Instructional Video2:32
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : Black-Box Adversarial with Example

Higher Ed
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one...
Instructional Video7:11
Curated Video

routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
Instructional Video5:32
Curated Video

Explain web security : Methodolo-gy of Hack-ers

Higher Ed
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether...
Instructional Video2:51
Packt

Explain the negative impacts of artificial intelligence systems on society : CW Attack Practical Configuration

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video5:48
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 9

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images.



CNN-Industry Live Project: Playing with Real World Natural Images:...
Instructional Video6:09
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 6

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images.



CNN-Industry Live Project: Playing with Real World Natural Images:...
Instructional Video15:50
Curated Video

Implement a computer program using a classic algorithm : A look at the recursive divide function

Higher Ed
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation.<b<br/>r/>

A look at the divide/split function which introduces recursion
Instructional Video5:13
Curated Video

Evaluate a machine learning model : Better Measures than Accuracy

Higher Ed
From the section: Improving Model Accuracy. We start with reviewing previous day’s assignment by looking at an ideal solution and results. This module takes a pause from introducing any new model and focuses on improving the models...
Instructional Video3:07
Curated Video

Develop a computer program to solve a problem using control structures : For Loops II

Higher Ed
From the section: Python Crash Course. In this section, the author covers Python and provides a crash course on this.<b<br/>r/>

Python Crash Course: For Loops II
Instructional Video7:51
Curated Video

Describe network protocols : Handling Connections with Thread Pools

Higher Ed
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works.



In this video, we will look at how to handle threads with thr
ead pools.
• Show a...
Instructional Video9:18
Curated Video

Describe a neural network : Theory Behind ANN (Artificial Neural Network) and DNN (Deep Neural Networks)

Higher Ed
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Instructional Video3:01
Packt

Compare the breadth-first and depth-first search algorithms : DFS Versus BFS

Higher Ed
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and...
Instructional Video4:53
Packt

Compare the breadth-first and depth-first search algorithms : Building Search Tree with Nodes

Higher Ed
From the section: Shortest Time Search (Depth First Search). Build a sample search tree by answering the questions.

• What is a
node
• What are the properties and methods of
node class
• How can nodes be...
Instructional Video16:31
Curated Video

Create a list : Implement List Insert

Higher Ed
From the section: Lists. This section focuses on lists and the various functions of the list.<b<br/>r/>

This video explains how to implement the List Insert method.
Instructional Video16:40
Curated Video

Evaluate two sorting or two search algorithms : Bubble sort implementation

Higher Ed
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation.<b<br/>r/>

Implement the bubble sort algorithm step by step
Instructional Video3:13
Curated Video

Describe network protocols : Creating Simple TCP Echo Server

Higher Ed
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works.



In this video, will learn how to create a simple TCP ec
ho server.
• Learn the...
Instructional Video4:37
Curated Video

Describe cyber attacks that could affect a computer system or network : Leaving a Backdoor in the Target Machine

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools.



In this video, we will find out what is...
Instructional Video1:29
Curated Video

Describe computer programming : The Course Overview

Higher Ed
From the section: Introduction to Python. In this section we look at Python's fundamental, built-in data structures, and discuss how and when to use them.<b<br/>r/>

This video will give you an overview about the course.
Instructional Video3:01
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : Feature Extraction - SIFT, SURF, FAST and ORB

Higher Ed
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision.<b<br/>r/>

Computer Vision Basics: Part 3: Feature Extraction - SIFT, SURF, FAST and ORB
Instructional Video3:41
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Code to obtain color histogram

Higher Ed
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision.<b<br/>r/>

Computer Vision Basics: Part 3: [Activity] Code to obtain color histogram
Instructional Video17:36
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Convert RGB to HSV color spaces and merge/split channels

Higher Ed
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision.<b<br/>r/>

Computer Vision Basics: Part 1: [Activity] Convert RGB to HSV color spaces and merge/split channels
Instructional Video8:54
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] View colored image and convert RGB to Gray

Higher Ed
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision.<b<br/>r/>

Computer Vision Basics: Part 1: [Activity] View colored image and convert RGB to Gray
Instructional Video9:41
Curated Video

Create a computer network: Model Network Devices as Objects

Higher Ed
From the section: Interacting with Classic Network Devices. In this section, we will look at how to interact with classic network devices with Python libraries. We will explain what we define as classic network devices and use...
Instructional Video6:15
Curated Video

routing protocols : Static Routes and Dynamic Routes

Higher Ed
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols.



Routing Introduction: Static Routes and Dynamic...