Instructional Video5:26
Curated Video

High Performance Scientific Computing with C 1.5: Linear Equations and Matrix Methods

Higher Ed
How can we invert a matrix? How fast can we do it? • Learn why matrix inversion is useful • See how to invert a matrix numerically • Learn how expensive matrix inversion is
Instructional Video1:39
Science360

Computer science - Not just for boys or geeks

12th - Higher Ed
Mathematics and computer science teacher Jackie Corricelli is out to counter the myths about who should study what. She is a recipient of the 2013 Presidential Award for Excellence in Mathematics and Science Teaching.
Instructional Video9:06
Curated Video

Mastering Tableau 2018.1, Second Edition 1.2: Exploring Tableau and Data Visualization

Higher Ed
In this video, we’ll see the features and functionalities that Tableau provides. We’ll also look at the basics of creating a data visualization. • How to visualize data in Tableau? • Creating your first data visualization
Instructional Video3:57
Curated Video

Describe a neural network : Neural Network with PCA for Binary Classifications

Higher Ed
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Instructional Video5:22
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Poisoning Attacks, Privacy, and Backdoor Attacks Theory

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Instructional Video4:27
Curated Video

routing protocols : Benefits of link state routing and Drawbacks of link state routing

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Benefits of link state routing and...
Instructional Video1:13
Packt

Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defence from Modified Model Category

Higher Ed
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show a practical example of defense...
Instructional Video16:38
Curated Video

Test a computer program or algorithm : Handling User Errors

Higher Ed
From the section: Errors in Python. This section introduces you to errors in Python. This video explains how to handle user errors.
Instructional Video1:10
Curated Video

Modify a data structure : Linked List - Independent Exercise

Higher Ed
From the section: Linked Lists. Linked Lists: Linked List - Independent Exercise Linked Lists: Linked List - Independent Exercise
Instructional Video13:11
Curated Video

Implement different search algorithms : BST - Deleting leaf nodes

Higher Ed
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Delete scenario one - deleting nodes with no children (leaf nodes)
Instructional Video13:07
Curated Video

Implement different search algorithms : Build a Binary Search Tree from scratch - Insert

Higher Ed
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Inserting nodes into a BST in-depth with test cases
Instructional Video6:03
Curated Video

Describe network protocols : Multi-thread Echo Server

Higher Ed
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will have a look at how multi-thread TCP echo server works. • Understand that the...
Instructional Video6:26
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Convolutional Neural Networks (CNN's)

Higher Ed
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: Convolutional Neural Networks (CNN's)
Instructional Video8:38
Curated Video

Compare different types of data structures : Segment Trees and the RMQ Problem

Higher Ed
From the section: Tree-Based Data Structures. In this section, we will go over a few robust tree-based data structures, that are indispensable for efficiently solving various query-related problems. In this video, we revisit the RMQ...
Podcast53:19
NASA

‎Houston We Have a Podcast: Uncommon Origins

Pre-K - Higher Ed
Shawn Cvetezar, Laura Paulino, and Don Caluya, NASA interns representing NASA’s Marshall Space Flight Center, Ames Research Center, and Johnson Space Center, respectively, reflect upon their non-traditional paths that led them to NASA...
Instructional Video10:12
Packt

Introduction to computer hardware and software : USB Standards

Higher Ed
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. The Universal Serial Bus (USB) interface is the main peripheral interface these days. Make...
Podcast23:56
NASA

‎NASA in Silicon Valley: Jeremy Frank Talks About How Automated Technology Will Help Humans Reach Mars

Pre-K - Higher Ed
A conversation with Jeremy Frank, Principle Investigator for the Autonomous Systems and Operations Project at NASA’s Ames Research Center in Silicon Valley.
Instructional Video4:40
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Backdoor Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Instructional Video4:05
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks

Higher Ed
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Instructional Video3:33
Curated Video

routing protocols : OSPF Hierarchy - Multiple areas

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: OSPF Hierarchy - Multiple areas
Instructional Video6:34
Curated Video

Explain web security : What is Reconnaissance?

Higher Ed
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Instructional Video2:32
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 2

Higher Ed
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Instructional Video9:06
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 2

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Instructional Video4:13
Packt

Compare the breadth-first and depth-first search algorithms : Graph Data Structure

Higher Ed
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and graph...