Instructional Video5:26
Curated Video

High Performance Scientific Computing with C 1.5: Linear Equations and Matrix Methods

Higher Ed
How can we invert a matrix? How fast can we do it? • Learn why matrix inversion is useful • See how to invert a matrix numerically • Learn how expensive matrix inversion is
Instructional Video3:21
Curated Video

Learning R for Data Visualization (Video 3)

Higher Ed
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
Instructional Video25:43
APMonitor

MathCAD Nonlinear Equation Solver

10th - Higher Ed
Solution of variables within nonlinear expressions can either be difficult or impossible with analytic or symbolic techniques. When a numerical solution is required, a nonlinear solution technique can be used within Mathcad with either a...
Instructional Video16:07
Programming Electronics Academy

Arrays and For Loops Continued: Arduino Course 7.5

Higher Ed
A walkthrough of using arrays and for loops in programming.
Instructional Video20:36
Programming Electronics Academy

Tone Library Continued: Arduino Course 6.6

Higher Ed
A description of how to explore a code library.
Instructional Video9:06
Curated Video

Mastering Tableau 2018.1, Second Edition 1.2: Exploring Tableau and Data Visualization

Higher Ed
In this video, we’ll see the features and functionalities that Tableau provides. We’ll also look at the basics of creating a data visualization. • How to visualize data in Tableau? • Creating your first data visualization
Instructional Video5:22
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Poisoning Attacks, Privacy, and Backdoor Attacks Theory

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Instructional Video4:27
Curated Video

routing protocols : Benefits of link state routing and Drawbacks of link state routing

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Benefits of link state routing and...
Instructional Video1:13
Packt

Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defence from Modified Model Category

Higher Ed
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show a practical example of defense...
Instructional Video16:38
Curated Video

Test a computer program or algorithm : Handling User Errors

Higher Ed
From the section: Errors in Python. This section introduces you to errors in Python. This video explains how to handle user errors.
Instructional Video1:10
Curated Video

Modify a data structure : Linked List - Independent Exercise

Higher Ed
From the section: Linked Lists. Linked Lists: Linked List - Independent Exercise Linked Lists: Linked List - Independent Exercise
Instructional Video13:11
Curated Video

Implement different search algorithms : BST - Deleting leaf nodes

Higher Ed
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Delete scenario one - deleting nodes with no children (leaf nodes)
Instructional Video13:07
Curated Video

Implement different search algorithms : Build a Binary Search Tree from scratch - Insert

Higher Ed
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Inserting nodes into a BST in-depth with test cases
Instructional Video6:03
Curated Video

Describe network protocols : Multi-thread Echo Server

Higher Ed
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will have a look at how multi-thread TCP echo server works. • Understand that the...
Instructional Video3:57
Curated Video

Describe a neural network : Neural Network with PCA for Binary Classifications

Higher Ed
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Instructional Video6:26
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Convolutional Neural Networks (CNN's)

Higher Ed
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: Convolutional Neural Networks (CNN's)
Instructional Video8:38
Curated Video

Compare different types of data structures : Segment Trees and the RMQ Problem

Higher Ed
From the section: Tree-Based Data Structures. In this section, we will go over a few robust tree-based data structures, that are indispensable for efficiently solving various query-related problems. In this video, we revisit the RMQ...
Instructional Video32:13
APMonitor

Introduction to MathCAD for Engineers

10th - Higher Ed
Mathcad is a tool to arrange, calculate, and visualize engineering calculations. A Mathcad sheet has values, equations, plots, and functions that are written and displayed in a manner that is similar to how they are written in a textbook...
Instructional Video4:40
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Backdoor Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Instructional Video4:05
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Instructional Video3:33
Curated Video

routing protocols : OSPF Hierarchy - Multiple areas

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: OSPF Hierarchy - Multiple areas
Instructional Video6:34
Curated Video

Explain web security : What is Reconnaissance?

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Instructional Video2:32
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 2

Higher Ed
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Instructional Video9:06
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 2

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...