Curated Video
Python for Network Forensics 3.5: Reading the Journal
In this video, we will continue our experimentation with reading and parsing system logs. • Further interact with the Systemd journal • Use our Python skills to effectively parse information regarding system events • Narrow down events...
Curated Video
High Performance Scientific Computing with C 1.1: The Course Overview
This video will give you an overview about the course.
Curated Video
Cloud Native Development on Azure with Java 2.1: Build a Spring Boot Java Application and Provide CRUD Functionality for a To-Do List
This video will walk you through a few quick steps to create a simple To-Do application capable of tracking your upcoming tasks. You can add new tasks to the application, and when you are done with a particular task, you can mark it as...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 11
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing With Real World Natural Images: Working with...
Curated Video
Create a machine learning model of a real-life process or object : Adding More Metrics to Gain a Better Understanding
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a good...
Curated Video
Design test cases to verify a computer program : Writing a Printer Class for Testing
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python. This video demonstrates how to write a printer class for testing in Python.
Curated Video
Evaluate two sorting or two search algorithms : Bisection/Binary search - Iterative implementation
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Build the binary search function using iteratively
Curated Video
Describe computer programming : Loops
From the section: Common Coding Concepts.This section will cover common coding concepts such as Scratch setup, bugs, pseudocode, decomposition, commenting and many more. Common Coding Concepts: Loops
Packt
Create visual representations of data that models real-world phenomena or processes : Line Charts
From the section: Data Visualization. In this section you will learn about data visualization, matplotlib library, bar charts, line charts and scatter plots. There’s also an activity for data visualization. Data Visualization: Line Charts
Curated Video
High Performance Scientific Computing with C 1.5: Linear Equations and Matrix Methods
How can we invert a matrix? How fast can we do it? • Learn why matrix inversion is useful • See how to invert a matrix numerically • Learn how expensive matrix inversion is
Science360
Computer science - Not just for boys or geeks
Mathematics and computer science teacher Jackie Corricelli is out to counter the myths about who should study what. She is a recipient of the 2013 Presidential Award for Excellence in Mathematics and Science Teaching.
Curated Video
Mastering Tableau 2018.1, Second Edition 1.2: Exploring Tableau and Data Visualization
In this video, we’ll see the features and functionalities that Tableau provides. We’ll also look at the basics of creating a data visualization. • How to visualize data in Tableau? • Creating your first data visualization
NASA
Houston We Have a Podcast: Uncommon Origins
Shawn Cvetezar, Laura Paulino, and Don Caluya, NASA interns representing NASA’s Marshall Space Flight Center, Ames Research Center, and Johnson Space Center, respectively, reflect upon their non-traditional paths that led them to NASA...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Poisoning Attacks, Privacy, and Backdoor Attacks Theory
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Curated Video
routing protocols : Benefits of link state routing and Drawbacks of link state routing
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Benefits of link state routing and...
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defence from Modified Model Category
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show a practical example of defense...
Curated Video
Test a computer program or algorithm : Handling User Errors
From the section: Errors in Python. This section introduces you to errors in Python. This video explains how to handle user errors.
Curated Video
Modify a data structure : Linked List - Independent Exercise
From the section: Linked Lists. Linked Lists: Linked List - Independent Exercise Linked Lists: Linked List - Independent Exercise
Curated Video
Implement different search algorithms : BST - Deleting leaf nodes
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Delete scenario one - deleting nodes with no children (leaf nodes)
Curated Video
Implement different search algorithms : Build a Binary Search Tree from scratch - Insert
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Inserting nodes into a BST in-depth with test cases
Curated Video
Describe network protocols : Multi-thread Echo Server
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will have a look at how multi-thread TCP echo server works. • Understand that the...
Curated Video
Describe a neural network : Neural Network with PCA for Binary Classifications
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Convolutional Neural Networks (CNN's)
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: Convolutional Neural Networks (CNN's)
Curated Video
Compare different types of data structures : Segment Trees and the RMQ Problem
From the section: Tree-Based Data Structures. In this section, we will go over a few robust tree-based data structures, that are indispensable for efficiently solving various query-related problems. In this video, we revisit the RMQ...