Topics on the engineering and analysis of network protocols and architecture, including: …
Topics on the engineering and analysis of network protocols and architecture, including: architectural principles for designing heterogeneous networks; congestion control; unicast and multicast routing; wireless and mobile networking; network quality of service; router design; network security; streaming and multicast applications; naming; content distribution; and peer-to-peer networking. Readings from original research papers, industry white papers, and Internet RFCs. Semester-long project and paper.
This book is meant to provide you with an interactive experience as …
This book is meant to provide you with an interactive experience as you learn to program. You can read the text, watch videos, and write and execute Python code. In addition to simply executing code, there is a unique feature called codelens that allows you to control the flow of execution in order to gain a better understanding of how the program works.
Table of Contents: Scratch Reeborg Python - Getting Started Python - Turtle Drawings (Loops and Functions) Python - Functions in Detail Python - Micro:bit and More Functions Python - Image Processing Python - Strings Python - Lists Student-Directed Research End of Semester Review Computing and Society Career Exploration
This textbook covers the traditional introductory Computer Science I topics but takes …
This textbook covers the traditional introductory Computer Science I topics but takes a unique approach. Topics are covered in a language-agnostic manner in the first part with supplemental parts that cover the same concepts in a specific language. The current version covers C, Java, and PHP. This textbook as been used in several Computer Science I sections over multiple years at the University of Nebraska-Lincoln
This textbook covers the traditional introductory Computer Science I topics but takes …
This textbook covers the traditional introductory Computer Science I topics but takes a unique approach. Topics are covered in a language-agnostic manner in the first part with supplemental parts that cover the same concepts in a specific language. The current version covers C, Java, and PHP. This textbook as been used in several Computer Science I sections over multiple years at the University of Nebraska-Lincoln.
This course explores a variety of topics in computing, such as the …
This course explores a variety of topics in computing, such as the following: the components of a computer, common computer terminology, an introduction to the Internet, computer security and privacy, computer troubleshooting techniques, and steps to maintain the life of your computer.
This introductory class of computer skills is comprised of units that focus …
This introductory class of computer skills is comprised of units that focus on basic computer hardware and the following applications: Word 2010, Excel 2010, PowerPoint 2010, Photo Gallery, and Audacity. Most units begin with YouTube overviews or 'how to' presentations followed by step by step guides to using aspects of the application and then have assessment exercises and conclude with a final project for evaluation.
There is an increasing demand in the industry for graduates with problem …
There is an increasing demand in the industry for graduates with problem solving skills; those with the capability of applying the theories, methods and techniques learnt during their degree programme in solving real life problems. The goal behind applied computer science programme is to produce such graduates who can easily integrate into the industry immediately after college and become indispensable problem solvers. Another goal of the applied computer science programme is to produce entrepreneurs who can create opportunities and bring about innovative solutions. Knowing fully well the demand of the industry, Project 2 has been designed to help students consolidate the knowledge and skills acquired during the course of the degree programme by developing systems (hardware or software) that are applicable to the market. Such systems as a matter of fact should contribute by addressing gaps in the market and should mainly target areas that need solutions unique to the African region. This is not in any way to limit students’ horizon; they should think globally but be able also to customize their solutions to the region.
The primary goal of the course is to develop computer professionals able …
The primary goal of the course is to develop computer professionals able to explore the implications of what computing professionals create as part of their work and how this impacts society at large. It will help the learner to understand the development, application and consequences of computing technology in relation to society.
In this course, you will learn about the history of computing; principles, concepts and terminology of computing, software uses, application and development; role of computing professionals; current computing technologies and their use in everyday life, examination of variety of computing perspectives such as access to information, privacy, computer security, virtual society, transformation of work and workplace; social, ethical and legal issues and their implications to computing in our daily lives as a society; professional aspects of computing.
" This class explores interaction with mobile computing systems and telephones by …
" This class explores interaction with mobile computing systems and telephones by voice, including speech synthesis, recognition, digital recording, and browsing recorded speech. Emphasis on human interface design issues and interaction techniques appropriate for cognitive requirements of speech. Topics include human speech production and perception, speech recognition and text-to-speech algorithms, telephone networks, and spatial and time-compressed listening. Extensive reading from current research literature."
This course introduces cryptography by addressing topics such as ciphers that were …
This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that you complete an abstract algebra course (such as the Saylor FoundationĺÎĺ_ĺĚĺ_s MA231) before taking this course. Upon successful completion of this course, students will be able to: explain how symmetric and asymmetric key ciphers work; list and define cryptographyĺÎĺ_ĺĚĺ_s goals; list and define the most common classical ciphers; explain the workings of mechanical ciphers Enigma and Lorenz; describe the principles of substitution-permutation networks; describe the algorithms for data encryption and the advanced encryption standard; describe and use the MD5 and SHA-1 hash functions; explain the idea behind public key cryptography; use the RSA cryptography system by applying it to practical problems; test whether the large integer is prime with the mathematical tools presented in this course; define the elliptic curve and use it in cryptography; explain the Diffie-Hellman key exchange; describe the most common signature and autokey identity schemes; describe the conceptual workings of public key infrastructure. This free course may be completed online at any time. (Computer Science 409)
A perfect introduction to the exploding field of Data Science for the …
A perfect introduction to the exploding field of Data Science for the curious, first-time student. The author brings his trademark conversational tone to the important pillars of the discipline: exploratory data analysis, choices for structuring data, causality, machine learning principles, and introductory Python programming using open-source Jupyter Notebooks. This engaging read will allow any dedicated learner to build the skills necessary to contribute to the Data Science revolution, regardless of background.
Table of Contents 1 Introduction 2 A trip to Jupyter 3 Three kinds of atomic data 4 Memory pictures 5 Calculations 6 Scales of measure 7 Three kinds of aggregate data 8 Arrays in Python (1 of 2) 9 Arrays in Python (2 of 2) 10 Interpreting Data 11 Assoc. arrays in Python (1 of 3) 12 Assoc. arrays in Python (2 of 3) 13 Assoc. arrays in Python (3 of 3) 14 Loops 15 EDA: univariate 16 Tables in Python (1 of 3) 17 Tables in Python (2 of 3) 18 Tables in Python (3 of 3) 19 EDA: bivariate (1 of 2) 20 EDA: bivariate (2 of 2) 21 Branching 22 Functions (1 of 2) 23 Functions (2 of 2) 24 Recoding and transforming 25 Machine Learning: concepts 26 Classification: concepts 27 Decision trees (1 of 2) 28 Decision trees (2 of 2) 29 Evaluating a classifier
This course examines computers anthropologically, as artifacts revealing the social orders and …
This course examines computers anthropologically, as artifacts revealing the social orders and cultural practices that create them. Students read classic texts in computer science along with cultural analyses of computing history and contemporary configurations. It explores the history of automata, automation and capitalist manufacturing; cybernetics and WWII operations research; artificial intelligence and gendered subjectivity; robots, cyborgs, and artificial life; creation and commoditization of the personal computer; the growth of the Internet as a military, academic, and commercial project; hackers and gamers; technobodies and virtual sociality. Emphasis is placed on how ideas about gender and other social differences shape labor practices, models of cognition, hacking culture, and social media.
Progressively more, people and organizations depend on the availability of computer networks …
Progressively more, people and organizations depend on the availability of computer networks to carry out various activities such as professional, academic or leisure. Computer networks have become a critical piece of any information system.
Imagine a single computer without being connected to any other computer: this machine will only have access to your information (found on your Hard Disk) or information that may come from floppies, flashes, CD’s and DVD’s.
When a computer is connected to a computer network, you can have access to information that comes to you and to present information on other computers connected to the same network, allowing a much larger number of possible information to access through that computer. However, it must recognize that computer networks today have little to do with networks used for several years, taking advantage of technological advances in transmission capacity of the physical, logical means, processing capacity of the equipment and functionality of the protocols and applications.
Throughout the module will use the term “computer network” when we want to mention a collection of autonomous computers connected by a single technology. Two computers are interconnected when they can exchange information. The connection do not need to be made by a copper wire; they can also use optical fibers, microwaves, infrared waves, and communication satellites. There are networks in many sizes, shapes and forms, as we shall focus on.
“Every program depends on algorithms and data structures, but few programs depend …
“Every program depends on algorithms and data structures, but few programs depend on the invention of brand new ones.”! “I will, in fact, claim that the difference between a bad programmer and a good one is whether he considers his code or his data structures more important. Bad programmers worry about the code. Good programmers worry about data structures and their relationships.”!
This course introduces students to data structures and algorithms, and how data structures can be created and used. The application of data structures will be presented on the basis of various algorithms. This course teaches learners the way information is organized in the computer and which have an impact on the performance of the computer. The purpose of this course is to provide the students with solid foundations in the basic concepts of programming: data structures and algorithms. The main objective of the course is to teach the students how to select and design data structures and algorithms that are appropriate for problems that they might encounter. This course is also about showing the correctness of algorithms and studying their computational complexities. This course offers the students a mixture of theoretical knowledge and practical experience. The study of data structures and algorithms is carried out within an object-oriented framework. When implementations are considered, the Java programming language is used.
This course focuses on basic and advanced techniques on data warehousing and …
This course focuses on basic and advanced techniques on data warehousing and data mining, the study of the processing, modelling, querying, organizing, classifying documents, identifying association rules and categorization.
Database Design - 2nd Edition covers database systems and database design concepts. …
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
Survey of information technology covering database modeling, design, and implementation with an …
Survey of information technology covering database modeling, design, and implementation with an emphasis on relational databases and SQL. Internet technologies: http, html, XML, SOAP, security. Brief introduction to components and middleware. Introduction to design and implementation of multi-tier architectures, benchmarks, and performance. Data networking protocols and technologies. Students complete project that covers requirements/design, data model, database implementation, web site, and system architecture. This course is an intensive review of information technology. It covers topics in software development methods, data modeling and databases, application development, Web standards and development, system integration, security, and data communications. Most of the homework sets lead the class through a project in which a database and Web application are designed and constructed, using good software process and addressing security, network and other issues. The project, which is done in two-person teams, provides hands-on experience to complement the lectures and readings. Recitations discuss readings and provide more detailed information on the software tools used. The course goal is to cover the key concepts in the major areas of information technology, to enable students to successfully understand, work with and manage IT efforts as part of supply chain, transportation or civil engineering projects.
Pharo is a clean, innovative, open-source, live-programming environment. Deep into Pharois the …
Pharo is a clean, innovative, open-source, live-programming environment.
Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.
You will explore the language with chapters on exceptions, blocks, small integers, and floats.
You will discover tools such as profilers, Metacello and Gofer.
Pharo is a clean, innovative, open-source, live-programming environment. Deep into Pharois the …
Pharo is a clean, innovative, open-source, live-programming environment.
Deep into Pharois the second volume of a series of books covering Pharo. Whereas the first volume is intended for newcomers, this second volume covers deeper topics.You will learn about Pharo frameworks and libraries such as Glamour, PetitParser, Roassal, FileSystem, Regex, and Socket.
You will explore the language with chapters on exceptions, blocks, small integers, and floats.
You will discover tools such as profilers, Metacello and Gofer.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.