Back to Courses

Computer Science Courses - Page 164

Showing results 1631-1640 of 2309
Graphic design: realistic neon effect texts with Adobe Photoshop
By the end of this project, you will learn how to use Photoshop to create neon effects on your texts and transform them into a captivating graphic. Adobe Photoshop is the industry standard among editors in raster graphics as well as in digital art as a whole. It can be used in a variety of ways, for example in Photo Editing as this is the actual use of Adobe Photoshop, it allows you to enhance the colours and add contrast to an image and fully retouch it, make old or damaged photos look brand new, create a staged photo of a subject set in a chosen scene, remove any backgrounds or objects from an image... It is also greatly used in Graphic Design to create pattern and texture, logos designs, flyers, book covers, brochures, icons, marketing materials for businesses... Photoshop is a versatile software that allows users to create works in Digital Paintings, Graphic Design, Web Design, Video Editing… Being able to use it is essential for students, graphic designers, photographers and visual artists aimed to work in the visual sector of the creative industries. This guided project is for students, graphic designers, content creators or the general public who want to create artistic neon effects to pop their graphic works using the tools in Adobe Photoshop.
Diabetes Disease Detection with XG-Boost and Neural Networks
In this project-based course, we will build, train and test a machine learning model to detect diabetes with XG-boost and Artificial Neural Networks. The objective of this project is to predict whether a patient has diabetes or not based on their given features and diagnostic measurements such as number of pregnancies, insulin levels, Body mass index, age and blood pressure.
Digital Product Management: Modern Fundamentals
Not so long ago, the job of product manager was about assessing market data, creating requirements, and managing the hand-off to sales/marketing. Maybe you’d talk to a customer somewhere in there and they’d tell you what features they wanted. But companies that manage product that way are dying. Being a product person today is a new game, and product managers are at the center of it. Today, particularly if your product is mostly digital, you might update it several times a day. Massive troves of data are available for making decisions and, at the same time, deep insights into customer motivation and experience are more important than ever. The job of the modern product manager is to charter a direction and create a successful working environment for all the actors involved in product success. It’s not a simple job or an easy job, but it is a meaningful job where you’ll be learning all the time. This course will help you along your learning journey and prepare you with the skills and perspective you need to: Create the actionable focus to successfully manage your product (week 1) Focus your work using modern product management methods (week 2) Manage new products and explore new product ideas (week 3) Manage and amplify existing products (week 4) This course is ideal for current product or general managers interested in today's modern product management methods. Please note that there are new additions to this course and subtitles for these videos will soon be available. This course was developed with the generous support of the Batten Institute at UVA’s Darden School of Business. The Batten Institute’s mission is to improve the world through entrepreneurship and innovation: www.batteninstitute.org.
Pattern Discovery in Data Mining
Learn the general concepts of data mining along with basic methodologies and applications. Then dive into one subfield in data mining: pattern discovery. Learn in-depth concepts, methods, and applications of pattern discovery in data mining. We will also introduce methods for data-driven phrase mining and some interesting applications of pattern discovery. This course provides you the opportunity to learn skills and content to practice and engage in scalable pattern discovery methods on massive transactional data, discuss pattern evaluation measures, and study methods for mining diverse kinds of patterns, sequential patterns, and sub-graph patterns.
Black-box and White-box Testing
After completing this course, learners will have an understanding of a variety of black-box and white-box testing techniques. The learner will have put this understanding into practice, creating effective sets of test cases (called a test suite) to properly exercise software for defect finding. The learner will have examined requirements for testability, created an oracle for automated testing, assessed fault-finding effectiveness of test suites, and generated inputs using a variety of techniques. After completing this course, you will be able to: - evaluate testability of requirements - define testable units within a program specification - apply black-box test input selection methods - specifically boundary-value analysis, fuzzing, and random selection - and select the method most-suited to achieve the given testing objective - assess the fault-finding effectiveness of a functional test suite using mutation testing - use category partitioning to develop automated functional tests (with Cucumber) based on a given software specification - create an expected-value oracle from a program description to use within the generated tests In order to do well in this course, you should have experience with an OOP language (like Java), have an IDE installed (e.g., Eclipse), and be familiar with testing terminology (see Intro to Software Testing course within this specialization). we also expect a familiarity with the Software Development Lifecycle and the context in which the testing stage sits. This course is primarily aimed at those learners interested in any of the following roles: Software Engineer, Software Engineer in Test, Test Automation Engineer, DevOps Engineer, Software Developer, Programmer, Computer Enthusiast.
Create a Text Logo Professionally using Adobe illustrator
By the end of this project, you will be able to Create a Text Effect Logo Professionally using Adobe illustrator. We will be designing a Text effect logo for a hair shop called “THE WAVY HAIRSHOP ''. The word wavy will be distorted to reflect the wavy shape of the hair. Then color variations of this logo will be created. Next, we will design a Social media post to implement the use of the logo color variations. Last but not least, these posts will be added to a mobile mockup to showcase the client how the designs will look like when published to the market and social media platforms. This project is for intermediate designers, who already have the basics of Adobe illustrator, that are able to build simple designs using this program. In addition, for students that aim to learn new and advanced design techniques. Since logos can be designed in many styles, a Text Effect logo is one them. Taking this course will help you as a designer to gain advanced skills in designing a logo and to learn how distortion can be applied to a text in order to reflect the brand’s name and vision. In this Project, we’ll be using Adobe illustrator which is one of the Adobe Creative Cloud.
Python Basics: Create a Guessing Number Game from Scratch
By the end of this project, you will create a simple interactive game written in Python ‎language. You will learn and apply basic concepts of programming like: (Data types, ‎variables, conditional and Iterative statements) that will assist you to reach the aim of ‎being able to code your own games and daily tasks in python.‎ ‎ Python language is one of the most accessible programming languages available because ‎of Its simplified syntax that gives emphasis on natural language. It is highly used in ‎machine learning and data science applications which are some of the biggest trends in ‎computer science right now. It is also supported by many corporations such as Facebook ‎and Amazon. It is specially adapted by Google making it the number one choice for many ‎programmers and engineers.‎ Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Build a Banner Ad with Inkscape
By the end of this project, you will build a banner advertisement with Inkscape—a free, open-source graphics program. You’ll use objects in Inkscape that can be expanded and resized without losing image quality, so you can resize and use the same image for use with different social media platforms and websites. You will practice working with vector graphics, including path editing, and you will feel comfortable using Inkscape to build basic and complex shapes, use align commands to accurately and easily position those shapes, and add color and stroke to create eye-catching images. To build these skills, you’ll build a banner or feed advertisement image, practice customizing it, and use Inkscape’s built-in export tools. Note: This course works best for learners who are based in the North America region. We’re currently working on providing the same experience in other regions.
Justice and Equity in Technology Policy
More than ever, technology is shaping, and being shaped by, public policy. This has an enormous impact, particularly for marginalized communities. The artificial intelligence and computer algorithms increasingly driving government and industry decisions—from the allocation of social services to hiring—are reflecting and reinforcing social biases towards women, people of color, and disabled people, among others. Global climate change is having a disproportionately negative impact on low- and middle-income countries, and on historically disadvantaged communities of color in the United States. Communities are increasingly concerned they are not benefiting from government research funding, and that the regulation of emerging technologies is inadequate. The interconnectedness of technology, policy, and equality raises crucial questions for scientists, technologists, and leaders in public policy, civil society, and industry. How can technology be built, implemented, and governed more equitably? How can the concerns of marginalized communities be integrated better into technology and related policies? How should community knowledge and concerns be integrated with technical expertise and scientific evidence in the development of public policies? This course will center equity and justice in the development and implementation of technology and science public policies. In particular, we aim to help learners understand how inequities can become embedded in technology, and associated policies, and how this can be addressed. Combining real-world cases with scholarly insights, this course introduces learners to these challenges and offers tools for navigating them. You will learn about: - The landscape of technology policymaking - How technology, and related policies both reflect and reinforce social values, biases and politics - The power and limitations of technology in solving social problems - New ways to think about “experts” and “publics” - The politics of innovation policy The course is designed for people from diverse professional, advocacy, and academic backgrounds. No scientific, technical, or policy background is necessary.
The GRC Approach to Managing Cybersecurity
Managing cybersecurity is about managing risk, specifically the risk to information assets of valued by an organization. This course examines the role of Governance, Risk Management, and Compliance (GRC) as part of the Cybersecurity management process, including key functions of planning, policies, and the administration of technologies to support the protection of critical information assets. In this course, a learner will be able to: ● Identify the importance and functions of Governance, Risk Management, and Compliance in Cybersecurity program management. ● Describe best practices in risk management including the domains of risk assessment and risk treatment. ● Describe the structure and content of Cybersecurity-related strategy, plans, and planning ● Identify the key components and methodologies of Cybersecurity policies and policy development ● Discuss the role of performance measures as a method to assess and improve GRC programs