Curated Video
High Performance Scientific Computing with C 1.5: Linear Equations and Matrix Methods
How can we invert a matrix? How fast can we do it? • Learn why matrix inversion is useful • See how to invert a matrix numerically • Learn how expensive matrix inversion is
Curated Video
Learning R for Data Visualization (Video 3)
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
APMonitor
MathCAD Nonlinear Equation Solver
Solution of variables within nonlinear expressions can either be difficult or impossible with analytic or symbolic techniques. When a numerical solution is required, a nonlinear solution technique can be used within Mathcad with either a...
Programming Electronics Academy
Arrays and For Loops Continued: Arduino Course 7.5
A walkthrough of using arrays and for loops in programming.
Programming Electronics Academy
Tone Library Continued: Arduino Course 6.6
A description of how to explore a code library.
Curated Video
Mastering Tableau 2018.1, Second Edition 1.2: Exploring Tableau and Data Visualization
In this video, we’ll see the features and functionalities that Tableau provides. We’ll also look at the basics of creating a data visualization. • How to visualize data in Tableau? • Creating your first data visualization
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Poisoning Attacks, Privacy, and Backdoor Attacks Theory
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Curated Video
routing protocols : Benefits of link state routing and Drawbacks of link state routing
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Benefits of link state routing and...
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defence from Modified Model Category
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show a practical example of defense...
Curated Video
Test a computer program or algorithm : Handling User Errors
From the section: Errors in Python. This section introduces you to errors in Python. This video explains how to handle user errors.
Curated Video
Modify a data structure : Linked List - Independent Exercise
From the section: Linked Lists. Linked Lists: Linked List - Independent Exercise Linked Lists: Linked List - Independent Exercise
Curated Video
Implement different search algorithms : BST - Deleting leaf nodes
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Delete scenario one - deleting nodes with no children (leaf nodes)
Curated Video
Implement different search algorithms : Build a Binary Search Tree from scratch - Insert
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Inserting nodes into a BST in-depth with test cases
Curated Video
Describe network protocols : Multi-thread Echo Server
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will have a look at how multi-thread TCP echo server works. • Understand that the...
Curated Video
Describe a neural network : Neural Network with PCA for Binary Classifications
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Convolutional Neural Networks (CNN's)
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: Convolutional Neural Networks (CNN's)
Curated Video
Compare different types of data structures : Segment Trees and the RMQ Problem
From the section: Tree-Based Data Structures. In this section, we will go over a few robust tree-based data structures, that are indispensable for efficiently solving various query-related problems. In this video, we revisit the RMQ...
APMonitor
Introduction to MathCAD for Engineers
Mathcad is a tool to arrange, calculate, and visualize engineering calculations. A Mathcad sheet has values, equations, plots, and functions that are written and displayed in a manner that is similar to how they are written in a textbook...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Backdoor Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Curated Video
routing protocols : OSPF Hierarchy - Multiple areas
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: OSPF Hierarchy - Multiple areas
Curated Video
Explain web security : What is Reconnaissance?
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 2
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 2
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...