Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Example 2 - Build Multi-layer perceptron for binary classification
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Example 2 - Build Multi-layer perceptron for binary classification
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Project Solution: Detecting Cars Using SVM - Part #3
From the section: Machine Learning: Part 2. In this section, we’ll cover Bayes Theorem, Naive Bayes, SVM and SVC to classify data. Machine Learning: Part 2: [Activity] Project Solution: Detecting Cars Using SVM - Part #3
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Code to perform HOG Feature extraction
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision. Computer Vision Basics: Part 3: [Activity] Code to perform HOG Feature extraction
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Project Solution: Find a Truck Using Template Matching
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision. Computer Vision Basics: Part 3: [Activity] Project Solution: Find a Truck Using Template Matching
NASA
NASA in Silicon Valley: Bill Thigpen Talks About How NASA Uses Supercomputers
A conversation with Bill Thigpen, Branch Chief of Advanced Computing at NASA’s Ames Research Center in Silicon Valley.
Curated Video
Ensemble Machine Learning Techniques 6.3: Example on Kaggle Competition
We will get comfortable with using ensemble learning for competitive data science. • We will understand the dataset • We will create and train different models • We will combine the trained models using stacking and get our final result
Curated Video
Python for Network Forensics 3.3: Deeper File Properties
In this video, we will explore other important properties of file that will allow you to decipher a known bad or malicious actor. • Learn how a digest algorithm works with a file • Develop a Python application to hash a file • Alter our...
Curated Video
Mastering Tableau 2018.1, Second Edition 4.2: Data Blending with Tableau
Merge different data sources with the help of data blending. • Understand how data blending works • Blend data in Tableau
Curated Video
Serverless JavaScript Projects 4.1: Creating the UI by Building a Good Front End with Drag and Drop Tiles
This video covers a usable front end UI that works for people to visualize a SCRUM or KANBAN board. • Set up an HTML template with Bootstrap and jQuery • Link the jQuery UI Library for drag and drop functionality • Build a UI that has...
Curated Video
High Performance Scientific Computing with C 3.3: Vectorizing with AVX
How can we use automatic vectorization to speed up our code? What vectorization options currently exist? • Learn about the history of vector instructions • Learn how to compile with AVX/AVX2 • Learn about the latest AVX-512 instruction set
Curated Video
Tips, Tricks, and Techniques for Node.js Development 5.1: Process Environment Variables
In this video, we will learn why and how we can use environment variables, as well as how to manage these variables. • Show how environment variables work • Load variables from .env files • Show node-env-run
Curated Video
Learning D3.JS 5.0 5.2: Function in Methods
In this video, we will learn to add functions to methods to make them more dynamic. • Add a function in the text method • Create the style method • Add a function and an if-else statement in the style method
Curated Video
Bug Bounty Program Certification 9.4: Forge Request Attack on Websites
In this video, you will perform cross site request forgery attack on website. • Setup Lab setup using Mutillidae Buggy web application for forgery attack • Learn from the example of Force someone to add a blog without consent • Learn...
Curated Video
Bug Bounty Program Certification 4.1: Bugs Overview in Networks As External Attacker
In this video, we will find bugs in networks as external attacker. • Explore wireless attack process as an attacker • Learn about pre-attack phase of external attack • Learn about post attack phase of external attack
Curated Video
Cloud Native Development on Azure with Java 5.2: Deploying Multi-Container Application to Azure Kubernetes Service
Now that you know what Kubernetes is, we are all ready to get our hands dirty! In this video, we will deploy a multi-container application to Azure Kubernetes Service. • Configure an existing service principle and use it to manage the...
Packt
List computer networking media : Internet Tiers
From the section: The Internet. Here, we explore our internet options. In this episode, Mike discusses the structure of the Internet. Starting with the Tier 1 carriers, he shows how carriers at each layer relate to their peers and also...
Curated Video
Create a list : Lists in Python
From the section: Introduction to Python. This section will give you a brief introduction to the course. This video explains how to use lists in Python.
Curated Video
Develop a computer program to solve a problem using a sequence of instructions : If statements
From the section: A Full Python Refresher. This section is about Python Refresher and includes lectures on Variables in Python, Methods, List, tuple and sets. A Full Python Refresher: If statements
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Building a Logistic Classifier with Deep Learning and Keras
From the section: Deep Learning and Tensorflow: Part 1. In this section, we’ll talk about what Deep Learning is, and how TensorFlow works at a low level. Deep Learning and Tensorflow: Part 1: [Activity] Building a Logistic Classifier...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Detect lane lines in colored image
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: [Activity] Detect lane lines in colored image
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Python Basics: Tuples and Dictionaries
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...
Curated Video
Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Curated Video
Python for Network Forensics 5.3: Exploitation
Once an attack vector has been found we will proceed with exploitation to take over the system. • Learn about a common attack vector through exploitable web services • Develop a Python-based reverse shell to gain access into the system •...
Curated Video
Python for Network Forensics 1.5: Introduction to Impacket
In this video, we will add breadth to our Python capability to extend functionality using Impacket. • Further expand our application to import Impacket • Decode raw packets using Impacket • Get a better understanding of encapsulation and...