Student Type: Aikuisopiskelija
VR systems and humans
Virtual reality (VR) technology transports us to real or synthetic places that may be inaccessible, breathtaking, complex beyond our wildest imagination, or just simple and relaxing. Applications include entertainment, social interaction, virtual travel, remote training, architectural walkthroughs, cultural appreciation, and learning enhancement. Although VR has been around for decades, it always came with a high…
Simulations and tools for telecommunications 1 ECTS
In this course you will learn basics about the wireless communication channel, how the system performance can be evaluated, about different simulation levels and simulation as a process. You will get short introduction to some simulation software like Matlab, Simulink, OPNET, CST and/or ADS without practical simulations. Course contents Learning outcomes After the course, the…
Introduction to probability and statistical inference
Course contents Learning outcomes After the course, the student Completion methods Self-study and exam. More information in the Tampere University study guide. You can get a digital badge after completing this course.
Introduction to XR systems
The course provides you with an overview of XR hardware, XR systems software and a high level overview of human physiology, neuroscience, and human perception in relation to XR hardware and software. The practical part consists of homework assignments where you learn to build an XR experience with Unity. Course contents Learning outcomes After having…
Käyttäjäkokemus (UX)
Maksimimäärä FITech-opiskelijoita: 60 aikuisopiskelijaa Oletko kiinnostunut käyttöliittymäsuunnittelusta ja ehkä jo suorittanut Vaasan yliopiston käyttöliittymäsuunnitteluun liittyvän kurssin Introduction to human computer interaction? Tällä kurssilla opit, miten käyttäjäkokemukseen voidaan vaikuttaa ja miten sitä voidaan suunnitella erilaisilla menetelmillä. Kurssin sisältö Käyttäjäkokemuksen määrittely ja käyttäjäkokemuksen suunnitteluun liittyviin menetelmiin tutustuminen. Ajankohtaiseen käyttäjäkokemukseen liittyvään tutkimukseen tutustuminen ja sen käsittely ryhmän kesken.…
Entrepreneurship in international contexts
Course contents This course introduces you to the topic of entrepreneurs operating in international contexts and their business activities, exploring how individuals operate businesses across national borders. We start by exploring the theoretical foundations of international entrepreneurship in the context of global migration trends, including concepts such as diaspora networks, social capital, and internationalisation strategies.…
Fuzzy systems
Max amount of FITech students: 60 adult learners Are you interested in image processing, pattern recognition or systems control? This course gives you insight about how you can perform these and many other task with fuzzy logic. You learn to implement simple fuzzy algorithms from scratch and use existing popular tools. Course contents Learning outcomes…
Navigation technologies for autonomous systems
Max amount of FITech students: 50 adult learners The course starts with going through the various applications where navigation technologies are utilised in autonomous systems followed by going through the different navigation technologies and their pros and cons in details. Autonomous systems need to have means to typically answer the questions: And the technologies that…
Networked AI systems
Max amount of FITech students: 15 Persons without a valid study right at a Finnish university or university of applied sciences have preference to this course. Discover the crucial link between Networking and AI. Learn how to leverage AI for networking and how networking is key to enabling multiple AI systems. Course contents Learning outcomes…
Cryptographic systems and their weaknesses
The course teaches the basic concepts of cryptography from an applied engineering perspective and shows how the implementations of these cryptographic concepts have failed over the years. Course contents Basic concepts of cryptography, definitions and concepts of cryptographic security and testing these through programming. Showing different cryptographic weaknesses and demonstrating different implementations of these through…