Learn the fundamentals of machine learning to help you correctly apply various …
Learn the fundamentals of machine learning to help you correctly apply various classification and regression machine learning algorithms to real-life problems.
A one-stop shop to get started on the key considerations about data …
A one-stop shop to get started on the key considerations about data for AI! Learn how crowdsourcing offers a viable means to leverage human intelligence at scale for data creation, enrichment and interpretation, demonstrating a great potential to improve both the performance of AI systems and their trustworthiness and increase the adoption of AI in general.
Women at NASA are doing some A-MAZE-ING things! Challenge your puzzle skills …
Women at NASA are doing some A-MAZE-ING things! Challenge your puzzle skills and learn about women at NASA making a mark in science, technology, engineering and mathematics. Celebrate their accomplishments with these printable worksheets.
Student groups create working radios by soldering circuit components supplied from AM …
Student groups create working radios by soldering circuit components supplied from AM radio kits. By carrying out this activity in conjunction with its associated lesson concerning circuits and how AM radios work, students are able to identify each circuit component they are soldering, as well as how their placement causes the radio to work. Besides reinforcing lesson concepts, students also learn how to solder, which is an activity that many engineers perform regularly giving students a chance to be able to engage in a real-life engineering activity.
this document contains usses of polymers in various parts of the automobile …
this document contains usses of polymers in various parts of the automobile and respective examples with the requirement of material to make product and polymers selected with similar properties.
In the last two decades, research in various aspects of mobile ad-hoc …
In the last two decades, research in various aspects of mobile ad-hoc networks, MANETs, has been very active, motivated mainly by military, disaster relief and law enforcement scenarios. More recently, location information has become increasingly available; partially prompted by the emerging trend to incorporate location or position sensing into personal handheld devices. An evolutionary natural step is to adopt such position-based operation in MANETs. This results in what we call position-based MANETs. In such settings, devices are equipped with position-sensing capabilities and rely on position information in their operation. The main distinguishing feature of the envisaged position-based MANET environment is the communication paradigm based not on permanent or semi-permanent identities, addresses or pseudonyms, but on instantaneous node locations or positions. In some application settings, such as: military, law enforcement and search-and-rescue, node identities are not nearly as important as node positions. Such settings have certain characteristics in common. First, node position is very important: knowledge of the physical, as opposed to logical or relative topology, makes it possible to avoid wasteful communication and focus on nodes located within a specific area. Thus, the emphasis is not on the longterm node identity, but rather on current node position. Second, critical environments face security and privacy attacks. Security attacks aim to distribute false location and network ing control information, e.g., routing control messages, or impede the propagation of genuine information. The goal of privacy attacks is to track nodes as they move. Third, when the operating environment is hostile, as is the case in military and law enforcement settings, node identities must not be revealed. We use the term hostile to mean that communication is being monitored by adversarial entities that are not part of the MANET. The need to hide node identities becomes more pressing if we further assume that MANET nodes do not trust each other, due to a suspicious environment where nodes can be compromised. In such an environment, it is natural for node movements to be obscured, such that tracking a given node is impossible or, at least, very difficult. While we do not claim that such suspicious and hostile location-based MANET environments are commonplace, they do occur and require high security and privacy guarantees. While doing all these;there is a challenge for nodes to maintain anonymity protection from outside observers or malicious attackers. Full anonymity protection can be achieved only when ;sources,destinations and routes all are protected. In this work, to offer better anonymity protection, we propose an Anonymous Position-based Security Aware Routing Protocol (APSAR). Experimental results exhibit consistency with the theoretical analysis, and show that APSAR achieves better route anonymity protection compared to other anonymous routing protocols. Also, APSAR achieves comparable routing efficiency to the GPSR geographical routing protocol. The work in this thesis addresses a number of security and privacy issues arising in position-based MANETs. models. We address the problem of position based security aware routing in consideration with better anonymity protection .
This book was created to support Project 677 in APSC 100 in …
This book was created to support Project 677 in APSC 100 in the Faculty of Engineering at Queen’s University during the winter term of 2019, and is being updated and expanded to support Project 725 in Winter 2021. It provides a publicly visible collection of information that will help with this design project. Use of these resources elsewhere under the CC license is encouraged, but not supported. The contents of this book will grow and change over the term. Please fell free to add your comments or questions in any of the sections and I will try to address them.
The resources in this book are not comprehensive and are only intended to provide a starting point to explore design options. In particular, there will be many examples illustrated by single products that are not the only, or even the best solutions for a particular application. You will need to go well beyond the contents of this book to make your independent design decisions.
The models used for building heat transfer are very much simplified for an introduction to the ideas and should be used cautiously. Design of actual building systems should be undertaken in much greater detail. The target here is to use models that don’t require you to learn any new physics.
The secondary reason this book exists is to give me some practice using PressBooks to develop Open Educational Resources (OER). Some of the files that are linked from this book are on Google Drive, and some are on GitHub.
Word Count: 13755
(Note: This resource's metadata has been created automatically as part of a bulk import process by reformatting and/or combining the information that the author initially provided. As a result, there may be errors in formatting.)
For students interested in studying biomechanical engineering, especially in the field of …
For students interested in studying biomechanical engineering, especially in the field of surgery, this lesson serves as an anatomy and physiology primer of the abdominopelvic cavity. Students are introduced to the abdominopelvic cavity—a region of the body that is the focus of laparoscopic surgery—as well as the benefits and drawbacks of laparoscopic surgery. Understanding the abdominopelvic environment and laparoscopic surgery is critical for biomechanical engineers who design laparoscopic surgical tools.
You will present students with a challenge: build a structure from different …
You will present students with a challenge: build a structure from different materials that will protect a model of the Ares launch vehicles (a raw egg) from the heat of a propane torch for as long as possible. Then they design, build, test, and revise their own thermal protection systems. They document their designs with sketches and written descriptions. As a culmination, students compile their results into a poster and present them to the class.
This activity explores the concepts of energy transfer with the following standards: • Energy is a property of many substances and is associated with heat and light. • Heat moves in predictable ways, flowing from warmer objects to cooler ones, until both reach the same temperature.
This activity focuses on getting the students to think about disabilities and …
This activity focuses on getting the students to think about disabilities and how they can make some aspects of life more difficult. The students are asked to pick a disability and design a new kind of sport for it.
Students learn about the concepts of accuracy and approximation as they pertain …
Students learn about the concepts of accuracy and approximation as they pertain to robotics, gain insight into experimental accuracy, and learn how and when to estimate values that they measure. Students also explore sources of error stemming from the robot setup and rounding numbers.
At this point in the unit, students have learned about Pascal's law, …
At this point in the unit, students have learned about Pascal's law, Archimedes' principle, Bernoulli's principle, and why above-ground storage tanks are of major concern in the Houston Ship Channel and other coastal areas. In this culminating activity, student groups act as engineering design teams to derive equations to determine the stability of specific above-ground storage tank scenarios with given tank specifications and liquid contents. With their floatation analyses completed and the stability determined, students analyze the tank stability in specific storm conditions. Then, teams are challenged to come up with improved storage tank designs to make them less vulnerable to uplift, displacement and buckling in storm conditions. Teams present their analyses and design ideas in short class presentations.
Students are provided with an introduction to above-ground storage tanks, specifically how …
Students are provided with an introduction to above-ground storage tanks, specifically how and why they are used in the Houston Ship Channel. The introduction includes many photographic examples of petrochemical tank failures during major storms and describes the consequences in environmental pollution and costs to disrupted businesses and lives, as well as the lack of safety codes and provisions to better secure the tanks in coastal regions regularly visited by hurricanes. Students learn how the concepts of Archimedes' principle and Pascal's law act out in the form of the uplifting and buckling seen in the damaged and destroyed tanks, which sets the stage for the real-world engineering challenge presented in the associated activity to design new and/or improved storage tanks that can survive storm conditions.
This video segment adapted from First Light explains why the highest peak …
This video segment adapted from First Light explains why the highest peak in the Pacific, Mauna Kea, is an ideal site for astronomical observations. Featured are new telescope technologies that allow astronomers to explore the universe in more depth.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.