Instructional Video3:37
Packt

Describe a network protocol : Home Network and SOHO network

Higher Ed
From the section: Basic Networking Terms (ICND1). This Section is about the basic Networking Terms. This includes lectures on Network Interface Card, Network protocol, computer network and so on. Basic Networking Terms (ICND1): Home...
Instructional Video7:17
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Backpropagation Training

Higher Ed
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Backpropagation Training
Instructional Video13:56
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Hough transform theory

Higher Ed
From the section: Computer Vision Basics: Part 2. In this section, we’ll explore the some addtiional features of Computer Vision. Computer Vision Basics: Part 2: Hough transform theory
Instructional Video8:45
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : What is an image and how is it digitally stored?

Higher Ed
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: What is an image and how is it digitally stored?
Instructional Video10:41
Packt

State the purpose of network hardware : Wireless Network Hardware

Higher Ed
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. Structured cabling is the process of installing and organizing cable systems to ensure long term, reliable connections....
Instructional Video7:02
Curated Video

Use variables to store data : Working with Variables and Data Types – Part 2

Higher Ed
From the section: Java Introduction and Development Environment Setup. In this section, you will be introduced to Java 11. The Java programming language is widely used in the development of web and cellphone applications. In this...
Instructional Video4:54
Curated Video

Explain web security : Understand-ing Bit Hacker Jar-gon!

Higher Ed
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Instructional Video6:21
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 4

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Instructional Video3:32
Curated Video

Evaluate visual representations of data that models real-world phenomena or processes : Advanced Features of TensorBoard and PyTorch Limitations

Higher Ed
From the section: NLP Visualization and Model Experimentation. Visualize text data and view data embeddings. View and track hyperparameter tuning and display training configurations to run reproducible experiments. In this video, we’ll...
Instructional Video3:25
Packt

Develop an AI system to solve a real-world problem : Small Data and Cross Validation

Higher Ed
From the section: Predicting Sales with Supervised Learning. In this section, learners will use their first machine learning techniques, including Support Vector Machines and Artificial Neural Networks. These techniques will be applied...
Instructional Video10:16
Packt

Implement a function : Arguments and Parameters

Higher Ed
From the section: Python Fundamentals. This section will help you to learn about the Python fundamentals and setup. This video focuses on arguments and parameters in Python.
Instructional Video22:18
Curated Video

Create a list : List Get and Set

Higher Ed
From the section: Lists. This section focuses on lists and the various functions of the list. This video focuses on list Get and Set methods.
Instructional Video3:55
Curated Video

Fix the errors in a computer program or algorithm : Raising Exception

Higher Ed
From the section: Errors and Exceptions Handling. In this section, you will learn about Errors and Exception handling in detail. Errors and Exceptions Handling: Raising Exception
Instructional Video6:59
Curated Video

Implement different search algorithms : BST from scratch - Delete demo

Higher Ed
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Visualize and understand the process of the delete functionality from a BST
Instructional Video12:05
Curated Video

High Performance Scientific Computing with C 1.4: Numerical Integration

Higher Ed
How can we calculate integrals with a computer? How can we solve differential equations? • Calculate integrals with the trapezoid and Simpson’s rule • See how the error terms scale with different algorithms • Solve differential equations...
Instructional Video10:09
Zach Star

Computer Engineering Careers and Subfields

12th - Higher Ed
This video covers various subfields of computer engineering and what careers you can get in those fields. Computer engineering is basically the combination of electrical engineering and computer science, which means a lot of these jobs...
Instructional Video8:59
Curated Video

High Performance Scientific Computing with C 3.2: Pipelining and Hardware-Oriented Design

Higher Ed
How can we design our programs to take the most advantage of modern CPU design? • Learn about caching • Learn about branch prediction and speculative execution • Stay out of the way of the CPU and compiler!
Instructional Video5:48
Curated Video

Cloud Native Development on Azure with Java 2.5: Build and Deploy a New Azure App Service Instance

Higher Ed
In this video, we will create an Azure web application hosted within the Azure App Service. We will configure it such that it will be compatible for hosting our Java Spring Boot application. • Add a new web application • Deploy a default...
Instructional Video2:33
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : White-Box Adversarial with Example

Higher Ed
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video3:52
Packt

Explain the negative impacts of artificial intelligence systems on society : Adversarial Attacks Metrics and White-Box Adversarial Attacks

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video3:30
Curated Video

Fix the errors in a computer program or algorithm : Try, Except, Else and Finally

Higher Ed
From the section: Errors and Exceptions Handling. In this section, you will learn about Errors and Exception handling in detail. Errors and Exceptions Handling: Try, Except, Else and Finally
Instructional Video7:59
Packt

Describe a data structure : Constructor Functions and the "this" Keyword

Higher Ed
From the section: Introduction to Data Structures and Important Concepts. This section introduces Data Structures and important concepts of DS and explains why they are important Introduction to Data Structures and Important Concepts:...
Instructional Video6:18
Curated Video

Describe cyber attacks that could affect a computer system or network : Advanced-Level Hacking - Scanning Hosts with Python Script

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will consider using Python language in...
Instructional Video5:20
Curated Video

Describe cyber attacks that could affect a computer system or network : Types of man-in-the-middle Attack

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know about what is...