Home
Videos uploaded by user “intrigano”
Neural Networks - Networks in Networks and 1x1 Convolutions
 
06:40
Convolutional Neural Networks About this course: This course will teach you how to build convolutional neural networks and apply it to image data. Thanks to deep learning, computer vision is working far better than just two years ago, and this is enabling numerous exciting applications ranging from safe autonomous driving, to accurate face recognition, to automatic reading of radiology images. You will: - Understand how to build a convolutional neural network, including recent variations such as residual networks. - Know how to apply convolutional networks to visual detection and recognition tasks. - Know to use neural style transfer to generate art. - Be able to apply these algorithms to a variety of image, video, and other 2D or 3D data. This is the fourth course of the Deep Learning Specialization. Who is this class for: - Learners that took the first two courses of the specialization. The third course is recommended. - Anyone that already has a solid understanding of densely connected neural networks, and wants to learn convolutional neural networks or work with image data. Deep convolutional models: case studies Learn about the practical tricks and methods used in deep CNNs straight from the research papers. Learning Objectives • Understand multiple foundational papers of convolutional neural networks • Analyze the dimensionality reduction of a volume in a very deep network • Understand and Implement a Residual network • Build a deep neural network using Keras • Implement a skip-connection in your network • Clone a repository from github and use transfer learning Subscribe at: https://www.coursera.org
Views: 8376 intrigano
Software security - Return Oriented Programming -  ROP
 
11:14
software security - Return Oriented Programming - ROP To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: https://www.youtube.com/playlist?list=PL2jykFOD1AWY1E3MB38_uOfpvEf4gnW80 ================================== About this course: This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
Views: 7517 intrigano
What is LDAP
 
01:57
Google IT Support Professional Certificate Course 4 - System Administration and IT Infrastructure Services, Module 4 - Directory Services To get certificate subscribe at: https://www.coursera.org/specializations/google-it-support ================= The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playlist?list=PL2jykFOD1AWZlfwMPcVKwaFrRXbqObI3U ================= System Administration and IT Infrastructure Services: https://www.youtube.com/playlist?list=PL2jykFOD1AWYUKiWILvy1MtkboqifMEJ0 ================= https://www.facebook.com/cyberassociation/ https://scsa.ge/en/online-courses/ This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Course 4 - System Administration and IT Infrastructure Services About the Course This course will transition you from working on a single computer to a whole fleet. Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment. In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running. You’ll learn how to manage and configure servers, how to use industry tools to manage computers, user information, and user productivity. Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster. By the end of this course you’ll be able to: - utilize best practices for choosing hardware, vendors, and services for your organization. - understand how the most common infrastructure services that keep an organization running work and how to manage infrastructure servers. - manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP. - choose and manage the tools that your organization will use. - backup your organization’s data and be able to recover your IT infrastructure in the case of a disaster. - utilize systems administration knowledge to plan improve processes for IT environments. Module 4 - Directory Services In the fourth module of this course, we'll learn about directory services. Specifically, we'll cover how two of the most popular directory services, Active Directory and OpenLDAP, work in action. We'll explore the concept of centralized management and how this can help SysAdmins maintain and support all the different parts of an IT infrastructure. By the end of this module, you will know how to add users, passwords, and use group policies in Active Directory and OpenLDAP. Learning Objectives • Understand what services a directory server provides. • Understand what LDAP and Active Directory are.
Views: 5027 intrigano
Firewall Stateful versus Stateless
 
05:29
Real-Time Cyber Threat Detection and Mitigation Module 1 Basic Network Security This module introduces the basics of TCP/IP for security, including firewall design and use. Learning Objectives • Explain the pros and cons of security through obscurity • Summarize the basics of TCP/IP for cyber security • Examine basic TCP/IP hacks including spoofs and floods • Define firewall and basic operation • Differentiate between stateful and stateless firewall operation About this course: This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need for network security solutions such as stateless and stateful firewalls. Learners will be introduced to the techniques used to design and configure firewall solutions such as packet filters and proxies to protect enterprise assets. Perimeter solutions such as firewalls and intrusion prevention systems are shown to have significant drawbacks in common enterprise environments. The result of such weakness is shown to often exist as advanced persistent threats (APTs) from nation-state actors. Such attacks, as well as DDOS and third-party attacks, are shown to have potential solutions for modern enterprise. Subscribe at: https://www.coursera.org/learn/intro-cyber-attacks/home/welcome https://www.coursera.org
Views: 3811 intrigano
Introduction to IT Support - What does an IT Support Specialist do
 
02:32
Google IT Support Professional Certificate https://www.coursera.org/specializations/google-it-support This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Through a dynamic mix of video lectures, quizzes, and hand-on labs and widgets, this program will introduce you to troubleshooting and customer service, networking, operating systems, system administration, automation, and security. Along the way, you’ll hear from Googlers with unique backgrounds and perspectives, whose own foundation in IT support served as a jumping off point for their careers. They’re excited to go on this journey with you, as you invest in your future by achieving an end-of-program certificate. Course 1 - IT Technical Support Fundamentals In this course, you’ll be introduced to the world of Information Technology, or IT. This course is the first of a series that aims to prepare you for a role as an entry-level IT Support Specialist. You’ll learn about the different facets of Information Technology, like computer hardware, the Internet, computer software, and job-related skills. You’ll also learn about the history of computers, and the pioneers who shaped the world of computing that we know today. This course covers a wide variety of topics in IT that are designed to give you an overview of what’s to come in this IT Support Professional Certificate. By the end of this course, you’ll be able to: - understand how the binary system works. - assemble a computer from scratch. - choose and install an operating system on a computer. - understand what the Internet is, how it works, and the impact it has in the modern world. - learn how applications are created and how they work under the hood of our computer. - utilize common problem-solving methodologies and soft skills in an Information Technology setting. Who is this class for: This program is intended for beginners who are interested in developing the skills necessary to perform entry-level IT support. No pre-requisite knowledge is required. However, if you do have some familiarity with IT, you can skip through
Views: 2789 intrigano
Bitcoin - Proof of Stake Virtual Mining
 
08:07
Proof of Stake Virtual Mining - Bitcoin and Cryptocurrency Technologies Part 8 - Alternative Mining Puzzles Not everyone is happy about how Bitcoin mining works: its energy consumption and the fact that it requires specialized hardware are major sticking points. This week we'll look at how mining can be re-designed in alternative cryptocurrencies.
Views: 30497 intrigano
What is LDAP Authentication
 
03:10
Google IT Support Professional Certificate Course 4 - System Administration and IT Infrastructure Services, Module 4 - Directory Services To get certificate subscribe at: https://www.coursera.org/specializations/google-it-support ================= The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playlist?list=PL2jykFOD1AWZlfwMPcVKwaFrRXbqObI3U ================= System Administration and IT Infrastructure Services: https://www.youtube.com/playlist?list=PL2jykFOD1AWYUKiWILvy1MtkboqifMEJ0 ================= https://www.facebook.com/cyberassociation/ https://scsa.ge/en/online-courses/ This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Course 4 - System Administration and IT Infrastructure Services About the Course This course will transition you from working on a single computer to a whole fleet. Systems administration is the field of IT that’s responsible for maintaining reliable computers systems in a multi-user environment. In this course, you’ll learn about the infrastructure services that keep all organizations, big and small, up and running. You’ll learn how to manage and configure servers, how to use industry tools to manage computers, user information, and user productivity. Finally, you’ll learn how to recover your organization’s IT infrastructure in the event of a disaster. By the end of this course you’ll be able to: - utilize best practices for choosing hardware, vendors, and services for your organization. - understand how the most common infrastructure services that keep an organization running work and how to manage infrastructure servers. - manage an organization’s computers and users using the directory services, Active Directory, and OpenLDAP. - choose and manage the tools that your organization will use. - backup your organization’s data and be able to recover your IT infrastructure in the case of a disaster. - utilize systems administration knowledge to plan improve processes for IT environments. Module 4 - Directory Services In the fourth module of this course, we'll learn about directory services. Specifically, we'll cover how two of the most popular directory services, Active Directory and OpenLDAP, work in action. We'll explore the concept of centralized management and how this can help SysAdmins maintain and support all the different parts of an IT infrastructure. By the end of this module, you will know how to add users, passwords, and use group policies in Active Directory and OpenLDAP. Learning Objectives • Understand what services a directory server provides. • Understand what LDAP and Active Directory are.
Views: 2819 intrigano
8 Quantum Mechanics - Geometric representation part 2
 
08:09
Quantum Mechanics and Quantum Computation
Views: 2281 intrigano
44 Quantum Mechanics - Quantum factoring   Shor's factoring algorithm
 
25:43
Quantum Mechanics and Quantum Computation - Quantum factoring Shor's factoring algorithm
Views: 10835 intrigano
43 Quantum Mechanics - Quantum factoring   Period finding
 
19:28
Quantum Mechanics and Quantum Computation - Quantum factoring Period finding
Views: 6571 intrigano
python - Parsing XML in Python
 
12:21
Programming for Everybody - Parsing XML in Python
Views: 16570 intrigano
Neural Networks - Bounding Box Predictions
 
14:32
Convolutional Neural Networks About this course: This course will teach you how to build convolutional neural networks and apply it to image data. Thanks to deep learning, computer vision is working far better than just two years ago, and this is enabling numerous exciting applications ranging from safe autonomous driving, to accurate face recognition, to automatic reading of radiology images. You will: - Understand how to build a convolutional neural network, including recent variations such as residual networks. - Know how to apply convolutional networks to visual detection and recognition tasks. - Know to use neural style transfer to generate art. - Be able to apply these algorithms to a variety of image, video, and other 2D or 3D data. This is the fourth course of the Deep Learning Specialization. Who is this class for: - Learners that took the first two courses of the specialization. The third course is recommended. - Anyone that already has a solid understanding of densely connected neural networks, and wants to learn convolutional neural networks or work with image data. Object detection Learn how to apply your knowledge of CNNs to one of the toughest but hottest field of computer vision: Object detection. Learning Objectives • Understand the challenges of Object Localization, Object Detection and Landmark Finding • Understand and implement non-max suppression • Understand and implement intersection over union • Understand how we label a dataset for an object detection application • Remember the vocabulary of object detection (landmark, anchor, bounding box, grid, ...) Subscribe at: https://www.coursera.org
Views: 4930 intrigano
Networking -  The TCPIP Five Layer Network Model
 
05:15
Google IT Support Professional Certificate https://www.coursera.org/specializations/google-it-support https://www.facebook.com/cyberassociation/ This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Course 2 - The Bits and Bytes of Computer Networking (Module 1 Introduction to Networking) About the Course This course is designed to provide a full overview of computer networking. In this course, we’ll cover everything from the fundamentals of modern networking technologies and protocols to practical applications and network troubleshooting. By the end of this course, you’ll be able to: - describe computer networks in terms of a five-layer model. - understand all of the standard protocols involved with TCP/IP communications. - grasp powerful network troubleshooting tools and techniques. - learn network services like DNS and DHCP that help make computer networks run. Except as otherwise noted. Who is this class for: This program is intended for beginners who are interested in developing the skills necessary to perform entry-level IT support. No pre-requisite knowledge is required. However, if you do have some familiarity with IT, you can skip through any content that you might already know. Course 2 consists of 6 modules Module 1 Introduction to Networking Module 2 The Network Layer Module 3 The Transport and Application Layers Module 4 Networking Services Module 5 Connecting to the Internet Module 6 Troubleshooting and the Future of Networking In the first module of this course, we will cover the basics of computer networking. We will learn about the TCP/IP and OSI networking models and how the network layers work together. We'll also cover the basics of networking devices such as cables, hubs and switches, routers, servers and clients. We'll also explore the physical layer and data link layer of our networking model in more detail. By the end of this module, you will know how all the different layers of the network model fit together to create a network. Learning Objectives • Describe how the TCP/IP five layer network model works. • Identify basic networking devices. • Label each of the five layers in the TCP/IP network model. • Describe how the physical layer works. • Describe how the data link layer works.
Views: 1346 intrigano
Linux Logs
 
04:48
Google IT Support Professional Certificate Course 3 - Operating Systems and You: Becoming a Power User, Module 6 - Operating Systems in Practice To get certificate subscribe at: https://www.coursera.org/specializations/google-it-support ================= The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playlist?list=PL2jykFOD1AWZlfwMPcVKwaFrRXbqObI3U ================= Playlist Operating Systems: https://www.youtube.com/playlist?list=PL2jykFOD1AWY3Ot3HResh50JwdBdjilsq ================= https://www.facebook.com/cyberassociation/ https://scsa.ge/en/online-courses/ This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Course 3 - Operating Systems and You: Becoming a Power User About the Course In this course, you’ll learn how to use the major operating systems, Windows and Linux, which are a core component of IT. Through a combination of video lectures, demonstrations, and hands-on practice, you’ll learn about the main components of an operating system and how to perform critical tasks like managing software and users, and configuring hardware. By the end of this course you’ll be able to: - navigate the Windows and Linux filesystems using a graphical user interface and command line interpreter. - set up users, groups, and permissions for account access. - install, configure, and remove software on the Windows and Linux operating systems. - configure disk partitions and filesystems. - understand how system processes work and how to manage them. - work with system logs and remote connection tools. - utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role. Module 6 - Operating Systems in Practice Congratulations, you've made it to the final module in the course! In the last week of this course, we will cover some of the practical aspects of operating systems that you'll use all the time in IT Support. We will cover remote access and how to troubleshoot a computer from afar. We'll explore virtualization tools to manage and remove virtual instances, use logs for system monitoring, and show you a few different techniques for OS deployment. By the end of this module, you will apply all the skills from this course to debug some issues within Windows and Linux OS. Good luck! Learning Objectives • Be able to remotely access a Windows or Linux machine. • Read and troubleshoot logs. • Utilize disk cloning tools to make an image.
Views: 1327 intrigano
Hardware security - Physical Unclonable Functions PUF Basics
 
16:24
hardware security - Physical Unclonable Functions PUF Basics To get certificate subscribe at: https://www.coursera.org/learn/hardware-security ================================== Hardware security playlist: https://www.youtube.com/playlist?list=PL2jykFOD1AWZRNhehPCsDLhfRkM1abYHd ================================== About this course: In this course, we will study security and trust from the hardware perspective. Upon completing the course, students will understand the vulnerabilities in current digital system design flow and the physical attacks to these systems. They will learn that security starts from hardware design and be familiar with the tools and skills to build secure and trusted hardware.
Views: 3985 intrigano
2 Quantum Mechanics and Quantum Computation - Double slit experiment part 1
 
05:49
Quantum Mechanics and Quantum Computation
Views: 3248 intrigano
IT Technical Support Fundamentals – Introduction
 
05:18
Google IT Support Professional Certificate https://www.coursera.org/specializations/google-it-support This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Through a dynamic mix of video lectures, quizzes, and hand-on labs and widgets, this program will introduce you to troubleshooting and customer service, networking, operating systems, system administration, automation, and security. Along the way, you’ll hear from Googlers with unique backgrounds and perspectives, whose own foundation in IT support served as a jumping off point for their careers. They’re excited to go on this journey with you, as you invest in your future by achieving an end-of-program certificate. Course 1 - IT Technical Support Fundamentals In this course, you’ll be introduced to the world of Information Technology, or IT. This course is the first of a series that aims to prepare you for a role as an entry-level IT Support Specialist. You’ll learn about the different facets of Information Technology, like computer hardware, the Internet, computer software, and job-related skills. You’ll also learn about the history of computers, and the pioneers who shaped the world of computing that we know today. This course covers a wide variety of topics in IT that are designed to give you an overview of what’s to come in this IT Support Professional Certificate. By the end of this course, you’ll be able to: - understand how the binary system works. - assemble a computer from scratch. - choose and install an operating system on a computer. - understand what the Internet is, how it works, and the impact it has in the modern world. - learn how applications are created and how they work under the hood of our computer. - utilize common problem-solving methodologies and soft skills in an Information Technology setting. Who is this class for: This program is intended for beginners who are interested in developing the skills necessary to perform entry-level IT support. No pre-requisite knowledge is required. However, if you do have some familiarity with IT, you can skip through
Views: 3435 intrigano
Linear Algebra - Solving data science challenges with mathematics
 
05:55
Mathematics for Machine Learning: Linear Algebra, Module 1 - Introduction to Linear Algebra and to Mathematics for Machine Learning To get certificate subscribe at: https://www.coursera.org/learn/linear-algebra-machine-learning/home/welcome ============================ Mathematics for Machine Learning: Linear Algebra: https://www.youtube.com/playlist?list=PL2jykFOD1AWazz20_QRfESiJ2rthDF9-Z ============================ Youtube channel: https://www.youtube.com/user/intrigano ============================ https://scsa.ge/en/online-courses/ https://www.facebook.com/cyberassociation/ About this course: In this course on Linear Algebra we look at what linear algebra is and how it relates to vectors and matrices. Then we look through what vectors and matrices are and how to work with them, including the knotty problem of eigenvalues and eigenvectors, and how to use these to solve problems. Finally we look at how to use these to do fun things with datasets - like how to rotate images of faces and how to extract eigenvectors to look at how the Pagerank algorithm works. Since we're aiming at data-driven applications, we'll be implementing some of these ideas in code, not just on pencil and paper. Towards the end of the course, you'll write code blocks and encounter Jupyter notebooks in Python, but don't worry, these will be quite short, focussed on the concepts, and will guide you through if you’ve not coded before. At the end of this course you will have an intuitive understanding of vectors and matrices that will help you bridge the gap into linear algebra problems, and how to apply these concepts to machine learning. Who is this class for: This course is for people who want to refresh their maths skills in linear algebra, particularly for the purposes of doing data science and machine learning, or learning about data science and machine learning. We look at vectors, matrices and how to apply these to solve linear systems of equations, and how to apply these to computational problems. ________________________________________ Created by: Imperial College London Module 1 Introduction to Linear Algebra and to Mathematics for Machine Learning In this first module we look at how linear algebra is relevant to machine learning and data science. Then we'll wind up the module with an initial introduction to vectors. Throughout, we're focussing on developing your mathematical intuition, not of crunching through algebra or doing long pen-and-paper examples. For many of these operations, there are callable functions in Python that can do the adding up - the point is to appreciate what they do and how they work so that, when things go wrong or there are special cases, you can understand why and what to do. Less Learning Objectives • Recall how machine learning and vectors and matrices are related • Interpret how changes in the model parameters affect the quality of the fit to the training data • Recognize that variations in the model parameters are vectors on the response surface - that vectors are a generic concept not limited to a physical real space • Use substitution / elimination to solve a fairly easy linear algebra problem • Understand how to add vectors and multiply by a scalar number
Views: 1805 intrigano
Bitcoin - Zerocoin and Zerocash
 
19:48
Zerocoin and Zerocash - Bitcoin and Cryptocurrency Technologies Part 6 - Bitcoin and Anonymity Is Bitcoin anonymous? What does that statement even mean—can we define it rigorously? We'll learn about the various ways to improve Bitcoin's anonymity and privacy and learn about Bitcoin's role in Silk Road and other hidden marketplaces.
Views: 1521 intrigano
Neural Networks - Edge Detection Example
 
11:31
Edge Detection Example
Views: 3966 intrigano
cryptography - Padding Oracle Attacks
 
17:06
Cryptography To get certificate subscribe: https://www.coursera.org/learn/cryptography ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu ============================ Youtube channel: https://www.youtube.com/user/intrigano ============================ https://scsa.ge/en/online-courses/ https://www.facebook.com/cyberassociation/
Views: 3922 intrigano
Neural Networks - YOLO Algorithm
 
07:02
Convolutional Neural Networks About this course: This course will teach you how to build convolutional neural networks and apply it to image data. Thanks to deep learning, computer vision is working far better than just two years ago, and this is enabling numerous exciting applications ranging from safe autonomous driving, to accurate face recognition, to automatic reading of radiology images. You will: - Understand how to build a convolutional neural network, including recent variations such as residual networks. - Know how to apply convolutional networks to visual detection and recognition tasks. - Know to use neural style transfer to generate art. - Be able to apply these algorithms to a variety of image, video, and other 2D or 3D data. This is the fourth course of the Deep Learning Specialization. Who is this class for: - Learners that took the first two courses of the specialization. The third course is recommended. - Anyone that already has a solid understanding of densely connected neural networks, and wants to learn convolutional neural networks or work with image data. Object detection Learn how to apply your knowledge of CNNs to one of the toughest but hottest field of computer vision: Object detection. Learning Objectives • Understand the challenges of Object Localization, Object Detection and Landmark Finding • Understand and implement non-max suppression • Understand and implement intersection over union • Understand how we label a dataset for an object detection application • Remember the vocabulary of object detection (landmark, anchor, bounding box, grid, ...) Subscribe at: https://www.coursera.org
Views: 2484 intrigano
Neural Networks - Inception Network Motivation
 
10:15
Convolutional Neural Networks About this course: This course will teach you how to build convolutional neural networks and apply it to image data. Thanks to deep learning, computer vision is working far better than just two years ago, and this is enabling numerous exciting applications ranging from safe autonomous driving, to accurate face recognition, to automatic reading of radiology images. You will: - Understand how to build a convolutional neural network, including recent variations such as residual networks. - Know how to apply convolutional networks to visual detection and recognition tasks. - Know to use neural style transfer to generate art. - Be able to apply these algorithms to a variety of image, video, and other 2D or 3D data. This is the fourth course of the Deep Learning Specialization. Who is this class for: - Learners that took the first two courses of the specialization. The third course is recommended. - Anyone that already has a solid understanding of densely connected neural networks, and wants to learn convolutional neural networks or work with image data. Deep convolutional models: case studies Learn about the practical tricks and methods used in deep CNNs straight from the research papers. Learning Objectives • Understand multiple foundational papers of convolutional neural networks • Analyze the dimensionality reduction of a volume in a very deep network • Understand and Implement a Residual network • Build a deep neural network using Keras • Implement a skip-connection in your network • Clone a repository from github and use transfer learning Subscribe at: https://www.coursera.org
Views: 2497 intrigano
7 Quantum Mechanics and Quantum Computation - Geometric representation part 1
 
12:11
Quantum Mechanics and Quantum Computation
Views: 2871 intrigano
cryptography - Hex and ASCII
 
10:58
cryptography To get certificate subscribe: https://www.coursera.org/learn/cryptography ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu ============================ Youtube channel: https://www.youtube.com/user/intrigano ============================ https://scsa.ge/en/online-courses/ https://www.facebook.com/cyberassociation/
Views: 7318 intrigano
47 Quantum Mechanics - Quantum search   Grover's algorithm
 
12:04
Quantum Mechanics and Quantum Computation - Quantum search Grover's algorithm
Views: 3313 intrigano
Cryptocurrencies - Centralization vs  Decentralization
 
04:48
Cryptocurrencies - Centralization vs Decentralization - Bitcoin and Cryptocurrency Technologies Part 2 - How Bitcoin Achieves Decentralization Learn Bitcoin's consensus mechanism and reason about its security. Appreciate how security comes from a combination of technical methods and clever incentive engineering.
Views: 2071 intrigano
25 Quantum Mechanics - Teleportation part 1
 
11:38
Teleportation part 1
Views: 1349 intrigano
38 Quantum Mechanics - Quantum Fourier transform overview
 
10:12
Quantum Mechanics and Quantum Computation - Quantum Fourier transform overview
Views: 3673 intrigano
Quantum Optics – Quantum cryptography the BB84 QKD scheme
 
15:14
One-photon based quantum technologies In this lesson, you will discover two quantum technologies based on one photon sources. Quantum technologies allow one to achieve a goal in a way qualitatively different from a classical technology aiming at the same goal. For instance, quantum cryptography is immune to progress in computers power, while many classical cryptography methods can in principle be broken when we have more powerful computers. Similarly, quantum random number generators yield true random numbers, while classical random number generators only produce pseudo-random numbers, which might be guessed by somebody else than the user. This lesson is also an opportunity to learn two important concepts in quantum information: (i) qubits based on photon polarization; (ii) the celebrated no-cloning theorem, at the root of the security of quantum cryptography. Learning Objectives • Apply your knowledge about the behavior of a single photon on a beam splitter to quantum random number generators. • Understand the no-cloning theorem • Understand and remember the properties of q qubit This course gives you access to basic tools and concepts to understand research articles and books on modern quantum optics. You will learn about quantization of light, formalism to describe quantum states of light without any classical analogue, and observables allowing one to demonstrate typical quantum properties of these states. These tools will be applied to the emblematic case of a one-photon wave packet, which behaves both as a particle and a wave. Wave-particle duality is a great quantum mystery in the words of Richard Feynman. You will be able to fully appreciate real experiments demonstrating wave-particle duality for a single photon, and applications to quantum technologies based on single photon sources, which are now commercially available. The tools presented in this course will be widely used in our second quantum optics course, which will present more advanced topics such as entanglement, interaction of quantized light with matter, squeezed light, etc... So if you have a good knowledge in basic quantum mechanics and classical electromagnetism, but always wanted to know: • how to go from classical electromagnetism to quantized radiation, • how the concept of photon emerges, • how a unified formalism is able to describe apparently contradictory behaviors observed in quantum optics labs, • how creative physicists and engineers have invented totally new technologies based on quantum properties of light, then this course is for you. Subscribe at: https://www.coursera.org
Views: 2669 intrigano
cryptography - CBC MAC
 
07:09
Cryptography To get certificate subscribe: https://www.coursera.org/learn/cryptography ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu ============================ Youtube channel: https://www.youtube.com/user/intrigano ============================ https://scsa.ge/en/online-courses/ https://www.facebook.com/cyberassociation/
Views: 1797 intrigano
Python Programming - Why Python
 
15:40
Why Python
Views: 3318 intrigano
Neural Networks - One Shot Learning
 
04:45
Convolutional Neural Networks About this course: This course will teach you how to build convolutional neural networks and apply it to image data. Thanks to deep learning, computer vision is working far better than just two years ago, and this is enabling numerous exciting applications ranging from safe autonomous driving, to accurate face recognition, to automatic reading of radiology images. You will: - Understand how to build a convolutional neural network, including recent variations such as residual networks. - Know how to apply convolutional networks to visual detection and recognition tasks. - Know to use neural style transfer to generate art. - Be able to apply these algorithms to a variety of image, video, and other 2D or 3D data. This is the fourth course of the Deep Learning Specialization. Who is this class for: - Learners that took the first two courses of the specialization. The third course is recommended. - Anyone that already has a solid understanding of densely connected neural networks, and wants to learn convolutional neural networks or work with image data. Special applications: Face recognition & Neural style transfer Discover how CNNs can be applied to multiple fields, including art generation and face recognition. Implement your own algorithm to generate art and recognize faces! Subscribe at: https://www.coursera.org
Views: 1135 intrigano
33 Quantum Mechanics - Fourier sampling part 1
 
08:06
Quantum Mechanics and Quantum Computation - Fourier sampling part
Views: 1825 intrigano
Software security - Session Hijacking
 
06:57
software security - Session Hijacking To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: https://www.youtube.com/playlist?list=PL2jykFOD1AWY1E3MB38_uOfpvEf4gnW80 ================================== About this course: This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
Views: 1456 intrigano
Software security - Control Flow Integrity
 
14:54
software security - Control Flow Integrity To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: https://www.youtube.com/playlist?list=PL2jykFOD1AWY1E3MB38_uOfpvEf4gnW80 ================================== About this course: This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
Views: 1270 intrigano
cryptography - Pseudorandom Functions and Block Ciphers
 
19:39
Cryptography To get certificate subscribe: https://www.coursera.org/learn/cryptography ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu ============================ Youtube channel: https://www.youtube.com/user/intrigano ============================ https://scsa.ge/en/online-courses/ https://www.facebook.com/cyberassociation/
Views: 1951 intrigano
cryptography - HMAC
 
11:28
Cryptography To get certificate subscribe: https://www.coursera.org/learn/cryptography ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWb07OLBdFI2QIHvPo3aTTeu ============================ Youtube channel: https://www.youtube.com/user/intrigano ============================ https://scsa.ge/en/online-courses/ https://www.facebook.com/cyberassociation/
Views: 9849 intrigano
Neural Networks - Triplet Loss
 
15:31
Convolutional Neural Networks About this course: This course will teach you how to build convolutional neural networks and apply it to image data. Thanks to deep learning, computer vision is working far better than just two years ago, and this is enabling numerous exciting applications ranging from safe autonomous driving, to accurate face recognition, to automatic reading of radiology images. You will: - Understand how to build a convolutional neural network, including recent variations such as residual networks. - Know how to apply convolutional networks to visual detection and recognition tasks. - Know to use neural style transfer to generate art. - Be able to apply these algorithms to a variety of image, video, and other 2D or 3D data. This is the fourth course of the Deep Learning Specialization. Who is this class for: - Learners that took the first two courses of the specialization. The third course is recommended. - Anyone that already has a solid understanding of densely connected neural networks, and wants to learn convolutional neural networks or work with image data. Special applications: Face recognition & Neural style transfer Discover how CNNs can be applied to multiple fields, including art generation and face recognition. Implement your own algorithm to generate art and recognize faces! Subscribe at: https://www.coursera.org
Views: 2420 intrigano
python - XML Schema
 
12:53
Programming for Everybody - XML Schema
Views: 1477 intrigano
12 Quantum Mechanics - Entanglement
 
08:59
Quantum Mechanics and Quantum Computation
Views: 2207 intrigano
Quantum Optics - Canonical quantization
 
10:29
Quantum Optics - Quantization of light one mode - Canonical quantization This course gives you access to basic tools and concepts to understand research articles and books on modern quantum optics. You will learn about quantization of light, formalism to describe quantum states of light without any classical analogue, and observables allowing one to demonstrate typical quantum properties of these states. These tools will be applied to the emblematic case of a one-photon wave packet, which behaves both as a particle and a wave. Wave-particle duality is a great quantum mystery in the words of Richard Feynman. You will be able to fully appreciate real experiments demonstrating wave-particle duality for a single photon, and applications to quantum technologies based on single photon sources, which are now commercially available. The tools presented in this course will be widely used in our second quantum optics course, which will present more advanced topics such as entanglement, interaction of quantized light with matter, squeezed light, etc... So if you have a good knowledge in basic quantum mechanics and classical electromagnetism, but always wanted to know: • how to go from classical electromagnetism to quantized radiation, • how the concept of photon emerges, • how a unified formalism is able to describe apparently contradictory behaviors observed in quantum optics labs, • how creative physicists and engineers have invented totally new technologies based on quantum properties of light, then this course is for you. Who is this class for: This course is primarily intended for university students who have a good knowledge of basic quantum mechanics and classical electromagnetism, and who want to enter in the field of quantum optics. It is also intended for engineers who want to catch up with the rapidly developing quantum technologies derived from the second quantum revolution, in which the observation and control of single quantum objects, such as single photons, is a key ingredient. Subscribe at: https://www.coursera.org
Views: 1215 intrigano
Software security - Basic Symbolic Execution
 
14:18
software security - Basic Symbolic Execution To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: https://www.youtube.com/playlist?list=PL2jykFOD1AWY1E3MB38_uOfpvEf4gnW80 ================================== About this course: This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
Views: 2006 intrigano
41 QFTn part 2
 
10:05
Quantum Mechanics and Quantum Computation - QFTn part 2
Views: 1124 intrigano
Quantum Optics - Introduction to Quantization of light
 
05:03
This course gives you access to basic tools and concepts to understand research articles and books on modern quantum optics. You will learn about quantization of light, formalism to describe quantum states of light without any classical analogue, and observables allowing one to demonstrate typical quantum properties of these states. These tools will be applied to the emblematic case of a one-photon wave packet, which behaves both as a particle and a wave. Wave-particle duality is a great quantum mystery in the words of Richard Feynman. You will be able to fully appreciate real experiments demonstrating wave-particle duality for a single photon, and applications to quantum technologies based on single photon sources, which are now commercially available. The tools presented in this course will be widely used in our second quantum optics course, which will present more advanced topics such as entanglement, interaction of quantized light with matter, squeezed light, etc... So if you have a good knowledge in basic quantum mechanics and classical electromagnetism, but always wanted to know: • how to go from classical electromagnetism to quantized radiation, • how the concept of photon emerges, • how a unified formalism is able to describe apparently contradictory behaviors observed in quantum optics labs, • how creative physicists and engineers have invented totally new technologies based on quantum properties of light, then this course is for you. Who is this class for: This course is primarily intended for university students who have a good knowledge of basic quantum mechanics and classical electromagnetism, and who want to enter in the field of quantum optics. It is also intended for engineers who want to catch up with the rapidly developing quantum technologies derived from the second quantum revolution, in which the observation and control of single quantum objects, such as single photons, is a key ingredient. Subscribe at: https://www.coursera.org
Views: 1016 intrigano
5 Quantum Mechanics and Quantum Computation - Double slit experiment part 4
 
09:23
Quantum Mechanics and Quantum Computation
Views: 2273 intrigano
Software security - Introducing Symbolic Execution
 
10:53
software security - Introducing Symbolic Execution To get certificate subscribe at: https://www.coursera.org/learn/software-security ================================== Software Security playlist: https://www.youtube.com/playlist?list=PL2jykFOD1AWY1E3MB38_uOfpvEf4gnW80 ================================== About this course: This course we will explore the foundations of software security. We will consider important software vulnerabilities and attacks that exploit them -- such as buffer overflows, SQL injection, and session hijacking -- and we will consider defenses that prevent or mitigate these attacks, including advanced testing and program analysis techniques. Importantly, we take a "build security in" mentality, considering techniques at each phase of the development cycle that can be used to strengthen the security of software systems. Successful learners in this course typically have completed sophomore/junior-level undergraduate work in a technical field, have some familiarity with programming, ideally in C/C++ and one other "managed" program language (like ML or Java), and have prior exposure to algorithms. Students not familiar with these languages but with others can improve their skills through online web tutorials.
Views: 1347 intrigano
Linux SetUID, SetGID, Sticky Bit
 
05:53
Google IT Support Professional Certificate Course 3 - Operating Systems and You: Becoming a Power User, Module 2 - Users and Permissions (File Permissions) To get certificate subscribe at: https://www.coursera.org/specializations/google-it-support ================= The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playlist?list=PL2jykFOD1AWZlfwMPcVKwaFrRXbqObI3U ================= Playlist Operating Systems: https://www.youtube.com/playlist?list=PL2jykFOD1AWY3Ot3HResh50JwdBdjilsq ================= https://www.facebook.com/cyberassociation/ https://scsa.ge/en/online-courses/ This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Course 3 - Operating Systems and You: Becoming a Power User About the Course In this course, you’ll learn how to use the major operating systems, Windows and Linux, which are a core component of IT. Through a combination of video lectures, demonstrations, and hands-on practice, you’ll learn about the main components of an operating system and how to perform critical tasks like managing software and users, and configuring hardware. By the end of this course you’ll be able to: - navigate the Windows and Linux filesystems using a graphical user interface and command line interpreter. - set up users, groups, and permissions for account access. - install, configure, and remove software on the Windows and Linux operating systems. - configure disk partitions and filesystems. - understand how system processes work and how to manage them. - work with system logs and remote connection tools. - utilize operating system knowledge to troubleshoot common issues in an IT Support Specialist role. Module 2 - Users and Permissions In the second week of this course, we'll learn about configuring users and permissions in Windows and Linux OS. As an IT Support Specialist, it's important to know how to grant the appropriate permissions to users and groups for both Windows and Linux OS. By the end of this module, you will know how to add, modify, and remove users for a computer and for specific files and folders by using the Windows GUI, Windows CLI, and Linux shell. Learning Objectives • Grant the appropriate permissions to users and groups. • Add, modify and remove users on a computer. • Add, modify and remove permissions on files and folders.
Views: 915 intrigano
39 Quantum Mechanics - n th roots of unity
 
06:52
Quantum Mechanics and Quantum Computation - n th roots of unity
Views: 1332 intrigano
3 Quantum Mechanics and Quantum Computation - Double slit experiment part 2
 
05:56
Quantum Mechanics and Quantum Computation
Views: 2712 intrigano