Curated Video
Evaluate two sorting or two search algorithms : Selection sort implementation
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation. Implement the selection sort algorithm step by step
Packt
Introduction to computer hardware and software : Inside the PC
From the section: The Visible Computer. In this section, we learn more about primary PC computer, external connections and learn more about computer. Geeks go into PC cases and this episode is a case in point, if you’ll pardon the pun....
Curated Video
Describe cyber attacks that could affect a computer system or network : Taking Control Over Target Browser with BeEf
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn about variety of dangerous...
Curated Video
Describe computer programming : Section Goal
From the section: Common Coding Concepts.This section will cover common coding concepts such as Scratch setup, bugs, pseudocode, decomposition, commenting and many more. Common Coding Concepts: Section Goal • Use Python's def statement...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Introduction to Seaborn
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...
Curated Video
Ensemble Machine Learning Techniques 3.3: Making Predictions on Movie Ratings Using SVM
In this video, we will use Python to implement the Bagging technique using SVM. • We will use Jupyter Notebook to execute our code • Use Movie Rating to perform classification • Implement Bagging in python for classification
Curated Video
Learning D3.JS 5.0 6.1: Get Started with Bars
In this video, we will learn how to create a basic bar graph. • Understand the code and add more code to the given files • Understand how it’s done manually and how it’s done on D3.js • View the result with the developers’ tools
Packt
Explain the negative impacts of artificial intelligence systems on society : DeepFool Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Curated Video
Evaluate the accuracy of an artificial intelligence system : Evaluate Accuracy of the DNN Model
From the section: ANN & DNN With MXNet Package in R. This section is about ANN & DNN with MXNet Package in R. ANN & DNN With MXNet Package in R: Evaluate Accuracy of the DNN Model
Packt
Introduction to computer hardware and software : Mass Storage Troubleshooting
From the section: Implementing Mass Storage. Here, we learn to implement mass storage. Mass storage device sometimes fail, resulting in the potential loss of critical data. A good tech knows the tools and procedures to diagnose and...
Curated Video
Describe the different types of malware that could affect a computer system or network : Downloaders
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
de Dicto
What is COGNITIVE ROBOTICS? Turing Fellow Angelo Cangelosi explains
Angelo Cangelosi is a Professor of Machine Learning and Robotics at the University of Manchester, UK. He created the iCub humanoid robot which is now worth 300,000 £! He explains here the concept of cognitive robotics in a very...
Curated Video
Bug Bounty Program Certification 11.1: About Android App Frontend Penetration
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Curated Video
Bug Bounty Program Certification 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 4
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Curated Video
Create a machine learning model of a real-life process or object : Improving the Network with Better Activation Functions and Dropout
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a good...
Packt
Compare the breadth-first and depth-first search algorithms : Assignment 1 - Intro
From the section: BFS and DFS Grid World. This section will cover BFS and DFS Grid concept. BFS and DFS Grid World: Assignment 1 - Intro
Packt
Compare the breadth-first and depth-first search algorithms : Installation and Setup
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title. • Download python, Graphviz, and Pip. • Run the installer and install these...
Curated Video
Design test cases to verify a computer program : More Printer Tests
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python. This video explains how to perform more printer tests in Python.
Curated Video
Create a list : The Concat Solution
From the section: Lists. This section focuses on lists and the various functions of the list. This video provides the solution to the Concat Challenge.
Curated Video
Create a list : Lists Out of Arrays
From the section: Lists. This section focuses on lists and the various functions of the list. This video explains lists out of arrays.
Packt
Introduction to computer hardware and software : Troubleshooting Core Components
From the section: Power Supplies. Here, we check our power supply, mount the power supply and learn how to cool our PC. Now that power supplies are covered, it’s time to circle back and cover troubleshooting core components. The...