. Mr. Hill uses this as a quick pre-reading activity to increase curiosity and engagement and to have students anticipate what the article or essay is about and what the main idea is. Teachers might also consider a twist to this idea and have student groups create their own word cloud after reading a selected text.11
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.