ALAMOSE aims to educate undergraduate and graduate students on (i) what categories …
ALAMOSE aims to educate undergraduate and graduate students on (i) what categories of security weaknesses appear for artifacts used in DevOps, and (ii) how identified security weaknesses can be detected. ALAMOSE is funded by the U.S. National Science Foundation (NSF), and spearheaded by Akond Rahman at Auburn University. Please contact him with questions at akond@auburn.edu.
This article describes covert and overt active engagement strategies for use with …
This article describes covert and overt active engagement strategies for use with elementary students. Find the Question templates are included for use with informational text.
Students develop an app for an Android device that utilizes its built-in …
Students develop an app for an Android device that utilizes its built-in internal sensors, specifically the accelerometer. The goal of this activity is to teach programming design and skills using MIT's App Inventor software (free to download from the Internet) as the vehicle for learning. The activity should be exciting for students who are interested in applying what they learn to writing other applications for Android devices. Students learn the steps of the engineering design process as they identify the problem, develop solutions, select and implement a possible solution, test the solution and redesign, as needed, to accomplish the design requirements.
Courses on Artificial Intelligence (AI) and Librarianship in ALA-accredited Masters of Library …
Courses on Artificial Intelligence (AI) and Librarianship in ALA-accredited Masters of Library and Information (MLIS) degrees are rare. We have all been surprised by ChatGPT and similar Large Language Models. Generative AI is an important new area for librarianship. It is also developing so rapidly that no one can really keep up. Those trying to produce AI courses for the MLIS degree need all the help they can get. This book is a gesture of support. It consists of about 95,000 words on the topic, with a 3-400 item bibliography.
Explore some of the wonders of modern engineering in this video from …
Explore some of the wonders of modern engineering in this video from the Sciencenter in Ithaca, New York. Hear a diverse selection of engineers explain how things work.
In this activity, students will explore how the Law of Conservation of …
In this activity, students will explore how the Law of Conservation of Energy (the First Law of Thermodynamics) applies to atoms, as well as the implications of heating or cooling a system. This activity focuses on potential energy and kinetic energy as well as energy conservation. The goal is to apply what is learned to both our human scale world and the world of atoms and molecules.
Level I Microsoft Office Applications. Includes coverage of Windows, Microsoft Word, Excel, …
Level I Microsoft Office Applications. Includes coverage of Windows, Microsoft Word, Excel, and PowerPoint. Students apply problem techniques to complete a variety of projects, including integrating Office applications.
A computer is an automatic, electronic, data-processing machine that takes in facts …
A computer is an automatic, electronic, data-processing machine that takes in facts and figures known as data, and then processes or organizes it in some useful way. Afterwards it outputs, or displays, the results for you to see as information. Keep in mind that data is not information. Rather, information is the knowledge that you, the end-user, derive from accurate data that are entered into a computer. Only after processing, is data transformed into information which is then used for decision making. (Almost) each part of a computer can be classified as either hardware or software.
This book is part of the college course CIMW 207 Social Media …
This book is part of the college course CIMW 207 Social Media and Web Fundamentals currently offered at Saddleback College in Mission Viejo, CA and taught by Dr. Scot Trodick. This book can be viewed along with original social media and web fundamentals content which can be accessed by enrolling in CIMW 207 Social Media and Web Fundamentals offered at Saddleback College in Mission Viejo, CA and taught by Dr. Scot Trodick. Material from this course is not included in this open educational resource. Enrolling in the course CIMW 207 Social Media and Web Fundamentals at Saddleback College will provide full access to all materials or the content can be obtained directly from Bishop Publishing.
This Module forms part of the Henry Ford Corporate College Series on …
This Module forms part of the Henry Ford Corporate College Series on Cyber Intelligence and is accompanied by a Teaching Guide. The full range of materials includes teaching modules on cyber threat intelligence, threat hunting,MITRE and Diamond Frameworks, CARET, ATT&CK, collecting and processing data, assessments, slides, and other teaching tools that lecturers can adapt to their contexts, and integrate into existing college courses. The Module provides an outline for a 8 week class, but can be used for shorter or longer sessions.All teaching modules engage with existing academic research and debates, and may contain information, opinions and statements from a variety of sources, including press reports and independent experts. Links to external resources were tested at the time of publication. However, as third-party websites may change, please contact us if you come across a broken link or are redirected to inappropriate content. Please also inform us if you notice that a publication is linked to an unofficial version or website.
Learn about the Chandra X-Ray Observatory's telescope system, science instruments, and spacecraft …
Learn about the Chandra X-Ray Observatory's telescope system, science instruments, and spacecraft system in this interactive activity adapted from NASA.
This video from NASA describes the detailed computer modeling used to predict …
This video from NASA describes the detailed computer modeling used to predict that colliding neutron stars can produce gamma-ray bursts similar to those associated with black holes.
Students learn about complex networks and how to represent them using graphs. …
Students learn about complex networks and how to represent them using graphs. They also learn that graph theory is a useful mathematical tool for studying complex networks in diverse applications of science and engineering, such as neural networks in the brain, biochemical reaction networks in cells, communication networks, such as the internet, and social networks. Topics covered include set theory, defining a graph, as well as defining the degree of a node and the degree distribution of a graph.
Students gain experience with the software/system design process, closely related to the …
Students gain experience with the software/system design process, closely related to the engineering design process, to solve a problem. First, they learn about the Mars Curiosity rover and its mission, including the difficulties that engineers must consider and overcome to operate a rover remotely. Students observe a simulation of a robot being controlled remotely. These experiences guide discussion on how the design process is applied in these scenarios. The lesson culminates in a hands-on experience with the design process as students simulate the remote control of a rover. In the associated activity, students gain further experience with the design process by creating an Android application using App Inventor to control one aspect of a remotely controlled vehicle. (Note: The lesson requires a LEGO® MINDSTORMS® Education NXT base set.)
Cyberinfrastructure is a tightly integrated, planet-wide grid of computing, information, networking and …
Cyberinfrastructure is a tightly integrated, planet-wide grid of computing, information, networking and sensor resources which will enable individual researchers to have the power of the world's highest-performance digital resources at their disposal. NSF has funded or is exploring cyberinfrastructure-related projects designed to lead the scientific and engineering community in the coordinated development and expansive use of cyberinfrastructure.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.