Survey methodology

Instructional manipulation check

An instructional manipulation check, often abbreviated IMC, is a special kind of question inserted in a questionnaire among the regular questions, designed to check whether respondents are paying attention to the instructions. Discarding responses by participants who fail to read the instructions reduces the signal-to-noise ratio and can thereby increase the statistical power of an experiment. The tool was developed by Oppenheimer et al. Eliminating random responses this way before performing statistical hypothesis testing may be considered a legitimate form of data manipulation, but should be duly mentioned in publications reporting on the outcome of the experiment in question. (Wikipedia).

Video thumbnail

DSLR cameras for video capture

Introduction to DSLR cameras to use as video capturing devices for lectures.

From playlist Creating video tutorials - a series for academic personnel

Video thumbnail

Machine Learning

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist Machine Learning

Video thumbnail

Grade 6 Module 6 lesson 7

This video discusses the mean (average) as a balancing point. Diagrams model how to find values that allow the balancing point to be maintained.

From playlist EngageNY Grade 6 Module 6

Video thumbnail

Excel

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist Microsoft Excel

Video thumbnail

ShmooCon 2014: Timing-Based Attestation: Sexy Defense, or the Sexiest?

For more information visit: http://bit.ly/shmooc14 To download the video visit: http://bit.ly/shmooc14_down Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl Speakers: Xeno Kovah | Corey Kallenberg | John Butterworth What if I told you it's possible to ask a drunk person if he's drunk -

From playlist ShmooCon 2014

Video thumbnail

DEFCON 20: No More Hooks: Detection of Code Integrity Attacks

Speakers: XENO KOVAH THE MITRE CORPORATION COREY KALLENBERG THE MITRE CORPORATION Hooking is the act of redirecting program control flow somewhere other than it would go by default. For instance code can be "inlined hooked" by rewriting instructions to unconditionally transfer to other co

From playlist DEFCON 20

Video thumbnail

Thanks for Watching!

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist Making Decisions

Video thumbnail

Introduction to Programming and Computer Science - Full Course

In this course, you will learn basics of computer programming and computer science. The concepts you learn apply to any and all programming languages and will be a good base onto which you can build your skills. This video is meant for those who are interested in computer science and pro

From playlist Computer Science Concepts

Video thumbnail

Introduction to Classification Models

Ever wonder what classification models do? In this quick introduction, we talk about what classifications models are, as well as what they are used for in machine learning. In machine learning there are many different types of models, all with different types of outcomes. When it comes t

From playlist Introduction to Machine Learning

Video thumbnail

An Introduction to Programming

Welcome to An Introduction to Programming. In this lecture-style series, we will be taking you through the basics of computer science and giving you the tools required to delve into any programming language you would like to learn. This video hopes to give you a good base onto which you ca

From playlist Software Development

Video thumbnail

Introduction to Precision, Recall and F1 | Classification Models

You may have come across the terms "Precision, Recall and F1" when reading about Classification Models and machine learning. In this Data Science in Minutes tutorial, we will explain what Precision, Recall and F1 are, and when you can use each for measuring the accuracy of your model! Lea

From playlist Introduction to Machine Learning

Video thumbnail

Security Vulnerability Mitigations

Security vulnerabilities allow software to be manipulated in such a way that it misbehaves to the benefit of an attacker - security vulnerability mitigations work to thwart attempts to successfully exploit such a vulnerability. This landscape is continually changing in both the types of at

From playlist Security

Video thumbnail

RailsConf 2019 - Pre-evaluation in Ruby by Kevin Deisz

RailsConf 2019 - Pre-evaluation in Ruby by Kevin Deisz _______________________________________________________________________________________________ Cloud 66 - Pain Free Rails Deployments Cloud 66 for Rails acts like your in-house DevOps team to build, deploy and maintain your Rails ap

From playlist RailsConf 2019

Video thumbnail

AI Weekly Update #11 - November 4th, 2019

https://deepmind.com/blog/article/AlphaStar-Grandmaster-level-in-StarCraft-II-using-multi-agent-reinforcement-learning https://www.microsoft.com/en-us/research/blog/pipedream-a-more-effective-way-to-train-deep-neural-networks-using-pipeline-parallelism/ https://ai.googleblog.com/2019/10/le

From playlist AI Research Weekly Updates

Video thumbnail

RubyConf 2015 - Inside Ruby's VM: The TMI Edition. by Aaron Patterson

Inside Ruby's VM: The TMI Edition. by Aaron Patterson This is about Ruby's Virtual Machine. Specifically MRI's Virtual Machine. We will take a dive in to how your Ruby code is compiled in to byte code and how that byte code is executed. Once we get a grip on how the VM works, we'll see ho

From playlist RubyConf 2015

Video thumbnail

Test-Time Augmentation In Machine Learning.

Most people think of data augmentation as a technique to improve their model during training. Starting from an initial dataset, you can generate synthetic copies of each sample that will make a model resilient to variations in the data. Test-time augmentation is a technique where you can

From playlist Machine Learning Techniques

Video thumbnail

What's Next?

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist The Internet

Video thumbnail

Stanford Seminar - Concatenative Programming: From Ivory to Metal

EE380: Computer Systems Colloquium Seminar Concatenative Programming: From Ivory to Metal Speaker: Jon Purdy, Microsoft Concatenative programming is a relatively new programming paradigm built on a simple yet powerful tool: function composition. In this talk I will give an overview of con

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Related pages

Signal-to-noise ratio | Likert scale | Computer-assisted web interviewing | Statistical hypothesis testing