Instructional Video13:02
Curated Video

Evaluate two sorting or two search algorithms : Selection sort implementation

Higher Ed
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation. Implement the selection sort algorithm step by step
Instructional Video7:49
Packt

Introduction to computer hardware and software : Inside the PC

Higher Ed
From the section: The Visible Computer. In this section, we learn more about primary PC computer, external connections and learn more about computer. Geeks go into PC cases and this episode is a case in point, if you’ll pardon the pun....
Instructional Video11:09
Curated Video

Describe cyber attacks that could affect a computer system or network : Taking Control Over Target Browser with BeEf

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn about variety of dangerous...
Instructional Video2:15
Curated Video

Describe computer programming : Section Goal

Higher Ed
From the section: Common Coding Concepts.This section will cover common coding concepts such as Scratch setup, bugs, pseudocode, decomposition, commenting and many more. Common Coding Concepts: Section Goal • Use Python's def statement...
Instructional Video7:23
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)

Higher Ed
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)
Instructional Video17:56
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Introduction to Seaborn

Higher Ed
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...
Instructional Video7:59
Curated Video

Ensemble Machine Learning Techniques 3.3: Making Predictions on Movie Ratings Using SVM

Higher Ed
In this video, we will use Python to implement the Bagging technique using SVM. • We will use Jupyter Notebook to execute our code • Use Movie Rating to perform classification • Implement Bagging in python for classification
Instructional Video5:36
Curated Video

Learning D3.JS 5.0 6.1: Get Started with Bars

Higher Ed
In this video, we will learn how to create a basic bar graph. • Understand the code and add more code to the given files • Understand how it’s done manually and how it’s done on D3.js • View the result with the developers’ tools
Instructional Video2:35
Packt

Explain the negative impacts of artificial intelligence systems on society : DeepFool Attack Practical Configuration

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video2:48
Curated Video

Evaluate the accuracy of an artificial intelligence system : Evaluate Accuracy of the DNN Model

Higher Ed
From the section: ANN & DNN With MXNet Package in R. This section is about ANN & DNN with MXNet Package in R. ANN & DNN With MXNet Package in R: Evaluate Accuracy of the DNN Model
Instructional Video8:00
Packt

Introduction to computer hardware and software : Mass Storage Troubleshooting

Higher Ed
From the section: Implementing Mass Storage. Here, we learn to implement mass storage. Mass storage device sometimes fail, resulting in the potential loss of critical data. A good tech knows the tools and procedures to diagnose and...
Instructional Video5:55
Curated Video

Describe the different types of malware that could affect a computer system or network : Downloaders

Higher Ed
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Instructional Video3:24
Curated Video

Describe cyber attacks that could affect a computer system or network : Overview of Network Security

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video3:55
de Dicto

What is COGNITIVE ROBOTICS? Turing Fellow Angelo Cangelosi explains

Higher Ed
Angelo Cangelosi is a Professor of Machine Learning and Robotics at the University of Manchester, UK. He created the iCub humanoid robot which is now worth 300,000 £! He explains here the concept of cognitive robotics in a very...
Instructional Video6:27
Curated Video

Bug Bounty Program Certification 11.1: About Android App Frontend Penetration

Higher Ed
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Instructional Video2:32
Curated Video

Bug Bounty Program Certification 1.1: The Course Overview

Higher Ed
This video provides an overview of the entire course.
Instructional Video4:29
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 4

Higher Ed
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Instructional Video5:42
Curated Video

Create a machine learning model of a real-life process or object : Improving the Network with Better Activation Functions and Dropout

Higher Ed
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a good...
Instructional Video14:52
Packt

Compare the breadth-first and depth-first search algorithms : Assignment 1 - Intro

Higher Ed
From the section: BFS and DFS Grid World. This section will cover BFS and DFS Grid concept. BFS and DFS Grid World: Assignment 1 - Intro
Instructional Video8:30
Packt

Compare the breadth-first and depth-first search algorithms : Installation and Setup

Higher Ed
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title. • Download python, Graphviz, and Pip. • Run the installer and install these...
Instructional Video9:26
Curated Video

Design test cases to verify a computer program : More Printer Tests

Higher Ed
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python. This video explains how to perform more printer tests in Python.
Instructional Video6:55
Curated Video

Create a list : The Concat Solution

Higher Ed
From the section: Lists. This section focuses on lists and the various functions of the list. This video provides the solution to the Concat Challenge.
Instructional Video8:54
Curated Video

Create a list : Lists Out of Arrays

Higher Ed
From the section: Lists. This section focuses on lists and the various functions of the list. This video explains lists out of arrays.
Instructional Video14:19
Packt

Introduction to computer hardware and software : Troubleshooting Core Components

Higher Ed
From the section: Power Supplies. Here, we check our power supply, mount the power supply and learn how to cool our PC. Now that power supplies are covered, it’s time to circle back and cover troubleshooting core components. The...