Curated Video
High Performance Scientific Computing with C 1.5: Linear Equations and Matrix Methods
How can we invert a matrix? How fast can we do it? • Learn why matrix inversion is useful • See how to invert a matrix numerically • Learn how expensive matrix inversion is
Science360
Computer science - Not just for boys or geeks
Mathematics and computer science teacher Jackie Corricelli is out to counter the myths about who should study what. She is a recipient of the 2013 Presidential Award for Excellence in Mathematics and Science Teaching.
Curated Video
Mastering Tableau 2018.1, Second Edition 1.2: Exploring Tableau and Data Visualization
In this video, we’ll see the features and functionalities that Tableau provides. We’ll also look at the basics of creating a data visualization. • How to visualize data in Tableau? • Creating your first data visualization
Curated Video
Describe a neural network : Neural Network with PCA for Binary Classifications
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Poisoning Attacks, Privacy, and Backdoor Attacks Theory
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to show...
Curated Video
routing protocols : Benefits of link state routing and Drawbacks of link state routing
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Benefits of link state routing and...
Packt
Evaluate the impact of privacy issues, cyberattacks, and malware on your AI application : Testing Practical Defence from Modified Model Category
From the section: Choosing the Right Defense. In this section, you will deploy the right defense methods to protect AI systems from attacks by comparing their efficiency. The aim of this video is to show a practical example of defense...
Curated Video
Test a computer program or algorithm : Handling User Errors
From the section: Errors in Python. This section introduces you to errors in Python. This video explains how to handle user errors.
Curated Video
Modify a data structure : Linked List - Independent Exercise
From the section: Linked Lists. Linked Lists: Linked List - Independent Exercise Linked Lists: Linked List - Independent Exercise
Curated Video
Implement different search algorithms : BST - Deleting leaf nodes
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Delete scenario one - deleting nodes with no children (leaf nodes)
Curated Video
Implement different search algorithms : Build a Binary Search Tree from scratch - Insert
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Inserting nodes into a BST in-depth with test cases
Curated Video
Describe network protocols : Multi-thread Echo Server
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will have a look at how multi-thread TCP echo server works. • Understand that the...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Convolutional Neural Networks (CNN's)
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: Convolutional Neural Networks (CNN's)
Curated Video
Compare different types of data structures : Segment Trees and the RMQ Problem
From the section: Tree-Based Data Structures. In this section, we will go over a few robust tree-based data structures, that are indispensable for efficiently solving various query-related problems. In this video, we revisit the RMQ...
NASA
Houston We Have a Podcast: Uncommon Origins
Shawn Cvetezar, Laura Paulino, and Don Caluya, NASA interns representing NASA’s Marshall Space Flight Center, Ames Research Center, and Johnson Space Center, respectively, reflect upon their non-traditional paths that led them to NASA...
Packt
Introduction to computer hardware and software : USB Standards
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. The Universal Serial Bus (USB) interface is the main peripheral interface these days. Make...
NASA
NASA in Silicon Valley: Jeremy Frank Talks About How Automated Technology Will Help Humans Reach Mars
A conversation with Jeremy Frank, Principle Investigator for the Autonomous Systems and Operations Project at NASA’s Ames Research Center in Silicon Valley.
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Backdoor Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Practical Privacy Attacks
From the section: Build a Threat Model and Learn Different Attacks on AI. In this section, you will create a high-level threat model for AI solution to choose the right priorities against various threats. The aim of this video is to...
Curated Video
routing protocols : OSPF Hierarchy - Multiple areas
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: OSPF Hierarchy - Multiple areas
Curated Video
Explain web security : What is Reconnaissance?
From the section: Reconnaissance and Scanning. This section will cover reconnaissance and vulnerability scanning. This is needed to stage attacks. The goal of this video is to get an overview of the first step of ethical hacking:...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 2
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 2
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Packt
Compare the breadth-first and depth-first search algorithms : Graph Data Structure
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and graph...