Hi, what do you want to do?
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 2
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images.
CNN-Industry Live Project: Find Medical Abnormalities and...
CNN-Industry Live Project: Find Medical Abnormalities and...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 2
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images.
CNN-Industry Live Project: Playing with Real World Natural Images:...
CNN-Industry Live Project: Playing with Real World Natural Images:...
Packt
Compare the breadth-first and depth-first search algorithms : Graph Data Structure
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and...
Curated Video
Call a function : Demo - String Operations
From the section: Data Operations. In this section, you will learn about the different types of operators used in Python. This section will teach you the building blocks for any kind of operations in Python.
Data Operations:...
Data Operations:...
Curated Video
Describe the different types of malware that could affect a computer system or network : Backdoors
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
Learning R for Data Visualization (Video 22)
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
Curated Video
Learning R for Data Visualization (Video 2)
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
Packt
Describe a data structure : What Are Data Structures and Why Are They Important?
From the section: Introduction to Data Structures and Important Concepts. This section introduces Data Structures and important concepts of DS and explains why they are important
Introduction to Data Structures and Important...
Introduction to Data Structures and Important...
Pitsco Education
Code Cube Lesson 10: A Little Extra!
In this lesson, you will learn how to make exciting patterns with your Code Cube.
APMonitor
Linear and Polynomial Regression in MATLAB
Data regression is an empirical method to develop correlations. This tutorial demonstrates how to use MATLAB to fit a line and polynomial functions along with plotting the results and performing a basic statistical analysis.
Curated Video
Bug Bounty Program Certification 3.1: Overview of Preparation Steps
In this video, we will have a look at the preparation steps. • Explore various technologies • Learn about ports and services information • Explore vulnerability scanning and tools
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Attacks on Classification and How They Work
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools.
The aim of this video is to describe why adversarial attacks...
The aim of this video is to describe why adversarial attacks...
Packt
Explain the negative impacts of artificial intelligence systems on society : Comparing Metrics and Choosing the Best Attack
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Packt
Explain the negative impacts of artificial intelligence systems on society : PGD Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see...
Curated Video
Test a computer program or algorithm : The On-success Block and Re-raising Exceptions
From the section: Errors in Python. This section introduces you to errors in Python.<b<br/>r/>
This video explains the concept of on-success block and re-raising exceptions in Python.
This video explains the concept of on-success block and re-raising exceptions in Python.
Curated Video
Test a computer program or algorithm : Dealing with Python Errors
From the section: Errors in Python. This section introduces you to errors in Python.<b<br/>r/>
This video shows how to deal with Python errors.
This video shows how to deal with Python errors.
Curated Video
Implement a computer program using a classic algorithm : Project handoff: Bringing it together
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc.
Design and build a project that utilizes the algorithms and tools that...
Design and build a project that utilizes the algorithms and tools that...
Curated Video
Evaluate two sorting or two search algorithms : Selection sort implementation
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation.<b<br/>r/>
Implement the selection sort algorithm step by step
Implement the selection sort algorithm step by step
Curated Video
Describe cyber attacks that could affect a computer system or network : Taking Control Over Target Browser with BeEf
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools.
In this video, we will learn about variety...
In this video, we will learn about variety...
Curated Video
Describe computer programming : Section Goal
From the section: Common Coding Concepts.This section will cover common coding concepts such as Scratch setup, bugs, pseudocode, decomposition, commenting and many more.
Common Coding Concepts: Se
ction Goal
• Use...
Common Coding Concepts: Se
ction Goal
• Use...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision.<b<br/>r/>
Computer Vision Basics: Part 1: [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)
Computer Vision Basics: Part 1: [Activity] Edge Detection and Gradient Calculations (Sobel, Laplace and Canny)
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Introduction to Seaborn
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and...
Programming Electronics Academy
Switch Case: Arduino Course 5.6
A demonstration of how "switch-case statements" are used in programming.
Programming Electronics Academy
Arduino Toolchain: Arduino Course 2.7
A high level description of the software tools used to get the code you write on an Arduino board.