Instructional Video10:45
Curated Video

Predictive Analytics with TensorFlow 5.1: Using K-means for Predictive Analytics

Higher Ed
This video will have a brief introduction to the unsupervised machine learning technique. We will also look at k-means for predictive analytics. • Understand the concept of clustering • See how k-means work • Use k-means for predicting...
Instructional Video3:50
Curated Video

Predictive Analytics with TensorFlow 7.4: Deep Belief Networks

Higher Ed
While weights of an MLP are initialized randomly, a DBN uses a greedy layer-by-layer pretraining algorithm to initialize the network weights through probabilistic generative models composed of a visible layer and multiple layers of...
Instructional Video6:59
Curated Video

Predictive Analytics with TensorFlow 7.2: Fine-tuning DNN Hyperparameters

Higher Ed
First, we will see DNN performance analysis. Next, we will tune the DNN hyperparameters. • Do DNN performance analysis • Tune the DNN hyperparameters
Instructional Video3:18
Packt

Course Introduction - Data Structures and Algorithms The Complete Masterclass

Higher Ed
This video introduces you to the course. This clip is from the chapter "Course Introduction" of the series "Data Structures and Algorithms: The Complete Masterclass".This section provides an introduction to the course.
Instructional Video8:59
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Naive Bayes in Action

Higher Ed
From the section: Machine Learning: Part 2. In this section, we’ll cover Bayes Theorem, Naive Bayes, SVM and SVC to classify data. Machine Learning: Part 2: [Activity] Naive Bayes in Action
Instructional Video2:56
Curated Video

Learning D3.JS 5.0 2.4: Creating Circles and Ellipses

Higher Ed
In this video, we will learn how to create circles and ellipses. • Code a circle and view it in the browser • Fix the problem with viewing only one quarter of the circle • Code an ellipse and view it correctly
Instructional Video7:05
Curated Video

Tips, Tricks, and Techniques for Node.js Development 5.2: Creating a Child Process

Higher Ed
In this video, we will learn how to execute code in a child process. • Show the different ways of creating a child process • Create a child.js script • Show communication between child processes
Instructional Video6:22
Packt

Introduction to computer hardware and software : Form Factors

Higher Ed
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. Motherboards, power supplies, and cases are surprisingly interchangeable due to industry standards called form...
Instructional Video10:38
Curated Video

Discuss the importance of data : Pruning a tree in Python

Higher Ed
From the section: Simple Decision trees. In this section, we will start with the basic theory of decision tree then we cover data pre-processing topics like missing value imputation, variable transformation and Test-Train split. In the...
Instructional Video9:54
Curated Video

Design test cases to verify a computer program : Testing External Libraries

Higher Ed
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python. This video explains how to test external libraries.
Instructional Video5:35
Curated Video

Describe an advanced data structure : From Painfully Slow to Optimal: The Maximum Sum Subarray

Higher Ed
From the section: Doing a Lot with Very Little. In this section, we will explore some problems that look difficult to solve efficiently at first sight. You might think that they require some advanced logic or data structures, but in fact...
Instructional Video4:28
Curated Video

Implement arithmetic operations in a computer program : Arithmetic operators in Python: Python Basics

Higher Ed
From the section: Setting up Python and Jupyter Notebook. This section gets you started with Python. This section will help you set up the python and Jupyter environment on your system and it'll teach you how to perform some basic...
Instructional Video9:05
Packt

Advanced Computer Vision Projects 2.3: Finding Plate Characters

Higher Ed
In this video, we take a pass at finding characters potentially belonging to license plates. • Use contours to find character candidates • Filter contours based on geometric criteria • Identify possible plate locations based on characters
Instructional Video6:06
Curated Video

Predictive Analytics with TensorFlow 3.4: Data Model in TensorFlow

Higher Ed
The data model in TensorFlow is represented by tensors. Without using complex mathematical definitions, we can say that a tensor identifies a multidimensional numerical array. • Create tensors • Define the ranks, shape and data type •...
Instructional Video7:45
Curated Video

Evaluate visual representations of data that models real-world phenomena or processes : Visualizing Text Data

Higher Ed
From the section: NLP Visualization and Model Experimentation. Visualize text data and view data embeddings. View and track hyperparameter tuning and display training configurations to run reproducible experiments. In this video, we’ll...
Instructional Video4:10
Curated Video

Describe a function : Functions in Python

Higher Ed
From the section: Python Fundamentals. This section will help you to learn about the Python fundamentals and setup. This video explains the various functions in Python.
Instructional Video3:58
Packt

Introduction to computer hardware and software : Liquid Cooling

Higher Ed
From the section: CPUs. In this section, we explore features about CPU. Liquid cooling isn’t just for enthusiasts. It is quieter and much more efficient than traditional air cooling. Today’s liquid cooling solutions are easy to use and...
Instructional Video6:38
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Image cropping dilation and erosion

Higher Ed
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision. Computer Vision Basics: Part 2: Image cropping dilation and erosion
Instructional Video8:28
Curated Video

Compare different types of data structures : Binary Indexed Trees for the RMQ Problem

Higher Ed
From the section: Tree-Based Data Structures. In this section, we will go over a few robust tree-based data structures, that are indispensable for efficiently solving various query-related problems. This video presents an extension of...
Instructional Video7:30
Zach Star

Is Engineering Experience Needed Before College

12th - Higher Ed
Some students ask if engineering experience is needed before they enter college. And the good news is you really don't need any engineering experience. In fact most students who enter college don't have much, if any. There are some...
Instructional Video6:41
Curated Video

High Performance Scientific Computing with C 1.6: Monte Carlo Methods

Higher Ed
How can we use random numbers to solve problems? • Learn why randomness is useful • See how we can solve integrals with random numbers • See how the accuracy of Monte Carlo methods scales
Instructional Video15:40
Curated Video

Predictive Analytics with TensorFlow 9.4: An LSTM Predictive Model for Sentiment Analysis

Higher Ed
Sentiment analysis is one of the most widely performed tasks in NLP. An LSTM network can be used to classify short texts into desired categories–that is, classification problems. For example, a set of tweet texts can be categorized as...
Instructional Video15:34
Curated Video

Cloud Native Development on Azure with Java 1.3: Set Up the Environment for Building a Cloud Native Application

Higher Ed
This video will guide you through the steps of deploying the prerequisites and setting up your development environment using an Azure virtual machine. • Use an Azure VM • Install JDK, Apache Maven, and Azure CLI
Instructional Video8:32
Curated Video

Explain web security : Reconnais-sance and Passive In-formation Gathering

Higher Ed
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...