Search Constraints
Number of results to display per page
Results for:
Collaboration and Networking
Remove constraint Collaboration and Networking
« Previous |
1 - 10 of 27
|
Next »
Search Results
-
Video
The seminar began with a warm welcome by Prof. ZHANG Weixiong, Associate Director of PAIR, followed by a brief introduction of the speaker by Prof. ZHANG Chengqi, Chair Professor of Artificial Intelligence. Prof. Liu kick-started his presentation by outlining the key milestones in the evolution of robotics, and pointed out that human-centred intelligent robots should be able to co-exist, cooperate and collaborate with humans. He stated that robotics is a truly interdisciplinary field that combines engineering, science and humanities. Next, through a series of case studies, Prof. Liu examined how intelligent robots have been designed to work alongside humans in various applications, including civil infrastructure maintenance, construction, and manufacturing. He then discussed the dynamics of collaboration between humans and robots, and examined issues such as trust, computational modelling, physical and cognitive workload, brain-robot interface and human-centred design. By reflecting on the lessons learnt from these case studies, Prof. Liu highlighted both successes and challenges. At the end of his presentation, Prof. Liu emphasised that human-robot teaming is an interdisciplinary field. He also pointed out some areas for further development in the field, highlighting the many opportunities in robotics.
Event date: 10/10/2024
Speaker: Prof. LIU Dikai
Hosted by: PolyU Academy for Interdisciplinary Research
- Subjects:
- Mechanical Engineering and Computing, Data Science and Artificial Intelligence
- Keywords:
- Artificial intelligence Robotics Human-robot interaction
- Resource Type:
- Video
-
MOOC
The metaverse isn’t just for gamers or developers, it will be for everyone. In this free course from the experts at Meta, you’ll learn what the metaverse is, what it means for our world today and into the future, and the opportunities it presents for both professionals and businesses.
Understand the metaverse fundamentals
Experts will guide you through a broad range of topics spanning the metaverse ecosystem, from communication and collaboration to NFTs and cryptocurrency, from avatars and devices to platforms and game engines. You’ll learn about augmented reality (AR), virtual reality (VR), extended reality, NFTs, blockchain, web3, cryptocurrency, and more.
Discover new ways to connect, learn, and work
The metaverse provides new ways to connect people, websites, platforms and realities. You’ll explore how it will enhance online social experiences, the future of work and learning.
Opportunities for professionals and businesses
The metaverse will be built by everyone, with creative and practical applications being developed every day by imaginative people. Learn how the metaverse will be applied in areas like healthcare, education, city planning, art, and more—and how you can start creating these experiences today. You’ll also learn how the metaverse can make the world a more diverse, equitable, and inclusive place.
By the end of the course, you’ll be equipped with the fundamental knowledge of the metaverse to determine future areas of interest, learning, or professional growth.
-
MOOC
The Machine Learning Specialization is a foundational online program created in collaboration between DeepLearning.AI and Stanford Online. This beginner-friendly program will teach you the fundamentals of machine learning and how to use these techniques to build real-world AI applications.
This Specialization is taught by Andrew Ng, an AI visionary who has led critical research at Stanford University and groundbreaking work at Google Brain, Baidu, and Landing.AI to advance the AI field.
This 3-course Specialization is an updated version of Andrew’s pioneering Machine Learning course, rated 4.9 out of 5 and taken by over 4.8 million learners since it launched in 2012.
It provides a broad introduction to modern machine learning, including supervised learning (multiple linear regression, logistic regression, neural networks, and decision trees), unsupervised learning (clustering, dimensionality reduction, recommender systems), and some of the best practices used in Silicon Valley for artificial intelligence and machine learning innovation (evaluating and tuning models, taking a data-centric approach to improving performance, and more.) By the end of this Specialization, you will have mastered key concepts and gained the practical know-how to quickly and powerfully apply machine learning to challenging real-world problems. If you’re looking to break into AI or build a career in machine learning, the new Machine Learning Specialization is the best place to start.
- Course related:
- AAE5103 Artificial Intelligence in Aviation Industry
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Artificial intelligence Machine learning
- Resource Type:
- MOOC
-
Others
Computer Network tutorial provides basic and advanced concepts of Data Communication & Networks (DCN). Our Computer Networking Tutorial is designed for beginners and professionals. Our Computer Network tutorial includes all topics of Computer Network such as introduction, features, types of computer network, architecture, hardware, software, internet, intranet, website, LAN, WAN, etc.
- Course related:
- COMP2322 Computer Networking
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Computer networks
- Resource Type:
- Others
-
e-book
An Introduction to Computer Networksis a free and open general-purpose computer-networking textbook, complete with diagrams and exercises.It covers the LAN, internetworking and transport layers, focusing primarily on TCP/IP. Particular attention is paid to congestion; other special topics include queuing, real-time traffic, network management, security and the ns simulator. The book is suitable as the primary text for an undergraduate or introductory graduate course in computer networking, as a supplemental text for a wide variety of network-related courses, and as a reference work.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Textbooks Computer network protocols Computer networks
- Resource Type:
- e-book
-
e-book
This open textbook aims to fill the gap between the open-source implementations and the open-source network specifications by providing a detailed but pedagogical description of the key principles that guide the operation of the Internet.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Textbooks Computer network protocols
- Resource Type:
- e-book
-
e-book
In this book, you will learn about all three kinds of interaction. In all three cases, interesting software techniques are needed in order to bring the computations into contact, yet keep them suffciently at arm's length that they don't compromise each other's reliability. The exciting challenge, then, is supporting controlled interaction. This includes support for computations that share a single computer and interact with one another, as your email and word processing programs do. It also includes support for data storage and network communication. This book describes how all these kinds of support are provided both by operating systems and by additional software layered on top of operating systems, which is known as middleware. Chapter 1 provides an overview of the text as a whole, explaining what an operating system is, what middleware is, and what sorts of support these systems provide for controlled interaction. The next nine chapters work through the varieties of controlled interac- tion that are exemplified by the scenario at the beginning of the preface: in- teraction between concurrent computations on the same system (as between your email program and your word processor), interaction across time (as between your word processor before your trip and your word processor after your trip), and interaction across space (as between your email program and your service provider's email server). The first of these three topics is controlled interaction between computa- tions operating at one time on a particular computer. Before such interaction can make sense, you need to understand how it is that a single computer can be running more than one program, such as an email program in one window and a word processing program in another. Therefore, Chapter 2 explains the fundamental mechanism for dividing a computer's attention between concurrent computations, known as threads. Chapter 3 continues with the related topic of scheduling. That is, if the computer is dividing its time between computations, it needs to decide which ones to work on at any moment. With concurrent computations explained, Chapter 4 introduces con- trolled interactions between them by explaining synchronization, which is control over the threads' relative timing. For example, this chapter explains how, when your email program sends a document to your word processor, the word processor can be constrained to read the document only after the email program writes it. One particularly important form of synchroniza- tion, atomic transactions, is the topic of Chapter 5. Atomic transactions are groups of operations that take place as an indivisible unit; they are most commonly supported by middleware, though they are also playing an increasing role in operating systems. Other than synchronization, the main way that operating systems con- trol the interaction between computations is by controlling their access to memory. Chapter 6 explains how this is achieved using the technique known as virtual memory. That chapter also explains the many other objectives this same technique can serve. Virtual memory serves as the foundation for Chapter 7's topic, which is processes. A process is the fundamental unit of computation for protected access, just as a thread is the fundamental unit of computation for concurrency. A process is a group of threads that share a protection environment; in particular, they share the same access to virtual memory. The next three chapters move outside the limitations of a single com- puter operating in a single session. First, consider the document stored before a trip and available again after it. Chapter 8 explains persistent storage mechanisms, focusing particularly on the file storage that operat- ing systems provide. Second, consider the interaction between your email program and your service provider's email server. Chapter 9 provides an overview of networking, including the services that operating systems make available to programs such as the email client and server. Chapter 10 ex- tends this discussion into the more sophisticated forms of support provided by communication middleware, such as messaging systems, RMI, and web services. Finally, Chapter 11 focuses on security. Because security is a pervasive issue, the preceding ten chapters all provide some information on it as well. Specifically, the final section of each chapter points out ways in which se- curity relates to that chapter's particular topic. However, even with that coverage distributed throughout the book, a chapter specifically on security is needed, primarily to elevate it out of technical particulars and talk about general principles and the human and organizational context surrounding the computer technology. The best way to use these chapters is in consecutive order. However, Chapter 5 can be omitted with only minor harm to Chapters 8 and 10, and Chapter 9 can be omitted if students are already suffciently familiar with networking.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Operating systems (Computers) Computer software -- Development Middleware Textbooks
- Resource Type:
- e-book
-
e-book
We set out to design an introductory course governed by four themes: Give students a good idea of what a career in MIS looks like by doing MIS. Enhance the professionalism of deliverables by teaching design and usability concepts. Promote creativity by assigning projects that demand it. Teach students about cloud computing by having them do cloud computing. Students in an introductory Management Information Systems (MIS) course often ask what a career in MIS looks like. Lacking a clear vision, they make their own assumptions. Often they assume the career involves programming with little human interaction. That MIS is a technical field could not be further from the truth. MIS job descriptions typically require candidates to be able to collaborate, communicate, analyze needs and gather requirements. They also list the need for excellent written and communication skills. In other words, MIS workers are constantly interacting with other people both inside and outside the organization. They are coming up with creative solutions to business problems. This course is designed to help students get a feel for what a career in MIS would be like. Our students report that they learn more about information systems from their internships than from their IS courses. Consequently, we designed a course that looks very much like an internship—an introduction to the field followed by a substantial project. Chapter 1 begins by introducing the information systems landscape. Here we discuss all the usual suspects: the information systems triangle, the systems development life cycle, transaction systems (ERP, SCM, CRM), collaboration systems, and business intelligence systems. Other aspects of the landscape such as usability, outsourcing, database concepts and so forth are introduced throughout chapter in Chapter 2 where they fit in naturally with the flow of the project. Chapter 2 is the substantial project which runs over a number of chapters. Over the course of the semester, students plan, build, and develop a proposal for an iPhone application. They develop a very realistic mockup. They also build a website to help market and support the app. Students are engaged because the project is fun and feels real. However, they are simultaneously learning business concepts and MIS skills. Prior to the existence of this course, we were only able to give such an interesting project at the senior level. Now, even as freshmen, students have a real experience of MIS in operation. A by product of creating an engaging course is increased enrollment in the MIS major. Even students who have never heard of MIS become excited about the major and either switch majors or add it as a double major or minor. Many other books have students study tools and then do a case. By contrast, most of this book is a case. Much like the real world, we introduce tools when needed, and only to the extent needed, to get at each part of the case.
-
MOOC
Game designers work with a wide range of asset creators, programmers, producers, and others to bring a video game from concept to product. In this course, you will learn about the different types of teams a game designer is a member of, both large and small.
- Subjects:
- Computing, Data Science and Artificial Intelligence and Interactive and Digital Media
- Keywords:
- Video games -- Design
- Resource Type:
- MOOC
-
Video
A series of video that introduce various topics, including Node.js, Java, C programming, HTML, JavaScript, Python, PHP, and C++ programming.
- Subjects:
- Computing, Data Science and Artificial Intelligence
- Keywords:
- Computer programming Graphic arts Computer networks Web sites -- Design Computer games -- Programming
- Resource Type:
- Video
- « Previous
- Next »
- 1
- 2
- 3