Instructional Video11:50
Curated Video

Predictive Analytics with TensorFlow 7.3:Using Multilayer Perceptrons for Predictive Analytics

Higher Ed
For this video, we will be using bank marketing datasets. The data is related to direct marketing campaigns of a Portuguese banking institution. The marketing campaigns were based on phone calls. We will do predictive analytics using...
Instructional Video4:06
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Categories of ML Tasks and Attacks

Higher Ed
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to demonstrate that all approaches to solving...
Instructional Video6:03
Physics Girl

What is a quantum coin toss?

9th - 12th
Quantum coin flipping is the fairest way to flip a coin over the phone. How does it work?!
Instructional Video4:17
Curated Video

Predictive Analytics with TensorFlow 6.1: NLP Analytics Pipelines

Higher Ed
This video will explain us the general purpose of machine learning and also explain the workflow of predictive analytics. • Understand the workflow of predictive analytics in machine learning
Instructional Video4:56
Curated Video

Describe cyber attacks that could affect a computer system or network : Network Vulnerability Test Scope and Process

Higher Ed
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Instructional Video12:38
Zach Star

How Much Programming Do Engineers Do?

12th - Higher Ed
Do you wonder how much programming you'll do in college as an engineer. This answer is very dependent on what major you pick, the university you go to, and various other factors. However there are some consistencies in each major that...
Instructional Video6:07
Packt

routing protocols : EIGRP - advanced distance vector routing protocol and Administrative Distance

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: EIGRP - advanced distance vector...
Instructional Video9:20
Packt

Introduction to computer hardware and software : Troubleshooting Power Supplies

Higher Ed
From the section: Power Supplies. Here, we check our power supply, mount the power supply and learn how to cool our PC. If the power supply fails, a system simply will not operate. There are simple tricks and tips to diagnose and...
Instructional Video13:21
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Decision Trees In Action

Higher Ed
From the section: Machine Learning: Part 1. In this section, we’ll learn how machine learning works, and how it fits in with the world of AI and deep learning. And learn to train, test and validate the data using K-fold cross-validation....
Instructional Video5:12
Curated Video

Describe computer programming : Variables and Data Types

Higher Ed
From the section: Introduction to Python. In this section we look at Python's fundamental, built-in data structures, and discuss how and when to use them. This video will give you an overview of the variables and data types. • Create...
Instructional Video9:12
Brainwaves Video Anthology

Janice Cuny - Broadening Participation in Computing

Higher Ed
Janice Cuny is the Program Director for Computing Education at the National Science Foundation. The CRA (Computing Research Association) board selected Janice E. Cuny to receive the 2007 A. Nico Habermann Award for her dedication,...
Instructional Video2:56
Curated Video

Ensemble Machine Learning Techniques 2.1: Problems that Ensemble Learning Solves

Higher Ed
This video talks about the advantages of using ensemble learning. • Define what is Bias, variance • Define what is Bias-Variance tradeoff • Look at the Advantage of using ensemble learning
Instructional Video12:16
Packt

Compare the breadth-first and depth-first search algorithms : Example - A Simple Puzzle Game

Higher Ed
From the section: Searching in Graphs. In this section, we will see what we are searching for. Also, we will look at how to use and implement Breadth-First Search and Depth-First Search along with a simple puzzle game example. Solve the...
Instructional Video8:31
Curated Video

High Performance Scientific Computing with C 2.2: Algorithm Complexity and Performance

Higher Ed
How does the design of our programs affect their speed and accuracy? • Learn about floating-point round-off error • Learn about computational complexity • Examine the divide-and-conquer design approach
Instructional Video9:12
Curated Video

Design a computer system using tree search and reinforcement learning algorithms : Creating a Bandit with 4 Arms Using Python and Numpy

Higher Ed
From the section: The Multi-Armed Bandit. In this section, we will learn about the basics and look at one of the most foundational concepts in Reinforcement Learning – The Multi-Armed Bandit We construct a model of a MAB environment from...
Instructional Video8:56
Curated Video

Modify a data structure : Big O Notation and Calculating the Runtime of a Function

Higher Ed
From the section: Linked Lists. Linked Lists: Big O Notation and Calculating the Runtime of a Function Linked Lists: Big O Notation and Calculating the Runtime of a Function
Instructional Video5:02
Curated Video

Predictive Analytics with TensorFlow 11.1: Reinforcement Learning

Higher Ed
Supervised and unsupervised learning appears at opposite ends of the spectrum, RL exists somewhere in the middle. We use reinforcement learning to discover a good sequence of actions to take the maximum expected rewards. We will also see...
Instructional Video4:36
Curated Video

Design a computer system using tree search and reinforcement learning algorithms : Running the Blackjack Environment From the OpenAI Gym

Higher Ed
From the section: Model-Free Prediction and Control With Monte Carlo (MC). In this section, we will learn one of two improvements on DP – Monte Carlo, a method which does not require a model of the environment. We talk about a new...
Instructional Video6:35
Zach Star

How Much do Engineers and Scientists Make? Salary and Employment Statistics

12th - Higher Ed
Two common statistics that are helpful to know about any college major are: how much money you can expect to make, and the amount of job opportunities. Here I outline the statistics for many of the most majors and careers when it comes...
Instructional Video9:54
Packt

Introduction to computer hardware and software : Optical Media

Higher Ed
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. Shiny optical discs are an excellent media for transporting data and are still a very...
Instructional Video11:37
Curated Video

Predictive Analytics with TensorFlow 6.3: Using BOW for Predictive Analytics

Higher Ed
In this video, we will see how to perform a bit more complex predictive analytics using the bag-of-words concept of NLP with TensorFlow. At first, we will formalize the problem, and then will explore the dataset that will be used....
Instructional Video6:52
Curated Video

Describe a neural network : Neural Network for Binary Classifications

Higher Ed
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Instructional Video5:24
Packt

Introduction to computer hardware and software : New Installation - First Drive

Higher Ed
From the section: Implementing Mass Storage. Here, we learn to implement mass storage. A brand-new system doesn’t have a bootable drive with an installed operating system. In this episode you will go through the process of setting up an...
Instructional Video4:40
Curated Video

Cloud Native Development on Azure with Java 3.1: Security Features of an Azure Web Application

Higher Ed
Security is a very important aspect of any application. In this video, we will go through the process of securing our cloud-native application, which we created in the previous section. • Explore the security features • Learn about the...