Packt
Describe a network protocol : Home Network and SOHO network
From the section: Basic Networking Terms (ICND1). This Section is about the basic Networking Terms. This includes lectures on Network Interface Card, Network protocol, computer network and so on. Basic Networking Terms (ICND1): Home...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Backpropagation Training
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Backpropagation Training
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Hough transform theory
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision. Computer Vision Basics: Part 2: Hough transform theory
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : What is an image and how is it digitally stored?
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: What is an image and how is it digitally stored?
Packt
State the purpose of network hardware : Wireless Network Hardware
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. Structured cabling is the process of installing and organizing cable systems to ensure long term, reliable connections....
Curated Video
Use variables to store data : Working with Variables and Data Types – Part 2
From the section: Java Introduction and Development Environment Setup. In this section, you will be introduced to Java 11. The Java programming language is widely used in the development of web and cellphone applications. In this...
Curated Video
Explain web security : Understand-ing Bit Hacker Jar-gon!
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 4
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Curated Video
Evaluate visual representations of data that models real-world phenomena or processes : Advanced Features of TensorBoard and PyTorch Limitations
From the section: NLP Visualization and Model Experimentation. Visualize text data and view data embeddings. View and track hyperparameter tuning and display training configurations to run reproducible experiments. In this video, we’ll...
Packt
Develop an AI system to solve a real-world problem : Small Data and Cross Validation
From the section: Predicting Sales with Supervised Learning. In this section, learners will use their first machine learning techniques, including Support Vector Machines and Artificial Neural Networks. These techniques will be applied...
Packt
Implement a function : Arguments and Parameters
From the section: Python Fundamentals. This section will help you to learn about the Python fundamentals and setup. This video focuses on arguments and parameters in Python.
Curated Video
Create a list : List Get and Set
From the section: Lists. This section focuses on lists and the various functions of the list. This video focuses on list Get and Set methods.
Curated Video
Fix the errors in a computer program or algorithm : Raising Exception
From the section: Errors and Exceptions Handling. In this section, you will learn about Errors and Exception handling in detail. Errors and Exceptions Handling: Raising Exception
Curated Video
Implement different search algorithms : BST from scratch - Delete demo
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Visualize and understand the process of the delete functionality from a BST
Curated Video
High Performance Scientific Computing with C 1.4: Numerical Integration
How can we calculate integrals with a computer? How can we solve differential equations? • Calculate integrals with the trapezoid and Simpson’s rule • See how the error terms scale with different algorithms • Solve differential equations...
Zach Star
Computer Engineering Careers and Subfields
This video covers various subfields of computer engineering and what careers you can get in those fields. Computer engineering is basically the combination of electrical engineering and computer science, which means a lot of these jobs...
Curated Video
High Performance Scientific Computing with C 3.2: Pipelining and Hardware-Oriented Design
How can we design our programs to take the most advantage of modern CPU design? • Learn about caching • Learn about branch prediction and speculative execution • Stay out of the way of the CPU and compiler!
Curated Video
Cloud Native Development on Azure with Java 2.5: Build and Deploy a New Azure App Service Instance
In this video, we will create an Azure web application hosted within the Azure App Service. We will configure it such that it will be compatible for hosting our Java Spring Boot application. • Add a new web application • Deploy a default...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : White-Box Adversarial with Example
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Packt
Explain the negative impacts of artificial intelligence systems on society : Adversarial Attacks Metrics and White-Box Adversarial Attacks
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Curated Video
Fix the errors in a computer program or algorithm : Try, Except, Else and Finally
From the section: Errors and Exceptions Handling. In this section, you will learn about Errors and Exception handling in detail. Errors and Exceptions Handling: Try, Except, Else and Finally
Packt
Describe a data structure : Constructor Functions and the "this" Keyword
From the section: Introduction to Data Structures and Important Concepts. This section introduces Data Structures and important concepts of DS and explains why they are important Introduction to Data Structures and Important Concepts:...
Curated Video
Describe cyber attacks that could affect a computer system or network : Advanced-Level Hacking - Scanning Hosts with Python Script
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will consider using Python language in...
Curated Video
Describe cyber attacks that could affect a computer system or network : Types of man-in-the-middle Attack
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know about what is...