MARTINDALE’S CALCULATORS ONLINE CENTER ELECTRICAL ENGINEERING & COMPUTER ENGINEERING: ComD (Calculators, Applets, Spreadsheets, 
Computer Science & Computer Engineering
Complexity Theory & Computational Complexity,
Computer Architecture & Engineering,
Digital Logic & Digital Systems,
Computer Science (Intro), Computer Coding,
Game Theory & Algorithmic Game Theory,
Software EngineeringSoftware Architecture,
Operating Systems & Systems Programming,
Computer Programming Languages,
Internet Technology & Distributed Systems,
Computer and Network Security,
Wireless and Mobile Networking & Security,
Algorithms & Data Structures,
Analytics & Data Mining,
Machine Learning & Deep Learning,
Cloud Computing, etc.
Artificial Intelligence; Computational Complexity; Computational Engineering; Computational Geometry; Computer Vision and Pattern Recognition; Cryptography and Security; Data Structures and Algorithms; Distributed, Parallel, and Cluster Computing; Multiagent Systems; Networking and Internet Architecture; Operating Systems; Programming Languages; Robotics; Software Engineering; etc…”
Complexity Theory Courses, Lectures, etc.
the study of the power and limitations of efficient computation…” Examples from over “27” “Complexity Theory” Course Lectures include
Nondeterminism; Relativization; Spacebounded nondeterminism; Timespace lower bounds; Lower bounds for constantdepth circuits; Randomness; Randomnessefficient error reduction; Timebounded derandomization; Approximate counting in the polynomialtime hierarchy; Probabilistically checkable proofs; etc…” For more information see 
Introduction to Computer Architecture Tutorials
of caches and pipelining. It contains examples, interactive applets and some problems with solutions to illustrate basic ideas…” Examples of “Computer Architecture Tutorial” Chapters & Subchapters include
Memory Hierarchy Design
Block Placement; Block Identification; Interaction with Memeory; etc…” Pipelining
Addressing Modes; DLX architecture; Basic Performance Issues in Pipelining; Pipeline Hazards; Pipeline with Multicycle Operations; etc…” For more information see Introduction to Computer Architecture Courses, Textbooks, Lectures, etc.
ISA Tradeoffs; Introdution to Microarchitecture: SingleCycle; MultiCycle and Microprogrammed Microarchitectures; Pipelining II: Data and Control Dependence Handling; Precise Exceptions, State Maintenance, State Recovery; GPUs, VLIW, DAE; Caches, Caches, Caches; Memory Management; Memory Consistency and Cache Coherence; etc…” For more information see
MIPS, MIPS Functions; Compiler, Assembler, Linker, Loader (CALL)S; MIPS SingleCycle Control, Pipelining Introduction; Memory Hierarchy, Fully Associative Caches; Performance, Floating Point, Tech Trends; Flynn Taxonomy, DataLevel Parallelism; Warehouse Scale Computing, MapReduce; I/O: DMA, Disks, Networking; etc…” For more information see Graduate Computer Architecture, Systems Architecture Courses, Textbooks, etc.
Early OutofOrder Processing; Modern OutofOrder Process; Vector Supercomputers; VLIW Machines; Synchronization and Memory models; Address Translation and Protection; etc…” For more information see Fault Tolerant Computer Architecture FOR FAULT TOLERANT COMPUTING ARCHITECTURE COURSES, TEXTBOOKS, TOOLS, ETC. SEE
on a system that supports multitasking. In most of the modern processors today it is often the case that multiple processes will need to share the resources of the system. Here we will simulate a cache on a system that supports multiple processes…”
Main Memory Size; Virtual Memory Size; etc…”
of the Scoreboarding algorithm used for Dynamic Scheduling…”
of the Tomasulo’s algorithm used for Dynamic Scheduling…”
Head Starting Track Number; Disk Access Track Number & Time between Disk Assesses; etc…” 
Digital Logic Courses, Lectures, etc.
Introduction to Logic Circuits: CAD Tools and VHDL; Optimized Implementation of Logic Functions: Multiple Output Circuits, NAND and NOR Logic Networks; Implementation Technology: Buffers, Tristate gates, Transmission gates; Number Representation and Arithmetic Circuits: Number Representation and Unsigned Addition; Combinatorial Circuit Building Blocks: Multiplexers; FlipFlops, Registers and Counters: Latches; Synchronous Sequential Circuits: State Diagrams, State Tables; VHDL for Sequential Circuits; etc…” For more information see Digital Systems Design Courses, Lectures, etc.
Programmable Device Technologies and Introduction to the Altera Cyclone IV FPGA; Memory Implementation on Altera CYCLONE IV Devices; DE2 LCD Display Controller; GlitchFree Clock Multiplexer; InSystem Memory Content Editor and SignalTap II Logic Analyze; Clock Networks and Phase Lock Loops on Altera Cyclone IV Devices; etc…” For more information see
Programming Technologies and PALs and PLDs; Overview of Boundary Scan and the Boundary Scan Interface in Spartan2 FPGAs; PicoBlaze Overview and PicoBlaze Manual and User’s Guide; HDLs in the Design Process; VHDL Names, Signals, and Attributes; VHDL Hierarchical Modeling; Parameterized RAM Modeling; VHDL FSM Modelin; etc…” For more information see Computation Structures Courses, Lectures, etc.
emphasizing structural principles common to a wide range of technologies…” Examples of “Computation Structures” Course Chapters include
Combinational Logic; Performance Measures; Assembly Language; Procedures & Stacks; Pipelining the Beta; etc…” For more information see Complex Digital Systems Courses, Lectures, etc.
Examples of “Complex Digital Systems: MultiMillionGate Hardware Designs” Course Lectures include
Combinational Circuits in Bluespec; Elastic Pipelines and Basics of Multirule Systems; Elastic Pipelines: Concurrency Issues; Modular Refinement; Stmt FSM; etc…” For more information see the Digital Systems Design with VHDL Courses, Lectures, etc.
Digital Systems Design Calculators & Applets
from gate and RTlevel to systemlevel…” Examples of “Hades Demonstration Applets” Categores & Applets include
Basic Gates Applet; Clock Generator Component Applet; etc…” Gatelevel Circuits
OR and NOR Gate Applet; De Morgan’s Transformation Applet; AOI and OAI Complex Gates Applet; Dice LED Decoder Applet; etc…” Flipflops
Flipflop Components Demonstration Applet; TTLseries 74273 8bit Dtype Register Applet; Muller CGate Applet; Micropipeline with Cgates Applet; etc…” Counters; For more information see
Introduction to Computer Science
applications emphasizing modern software engineering principles: objectoriented design, decomposition, encapsulation, abstraction, and testing…” Programming Abstractions Video Course
of data abstraction and modularity. Objectoriented programming, fundamental data structures (such as stacks, queues, sets) and datadirected design…” Programming Paradigms Video Course
between imperative and objectoriented paradigms. The functional paradigm (using LISP) and concurrent programming…” For more information see
Nondeterministic Computation; Design of Logic Circuits; Introduction to Complexity Classes; Proving a Language NPComplete; Equivalence of the DFSM and FSM; The Chomsky Language Hierarchy; Properties of ContextFree Languages; Limits to Language Recognition; etc…” For more information see 
Computer Science & Game Theory ePrints
Game Theory Journals
Game Theory Courses, Lectures, etc.
backward induction, Nash equilibrium, evolutionary stability, commitment, credibility, asymmetric information, adverse selection, and signaling are discussed and…” Examples from over “20” “Game Theory” Course Video Lectures include
Nash Equilibrium: Location, Segregation and Randomization Video Lecture; Mixed Strategies in Baseball, Dating and Paying Your Taxes Video Lecture; Evolutionary Stability: Social Convention, Aggression, and Cycles Video Lecture; Backward Induction: Commitment, Spies, and FirstMover Advantages Video Lecture; Backward Induction: Ultimatums and Bargaining Video Lecture; Subgame Perfect Equilibrium: Wars of Attrition Video Lecture; etc…” For more information see
Computing Mixed Nash Equilibrium; Hardness Beyond 2×2 Games; Strictly Dominated Strategies & Iterative Removal; Maxmin Strategies; Formalizing Perfect Information Extensive Form Games; Subgame Perfection; Subgame Perfect Application: Ultimatum Bargaining; Imperfect Information Extensive Form: Definition, Strategies; Bayesian Games: First Definition; Bayesian Games: Second Definition; Coalitional Game Theory: Definitions; etc…” For more information see Algorithmic Game Theory Courses, Lectures, etc.
Algorithmic Mechanism Design Video Lecture; Simple NearOptimal Auctions Video Lecture; Spectrum Auctions Video Lecture; Kidney Exchange, Stable Matching Video Lecture; Network OverProvisioning Video Lecture; Hierarchy of Equilibrium Concepts Video Lecture; BestCase and Strong Nash Equilibria Video Lecture; NoRegret Dynamics Video Lecture; etc…” For more information see
nonatomic congestion games and the price of anarchy; Atomic Congestion Games and the Price of Anarchy; Price of Stability of Cost Sharing Game; Bayesian Nash Equilibrium and First Price Auction; Smooth Auctions and the Price of Anarchy in Auction Games; Price of Anarchy for GSP; Walrasian Pricing Equilibrium; ArrowDebreu Market Equilibrium; etc…” For more information see 
Three types of software process; etc…” Design
Security; Object oriented program design; Reuse and legacy systems; Design patterns; etc…” Testing and reliability; etc. For more information see
Composition of State Machines; Hierarchical State Machines; Multitasking; Operating Systems, Microkernels, and Scheduling; Specification; Temporal Logic; Comparing State Machines; Execution Time Analysis; Synchronous/Reactive Models; etc…” For more information see
operating systems concepts that appear in other advanced systems. Topics we will cover include concepts of operating systems, systems programming, networked and distributed systems, and storage systems, including multipleprogram systems…” Examples from over “15” “Operating Systems and Systems Programming” Course Lectures include
I/O Continued, Sockets, Networking; Cooperating threads, Synchronization; Semaphores, Condition Variables, Readers/Writers; Deadlock, Address Translation, Virtual Memory; Input/Output, I/O Layers, Storage DevicesI/O Performance and Lowlevel Optimization; FileSystems (finished), MMAP and Reliability: ACID, 2PC; etc…” For more information see
Process scheduling, realtime scheduling; Memory management: working sets, paging algorithms; Kernel memory management; Network protocols; Sockets architecture; Virtualization, Virtual machines; etc…” For more information see
Linear Codes; Hamming Codes; Generalized ReedSolomon Codes; Codes over Subfields; Weight and Distance Enumeration; etc. For more information see
Roofline model; Compiler limitations; Linear algebra, BLAS, MMM optimizations using models; MMM optimizations related to virtual memory; LGen: Program generator for basic linear algebra; SIMD vector extensions continued: compiler vectorization; Linear transforms, fast algorithms, discrete Fourier transform (DFT); Linear algebra, BLAS, MMM optimizations using models; Memory bound computation: Sparse linear algebra; Optimizing CooleyTukey FFT, FFTW; etc…” For more information see
About Hack v2.010 – Chris Simpkins @ github Opensource typeface “Hack” brings design to source code – Ars Technica – 8/20/2015 “…The days of coders being shackled to Monaco or Courier New ends now. At SourceFoundry.org this week, programmer Chris Simpkins debuted the 2.0 version of Hack, an opensource typeface designed specifically for use in source code…” “…Hack has been released as a free and open source project (available via SourceFoundry and GitHub) that is free to modify, to use in commercial situations, and to download for print, desktop, or Web…”
Computer Programming Languages, etc. Open Source Software
SourceForge.net provides free hosting to Open Source software development projects with a centralized resource for managing projects, issues, communications, and code…” 
Synchronization: logical clocks, vector clocks, clock synchronization; Group communication: message ordering and message delivery, IP multicasting; Distributed transactions: two phase commit, threephase commit, ACID/BASE models; Distributed file systems: Dropbox, Chubby, Google FS (GFS), Hadoop Distributed FS (HDFS); Clustering: scalable performance, load balancing, and availability; Distributed authentication: protocols, digital certificates, Kerberos, SSL; etc…” For more information see
FOR RELATED CENTERS SEE CRYPTOGRAPHY, STEGANOGRAPHY, ETC. COURSES, TEXTBOOKS, ETC. Computer and Network Security Courses, Lectures, etc.
stealth malware, and exploits…” For more information see
functions of Python that play a role in a penetration testing career…” “…This course will take you from basic concepts to advanced scripts in just over 10 hours of material, with a focus on networking and security. Students will learn about networking protocols, fuzzing, and information gathering automation in a simple, easytounderstand format…” Examples of ” Python for Security Professionals” Course Modules include
Journeyman Python Module; Advanced Python Module; Packet Analyzer Module; etc..”
Block Ciphers and the Data Encryption Standard; Finite Fields (Part 1, 2, 3 & 4); Key Distribution for Symmetric Key Cryptography and Generating Random Numbers; PublicKey Cryptography and the RSA Algorithm; Certificates, Certificate Authorities, and Digital Signatures; Elliptic Curve Cryptography and Digital Rights Management; DNS and the DNS Cache Poisoning Attack; PGP, IPSec, SSL/TLS, and Tor Protocols; Malware: Viruses and Worms; Port and Vulnerability Scanning, Packet Sniffing, Intrusion Detection, and Penetration Testing; Web Security: PHP Exploits and the SQL Injection Attack; Bots and Botnets; Mounting Targeted Attacks with Trojans and Social Engineering; etc…” For more information see
While the companion course for undergraduates is focused on practical issues, the syllabus of this course is influenced strictly by the latest research. We will cover a range of topics, including authentication, integrity, confidentiality of distributed systems, network security, malware, privacy…” Examples of Advanced Information Assurance Graduate Course Lectures include
Information Hiding: Covert Channels; Information Leakage: Side Channels; Censorship Resistance: Parrots; Privacypreserving Services: Social Networks; Security and Privacy of Future Internet Architectures: NamedData Networking; Hardware Security: Trusted Platform Module; Online Tracking; Traffic Analysis: Flow Correlation; etc…” For more information see
MerkleHellman Demonstration (Java Applet); Mod arithmetic; etc…” Some Odd Ciphers (Java Applets);
DES, IDEA, AES; AES code; etc…” Message Digest – Auth, Integ, Encrypt
SHAxxx Description; SHA1 Broken; Hash Collisions; Karn Symmetric Key Algorithm; etc…” Public Key Cryptosystems
RSA; DSS; etc…” Stream Ciphers and Authentication Protocols; etc. For more information see
Dealing with legacy code: sandboxing and isolation; Tools for writing robust application code; Exploitation techniques and fuzzing; Web application security; Session management and user authentication; Security issues in Internet protocols: TCP, DNS, and routing; Malware: Computer viruses, Spyware, and keyloggers; Mobile platform security models: Android and iOS; Mobile threats and malware; etc…” For more information see Blackhat Technical White Paper Presentations

Undergraduate Courses, Lectures, etc.
Shadowing, Combined Path Loss/Shadowing, Coverage Area, Model Parameters; Statistical Fading Models: Narrowband Fading; Fading Distributions and Duration. Markov Model. Wideband Fading. Doppler and Delay Spread; Capacity of Flat and FS Fading Channels Linear Modulation; ISI and doppler effects, Diversity; ractical constraints in adaptive modulation, MIMO and space/time communications; MIMO systems, Capacity, Beamforming, Diversity; Multicarrier modulation, OFDM; etc…” For more information see Graduate Courses, Lectures, etc.
for mobile wireless networks. The course aims at equipping graduate students with not only a solid foundation and the stateoftheart knowledge in a wide spectrum of wireless communications techniques and protocols…” Examples from over “13” “Mobile Wireless Networking” Course Lectures include
Characterizations and Modeling of the Wireless Channel; Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks; etc…” For more information see 
Algorithms & Data Structures Dictionaries
data structures, archetypical problems, and related definitions…” For more information see Undergraduate Algorithms & Data Structures Courses, Lectures, etc.
including asymptotic analysis; divideandconquer algorithms and recurrences; greedy algorithms; data structures; dynamic programming; graph algorithms; and randomized algorithms…” Examples from over “171” Design and Analysis of Algorithms Course Video Lectures include
Algorithmic Mechanism Design Video Lecture; A Generic Selection Algorithm Video Lecture; Representing Graphs: Adjacency Matrices and Lists Video Lecture; Dijkstra’s Algorithm Video Lecture; Correctness of Algorithm Video Lecture; Two Greedy Algorithms Video Lecture; Prim’s Algorithm Video Lecture; Kruskal’s Algorithm Video Lecture; etc…” For more information see
algorithms that constitute the core of the modern algorithms toolkit. Emphasis will be on understanding the highlevel theoretical intuitions and principles underlying the algorithms we discuss, as well asndeveloping a concrete understanding of when and…” Examples of “Modern Algorithmic Toolbox” Lectures include
LSH and Nearest Neighbor Lectures; Sampling and Estimation Lectures; LinearAlgebraic Techniques Lectures; Mathematical Programming and Sparse Vector/Matrix Recovery Lectures; etc…” For more information see
including design and analysis of algorithms, formal languages and automata, computability, and complexity…” Examples of “Algorithms and Models of Computation” Subject Categories & Lectures include
Contextfree grammars; Reductions, Recursion, Divide and Conquer, Sorting; Backtracking, Intro to Dynamic Programming: Fibonacci; Dynamic Programming: Longest Increasing Subsequence, Interval Scheduling; Greedy Algorithms: techniques, examples; Minimum spanning tree algorithms; etc…” For more information see
Fast Integer Multiplication; “…More advanced dynamic programs involving internal sequences: RNA Secondary Structure…” “…Sequence Alignment problem. BellmanFord shortest path algorithm…” Proof of the maxflow, mincut theorem; etc…” For more information see
Adaboost; Toll/Congestion. Slides. Handout/slides; Review of Duals. Complementary Slackness. Facility Location; Lagrange. Convex Bodies. Farkas. Strong Duality; Semidefinite Programming. MaxCut; Streaming; Power of Two; More cheeger, isoperimetric; Cheeger, mixing for partial orders; Linear time linear systems; …” For more information see
large datasets, with a specific focus on integrating information from multiple datasets. In this context, we will cover parallel algorithms (which partition computation across many machines), streaming algorithms…” Examples of “Algorithms for BigData Management” Course Lectures include
Coupling and Mixing Times; Streaming Algorithms: Filtering & Estimating the number of distinct objects; Streaming Algorithms: Online Aggregation; Parallel Architechtures: Asynchronous Processing; Parallel Architechtures: Feed Following; Clustering & Deduplication: Correlation Clustering; Clustering & Deduplication: Collective Entity Resolution & Scalability; etc…” For more information see
of algorithms. The material covered draws from classical mathematical topics, including discrete mathematics, elementary real analysis,…” An Introduction to the Analysis of Algorithms Lectures (Slides)
at Princeton, developed to provide an overview of An Introduction to the Analysis of Algorithms and Analytic Combinatorics…” Examples of “An Introduction to the Analysis of Algorithms” Lectures include
Generating functions; Analytic combinatorics; Permutations; Strings and Tries; etc…” For more information see Undergraduate Computer Arithmetic Algorithms Calculators
Multiplication Computer Arithmetic Algorithms Calculators; Division Computer Arithmetic Algorithms Calculators; Square Root Computer Arithmetic Algorithms Calculators; FloatingPoint Arithmetic Computer Arithmetic Algorithms Calculators; Elementary Functions Computer Arithmetic Algorithms Calculators; Unconventional Number Systems Computer Arithmetic Algorithms Calculators; etc…” For more information see
Type of divider to use (srt4 comprised of 2 srt2; srt8 comprised of 3 srt2; srt16 comprised of 4 srt2; etc.); Signal Delays (CSA; 3 input Mux; 7 input Mux; etc.)…”
Signal Delays (Pred. Exponent; Pred. Leading Zeroes; Simple 2 to 1 Mux; etc.)…”
Graduate Algorithms & Data Structures Courses, Lectures, etc.
relations and divideandconquer algorithms, dynamic programming, graph algorithms (e.g., network flow), amortized analysis, cacheefficient and externalmemory algorithms, high probability bounds and…” Examples from over “26” “Analysis of Algorithms” Course Lectures include
Polynomial Multiplication & the Fast Fourier Transform; AkraBazzi Recurrences; Linear Recurrences with Constant Coefficients Generating Functions; Binomial Heaps; Dijkstra’s SSSP & Fibonacci Heaps; Analyzing Parallel Algorithms; Analyzing I/O and Cache Performance; etc…” For more information see
Applications of MSTs; Divide and Conquer Algorithms; Dynamic Programming; NP and Computational Intractability; NPComplete Problems; etc…” For more information see
Topics will include divide and conquer algorithms, greedy algorithms, graph algorithms, algorithms for social networks, computational biology, optimization algorithms,…” Example of “Design and Analysis of Algorithms” Course Lectures include
Graph algorithms; Network flow; Phylogenetic trees; Optimization; Graph Clustering; Crowdsource: Knapsack problems & Sequence Alignments; Crowdsource: NPhard problem & Approximation Algorithms; etc…” For more information see 
Graduate Analytics & Data Mining Courses, Lectures, etc.
data mining and predictive analytics…” Examples of “Data Mining and Predictive Analytics” Course Lectures include
Graphical Models & Interdependent Variables; Text Mining; Network Analysis; Modeling Temporal and Sequence Data; etc…” For more information see Data Mining Software (Examples)
can either be applied directly to a dataset or called from your own Java code. Weka contains tools for data preprocessing, classification, regression, clustering, association rules, and visualization…” For more information see
for the entire analysis process: data access, data transformation, initial investigation, powerful predictive analytics, visualisation and reporting…”
data modeling, and data visualization — with access to data sources like Excel, Access, Oracle, IBM DB2, Microsoft SQL, Sybase, Ingres, MySQL, Postgres, SPSS, dBase, Text files,…”
transforms data into forms that can be readily modelled, builds both unsupervised and supervised models from the data, presents the performance of models graphically, and scores new datasets…”
TensorFlow – Open Source Software Library for Machine Intelligences
Undergraduate Machine Learning & Deep Learning Courses, Lectures, etc.
Deep Learning. By working through it, you will also get to implement several feature learning/deep learning algorithms, get to see them work for yourself, and learn how to apply/adapt these ideas to new problems…”
Linear Regression with with Multiple Variables Video Lectures; Regularization Video Lectures; Neural Networks: Representation Video Lectures; Machine Learning System Design Video Lectures; Dimensionality Reduction Video Lectures; Anomaly Detection Video Lectures; etc…” For more information see
Kernel methods; Boosting; Regression; Ranking; Learning Languages; etc…” For more information see Graduate Machine Learning & Deep Learning Courses, Lectures, etc.
and indepth coverage of new and advanced methods in machine learning, as well as their underlying theory. It emphasizes approaches…” Examples from over “18” “Advanced Machine Learning” Course Lectures include
Statistical Learning Theory: Error Bounds and VCDimension; Support Vector Machines: Duality and Leaveoneout; Generative Models for Classification; Modeling Sequence Data: HMMs and Viterbi; Structured Output Prediction: Discriminative Learning; etc…” For more information see
where many stages of nonlinear information processing in hierarchical architectures are exploited for pattern classification and for feature learning. In the more recent literature, it is also connected to representation learning, which involves a hierarchy of features or concepts where higherlevel concepts are defined from lowerlevel ones and where the same lowerlevel concepts help to define higherlevel ones…” For more information see
Regression; Gaussian Processes; Latent Variable Models, etc…” For more information see
Kernel trick continued, stochastic gradient descent (SGD); etc…” Document Retrieval
Clustering: GMM, EM; LDA, Gibbs sampling for LDA; Variational methods and online variational for LDA; etc…” fMRI Prediction
LARS, fused LASSO, Shotgun, stochastic coordinate descent (SCD), averaging methods; etc…” Collaborative Filtering
Coldstart problem, featurebased collaborative filtering. Graphparallel problems; etc…” For more information see Machine Learning and Artificial Intelligence Index of Courses, Lectures, etc.

Network Routing; First and Second Tier Cloud Services; Adaptive Overlays for the Tier 2 Cloud; Consistency and time. Logical and Vector clocks. Consistent cuts; Consensus and the FLP theorem; Atomic multicast with Virtual Synchrony guarantees; Atomic multicast tradeoffs; STransactional model, ACID; etc…” For more information see
IAEval “…a simple Interval Arithmetic Evaluator…” GIAEval “…A General Interval Arithmetic Evaluator…” For more information see COMPUTER CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS

Computer Graphics, Image Processing,
Computer Vision, Chromaticity, Concepts of Color, etc.
Image Processing, Computer Vision, Chromaticity, Color, Colorimetric Representations, Introduction to Color Graphics Tool for Lindermayer Systems

Computer Graphics, Computer Image Processing, Computer Vision, Color, Image Processing, etc.
Computer Vision
robotics applications…” Examples of “BoofCV” Applet Categories on the “Home Page” include
Feature Applets; Geometric Applets…” Examples of “BoofCV” Applet Categories in the “List of Applets” include
Image Feature Intensity Applets; Detected Image Features Applets; Associating Image Features Applets; Image Transforms Applets; Camera Calibration Applets; 3D Computer Vision Applets, etc…” Spherical Harmonics
represented as spherical harmonics (SH). Given a spherical probability density function (PDF) represented as a vector of SH coefficients, our method warps an input point set to match the target PDF using hierarchical sample warping…” For more information see
incredible images to be produced in a fraction of the time and with massive data sets – that only a few years ago seemed impossible. We explain SH and the amazing way Weta Digital in particular is pushing their use in production rendering…” For more information see
(component) M; R polar resolution; etc…”
CHROMATICITY VIDEOS/MOVIES & AUDIO/SOUND COLOR CALCULATORS, APPLETS, ANIMATIONS & SPREADSHEETS (XLS) COLORIMETRIC REPRESENTATIONS CALCULATORS & SPREADSHEETS (XLS)
Levels Calculator; ColorChecker Calculator; ColorChecker RGB Summaries, Calculators and Lab TIFF File; Munsell Display Calculator; Dot Gain Calculator; Also includes Color Equations
various Colorimetric Representations; and Color Information, Studies and Files…”
models as well as providing correlated color temperature and standard RGB conversions…”
in xyY, Lab and Luv. This is a useful tool for evaluating uniform perceptual color spaces…”
educational aide to help students better understand the concepts of color, its characteristics, representations and transformations as applied to computer graphics…” For more information see
The Spectrum Calculator Spectrum Calculator
spectrum is “perceived” by the computer eye, which calculates three numbers: X, Y, and Z…”
spaces and how conversion between these spaces can be done…”
provided by computer monitors Features currently incorporated…” For more information see
Combined Color Mixing Applet; Metamers Applet; Reflection Applet; RGB Insufficiency Applet; Single Cell Response Applet; Triple Cell Response Applet; Two Materials Applet For more information see
Examples of Undergraduate & Graduate Courses include
Computer Games; User Interfaces; Physical Media; Multimedia; etc…” For more information see
overlooked in 3D computer graphics education…” Viewing Techniques;
Signal Processing
convolution and image filtering and scaling…” Texture Mapping
raytracing algorithms…” Scenegraphs; For more information see
scenegraph data structures which offer a highlevel vocabulary with which to describe 3D scenes…” Scenegraphs Applets include:
various techniques used to view a synthetic 3D scene…” Viewing Techniques Applets include:
Perspective Camera Parameters; Perspective Camera Transformation; Radiosity Form Factor; etc…”
concepts in lighting and shading for 3D computer graphics…” Lighting & Shading Applets include:
Radiosity Shooting vs Gathering; etc…”

For more information see
tool for evaluating Lindenmayer grammars…” For more information see 
COMPUTER HARD DRIVE CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
Visualize Magnetoresistive (MR) and Giant Magnetoresistive (GMR) Heads in action; Observe the physics of Giant Magnetoresistive (GMR) in motion…” For more information see
and how it actually works internally…” For more information see the COMPUTER MONITOR SPECTRAL CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
the spectrum as represented on a computer monitor!…” For more information see 
Voltmeter, Wheatstone, etc.
CURRENT CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
FREQUENCY CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS ANALOG METER CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
For more information see EDDY CURRENT CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
MULTIMETER VOM CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
resistance. These devices are often combined into one instrument called a multimeter or VOM (voltohmmilliemmeter)…” For more information see REFLECTOMETER CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
transmission line, part of the incident wave is reflected back…” For more information see WHEATSTONE BRIDGE CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
Wheatstone Bridge Calculator #2
For more information see
MEASUREMENT & CONTROL COURSES, LESSONS, ETC. WITH CALCULATORS & APPLETS
Force Related Measurements; etc….” Temperature:
Wire Color Codes and Limits of Error; Introduction to Temperature Controllers; Introduction to Temperature Measurement; etc…” Pressure, Strain and Force:
Introduction to Pressure Transducers; etc…” Flow and Level:
Liquid Flowmeters; etc…” Data Acquisition:
Introduction to Data Acquisition Systems; Introduction to Data Logging Systems; etc…” For more information see CONTROL SYSTEMS DESIGN CALCULATORS & APPLETS
and graduate students along with steel company employees and people within the steel industry supply chain. Professors, instructors, teachers and trainers will also benefit from the use of steeluniversity learning+ to organise and supplement instruction for their students…” Examples of “Steeluniversity” Course Modules include
Ferrous Metallurgy (6 Hours); Blast Furnace (2 Hours); Basic Oxygen Steelmaking (2 Hours); Electric Arc Steelmaking (2 Hours); Thermodynamics and Kinetics (2 Hours); Mechanical Properties (1 Hour); etc…” For more information see
Inverted Pendulum; Rolling Mill; Tank Level Control; Ball and Plate; Shape Control; Distillation Columns; etc…” For more information see

DATA STRUCTURE CALCULATORS, APPLETS, ANIMATIONS & SIMULATIONS
PARALLEL ALGORITHM APPLETS, SORTING ALGORITHM APPLETS TREE ALGORITHM CALCULATORS & APPLETS DATA STRUCTURE APPLETS WITH COURSES
String Matching Applets; Stack and Queue Applets; Binary Search Tree Applets; Heap/Priority Queue Applets; Red Black Tree Applets; AVL Tree Applets; etc…” For more information see
Postman Sort Applets; Twoway Selection Sort Applets; etc…”
Boyer Moore String Matching Algorithm Applet; Knuth Morris Pratt String Matching Algorithm Applet; RobinKarp String Matching Algorithm Applet…”
Linked Lists Applets; Recursion Applets; Advanced Sorting Applets; Binary Tree Applets; Redblack Tree Applets; 234 Tree Applets; Hash Table Applets; Heap Applets; Graphs Applets; Weighted Graphs Applets…” For more information see

Leave a Reply