Instructional Video3:55
Curated Video

Fix the errors in a computer program or algorithm : Raising Exception

Higher Ed
From the section: Errors and Exceptions Handling. In this section, you will learn about Errors and Exception handling in detail. Errors and Exceptions Handling: Raising Exception
Instructional Video6:59
Curated Video

Implement different search algorithms : BST from scratch - Delete demo

Higher Ed
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Visualize and understand the process of the delete functionality from a BST
Instructional Video3:24
Curated Video

Learning R for Data Visualization (Video 19)

Higher Ed
R is on the rise and showing itself as a powerful option in many software development domains. At its core, R is a statistical programming language that provides impressive tools for data mining and analysis, creating high-level...
Instructional Video12:05
Curated Video

High Performance Scientific Computing with C 1.4: Numerical Integration

Higher Ed
How can we calculate integrals with a computer? How can we solve differential equations? • Calculate integrals with the trapezoid and Simpson’s rule • See how the error terms scale with different algorithms • Solve differential equations...
Instructional Video8:59
Curated Video

High Performance Scientific Computing with C 3.2: Pipelining and Hardware-Oriented Design

Higher Ed
How can we design our programs to take the most advantage of modern CPU design? • Learn about caching • Learn about branch prediction and speculative execution • Stay out of the way of the CPU and compiler!
Instructional Video5:48
Curated Video

Cloud Native Development on Azure with Java 2.5: Build and Deploy a New Azure App Service Instance

Higher Ed
In this video, we will create an Azure web application hosted within the Azure App Service. We will configure it such that it will be compatible for hosting our Java Spring Boot application. • Add a new web application • Deploy a default...
Instructional Video2:33
Curated Video

Use a real-life example of an AI system to discuss some impacts of cyber attacks : White-Box Adversarial with Example

Higher Ed
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Instructional Video3:52
Packt

Explain the negative impacts of artificial intelligence systems on society : Adversarial Attacks Metrics and White-Box Adversarial Attacks

Higher Ed
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Instructional Video3:30
Curated Video

Fix the errors in a computer program or algorithm : Try, Except, Else and Finally

Higher Ed
From the section: Errors and Exceptions Handling. In this section, you will learn about Errors and Exception handling in detail. Errors and Exceptions Handling: Try, Except, Else and Finally
Instructional Video7:59
Packt

Describe a data structure : Constructor Functions and the "this" Keyword

Higher Ed
From the section: Introduction to Data Structures and Important Concepts. This section introduces Data Structures and important concepts of DS and explains why they are important Introduction to Data Structures and Important Concepts:...
Instructional Video6:18
Curated Video

Describe cyber attacks that could affect a computer system or network : Advanced-Level Hacking - Scanning Hosts with Python Script

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will consider using Python language in...
Instructional Video5:20
Curated Video

Describe cyber attacks that could affect a computer system or network : Types of man-in-the-middle Attack

Higher Ed
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will know about what is...
Instructional Video6:50
Packt

Debug a computer program created by someone else : Debugging Your Second Python Program

Higher Ed
From the section: Getting Started with Python Development. Setup your development environment, a gentle introduction to Python3. Demonstrate the Python debugger, and PyCharm interface to the debugger mode. • Run our program in the debug...
Instructional Video17:35
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Detecting Cars Using SVM - Part #2

Higher Ed
From the section: Machine Learning: Part 2. In this section, we’ll cover Bayes Theorem, Naive Bayes, SVM and SVC to classify data. Machine Learning: Part 2: [Activity] Detecting Cars Using SVM - Part #2
Instructional Video7:45
Curated Video

Describe an advanced data structure : Array Problems Involving Modulos

Higher Ed
From the section: Doing a Lot with Very Little. In this section, we will explore some problems that look difficult to solve efficiently at first sight. You might think that they require some advanced logic or data structures, but in fact...
Instructional Video5:54
Curated Video

Java 11 Programming for Beginners 1.4: Running Hello World

Higher Ed
This video guides you to use the basic setup from Video 1 and Video 2 to create your first simple Java program. • Write the Hello World Code • Run Hello World in the IDE • Run Hello World from the command line
Instructional Video10:07
Curated Video

Mastering Tableau 2018.1, Second Edition 8.6: Visualize Benford’s Law

Higher Ed
In this video, we’ll see how to visualize Benford’s law in Tableau. • Understand what Benford’s law is • Implement Benford’s law in Tableau
Instructional Video7:10
Curated Video

Learning D3.JS 5.0 7.1: Circles in Action

Higher Ed
In this video, we will learn what a scatter plot is and when we need it. • Understand the code • Create the SVG element • Create the circles
Instructional Video2:42
Curated Video

Learning D3.JS 5.0 3.1: Creating Polygons and Polylines

Higher Ed
In this video, we will learn how to create a polygon/polyline. • Code a polygon • Code a polyline • Understand the difference between polygon and polyline
Instructional Video7:50
Curated Video

Bug Bounty Program Certification 13.6: Certification Exam Practice Questions – Part 5

Higher Ed
Exam questions. • Practice questions • Solutions • Explanation of answer
Instructional Video4:10
Curated Video

Predictive Analytics with TensorFlow 8.2: Pooling Layer and Padding Operations

Higher Ed
We will have a look at pooling layer and padding operations. • Study the pooling layer • Understand padding operations
Instructional Video6:57
Curated Video

Predictive Analytics with TensorFlow 1.3: Installing Python in Windows

Higher Ed
This video will first explain the installing and getting started with python. We will then see python data types, strings, lists, tuples, dictionary, sets and functions. • Install python • See the python data types
Instructional Video9:18
APMonitor

Import Data and Analyze with MATLAB

10th - Higher Ed
Data are frequently available in text file format. This tutorial reviews how to import data, create trends and custom calculations, and then export the data in text file format from MATLAB. Source code is available from...
Instructional Video21:19
Programming Electronics Academy

PWM Example: Arduino Course 4.8

Higher Ed
An example of using Pulse Width Modulation with Arduino.