Login to filter by course Login to filter by course Reset
Rumors and beliefsExplores conspiracy theories, analyzing their themes, authors, and levels of belief, and their impact post-9/11.
Radiative Heat TransferCovers radiative heat transfer, boundary conditions, heat flux, and particle clouds in participating media.
Media Security StandardsExplores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Trust and PrivacyExplores trust, privacy, visual protection, social media models, and blockchain technology.
Totalitarianism and PropagandaExplores the essence of totalitarianism and the manipulative power of propaganda in controlling individuals' beliefs and behaviors.
Hierarchical Control in RoboticsExplores hierarchical control concepts in robotics, including switching, prioritizing, and information chains, to achieve complex robot behaviors.
Cognition, Language & EmotionsExplores cognitive biases, emotions, and language evolution, covering memory failures, decision-making heuristics, and the origins of language.
From Comparator to AmplifierCovers the transition from a comparator to an amplifier, focusing on the different stages and components involved.