Searching for key : 501 results found | RSS Feed for this search

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

AL-58 Jones Album Image_00116

Description

Subjects

mexicana | airplane | aircraft | aviation | warner | santamaria | davis | usnavy | usn | aviator | panam | pilot | aviators | biplane | paa | americanlegion | panamerican | wooster | gott | moffett | j5 | navalaviation | unitedstatesnavy | easternairlines | whirlwind | k47 | panamericanairways | wrightwhirlwind | noeldavis | keystonepathfinder | wrightj5 | williamamoffett | williammoffett | williamadgermoffett | admiralwilliamamoffett | admiralwilliammoffett | admiralmoffett | cn3137 | keystonek47a | k47a | xabcq | noelguydavis | noelgdavis | stantonhallwooster | stantonhwooster | stanwooster | nx179 | keystoneaircraftcorporation | keystoneaircraft | keystonek47pathfinder | keystonek47 | k47pathfinder | keystoneamericanlegion | nc1612 | westindianaerialexpress | stantonwooster | edgarngott | edgargott | edwardwarner | fredalvinjones | edwardpearsonwarner | edwardpwarner

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=49487266@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Lt. Com. Noel Davis -- Lt. S.H. Wooster (LOC)

Description

Subjects

mexicana | airplane | aircraft | santamaria | libraryofcongress | davis | propeller | aviator | panam | aviators | biplane | paa | americanlegion | panamerican | wooster | 1927 | j5 | whirlwind | hamiltonstandard | k47 | panamericanairways | wrightwhirlwind | xmlns:dc=httppurlorgdcelements11 | noeldavis | keystonepathfinder | wrightj5 | wrightj5whirlwind | cn3137 | keystonek47a | k47a | xabcq | noelguydavis | noelgdavis | stantonhallwooster | stantonhwooster | stanwooster | nx179 | keystoneaircraftcorporation | keystoneaircraft | keystonek47pathfinder | keystonek47 | k47pathfinder | keystoneamericanlegion | nc1612 | westindianaerialexpress | stantonwooster | dc:identifier=httphdllocgovlocpnpggbain24653

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=8623220@N02&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Sorrento Terrace, Dalkey [and Dalkey Island] Sorrento Terrace, Dalkey [and Dalkey Island]

Description

Subjects

dalkey | dalkey | glassnegative | glassnegative | martellotower | martellotower | dalkeyisland | dalkeyisland | robertfrench | robertfrench | williamlawrence | williamlawrence | nationallibraryofireland | nationallibraryofireland | sorrentoterrace | sorrentoterrace | dalkeydublin | dalkeydublin | lawrencecollection | lawrencecollection | lawrencephotographicstudio | lawrencephotographicstudio | thelawrencephotographcollection | thelawrencephotographcollection

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=47290943@N03&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Credit Crunch Live

Description

Economics students of St Edmund Hall, University of Oxford pose questions to a panel of experts about the credit crunch and global recession. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

quantitative easing | macroeconomics | credit crunch | nationalization | money | keynesian | economics | recession | banking | bail-out | businesses | fiscal policy | nationalisation | banks | keynesianism | VAT | obama | quantitative easing | macroeconomics | credit crunch | nationalization | money | keynesian | economics | recession | banking | bail-out | businesses | fiscal policy | nationalisation | banks | keynesianism | VAT | obama

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129190/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.045J Automata, Computability, and Complexity (MIT) 6.045J Automata, Computability, and Complexity (MIT)

Description

This course provides a challenging introduction to some of the central ideas of theoretical computer science. Beginning in antiquity, the course will progress through finite automata, circuits and decision trees, Turing machines and computability, efficient algorithms and reducibility, the P versus NP problem, NP-completeness, the power of randomness, cryptography and one-way functions, computational learning theory, and quantum computing. It examines the classes of problems that can and cannot be solved by various kinds of machines. It tries to explain the key differences between computational models that affect their power. This course provides a challenging introduction to some of the central ideas of theoretical computer science. Beginning in antiquity, the course will progress through finite automata, circuits and decision trees, Turing machines and computability, efficient algorithms and reducibility, the P versus NP problem, NP-completeness, the power of randomness, cryptography and one-way functions, computational learning theory, and quantum computing. It examines the classes of problems that can and cannot be solved by various kinds of machines. It tries to explain the key differences between computational models that affect their power.

Subjects

finite automata | finite automata | Turing machine | Turing machine | halting problem | halting problem | computability | computability | computational complexity | computational complexity | polynomial time | polynomial time | P | P | NP | NP | NP complete | NP complete | probabilistic algorithms | probabilistic algorithms | private-key cryptography | private-key cryptography | public-key cryptography | public-key cryptography | randomness | randomness

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.080 Great Ideas in Theoretical Computer Science (MIT) 6.080 Great Ideas in Theoretical Computer Science (MIT)

Description

This course provides a challenging introduction to some of the central ideas of theoretical computer science. It attempts to present a vision of "computer science beyond computers": that is, CS as a set of mathematical tools for understanding complex systems such as universes and minds. Beginning in antiquity—with Euclid's algorithm and other ancient examples of computational thinking—the course will progress rapidly through propositional logic, Turing machines and computability, finite automata, Gödel's theorems, efficient algorithms and reducibility, NP-completeness, the P versus NP problem, decision trees and other concrete computational models, the power of randomness, cryptography and one-way functions, computational theories of learning, interactive proofs, and q This course provides a challenging introduction to some of the central ideas of theoretical computer science. It attempts to present a vision of "computer science beyond computers": that is, CS as a set of mathematical tools for understanding complex systems such as universes and minds. Beginning in antiquity—with Euclid's algorithm and other ancient examples of computational thinking—the course will progress rapidly through propositional logic, Turing machines and computability, finite automata, Gödel's theorems, efficient algorithms and reducibility, NP-completeness, the P versus NP problem, decision trees and other concrete computational models, the power of randomness, cryptography and one-way functions, computational theories of learning, interactive proofs, and q

Subjects

computer science | computer science | theoretical computer science | theoretical computer science | logic | logic | turing machines | turing machines | computability | computability | finite automata | finite automata | godel | godel | complexity | complexity | polynomial time | polynomial time | efficient algorithms | efficient algorithms | reducibility | reducibility | p and np | p and np | np completeness | np completeness | private key cryptography | private key cryptography | public key cryptography | public key cryptography | pac learning | pac learning | quantum computing | quantum computing | quantum algorithms | quantum algorithms

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.897 Selected Topics in Cryptography (MIT) 6.897 Selected Topics in Cryptography (MIT)

Description

This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given. This course covers a number of advanced "selected topics" in the field of cryptography. The first part of the course tackles the foundational question of how to define security of cryptographic protocols in a way that is appropriate for modern computer networks, and how to construct protocols that satisfy these security definitions. For this purpose, the framework of "universally composable security" is studied and used. The second part of the course concentrates on the many challenges involved in building secure electronic voting systems, from both theoretical and practical points of view. In the third part, an introduction to cryptographic constructions based on bilinear pairings is given.

Subjects

cryptography | cryptography | cryptanalysis | cryptanalysis | cryptographic protocols | cryptographic protocols | general security definitions | general security definitions | composition theorems | composition theorems | protocols | protocols | commitments | commitments | key exchange | key exchange | general multi-party computation | general multi-party computation | composable notions of security for PK encryption and signatures | composable notions of security for PK encryption and signatures | theory of extractors | theory of extractors | privacy amplification | privacy amplification | special-purpose factoring devices | special-purpose factoring devices | algorithms | algorithms | concrete security arguments | concrete security arguments | differential cryptanalysis | differential cryptanalysis | public-key infrastructures | public-key infrastructures | electronic voting | electronic voting

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Credit Crunch Live (Transcript)

Description

Economics students of St Edmund Hall, University of Oxford pose questions to a panel of experts about the credit crunch and global recession.

Subjects

quantitative easing | macroeconomics | credit crunch | nationalization | money | keynesian | economics | recession | banking | bail-out | businesses | fiscal policy | nationalisation | banks | keynesianism | VAT | obama | quantitative easing | macroeconomics | credit crunch | nationalization | money | keynesian | economics | recession | banking | bail-out | businesses | fiscal policy | nationalisation | banks | keynesianism | VAT | obama

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://rss.oucs.ox.ac.uk/sedm/general-audio/rss20.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

IJshockeyteam / Ice Hockey Team

Description

Subjects

hockey | icehockey | hockeyteam | canadianhockeyteam | torontogranites

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29998366@N02&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration. 6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | Bitcoin | Bitcoin | encryption | encryption | block ciphers | block ciphers | cryptographic hash functions | cryptographic hash functions | one-time pad | one-time pad | stream ciphers | stream ciphers | web browser security | web browser security | biometrics | biometrics | Viruses | Viruses | electronic voting | electronic voting

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

PR77954 PR77954

Description

Subjects

tents | tents | florida | florida | pipes | pipes | everglades | everglades | turkeys | turkeys | turkeyhunting | turkeyhunting | docengelbert | docengelbert | ellisbengelbert | ellisbengelbert

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=31846825@N04&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Donkeys in the field Donkeys in the field

Description

Subjects

donkeys | donkeys | livestock | livestock | durban | durban | glassnegative | glassnegative | countywaterford | countywaterford | nationallibraryofireland | nationallibraryofireland | ahpoole | ahpoole | poolecollection | poolecollection | arthurhenripoole | arthurhenripoole | ssmaori | ssmaori | captaindaly | captaindaly | donkeyexport | donkeyexport

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=47290943@N03&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Sunset Cove Tea Room - Key Largo Sunset Cove Tea Room - Key Largo

Description

Subjects

signs | signs | florida | florida | restaurants | restaurants | keylargo | keylargo | keylimepie | keylimepie | sunsetcovetearoom | sunsetcovetearoom

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=31846825@N04&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Sand Key Lighthouse - Key West Sand Key Lighthouse - Key West

Description

Subjects

lighthouses | lighthouses | florida | florida | keywest | keywest | sandkeylighthouse | sandkeylighthouse

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=31846825@N04&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Young ladies in grove during the Key Lime Festival - Key Largo Young ladies in grove during the Key Lime Festival - Key Largo

Description

Subjects

florida | florida | keylargo | keylargo | bathingsuits | bathingsuits | festivals | festivals | limes | limes | groves | groves | ladders | ladders | keylimefestival | keylimefestival

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=31846825@N04&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

John Pennekamp Coral Reef State Park John Pennekamp Coral Reef State Park

Description

Subjects

florida | florida | floridakeys | floridakeys | keylargo | keylargo | promotionalfilms | promotionalfilms | scubadiving | scubadiving | wildlife | wildlife | shipwrecks | shipwrecks | underwaterphotography | underwaterphotography

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=31846825@N04&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

There's a hairy ass fair in the County Clare There's a hairy ass fair in the County Clare

Description

Subjects

robertfrench | robertfrench | williamlawrence | williamlawrence | lawrencecollection | lawrencecollection | lawrencephotographicstudio | lawrencephotographicstudio | thelawrencephotographcollection | thelawrencephotographcollection | glassnegative | glassnegative | nationallibraryofireland | nationallibraryofireland | kilkee | kilkee | coclare | coclare | ireland | ireland | atlantic | atlantic | wildatlanticway | wildatlanticway | donkeys | donkeys | asses | asses | horses | horses | saddle | saddle | carriages | carriages | carts | carts | boys | boys | men | men | ocurrystreet | ocurrystreet | albertroad | albertroad | stellamarishotel | stellamarishotel | clare | clare | donkey | donkey | cheapexcursions | cheapexcursions | excursions | excursions | tourists | tourists

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=47290943@N03&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Key West High School Cheerleaders Key West High School Cheerleaders

Description

Subjects

florida | florida | keywest | keywest | cheerleaders | cheerleaders | keywesthighschool | keywesthighschool

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=31846825@N04&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Four-week-old wild turkey poults at Fisheating Creek in Glades County, Florida

Description

Subjects

bird | florida | turkeys | 1990s | wildturkey | fisheatingcreek | harriburg | gladescounty | digitalcollection | turkeypoults | statelibraryandarchivesofflorida | vision:mountain=0514 | vision:sky=0543 | vision:outdoor=0931 | lovettewilliams

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=31846825@N04&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Fannie Stewart and Ruby Smith carving wild turkey at the Brighton Reservation, Florida

Description

Subjects

cooking | turkey | florida | 1950s | nativeamericans | wildturkey | carvingturkey | seminoleindians | gladescounty | floridaseminoles | statelibraryandarchivesofflorida | rubysmith | brightonseminoleindianreservation | vision:outdoor=0973 | irvinmpeithmanncollection | fanniestewart

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=31846825@N04&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

DG5635 Telecommunications Fundamentals

Description

This unit provides you with the knowledge and understanding associated with noise sources, and the various methods of reducing their effects on the performance of electronic circuits. It also looks at and describes the factors affecting electromagnetic compatibility (EMC) and how these can be minimised by good design practice. The unit also provides you with an understanding of the modulation and demodulation techniques used in the telecommunications industry and applies this understanding to explain the function of various radio frequency (RF) circuits used in transmitters and receivers. Outcomes On completion of the unit the candidate should be able to: 1. Outline the various sources and factors that cause noise and EMC, and explain the reduction methods applied in practice. 2. Analyse m

Subjects

DG56 35 | Johnson noise equation | frequency modulation | pulse code modulation | time division multiplexing | amplitude shift keying | phase shift keying | frequency shift keying | X: Engineering | ENGINEERING | SCQF Level 8

License

Except where expressly indicated otherwise on the face of these materials (i) copyright in these materials is owned by the Scottish Qualification Authority (SQA), and (ii) none of these materials may be Used without the express, prior, written consent of the Colleges Open Learning Exchange Group (COLEG) and SQA, except if and to the extent that such Use is permitted under COLEG's conditions of Contribution and Use of Learning Materials through COLEG’s Repository, for the purposes of which these materials are COLEG Materials. Except where expressly indicated otherwise on the face of these materials (i) copyright in these materials is owned by the Scottish Qualification Authority (SQA), and (ii) none of these materials may be Used without the express, prior, written consent of the Colleges Open Learning Exchange Group (COLEG) and SQA, except if and to the extent that such Use is permitted under COLEG's conditions of Contribution and Use of Learning Materials through COLEG’s Repository, for the purposes of which these materials are COLEG Materials. Licensed to colleges in Scotland only Licensed to colleges in Scotland only http://content.resourceshare.ac.uk/xmlui/bitstream/handle/10949/17761/LicenceSQAMaterialsCOLEG.pdf?sequence=1 http://content.resourceshare.ac.uk/xmlui/bitstream/handle/10949/17761/LicenceSQAMaterialsCOLEG.pdf?sequence=1 SQA SQA

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Mapping Turkish International Migration Studies: Old Questions, New Challenges

Description

Prof Dr. Ahmet Icduygu, Migration Research Centre, Koc University, Istanbul, gives the first in a new series on Turkish Migration for COMPAS. Turkey has long been a major sending country of migrants and there are 3.7 million Turks and their descendants now living in the EU. However, Turkey has increasingly become a receiving and transit country for migrants. Its population is likely to grow from 75 to 90 million between now and 2050 but is already undergoing demographic transformation and has begun ageing. The Turkish economy is amongst the fastest growing in the OECD, and Turkey is becoming a strong regional power; it thus has potential to become a new gravity centre in the Mediterranean migration system. It is even suggested by some sources that Turkey should become a member of the Risin Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

Turkey | BRICS | migration | Turkey | BRICS | migration | 2011-06-22

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129204/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

The legal adaptation of British settlers in Turkey

Description

Lecture by Derya Bayir, Queen Mary Univesity and Prakash Shah, GLOCUL: Centre for Culture and Law, Queen Mary, University of London. Wales; http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Subjects

turkey legal | migration | turkey legal | migration

License

http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://mediapub.it.ox.ac.uk/feeds/129209/audio.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.831 User Interface Design and Implementation (MIT) 6.831 User Interface Design and Implementation (MIT)

Description

6.831 introduces the principles of user interface development, focusing on three key areas: Design: How to design good user interfaces, starting with human capabilities (including the human information processor model, perception, motor skills, color, attention, and errors) and using those capabilities to drive design techniques: task analysis, user-centered design, iterative design, usability guidelines, interaction styles, and graphic design principles. Implementation: Techniques for building user interfaces, including low-fidelity prototypes, Wizard of Oz, and other prototyping tools; input models, output models, model-view-controller, layout, constraints, and toolkits. Evaluation: Techniques for evaluating and measuring interface usability, including heuristic evaluation, predicti 6.831 introduces the principles of user interface development, focusing on three key areas: Design: How to design good user interfaces, starting with human capabilities (including the human information processor model, perception, motor skills, color, attention, and errors) and using those capabilities to drive design techniques: task analysis, user-centered design, iterative design, usability guidelines, interaction styles, and graphic design principles. Implementation: Techniques for building user interfaces, including low-fidelity prototypes, Wizard of Oz, and other prototyping tools; input models, output models, model-view-controller, layout, constraints, and toolkits. Evaluation: Techniques for evaluating and measuring interface usability, including heuristic evaluation, predicti

Subjects

human-computer interfaces | human-computer interfaces | human capabilities | human capabilities | human information processor | human information processor | perception | perception | Fitts's Law | Fitts's Law | color | color | hearing | hearing | task analysis | task analysis | user-centered design | user-centered design | iterative design | iterative design | low-fidelity prototyping | low-fidelity prototyping | heuristic evaluation | heuristic evaluation | keystroke-level models | keystroke-level models | formative evaluation | formative evaluation | input models | input models | output models | output models | model-view-controller | model-view-controller | toolkits | toolkits | programming project | programming project | GUI | GUI | Java | Java

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata