Curated Video
Predictive Analytics with TensorFlow 11.3: Developing a Stock Price Predictive Model
An emerging area for applying is the stock market trading, where a trader acts like a reinforcement agent since buying and selling particular stock changes the state of the trader by generating profit or loss, that is, reward. • Define...
Curated Video
Predictive Analytics with TensorFlow 7.3:Using Multilayer Perceptrons for Predictive Analytics
For this video, we will be using bank marketing datasets. The data is related to direct marketing campaigns of a Portuguese banking institution. The marketing campaigns were based on phone calls. We will do predictive analytics using...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Categories of ML Tasks and Attacks
From the section: Security Test Using Adversarial Attack. In this section, you will test any AI system against the latest attacks with the help of simple tools. The aim of this video is to demonstrate that all approaches to solving...
Curated Video
Predictive Analytics with TensorFlow 6.1: NLP Analytics Pipelines
This video will explain us the general purpose of machine learning and also explain the workflow of predictive analytics. • Understand the workflow of predictive analytics in machine learning
Curated Video
Describe cyber attacks that could affect a computer system or network : Network Vulnerability Test Scope and Process
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Zach Star
How Much Programming Do Engineers Do?
Do you wonder how much programming you'll do in college as an engineer. This answer is very dependent on what major you pick, the university you go to, and various other factors. However there are some consistencies in each major that...
Packt
routing protocols : EIGRP - advanced distance vector routing protocol and Administrative Distance
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: EIGRP - advanced distance vector...
Packt
Introduction to computer hardware and software : Troubleshooting Power Supplies
From the section: Power Supplies. Here, we check our power supply, mount the power supply and learn how to cool our PC. If the power supply fails, a system simply will not operate. There are simple tricks and tips to diagnose and...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Decision Trees In Action
From the section: Machine Learning: Part 1. In this section, we’ll learn how machine learning works, and how it fits in with the world of AI and deep learning. And learn to train, test and validate the data using K-fold cross-validation....
Curated Video
Describe computer programming : Variables and Data Types
From the section: Introduction to Python. In this section we look at Python's fundamental, built-in data structures, and discuss how and when to use them. This video will give you an overview of the variables and data types. • Create...
APMonitor
Regression with MATLAB fmincon
A frequent activity in data science and machine learning is to develop correlations from data. By importing the data into MATLAB, data analysis such as statistics, trending, or calculations can be made to synthesize the information into...
Curated Video
Ensemble Machine Learning Techniques 2.1: Problems that Ensemble Learning Solves
This video talks about the advantages of using ensemble learning. • Define what is Bias, variance • Define what is Bias-Variance tradeoff • Look at the Advantage of using ensemble learning
Packt
Compare the breadth-first and depth-first search algorithms : Example - A Simple Puzzle Game
From the section: Searching in Graphs. In this section, we will see what we are searching for. Also, we will look at how to use and implement Breadth-First Search and Depth-First Search along with a simple puzzle game example. Solve the...
APMonitor
MATLAB User Defined Custom Functions
User-defined functions are routines in MATLAB that typically input data or arguments, perform custom calculations, and return one or multiple results. This introduction to functions is part of the programming course for engineers at...
Curated Video
High Performance Scientific Computing with C 2.2: Algorithm Complexity and Performance
How does the design of our programs affect their speed and accuracy? • Learn about floating-point round-off error • Learn about computational complexity • Examine the divide-and-conquer design approach
Curated Video
Design a computer system using tree search and reinforcement learning algorithms : Creating a Bandit with 4 Arms Using Python and Numpy
From the section: The Multi-Armed Bandit. In this section, we will learn about the basics and look at one of the most foundational concepts in Reinforcement Learning – The Multi-Armed Bandit We construct a model of a MAB environment from...