Hi, what do you want to do?
Curated Video
Learning R for Data Visualization (Video 23)
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
Curated Video
Ensemble Machine Learning Techniques 3.3: Making Predictions on Movie Ratings Using SVM
In this video, we will use Python to implement the Bagging technique using SVM.
• We will use Jupyter Notebook to execute our
code
• Use Movie Rating to perform clas
sification
• Implement Bagging in python for...
• We will use Jupyter Notebook to execute our
code
• Use Movie Rating to perform clas
sification
• Implement Bagging in python for...
Curated Video
Learning D3.JS 5.0 6.1: Get Started with Bars
In this video, we will learn how to create a basic bar graph.
• Understand the code and add more code to the given
files
• Understand how it’s done manually and how it’s don
e on D3.js
• View the result with the...
• Understand the code and add more code to the given
files
• Understand how it’s done manually and how it’s don
e on D3.js
• View the result with the...
Packt
Explain the negative impacts of artificial intelligence systems on society : DeepFool Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see...
Curated Video
Evaluate the accuracy of an artificial intelligence system : Evaluate Accuracy of the DNN Model
From the section: ANN & DNN With MXNet Package in R. This section is about ANN & DNN with MXNet Package in R.<b<br/>r/>
ANN & DNN With MXNet Package in R: Evaluate Accuracy of the DNN Model
ANN & DNN With MXNet Package in R: Evaluate Accuracy of the DNN Model
Curated Video
Describe the different types of malware that could affect a computer system or network : Downloaders
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Programming Electronics Academy
EPS 022 - Using Arduino in Schools with Phil Nolt
This week Michael sits down with Phil Nolt, a technology instructor for a large high school in Pennsylvania. Phil talks about an Arduino class he teaches. We hear about the ups and downs, and get Phils perspective on teaching.
Curated Video
Bug Bounty Program Certification 11.1: About Android App Frontend Penetration
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Curated Video
Bug Bounty Program Certification 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 4
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images.
CNN-Industry Live Project: Find Medical Abnormalities and...
CNN-Industry Live Project: Find Medical Abnormalities and...
Curated Video
Create a machine learning model of a real-life process or object : Improving the Network with Better Activation Functions and Dropout
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a...
Packt
Compare the breadth-first and depth-first search algorithms : Assignment 1 - Intro
From the section: BFS and DFS Grid World. This section will cover BFS and DFS Grid concept.<b<br/>r/>
BFS and DFS Grid World: Assignment 1 - Intro
BFS and DFS Grid World: Assignment 1 - Intro
Packt
Compare the breadth-first and depth-first search algorithms : Installation and Setup
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title.
• Download python, Graphviz, and
Pip.
• Run the installer...
• Download python, Graphviz, and
Pip.
• Run the installer...
Curated Video
Design test cases to verify a computer program : More Printer Tests
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python.<b<br/>r/>
This video explains how to perform more printer tests in Python.
This video explains how to perform more printer tests in Python.
Curated Video
Create a list : The Concat Solution
From the section: Lists. This section focuses on lists and the various functions of the list.<b<br/>r/>
This video provides the solution to the Concat Challenge.
This video provides the solution to the Concat Challenge.
Curated Video
Create a list : Lists Out of Arrays
From the section: Lists. This section focuses on lists and the various functions of the list.<b<br/>r/>
This video explains lists out of arrays.
This video explains lists out of arrays.
Packt
Introduction to computer hardware and software : Troubleshooting Core Components
From the section: Power Supplies. Here, we check our power supply, mount the power supply and learn how to cool our PC. Now that power supplies are covered, it’s time to circle back and cover troubleshooting core components. The...
Packt
Introduction to computer hardware and software : Configuring USB
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. Most USB devices work well fresh out of the box. For those that don’t, it’s important to...
Curated Video
Describe computer programming : Reading from and Writing to the Console
From the section: Introduction to Python. In this section we look at Python's fundamental, built-in data structures, and discuss how and when to use them.
This video will give you an overview about how to read from and...
This video will give you an overview about how to read from and...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Implementing CNN's in Keras
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works.<b<br/>r/>
Deep Learning and Tensorflow: Part 2: Implementing CNN's in Keras
Deep Learning and Tensorflow: Part 2: Implementing CNN's in Keras
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Corner detection – Harris
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision.<b<br/>r/>
Computer Vision Basics: Part 3: Corner detection – Harris
Computer Vision Basics: Part 3: Corner detection – Harris
Programming Electronics Academy
More Serial Library: Arduino Course 5.9
A description of using Serial Communication with Arduino.
Packt
Coding Standards to Achieve Encapsulation in Framework
This video presents coding standards required to achieve encapsulation in framework.
<
br/>
This clip is from the chapter "Selenium Framework Optimization and Interview Questions" of the series "Selenium WebDriver with Java - Basics...
<
br/>
This clip is from the chapter "Selenium Framework Optimization and Interview Questions" of the series "Selenium WebDriver with Java - Basics...