Search result for Example of research paper Online Courses & Certifications
Get Course Alerts by Email
We the People: Civic Engagement in a Constitutional Democracy
by Danielle Allen- 0.0
7 Weeks
Gain a foundational knowledge of American constitutional democracy and understand how to encourage others to explore their own civic paths, while in parallel crafting your own civic voice and identity. This course is built on more than ten years of academic research through the Democratic Knowledge Project, an initiative of the Edmond J....
$99
The Book: Book Sleuthing: What 19th-Century Books Can Tell Us About the Rise of the Reading Public?
by Leah Price- 0.0
3 Weeks
Do you love printed paper and wonder how much longer it will survive in the age of ebooks? Come behind the scenes in Harvard’s libraries to explore the look, feel and even smell of nineteenth-century British and American books in this module of The Book: Histories Across Time and Space. HarvardX pursues the science of learning....
$70
Real-Time Embedded Systems Concepts and Practices
by Sam Siewert- 0.0
Approx. 51 hours to complete
This course can also be taken for academic credit as ECEA 5315, part of CU Boulder’s Master of Science in Electrical Engineering degree. Timing Analysis - Rate Monotonic Priority Assignment Policy By Example Quality of Service Theory from Best Effort to Hard Real-Time Example of scheduling above the LUB at 100% utility that is feasible...
Foundations of Data Science: K-Means Clustering in Python
by Dr Matthew Yee-King , Dr Betty Fyn-Sydney , Dr Jamie A Ward , Dr Larisa Soldatova- 4.6
Approx. 29 hours to complete
Managing and analysing big data has become an essential part of modern finance, retail, marketing, social science, development and research, medicine and government. Types of Data Types of Data – Review Information 5 No Data no Data Science: Introduction of the Dataset Define and explain the key concepts of data clustering...
Data Collection: Online, Telephone and Face-to-face
by Frederick Conrad, Ph.D.- 4.6
Approx. 21 hours to complete
This course presents research conducted to increase our understanding of how data collection decisions affect survey errors. Module 1: Introduction, Classic Modes of Survey Data Collection 1 Uses of Big Data, Sensing Technology, Social Media Content as Data 4 Interview with Aigul Mavletova (National Research University Higher School of Economics, Mosow) on mobile web surveys...
Creating and Developing a Tech Startup
by Romain Beaume , Etienne Krieger- 4.1
Approx. 11 hours to complete
2 From laboratory research to the decision to create an innovative company: the experience of a researcher-entrepreneur. 1 From the creation of a startup to the IPO: the example of Cellectis 1/2 2 From the creation of a startup to the IPO: the example of Cellectis 2/2 End of the course and final exam...
Implementing a Patient Safety or Quality Improvement Project (Patient Safety V)
by David Thompson DNSc, MS, RN- 4.7
Approx. 10 hours to complete
Case Story: Practice, Policy, Public Reporting, & Patient Engagement: Learning from the Venous Thromboembolism (VTE) Example Importance of VTE Missed Doses of VTE Prophylaxis Importance of Teamwork and Mentoring in QI Closing Thoughts on the Science of QI Historical Perspective on Human Subjects Research...
Related searches
Blockchain in Financial Services: Strategic Action Plan
by Don Tapscott , Alex Tapscott- 4.3
Approx. 14 hours to complete
In this fourth and final course of the specialization, you will synthesize your learning into a Strategic Action Plan. The goals of this course are twofold: One, it’s for you to identify a specific need or problem within the financial services industry that can potentially be solved using blockchain technology. Blockchain Transformations of Financial Services...
Asymmetric Cryptography and Key Management
by Sang-Yoon Chang- 4.7
Approx. 9 hours to complete
In asymmetric cryptography or public-key cryptography, the sender and the receiver use a pair of public-private keys, as opposed to the same symmetric key, and therefore their cryptographic operations are asymmetric. This course will first review the principles of asymmetric cryptography and describe how the use of the pair of keys can provide different security properties....
How to Write a Professional Business Plan
by Long Road Instructors- 3.3
1 hour on-demand video
Key points of research will be laid out so that you are able to develop a strategy and clearly lay out a full plan for your business. You will be given an outline to follow for formatting to ensure that you do not miss any important parts of your business plan....
$13.99