We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJan Abbott
Modified over 2 years ago
A Bridge Between Engineering and Mathematics Budi Rahardjo Sekolah Teknik Elektro dan Informatika firstname.lastname@example.org 2007
Why such topic?
I am an engineer
I need maths!
We live in an exciting time
everything … business, daily lives
done through electronic means
ATM, cellphones, internet, …
They need 1 thing:
They’re all MATH EQUATIONS!
How to efficiently implement them in software and hardware
Hardware is more difficult (limited resources)
“For any field to move ahead, researchers must try things even when they don’t quite know what they’re doing” (Bob Colwell, “All Things Are Connected,” IEEE Computer, November, 2004)
Engineers must have “higher standards”
“Maybe engineers are held to higher standards because they can be” (Bob Colwell, “All Things Are Connected,” IEEE Computer, November, 2004)
Engineers must understand maths
But we’re not getting it
We need “Maths for Engineers”
in what form?
Formal class (too much science?)
Books (stories of digital heroes who go interested in engineering because they read certain books)
Get together (mixing it up)
The Road Ahead Budi Rahardjo Teknik Elektro ITB Bandung Presented – 18 August 2001 before the new ITB EE students 16 March 2002 – Kapita Selekta.
I crypt, You crypt Budi Rahardjo Institut Teknologi Bandung – Invited.
Working at School and Staying on Topic
What is CS? And what is it not?. Ten Reasons to Study Computer Science 1.Computing is part of everything we do 2.Allows you to solve complex problems.
Assoc. Prof. Dr. Ahmet Turan ÖZCERİT. What is engineer, What is Computer Engineering The topics in Computer Engineering You will learn: 2.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
Domain Name Management Budi Rahardjo Indonesia Network Information Center (IDNIC)
Digital Communications Math class.
Trusting the Trust Budi Rahardjo Inixindo Security Day Seminar The Executive Club, Jakarta, 19 March 2009.
Electrical Tech, Computer Tech, or E-Commerce These programs have much in common-BUT are you in the correct one??? Lets look at some things!
Contents Page 2 Language arts inside the classroom Page 3 Mathematics at a glance Page 4 April Art Page 5 Science Page 6 Social Studies Page 7-9 Appendix.
No ICT Without ICT Integrated Circuit Technology (ICT) as the basis for leading edge Information & Communication Technology (ICT) Budi Rahardjo
I Search By: Zac Schmouder. Outline Intro ASVAB Job Shadow Info on Computer Program Info on Software engineering Info on Game Design Conclusion.
Searching with Proquest Good results follow naturally from good searches.
Monitor their organization’s networks for security breaches and investigate a violation when one occurs Install and use software, such as firewalls.
Science Fair How To Get Started… (www.societyforscience.org/ISEF)www.societyforscience.org/ISEF.
Fundamental Digital Electronics
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
Kittiphan Techakittiroj (24/08/58 22:49 น. 24/08/58 22:49 น. 24/08/58 22:49 น.) Digital Certification Kittiphan Techakittiroj
Computer Engineering Group Members Carolyn Carter Mike Lazere Josh Mangler Brian Robison Rebecca Steinlage.
The Role of Academic in Narrowing Digital Divide Budi Rahardjo Director of Research & Development Center on Industry and Information Technology Institut.
Software Reliability CIS 640 Adapted from the lecture notes by Doron Pelel (www.dcs.warwick.ac.uk/~doron/notes.html)
DIGITAL COMMUNICATION Packet error detection (CRC) November 2011 A.J. Han Vinck.
Pengantar Teknik Elektro Kuliah I. Topics Introduction Basic Electrical Quantities Circuit Analysis Introduction to Electromagnetism Introduction to Electronics.
Tony Wilson Academic Liaison Librarian for Computer Science May 2011.
Conference alerts is a current awareness and beneficiary website that allows research delegates to receive free ed updates of academic events,
Major Disciplines in Computer Science Ken Nguyen Department of Information Technology Clayton State University.
Security in Electronic Commerce The need for Public Key Infrastructure Budi Rahardjo Presented at BPPT, Jakarta, Indonesia 10 February 2000.
4.1 Divisibility and Mental Math. Mental Math Is 56 divisible by 7? Think! 56 = 8 x 7 Is 56 divisible by 4? Think! 56 = 8 x 7, and 4 x 2 = 8, 56 is divisible.
Agenda September 21 Daily lifelines: Today’s Physics concept: I can apply scientific notation and manipulate equations Vocabulary: Manipulating equations,
Novelties On The Internet Technology and Services Budi Rahardjo Institut Teknologi Bandung
Animals: Where They Live and What They Need (Habitats) LeeAnne Walker 2 nd Grade Granite Elementary.
Computer Networkers ~Connecting the World~ For: Mrs. Holder By: Andy Chmilenko November 2, 2005 TIKO0-A If you can read this, you are too close to the.
8 groups of 2 5 rounds Basic Definitions Substitution Cryptosystems Math Tricky Questions Comparing Cryptosystems 10 questions per round.
CSCI-235 Micro-Computer in Science Internet Search.
Giovanni Napolitano 09/11/2007. Since the inception of the iPod video. Podcasts are starting to become the norm now for information sharing. Podcasts.
© UNT in partnership with TEA1 7 th Grade Career Exploration Module Career Focus: Computer Software Engineer.
Math Facts Single Digit Addition ©
n Taking Notes and Keeping a Journal n Listening Skills n Working Together n Managing Your Time.
November 4th: All of the second grade classrooms will go on a field trip to Da An Park from 9:00AM - 1:00PM. November 27th & 28th: Thanksgiving Break Thank.
STEM Endorsement General Courses The STEM endorsement must include Algebra II Chemistry Physics These three courses are required to meet the STEM endorsement.
PROV 504 NIKITHA VADDULA INTRODUCTION IMPORTANCE OF DISCIPLINE CURRENT ISSUES MAJOR ORGANIZATIONS PRE-EMINENT SCHOLARS SEMINAL WORKS CONNECTIONS.
Engineering Careers By: Winton Heard and Jamaal Lewis.
Foundations of Network and Computer Security J J ohn Black CSCI 6268/TLEN 5831, Fall 2004.
DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE By Viktor Mayor-Schonberger.
1. 2 Why do we need to learn English? Rules for learning English. 3.
Voting and Elections.
Public Key Cryptography Topical Lecture Week 10. PUBLIC AB Public Key Cryptography A: Hey B, send me an encoded message. This is how you encode a message.
By: Zubeida Gobah. Easier to carry How? It’s just one thing and is not heavy. Search for different topics How? You can’t search anything in books.
Advanced Higher Computing Computer Networking Topic 1: Network Protocols and Standards.
© 2017 SlidePlayer.com Inc. All rights reserved.