Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Data collection
Graph Chatbot
Related lectures (32)
Login to filter by course
Login to filter by course
Reset
Research Design: Intermediate Variables
Emphasizes specificity in defining variables and the importance of incorporating intermediate variables in educational studies.
Interview Methods
Explores interview survey methods, preparation, types of interviews, question formulation, and interaction quality.
Predicting Bitcoin's Price with ML and Twitter Inputs
Showcases a project predicting Bitcoin's price using Twitter and ML, achieving 60% accuracy.
Art Authentication with AI
Explores an EPFL student's internship experience in art authentication using AI.
Google Analytics 4: Understand & set up GA4
Introduces Google Analytics 4 and guides on setting it up for WordPress websites, emphasizing key differences and event tracking.
Critical Data Studies: Introduction and Models
Introduces the Critical Data Studies course, covering data models, trust, reproducibility, biases, and ethics.
Urban Air Quality Monitoring with Sensor Networks
Explores urban air quality monitoring with sensor networks and crowdsensing for data collection.
Tracking Built-in Events in Google Analytics 4
Explains how to verify and activate built-in events in Google Analytics 4.
Participatory Capacity, Vulnerability, and Risk Analyses
Covers Participatory Capacity and Vulnerability Analysis (PCVA) as a method for engaging local stakeholders in disaster risk and vulnerability diagnosis.
Observation Methods in Social Sciences
Covers observation methods in social sciences, emphasizing direct and indirect observation, participant observation, and multi-situated ethnography.
Inventory Objective: Scaling Elementary Processes
Covers the objective of scaling elementary processes in inventory and includes examples of inventory calculations for brownies and coffee consumption.
Personal Devices Security: Attacks and Defenses
Explores security and privacy issues in personal electronic devices, covering attacks, defenses, and consequences.
Previous
Page 2 of 2
Next