Search Results (706)

View
Selected filters:
  • Computer Science
4 Corner Soccer
Conditions of Use:
Remix and Share
Rating

Great lead up game for soccer. It is a way for students to practice the skills they have learned, and practiced. Easier way to assess students, because of smaller numbers on the move.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Meaghen Ayers
Date Added:
11/16/2018
Activity Tracker Improvement
Conditions of Use:
No Strings Attached
Rating

In this project, students will start by discussing the strengths and weaknesses of existing activity trackers and determining the variables that affect the accuracy of these trackers. Students will then conduct interviews with people who wear activity trackers or wear a tracker themselves for a week to determine the pros, cons, and accuracies of the trackers. Then, codes and algorithms will be used to determine what should count as the threshold for a step to achieve maximum tracker accuracy by using Sparkfun Inventor's Kit, Raspberry Pi, and Linux.

Subject:
Computer Science
Material Type:
Lesson Plan
Author:
Marie Caniglia
Advanced Algorithms, Fall 2008
Conditions of Use:
Remix and Share
Rating

" This is a graduate course on the design and analysis of algorithms, covering several advanced topics not studied in typical introductory courses on algorithms. It is especially designed for doctoral students interested in theoretical computer science."

Subject:
Computer Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Goemans, Michel
Date Added:
01/01/2008
Advanced Artificial Intelligence
Conditions of Use:
Read the Fine Print
Rating

This course will present advanced topics in Artificial Intelligence (AI), including inquiries into logic, artificial neural network and machine learning, and the Turing machine. Upon successful completion of this course, students will be able to: define the term 'intelligent agent,' list major problems in AI, and identify the major approaches to AI; translate problems into graphs and encode the procedures that search the solutions with the graph data structures; explain the differences between various types of logic and basic statistical tools used in AI; list the different types of learning algorithms and explain why they are different; list the most common methods of statistical learning and classification and explain the basic differences between them; describe the components of Turing machine; name the most important propositions in the philosophy of AI; list the major issues pertaining to the creation of machine consciousness; design a reasonable software agent with java code. (Computer Science 408)

Subject:
Computer Science
Philosophy
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
11/16/2011
Advanced Circuit Techniques, Spring 2002
Conditions of Use:
Remix and Share
Rating

Following a brief classroom discussion of relevant principles, each student completes the paper design of several advanced circuits such as multiplexers, sample-and-holds, gain-controlled amplifiers, analog multipliers, digital-to-analog or analog-to-digital converters, and power amplifiers. One of each student's designs is presented to the class, and one may be built and evaluated. Associated laboratory emphasizing the use of modern analog building blocks. Alternate years.

Subject:
Computer Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Roberge, Jim
Date Added:
01/01/2002
Advanced Computer Organisation Architecture
Conditions of Use:
No Strings Attached
Rating

This course introduces students to Advanced Computer Organization and Architecture. Where architecture is a term used to describe the attributes of a system as seen by the programmer. Its concerned with designs and operations of a computer. Computer organization is the way the system is structured so that all those cataloged tools can be used, and that in an efficient fashion. This course has its emphasis on system design and performance.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Harrison Njoroge
Date Added:
02/22/2018
Advanced Computer Security
Conditions of Use:
No Strings Attached
Rating

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Richard Musabe
Date Added:
04/20/2018
Advanced Database Systems
Conditions of Use:
No Strings Attached
Rating

At the heart of any major system is a data storage back-end. This back-end is what is refered to as a database. Taking that a database forms the core of systems, there is every need for the data to have integrity and also available for use. Database systems when well designed will ensure the system achieves those goals. Persons with skills to develop and manage these databases are therefore vital in modern day systems. The course principals of Database Systems is needed to help provide the competencies and skills needed by entry-level systems analyst or programmers. This course is about understanding and developing application logic in databases.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
John Kandiri
Date Added:
02/22/2018
Advanced Databases
Conditions of Use:
Read the Fine Print
Rating

This course will expand upon SQL as well as other advanced topics, including query optimization, concurrency, data warehouses, object-oriented extensions, and XML. Additional topics covered in this course will help you become more proficient in writing queries and will expand your knowledge base so that you have a better understanding of the field. Upon successful completion of this course, the student will be able to: write complex queries, including full outer joins, self-joins, sub queries, and set theoretic queries; write stored procedures and triggers; apply the principles of query optimization to a database schema; explain the various types of locking mechanisms utilized within database management systems; explain the different types of database failures as well as the methods used to recover from these failures; design queries against a distributed database management system; perform queries against database designed with object-relational extensions; develop and query XML files. (Computer Science 410)

Subject:
Computer Science
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
11/16/2011
Advanced Topics in Cryptography, Spring 2003
Conditions of Use:
Remix and Share
Rating

Recent results in cryptography and interactive proofs. Lectures by instructor, invited speakers, and students. Alternate years. The topics covered in this course include interactive proofs, zero-knowledge proofs, zero-knowledge proofs of knowledge, non-interactive zero-knowledge proofs, secure protocols, two-party secure computation, multiparty secure computation, and chosen-ciphertext security.

Subject:
Computer Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Micali, Silvio
Date Added:
01/01/2003
Advanced Web Technologies
Conditions of Use:
Remix and Share
Rating

This course will cover an introduction to XML and it provides a hands-on experience of creating XML Documents using Schema, Namespaces, XSLT and XPath. It covers how to work with JQuery and implementation of AJAX using XML and JSON.

Subject:
Computer Science
Material Type:
Full Course
Author:
ABDUL RAHIMAN SHAIK KODAVENDLA
Date Added:
10/29/2018
Adventures in Advanced Symbolic Programming, Spring 2009
Conditions of Use:
Remix and Share
Rating

" This course covers concepts and techniques for the design and implementation of large software systems that can be adapted to uses not anticipated by the designer. Applications include compilers, computer-algebra systems, deductive systems, and some artificial intelligence applications. Topics include combinators, generic operations, pattern matching, pattern-directed invocation, rule systems, backtracking, dependencies, indeterminacy, memoization, constraint propagation, and incremental refinement. Substantial weekly programming Assignments and Labs are an integral part of the subject. There will be extensive programming Assignments and Labs, using MIT/GNU Scheme. Students should have significant programming experience in Scheme, Common Lisp, Haskell, CAML or some other "functional" language."

Subject:
Computer Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Sussman, Gerald
Date Added:
01/01/2009
Agent Based Modeling of Complex Adaptive Systems (Advanced)
Conditions of Use:
Remix and Share
Rating

Building on Complex Adaptive Systems theory and basic Agent Based Modeling knowledge presented in SPM4530, the Advanced course will focus on the model development process. The students are expected to conceptualize, develop and verify a model during the course, individually or in a group. The modeling tasks will be, as much as possible, based on real life research problems, formulated by various research groups from within and outside the faculty.
Study Goals The main goal of the course is to learn how to form a modeling question, perform a system decomposition, conceptualize and formalize the system elements, implement and verify the simulation and validate an Agent Based Model of a socio-technical system.

Subject:
Computer Science
Material Type:
Full Course
Provider:
Delft University of Technology
Provider Set:
Delft University OpenCourseWare
Author:
Dr. Ir. I. Nikolic
Date Added:
03/03/2016
The Alan Walks Wales Dataset: Quantified self and open data
Conditions of Use:
Remix and Share
Rating

This case study describes the educational use of an open dataset collected as part of a thousand mile research walk. The content connects to many hot topics including quantified self, privacy, biosensing, mobility and the digital divide, so has an immediate interest to students. It includes inter-linkable qualitative and quantitative data, in a variety of specialist and general formats, so offers a variety of technical challenges including visualisation and data mining as well. Finally, it is raw data with all the glitches, gaps and problems attached to this.

The case study draws on experience in two educational settings: the first with a group of computer science and interaction design masters students in class-based discussions run by the first author; the second a computer science bachelor's project supervised by the second author.

Subject:
Computer Science
Material Type:
Case Study
Author:
Alan Dix
Geoffrey Ellis
Date Added:
04/09/2019
Algorithim Design and Analysis
Conditions of Use:
No Strings Attached
Rating

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

This course aim to provide an in-depth understanding of the fundamental algorithmic techniques for design and analysis, in turn impart knowledge and practical competence in use of advanced data structures and the design and analysis of algorithms.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Godfry Justo
Date Added:
02/22/2018
Algorithim Design and Analysis
Conditions of Use:
No Strings Attached
Rating

There are both practical and theoretical reasons to study algorithms. From a practical standpoint, you have to know a standard set of important algorithms from different areas of computing; in addition, you should be able to design new algorithms and analyze their efficiency. From the theoretical standpoint, the study of algorithms, sometimes called algorithmics, has come to be as the cornerstone of computer science.

This course aim to provide an in-depth understanding of the fundamental algorithmic techniques for design and analysis, in turn impart knowledge and practical competence in use of advanced data structures and the design and Welcome to Advanced computer Security Module. This module provides a study of high-level computer security issues in computer networks and advanced methods of data encryption. It focuses on advanced aspects of computer security, such as encryption, security practices, system security, security for authentication on the Web and password management techniques. Finally this module, students should be able to create secure network architectures adapted to the investment level and required security. Take responsibility for installation, configuration and network security maintenance.

The module aims to give IT infrastructure management skills, where the role of computer security is critical to ensure the integrity of data and the normal operation of the various systems: computer networks, servers and personal computers in the organization. The course will also explore various Information Security controls, how to handle various risk assessment in an organization and finally creating a security policy in organization.

Today, we note that the information is considered the key business of an organization / company due to its usefulness and importance, however, the issue of the company’s Information Security is a priority task for managers, because they recognize the value it has and therefore organizations must make sure that it is managed effectively. For this reason, this module is important because you will learn the methods and tools for computer security that can ensure the confidentiality of information in organizations and also learn how to protect their information and systems in a network environment.

Subject:
Computer Science
Material Type:
Module
Provider:
African Virtual University
Provider Set:
OER@AVU
Author:
Richard Musabe
Date Added:
02/22/2018