Search result for Course of quality control Online Courses & Certifications
Get Course Alerts by Email
Fundamentals of Reinforcement Learning
by Martha White , Adam White- 4.8
Approx. 15 hours to complete
Reinforcement Learning is a subfield of Machine Learning, but is also a general purpose formalism for automated decision-making and AI. This course introduces you to the fundamentals of Reinforcement Learning. This course teaches you the key concepts of Reinforcement Learning, underlying classic and modern algorithms in RL. This is the first course of the Reinforcement Learning Specialization....
Construction Cost Estimating and Cost Control
by Ibrahim Odeh, Ph.D., MBA- 4.7
Approx. 19 hours to complete
This course introduces the types of cost estimation from the conceptual design phase through the more detailed design phase of a construction project. In addition, the course highlights the importance of controlling costs and how to monitor project cash flow. Defining Methods of Cost Control Lean in Cost Control Lean in Cost Control...
Motors and Motor Control Circuits
by Jay Mendelson , James Zweighaft- 4.7
Approx. 36 hours to complete
This course can also be taken for academic credit as ECEA 5341, part of CU Boulder’s Master of Science in Electrical Engineering degree. This is our second course in our specialization on Embedding Sensor and Motors. To get the most out of this course, you should first take our first course entitled Sensors and Sensor Circuits....
Software Architecture
by Kenny Wong- 4.5
Approx. 10 hours to complete
In this course you will study the ways these architectures are represented, both in UML and other visual tools. • Describe the properties of layered and n-tier architectures. • Create UML ipackage, component, and deployment diagrams to express the architectural structure of a system. • Explain the behaviour of a system using UML activity diagrams....
Approximation Algorithms
by Mark de Berg- 4.7
Approx. 15 hours to complete
The goal of this course is to become familiar with important algorithmic concepts and techniques needed to effectively deal with such problems. - Graph terminology, representations of graphs (adjacency lists and adjacency matrix), basic graph algorithms (BFS, DFS, topological sort, shortest paths) We will not cover everything from the course notes....
Client Needs and Software Requirements
by Kenny Wong- 4.8
Approx. 12 hours to complete
This course covers practical techniques to elicit and express software requirements from client interactions. 2: Types of Requirements Course Resources: Client Needs and Software Requirements Course Map: Client Needs and Software Requirements Module 4: Quality Requirements 3: Course Summary Congratulations and Preview a Capstone Course Course Assessment (Graded) Maximize the effectiveness of client interactions...
Unravelling solutions for Future Food problems
by Prof. dr. Denise de Ridder , Prof. dr. Marca Wauben , Prof. dr. Rens Voesenek- 4.6
Approx. 15 hours to complete
Our society depends on the availability of food and accessibility to it. ln this course, more than 10 food researchers from Utrecht University will address the main issues of food consumption. The role of genetics in dealing with the environment Control of disease and spoilage in plants Disease control in animals: Animal health Functionality of foods and dietary patterns...
Related searches
Healthcare Data Security, Privacy, and Compliance
by Paul Nagy, PhD, FSIIM- 4.7
Approx. 6 hours to complete
In the final course of the Healthcare IT Support program, we will focus on the types of healthcare data that you need to be aware, complexities of security and privacy within healthcare, and issues related to compliance and reporting. You'll leave this course well versed on the Stark Law, the Joint Commission and the purpose of quality measures....
Peer-to-Peer Protocols and Local Area Networks
by Xiaobo Zhou- 4.7
Approx. 16 hours to complete
Part one in this course is to answer the question of how does a peer-to-peer protocol deliver reliable data transfer service across unreliable transmission lines or networks. We focus on several medium access control protocols and their performance analysis. RFC 793, “Transmission Control Protocol: DARPA Internet program protocol specification” Comprehensive review of course materials...
Access Controls
by (ISC)² Education & Training- 4.7
Approx. 15 hours to complete
You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability....