Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Grey-Box Adversarial with Example
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Curated Video
Evaluate visual representations of data that models real-world phenomena or processes : Visualizing Model Graph – RNN
From the section: NLP Visualization and Model Experimentation. Visualize text data and view data embeddings. View and track hyperparameter tuning and display training configurations to run reproducible experiments. Here, we shall view...
Curated Video
Evaluate a machine learning model : Model Evaluation
From the section: Improving Model Accuracy. We start with reviewing previous day’s assignment by looking at an ideal solution and results. This module takes a pause from introducing any new model and focuses on improving the models and...
Curated Video
Describe network protocols : UDP Echo Server
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will look at how to create a UDP echo server. • Get...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Activation Functions
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Activation Functions
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Color Spaces
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: Color Spaces
Packt
Create a computer vision system using decision tree algorithms to solve a real-world problem : Introduction to MatPlotLib
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Linear Regression
From the section: Machine Learning: Part 1. In this section, we’ll learn how machine learning works, and how it fits in with the world of AI and deep learning. And learn to train, test and validate the data using K-fold cross-validation....
Curated Video
Python for Network Forensics 3.2: Exploring File Properties
Using the power of recursive traversal, we will begin to search and populate file properties. • Enrich your understanding of directory traversal • Modify our application to populate file properties • Search returned results to understand...
Curated Video
Java 11 Programming for Beginners 3.4: Working with Many Forms of Polymorphism
Polymorphism is hard without examples, so we go through a few. • Build another bot and use it as an example for method overriding • Go through theory • Show an example for method overloading
Curated Video
Bug Bounty Program Certification 10.4: Components of the Android App Bug Bounty Program
In this video, you will get Information about Android app components. • Learn about various components of Android app bug bounty program • Explore various vulnerabilities in android machines • Learn about reward on the basis of level of...
Curated Video
Cloud Native Development on Azure with Java 3.3: Configure the App to Use Your Azure AD Tenant
Now that we have registered our app with the Azure Active Directory, the next step is to configure the app to use our Azure AD tenant and then package and redeploy our app. Let’s do it right now! • Change the App ID URI and the reply...
Packt
Introduction to computer hardware and software : Magnetic Disk Drives
From the section: Mass Storage Technologies. In this section, we cover topics related to Mass storage. Hard Disk Drives (HDDs), which store data on rotating magnetic disks, have been the go-to mass storage media for decades. A good tech...
Curated Video
Implement a computer program using a classic algorithm : In-depth look at execution context of recursive divide function
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation. Analyze execution context and frames created by recursive divide...
Curated Video
Implement a computer program using a classic algorithm : Project conclusion walkthrough
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Go through implementation steps from concluded project
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Backpropagation Training
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Backpropagation Training
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Hough transform theory
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision. Computer Vision Basics: Part 2: Hough transform theory
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : What is an image and how is it digitally stored?
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: What is an image and how is it digitally stored?
Packt
Describe a network protocol : Home Network and SOHO network
From the section: Basic Networking Terms (ICND1). This Section is about the basic Networking Terms. This includes lectures on Network Interface Card, Network protocol, computer network and so on. Basic Networking Terms (ICND1): Home...
Packt
State the purpose of network hardware : Wireless Network Hardware
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. Structured cabling is the process of installing and organizing cable systems to ensure long term, reliable connections....
Curated Video
Use variables to store data : Working with Variables and Data Types – Part 2
From the section: Java Introduction and Development Environment Setup. In this section, you will be introduced to Java 11. The Java programming language is widely used in the development of web and cellphone applications. In this...
Curated Video
Explain web security : Understand-ing Bit Hacker Jar-gon!
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 4
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Curated Video
Evaluate visual representations of data that models real-world phenomena or processes : Advanced Features of TensorBoard and PyTorch Limitations
From the section: NLP Visualization and Model Experimentation. Visualize text data and view data embeddings. View and track hyperparameter tuning and display training configurations to run reproducible experiments. In this video, we’ll...