Monday, July 28, 2014

Research Day 04: What is research?

(Wordle from Textisbeautiful)-An artical from Wikipedia 

Problem-based learning Day 01

What Is Problem-based Learning [1]?

The basic principle supporting the concept of PBL is older than formal education itself; namely, learning is initiated by a posed problem, query, or puzzle that the learner wants to solve (Boud & Feletti, 1991).

In the problem-based approach, complex, real-world problems are used to motivate students to identify and research the concepts and principles they need to know to work through those problems.

Students work in small learning teams, bringing together collective skill at acquiring, communicating,
and integrating information.

Problem-based instruction addresses directly many of the recommended and desirable outcomes of an undergraduate education: specifically, the ability to do the following:
  • Think critically and be able to analyze and solve complex, real-world problems
  • Find, evaluate, and use appropriate learning resources
  • Work cooperatively in teams and small groups
  • Demonstrate versatile and effective communication skills, both verbal and written
  • Use content knowledge and intellectual skills acquired at the university to become continual learners
References
1. Barbara_J._Duch, Susan_E._Groh, and Deborah_E._Allen, The Power of Problem-Based Learning: A Practical How To for Teaching Undergraduate Courses in Any Discipline, 2001.

Type of Interruptions and Causes of Procrastination

I Type of Interruptions
1. Personal interruptions
  • Email alert or personal messenger
  • Telephone calls
  • Personal cell phones
  • Web surfing
  • Dealing with information
2. Interruption caused by others
  • Fellow employees
  • Meet fellow employees at their workplace
  • Schedule meetings
  • Visitors
  • Meetings
II Causes of Procrastination
  • Poor time management, often associated with a distorted sense of the time available
  • An inability to prioritise
  • Overload of tasks at a specific time
  • Anxiety about the task, so time is spent worrying rather than doing
  • Difficulty concentrating
  • Not knowing what is required
  • Feeling overwhelmed by the task(s)
  • Fear of success and its possible consequences
  • Perfectionism, often associated with unrealistic standards
  • Negative feelings - e.g. "I'm stupid", "nothing ever goes right for me"
  • All-or-nothing thinking, where one setback is seen as a total catastrophe
  • Being bored by the task
  • Never having learned how to work or sort out problems while at school or living at home
  • Avoidance of things which are disliked or difficult.
References

1. MN501 Professional Practice Lecture Notes, Melbourne Institute of Technology, 2014

To do lists



Maslow's Hierarchy of Needs


Computer network (networking) from Wikipedia (Text is beautiful)


Business intelligence Wordle (Text is beautifiul)


Wavelet article from Wikipedia (Text is beautiful)



Evaluative language (Wordle)


what do good learners do (Wordle)?


25 Hottest Skills in 2013 on Linkedin


Friday, July 25, 2014

Data communications Day 01: Topics covered

Data communications

1. Physical layer
2. Data-link layer
3. Network layer
4. Transport layer
5. Session layer
6. Presentation layer
7. Application layer
8. Wireless networks
9. Network security
10. Virtual LAN

Application layer
1. Wireshark
2. HTTP
3. VOIP
4. Email SMTP, POP

Datalink layer
1. Ethernet protocol (CSMA/CD)

Network layer
1. IP addressing
2. IP protocol
3. Subnetting

Transport layer
1. TCP
2. Flow control

1. Define LAN (Local Area Networks)
  • Group of computers connected on the same cable
  • Group of computers are in a confined area
  • Group of computers communicate with a high speed data transmission
2. Reasons to develop LANs
  • Share information (e.g. access same data files, exchange information via emails) leading to improve decision making
  • Share resources (e.g. printers, scanners, applications) leading to save costs
3. How do LANs differ from MANs, WANs, and BNs?

4. Why are network layers important?

5. Wavelength vs Frequency


Operating system Day 10 Fetch-Decode-Execute CPU cycle

  1. First, CPU fetches the instruction addressed by the Program Counter (PC) to the Memory Address Register (MAR). At the end of fetch operation, PC will point to the address of the next instruction for the next cycle.
  2. Second, the instruction in the IR gets decoded by the decoder. Data required from the memory will be loaded to the Memory Data Register (MDR) via data bus.
  3. Execute the instruction

Business Intelligence Modelling with Spreadsheet Day 01


  1. Linear programming for resource allocation problems
  2. Integer linear programming and goal programming
  3. Sensitivity analysis
  4. Network modelling and transportation and assignment problems
  5. Distribution problems
  6. Decision trees for analysis and support
  7. Inventory modelling and management problems
  8. Time series analysis and forecasting problems
  9. Queuing theory for performance analysis
  10. Simulation problems

Python programming Day 06

The append method modifies a list while the + operator creates a new list

>>> t1 = [1, 2]
>>> t2 = t1.append(3)
>>> print t1
[1, 2, 3]
>>> print t2
None

>>> t3 = t1 + [4]
>>> print t3
[1, 2, 3, 4]

The below function doesn't delete the head of a list

def bad_delete_head(lis):
      lis = lis[1:]

The below function deletes the head of a list

def correct_delete_head(lis):
      return lis[1:] 

The correct_delete_head function leaves the original list unmodified.

>>> letters = ['a', 'b', 'c']
>>> rest = correct_delete_head(letters)
>>> print rest
['b', 'c']

Most list methods modify the argument and return None. This is the opposite of the string methods, which return a new string and leave the original alone.

References
Allen B. Downey, Think Python: How to Think Like a Computer Scientist,
http://www.greenteapress.com/thinkpython/html/index.html

Teaching adult learners Day 01

Characteristics of adult learners

Goals oriented
Autonomous learner, self-directed
Life experiences relevant

Instructional tactics

Think pair-share
Placemat
Snow balls
Peers interview
Multiple intelligences survey


Analysis of algorithms Day 01

When are you going to multiply steps and when are you going to add steps? In particular, when there is a for loop.

There are three assumptions for a random access machine.

1. Memory access time is free or constant O(1).
2. Simple operations take one step.
3. Loops count as often as they run.

Distributed systems Day 01

Networked architectures can use different kinds of Brokers
  1. Object Request Broker (ORB)
  2. Service Oriented Architecture (SOA)
    1. All software entities are Clients/Service Providers, and they want to work together
  3. Peer to peer
    1. There is no distinction between Clients and Service Providers
    2. All resources are peers-both clients and service providers
    3. Peers can advertise their services-directly (via broadcast) or to a "super peer". A super peer is like a "mini-broker". It knows about the services provided by the peers in its cluster/group
  4. Grid Computing
  5. Cloud Computing
    1. Users/enterprises access services over the Internet
    2. Some basic services exist in the "Cloud" that is the Internet
Web Browser Processes
  • The Client Web Browser has many processes
    • User Interface: clicks, mouse, keyboard
  • Browser Engine
    • Allows user to navigate through Web pages
    • Should be platform independent
  • Rendering Engine
    • Displays documents
  • Script Interpreter
    • Scripting support for user interaction

Wireshark Day 01

What is the purpose of network analysis?
  1. To understand the performance of the network
  2. To understand the network traffic following through the network
  3. To verify the security of the application during launch, login and data transfer stages
  4. To analyze application behavior
  5. To identify network performance problems
  6. To identify network security breaches
Name at least three troubleshooting tasks that can performed using network analysis
  1. Detect bottle neck in the network e.g. high latency between hosts
  2. Identify where packets are lost
  3. Locate faulty network devices
Why is network analysis considered a security risk by some companies?
  1.  Tapping into network traffic to see unencrypted information (data, email, etc.)

Database Day 04: Database vs Flat files

A database is a collection of integrated and related tables.

DBMS: software application that is used to create, maintain, and provide controlled access to user databases

Metadata is data that describes the properties or characteristics of other data.  It allows database designers and users to understand what the data means.

Disadvantages of flat files
  1. Two users modifying information at the same time
  2. Programs using the file must know the format of the file
  3. We can store only limited types of elements, mainly text
All information is stored in files, and applications access the files to manipulate the information: reading, writing.

The information resides in database structures (e.g. tables), and applications access the information through the DBMS.

Complex application interface
Difficult to control concurrent access
Program-data dependence: the program needs to know the format of the data
Duplication of data
Data may be difficult to locate
Difficult data sharing
Lengthy development times
Excessive program maintenance (e.g. changing the data format means all applications have to change, at the same time)

Represents users view of data (e.g. reports, queries)
Emphasis on integration and sharing of data
Reduces data redundancy
Eliminates inter-dependence between programs and data
Improved data quality
Increased productivity of application development
Reduced program maintenance
Easier to extract information
Security is improved
Integrity can be assured

Installation and management costs
Complexity of DBMS
Powerful hardware needed to handle load
Need for explicit backup and recovery
Applications may be dependent of specific DBMS platforms or versions
Initial cost for implementation may be large

Examples of databases: customer database, flights database, CDs databases, product databases, books database, billing database, students database, movies database.

When there is a need to store records of something (e.g. students, bank accounts, eBay items) we can create a database.

Critical thinking skills Day 01

learn to identify valid and invalid arguments
learn to do inferences
learn to be an independent thinker
learn to be reasoning

Standard: Breadth
encompassing multiple viewpoints
Do we need to look at this from another perspective?
Do we need to consider another point of view?
Do we need to look at this in other ways?

Standard: Clarity
understandable, the meaning can be grasped
Could you elaborate further?
Could you give me an example?
Could you illustrate what you mean?

Standard: Accuracy
free from errors or distortions, true
How could we check on that?
How could we find out if that is true?
How could we verify or test that?

Standard: Precision
exact to the necessary level of detail
Could you be more specific?
Could you give me more details?
Could you be more exact?

Standard: Relevance
relating to the matter at hand
How does that relate to the problem?
How does that bear on the question?
How does that help us with the issue?

Standard: Depth
containing complexities and multiple interrelationships
What factors make this a difficult problem?
What are some of the complexities of this question?
What are some of the difficulties we need to deal with?

Standard: Logic
the parts make sense together, no contradictions
Does all this make sense together?
Does your first paragraph fit in with your last?
Does what you say follow from the evidence?

Standard: Significance
focusing on the important, not trivial
Is this the most important problem to consider?
Is this the central idea to focus on?
Which of these facts are most important?

Standard: Fairness
Justifiable, not self-serving or one-sided
Do I have any vested interest in this issue?
Am I sympathetically representing the viewpoints of others?

Academic word list by Wordle



Problem solving skills Day 01













The above presentation for learning and practicing problem solving skills belongs to Griffith University.

Wednesday, July 23, 2014

Writing skills Day 01

How to begin a new paragraph. Useful linking words and phrases.

Include linking words and phrases at the start of each new paragraph. Doing so helps to link what you have said in the previous paragraph to what you are about to say in your new paragraph.

These link words and phrases are often referred to as signposts. This is because they help to indicate to the reader when one point ends and other begins, as well as the relationship between each point.

Used with care and consistency they can help to guide examiners and tutors through your essay. As well as bolster the impression of a coherent, flowing and logical piece of work.

Useful linking words and phrases that can be used at the start of new paragraphs:

Although, …

As a consequence, …

As a result, …

As we have seen, …

At the same time, …

Accordingly, …

An equally significant aspect of…

Another, significant factor in…

Before considering X it is important to note Y

By the same token, …

But we should also consider, …

Despite these criticisms, …it’s popularity remains high.

Certainly, there is no shortage of disagreement within…

Consequently, …

Correspondingly, …

Conversely, …

Chaytor, … in particular, has focused on the

Despite this, …

Despite these criticisms, … the popularity of X remains largely undiminished.

Each of these theoretical positions make an important contribution to our understanding of, …

Evidence for in support of this position, can be found in…,

Evidently,

For this reason, …

For these reasons, …

Furthermore, …

Given, the current high profile debate with regard to, …it is quite surprising that …

Given, the advantages of … outlined in the previous paragraph, …it is quite predictable that …

However, …

Having considered X, it is also reasonable to look at …

Hence, …

In addition to, …

In contrast, …

In this way, …

In this manner, …

In the final analysis, …

In short, …

Indeed, …

It can be seen from the above analysis that, …

It could also be said that, …

It is however, important to note the limitations of…

It is important however not to assume the applicability of, …in all cases.

It is important however not to overemphasis the strengths of …

In the face of such criticism, proponents of, …have responded in a number of ways.

Moreover, …

Notwithstanding such criticism, ….it’s popularity remains largely undiminished.

Notwithstanding these limitations, ….it worth remains in a number of situations.

Noting the compelling nature of this new evidence, …has suggested that.

Nevertheless, …remains a growing problem.

Nonetheless, the number of, …has continued to expand at an exponential rate.

Despite these criticisms, …it’s popularity remains high.

On the other hand, critics of, …point to its blindness, with respect to.

Of central concern therefore to, …sociologists is explaining how societal processes and institutions…

Proponents of…, have also suggested that…

Subsequently, …

Similarly, …

The sentiment expressed in the quotation, embodies the view that, …

This interpretation of, … has not been without it’s detractors however.

This approach is similar to the, …. position

This critique, unfortunately, implies a singular cause of, …

This point is also sustained by the work of, …

Thirdly, …

The use of the term, …

Therefore, …

There appears then to be an acceleration in the growth of

There is also, however, a further point to be considered.

These technological developments have greatly increased the growth in, …

Thus, …

To be able to understand, …

Undoubtedly, …

While such failures must not be discounted, … there were in comparison small, when compared

Whilst the discussion in the preceding paragraph, …

Whether crime rates were actually lower at this time continues to be a matter of debate. Evidence from…

There are an almost limitless number of linking phrases and words one can use. What is important is that they complement the style of your writing and clearly link the start of each new paragraph, with the preceding paragraph.

Use these examples to arouse your creativity.

Finally, remember to succinctly, identify the key paragraphs and/or sections of your essay during your introductory paragraph. Then restate them along side an unambiguous position in your concluding paragraph. Again this will help to communicate a clear and understandable progression and structure, to those who read or mark your essay.

Note that the above collection of writing tips belongs to the respected author, meaning  the author of this blog is not the author of these tips.

Monday, July 21, 2014

Professional Practice: Day 01

Slide captured in "Professional Practice" lecture notes [1].
Slide captured in "Professional Practice" lecture notes [1].
Slide captured in "Professional Practice" lecture notes [1].
Slide captured in "Professional Practice" lecture notes [1].

References
1. BE103/BN201/MN501, Professional Practice, Melbourne Institute of Technology (MIT) Lecture Notes, 2014.

Friday, July 18, 2014

Data Science Day 01: Number of data analysis related courses

Slide is extracted from the course "Introduction to Data Science" at Coursera July 2014

Intelligent systems day 01: Agents & Environments





References:
David Poole and Alan Mackworth, Artificial Intelligence: Foundations of Computational Agents, http://artint.info/slides/index.html (Accessed on 18 July 2014).

Types of Data Science Questions


















The above images of slides are extracted from "The Data Scientist’s Toolbox" Course from Coursera July 2014.

Mounting USB drives in Windows Subsystem for Linux

Windows Subsystem for Linux can use (mount): SD card USB drives CD drives (CDFS) Network drives UNC paths Local storage / drives Drives form...