Updating search results...

Search Resources

4139 Results

View
Selected filters:
  • Module
AI & Dance
Unrestricted Use
CC BY
Rating
0.0 stars

Description: Students play with an AI that can react to their movement, and choreograph something that uses this tool. They can show off their choreography to the rest of the class
Skills/knowledge you'll gain: Movement, collaboration
Length: 1-4 hours

Curriculum aligns to:
- NGSS Engineering standards
- ISTE standards
- Common Core ELA/Literacy standards
- Also maps to CSTA standards

Subject:
Applied Science
Computer Science
Mathematics
Measurement and Data
Material Type:
Lesson
Module
Provider:
ai-4-all.org
Provider Set:
Byte of AI
Date Added:
04/03/2024
AI & Deepfakes
Unrestricted Use
CC BY
Rating
0.0 stars

Description: AI can create realistic-looking images and videos that were never actually filmed or taken as a photo. These images and videos are called deepfakes. This is a quick lesson requiring no background where students learn about deepfakes, as well as ways to verify information that they see
Skills/knowledge you'll gain: Critical thinking
Length: 1 hour

Curriculum aligns to:
- NGSS Engineering standards
- ISTE standards
- Common Core ELA/Literacy standards
- Also maps to CSTA standards

Subject:
Applied Science
Computer Science
Mathematics
Measurement and Data
Material Type:
Lesson
Module
Provider:
ai-4-all.org
Provider Set:
Byte of AI
Date Added:
04/03/2024
AI & Drawing
Unrestricted Use
CC BY
Rating
0.0 stars

Description: A quick and fun way to become familiar with some core ideas of modern AI while playing with Google Quick, Draw
Skills/knowledge you'll gain: Understanding of what AI is, privacy and bias concerns
Length: 1 hour

Curriculum aligns to:
- NGSS Engineering standards
- ISTE standards
- Common Core ELA/Literacy standards
- Also maps to CSTA standards

Subject:
Applied Science
Computer Science
Mathematics
Measurement and Data
Material Type:
Lesson
Module
Provider:
ai-4-all.org
Provider Set:
Byte of AI
Date Added:
04/03/2024
AI & Ethics
Unrestricted Use
CC BY
Rating
0.0 stars

Description: An interactive deep dive into the sort of ethical concerns that companies creating AI based systems should consider. Students explore these ideas through role-playing running their own companies and making ethical decisions for those companies
Skills/knowledge you'll gain: Human-centered design, ethics
Length: 10 hours

Curriculum aligns to:
- NGSS Engineering standards
- ISTE standards
- Common Core ELA/Literacy standards
- Also maps to CSTA standards

Subject:
Applied Science
Computer Science
Mathematics
Measurement and Data
Material Type:
Lesson
Module
Provider:
ai-4-all.org
Provider Set:
Byte of AI
Date Added:
04/03/2024
AI & Facial Recognition
Unrestricted Use
CC BY
Rating
0.0 stars

Description: A short deep dive into how facial recognition technology is used, some biases it has, and some ways companies, individuals, and the law are fighting against its use in surveillance
Skills/knowledge you'll gain: Ethics
Length: 1 hour

Curriculum aligns to:
- NGSS Engineering standards
- ISTE standards
- Common Core ELA/Literacy standards
- Also maps to CSTA standards

Subject:
Applied Science
Computer Science
Mathematics
Measurement and Data
Material Type:
Lesson
Module
Provider:
ai-4-all.org
Provider Set:
Byte of AI
Date Added:
04/03/2024
AI Writing Prompts
Unrestricted Use
CC BY
Rating
0.0 stars

This resource includes traditional writing prompts as well as prompts and assignments that utilize AI-generated text. It covers the fields of Creative Writing, Composition, and Business and Technical Writing. 

Subject:
Business and Communication
Composition and Rhetoric
English Language Arts
Material Type:
Assessment
Full Course
Homework/Assignment
Lesson
Module
Student Guide
Textbook
Author:
Josh Brewer
Date Added:
03/21/2023
AI & the Environment
Unrestricted Use
CC BY
Rating
0.0 stars

Description: Learn how conservationists use AI image recognition to save time identifying how and where to protect endangered species. Build your own species-identifying AI system
Skills/knowledge you'll gain: Conservation
Length: 1-2 hours

Curriculum aligns to:
- NGSS Engineering standards
- ISTE standards
- Common Core ELA/Literacy standards
- Also maps to CSTA standards

Subject:
Applied Science
Computer Science
Mathematics
Measurement and Data
Material Type:
Lesson
Module
Provider:
ai-4-all.org
Provider Set:
Byte of AI
Date Added:
04/03/2024
ALTERNATIVE WAYS OF SHARING GOODS AND SERVICES
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This assignment is about exploring alternative ways of sharing goods and services and understanding the benefits, drawbacks, and implications of these methods. Students are asked to choose one of seven non-market distribution methods, such as majority rule, contests, force, first-come/first-served, sharing equally, lottery, and personal characteristics, and observe how it is implemented in real-life scenarios. They need to explain the distribution method, who benefits from it, who is excluded, and the advantages and disadvantages of using it. Students also have to find a real-life example of the chosen non-market distribution method, describe how it is used, and assess its fairness and efficiency. Lastly, they are required to include a citation and ensure their submission is no less than 180 words and comprises a list of cited works. The goal of the assignment is to better understand how goods and services are distributed and how these methods affect different groups of people.

Subject:
Cultural Geography
Economics
Finance
Marketing
Political Science
Psychology
Reading Informational Text
Material Type:
Homework/Assignment
Lesson
Module
Reading
Author:
Benjamin Troutman
Date Added:
03/13/2023
ANTH 106 American Mosaic
Unrestricted Use
CC BY
Rating
0.0 stars

In this class, we will explore America's diversity through questions of immigration, race, gender/sexuality and class--some of the major ways our culture is organized. It is comprised of 9 lessons based on online resources, plus 2 auto-ethnography assignments. This class was originally taught by Huma Mohibullah at Renton Technical College. 

Subject:
Anthropology
Ethnic Studies
Higher Education
Religious Studies
U.S. History
World Cultures
Material Type:
Homework/Assignment
Lesson
Module
Reading
Author:
Di Zhang
Youth High School Completion Renton Techincal College
Date Added:
05/23/2022
ANTH 234 Religion and Culture
Unrestricted Use
CC BY
Rating
0.0 stars

Religion is a significant aspect of human cultures everywhere. In these lessons, we explore questions such as: What are the main elements of religion? Why is believing in a higher power important to human beings across cultures? How is religion related to our social orders? How is religion related to the politics of today's world?This resource is comprised of 7 lessons based on online modules, plus a final presentation assignment. Each lesson includes a discussion or written assignment. This class was originally taught by Huma Mohibullah at Renton Technical College. 

Subject:
Anthropology
Religious Studies
World Cultures
Material Type:
Homework/Assignment
Lesson
Module
Reading
Author:
Di Zhang
Youth High School Completion Renton Techincal College
Date Added:
05/23/2022
APA Research and Formatting
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

A strong foundation in science (including this social science) has always been an essential element of post-secondary education. The current White House administration demonstrates that people are much more impressionable when they don't have the critical tools to question so-called experts. Critical analysis of research has always been integral to the sciences, but with so much misinformation coming out of those in power, it is more important than ever to have a strong background in science and research. 

Subject:
Psychology
Material Type:
Module
Author:
Ron Mossler
Date Added:
01/13/2019
A&P Identification PowerPoint Presentations
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Anatomy and Physiology Lab I slide decks created by Steven Lee M.S. Pathology, FTCC. The PowerPoints include labeled body images to assist students in identifying body parts. Nicole Shaw is only responsible for assisting Steven with licensing his work under an open license and uploading content to the Commons. 

Subject:
Anatomy/Physiology
Biology
Health, Medicine and Nursing
Higher Education
Material Type:
Module
Author:
Nicole Shaw
Date Added:
06/29/2018
APSAR: Anonymous Position Based Security Aware Routing Protocol for MANETs
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

In the last two decades, research in various aspects of mobile ad-hoc networks, MANETs, has been very active, motivated mainly by military, disaster relief and law enforcement scenarios. More recently, location information has become increasingly available; partially prompted by the emerging trend to incorporate location or position sensing into personal handheld devices. An evolutionary natural step is to adopt such position-based operation in MANETs. This results in what we call position-based MANETs. In such settings, devices are equipped with position-sensing capabilities and rely on position information in their operation. The main distinguishing feature of the envisaged position-based MANET environment is the communication paradigm based not on permanent or semi-permanent identities, addresses or pseudonyms, but on instantaneous node locations or positions. In some application settings, such as: military, law enforcement and search-and-rescue, node identities are not nearly as important as node positions. Such settings have certain characteristics in common. First, node position is very important: knowledge of the physical, as opposed to logical or relative topology, makes it possible to avoid wasteful communication and focus on nodes located within a specific area. Thus, the emphasis is not on the longterm node identity, but rather on current node position. Second, critical environments face security and privacy attacks. Security attacks aim to distribute false location and network ing control information, e.g., routing control messages, or impede the propagation of genuine information. The goal of privacy attacks is to track nodes as they move. Third, when the operating environment is hostile, as is the case in military and law enforcement settings, node identities must not be revealed. We use the term hostile to mean that communication is being monitored by adversarial entities that are not part of the MANET. The need to hide node identities becomes more pressing if we further assume that MANET nodes do not trust each other, due to a suspicious environment where nodes can be compromised. In such an environment, it is natural for node movements to be obscured, such that tracking a given node is impossible or, at least, very difficult. While we do not claim that such suspicious and hostile location-based MANET environments are commonplace, they do occur and require high security and privacy guarantees. While doing all these;there is a challenge for nodes to maintain anonymity protection from outside observers or malicious attackers. Full anonymity protection can be achieved only when ;sources,destinations and routes all are protected. In this work, to offer better anonymity protection, we propose an Anonymous Position-based Security Aware Routing Protocol (APSAR). Experimental results exhibit consistency with the theoretical analysis, and show that APSAR achieves better route anonymity protection compared to other anonymous routing protocols. Also, APSAR achieves comparable routing efficiency to the GPSR geographical routing protocol. The work in this thesis addresses a number of security and privacy issues arising in position-based MANETs. models. We address the problem of position based security aware routing in consideration with better anonymity protection .

Subject:
Engineering
Material Type:
Module
Author:
priyanka malgi
Sweta Parkhedkar
Date Added:
10/12/2017
ART70 Gallery Productions and the Art of Business Module for IDEA
Unrestricted Use
CC BY
Rating
0.0 stars

The Open for Antiracism (OFAR) Program – co-led by CCCOER and College of the Canyons – emerged as a response to the growing awareness of structural racism in our educational systems and the realization that adoption of open educational resources (OER) and open pedagogy could be transformative at institutions seeking to improve. The program is designed to give participants a workshop experience where they can better understand anti-racist teaching and how the use of OER and open pedagogy can empower them to involve students in the co-creation of an anti-racist classroom. The capstone project involves developing an action plan for incorporating OER and open pedagogy into a course being taught in the spring semester. OFAR participants are invited to remix this template to design and share their projects and plans for moving this work forward. 

Subject:
Education
Material Type:
Module
Author:
Sara Smallhouse
Date Added:
05/29/2023
AT Policies and best Practices
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

In this module we will provide a comprehensive description of the legal landscape of the assistive technology locally and on an international level as well as best practices.

Subject:
Applied Science
Law
Technology
Material Type:
Module
Author:
Mada Center
Date Added:
11/28/2023