Curated Video
Predictive Analytics with TensorFlow 7.3:Using Multilayer Perceptrons for Predictive Analytics
For this video, we will be using bank marketing datasets. The data is related to direct marketing campaigns of a Portuguese banking institution. The marketing campaigns were based on phone calls. We will do predictive analytics using...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Categories of ML Tasks and Attacks
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to demonstrate that all approaches to solving...
Physics Girl
What is a quantum coin toss?
Quantum coin flipping is the fairest way to flip a coin over the phone. How does it work?!
Curated Video
Predictive Analytics with TensorFlow 6.1: NLP Analytics Pipelines
This video will explain us the general purpose of machine learning and also explain the workflow of predictive analytics. • Understand the workflow of predictive analytics in machine learning
Curated Video
Describe cyber attacks that could affect a computer system or network : Network Vulnerability Test Scope and Process
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Zach Star
How Much Programming Do Engineers Do?
Do you wonder how much programming you'll do in college as an engineer. This answer is very dependent on what major you pick, the university you go to, and various other factors. However there are some consistencies in each major that...
Packt
routing protocols : EIGRP - advanced distance vector routing protocol and Administrative Distance
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: EIGRP - advanced distance vector...
Packt
Introduction to computer hardware and software : Troubleshooting Power Supplies
From the section: Power Supplies. Here, we check our power supply, mount the power supply and learn how to cool our PC. If the power supply fails, a system simply will not operate. There are simple tricks and tips to diagnose and...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Decision Trees In Action
From the section: Machine Learning: Part 1. In this section, we’ll learn how machine learning works, and how it fits in with the world of AI and deep learning. And learn to train, test and validate the data using K-fold cross-validation....
Curated Video
Describe computer programming : Variables and Data Types
From the section: Introduction to Python. In this section we look at Python's fundamental, built-in data structures, and discuss how and when to use them. This video will give you an overview of the variables and data types. • Create...
Brainwaves Video Anthology
Janice Cuny - Broadening Participation in Computing
Janice Cuny is the Program Director for Computing Education at the National Science Foundation. The CRA (Computing Research Association) board selected Janice E. Cuny to receive the 2007 A. Nico Habermann Award for her dedication,...
Curated Video
Ensemble Machine Learning Techniques 2.1: Problems that Ensemble Learning Solves
This video talks about the advantages of using ensemble learning. • Define what is Bias, variance • Define what is Bias-Variance tradeoff • Look at the Advantage of using ensemble learning
Packt
Compare the breadth-first and depth-first search algorithms : Example - A Simple Puzzle Game
From the section: Searching in Graphs. In this section, we will see what we are searching for. Also, we will look at how to use and implement Breadth-First Search and Depth-First Search along with a simple puzzle game example. Solve the...
Curated Video
High Performance Scientific Computing with C 2.2: Algorithm Complexity and Performance
How does the design of our programs affect their speed and accuracy? • Learn about floating-point round-off error • Learn about computational complexity • Examine the divide-and-conquer design approach
Curated Video
Design a computer system using tree search and reinforcement learning algorithms : Creating a Bandit with 4 Arms Using Python and Numpy
From the section: The Multi-Armed Bandit. In this section, we will learn about the basics and look at one of the most foundational concepts in Reinforcement Learning – The Multi-Armed Bandit We construct a model of a MAB environment from...
Curated Video
Modify a data structure : Big O Notation and Calculating the Runtime of a Function
From the section: Linked Lists. Linked Lists: Big O Notation and Calculating the Runtime of a Function Linked Lists: Big O Notation and Calculating the Runtime of a Function
Curated Video
Predictive Analytics with TensorFlow 11.1: Reinforcement Learning
Supervised and unsupervised learning appears at opposite ends of the spectrum, RL exists somewhere in the middle. We use reinforcement learning to discover a good sequence of actions to take the maximum expected rewards. We will also see...
Curated Video
Design a computer system using tree search and reinforcement learning algorithms : Running the Blackjack Environment From the OpenAI Gym
From the section: Model-Free Prediction and Control With Monte Carlo (MC). In this section, we will learn one of two improvements on DP – Monte Carlo, a method which does not require a model of the environment. We talk about a new...
Zach Star
How Much do Engineers and Scientists Make? Salary and Employment Statistics
Two common statistics that are helpful to know about any college major are: how much money you can expect to make, and the amount of job opportunities. Here I outline the statistics for many of the most majors and careers when it comes...
Packt
Introduction to computer hardware and software : Optical Media
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. Shiny optical discs are an excellent media for transporting data and are still a very...
Curated Video
Predictive Analytics with TensorFlow 6.3: Using BOW for Predictive Analytics
In this video, we will see how to perform a bit more complex predictive analytics using the bag-of-words concept of NLP with TensorFlow. At first, we will formalize the problem, and then will explore the dataset that will be used....
Curated Video
Describe a neural network : Neural Network for Binary Classifications
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Packt
Introduction to computer hardware and software : New Installation - First Drive
From the section: Implementing Mass Storage. Here, we learn to implement mass storage. A brand-new system doesn’t have a bootable drive with an installed operating system. In this episode you will go through the process of setting up an...
Curated Video
Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...