AI & Machine Learning
epub |eng | | Author:Ralf T. Kreutzer & Marie Sirrenberg
We will also be able to gain a cashless shopping experience . For this purpose, the articles selected by the customer in the shop are identified via image recognition. A ...
( Category:
Intelligence & Semantics
February 27,2020 )
epub |eng | 2019-02-27 | Author:Giuseppe Bonaccorso; [Неизв.]
( Category:
Intelligence & Semantics
February 27,2020 )
epub |eng | 2019-06-15 | Author:Emmanuel Ameisen
Dimensionality Reduction for Errors We described vectorization and dimensionality reduction techniques for data exploration in “Vectorizing” and “Dimensionality reduction”. Let’s see how the same techniques can be used to make ...
( Category:
Machine Theory
February 26,2020 )
mobi, epub |eng | 2019-09-29 | Author:Jaspreet Bindra [Bindra, Jaspreet]
Added to this volatility are scams. Bitcoin, to the unsuspecting public, has been touted as the latest get-rich-quick scheme: ‘Give us your life’s savings, we will invest them in Bitcoin ...
( Category:
Intelligence & Semantics
February 26,2020 )
epub, mobi, pdf |eng | 2019-08-02 | Author:Alessandro Parisi
How to spot fake logins From what we have said so far, it should be clear that the use of authentication procedures based on security tokens, such as passwords, SMS, ...
( Category:
Intelligence & Semantics
February 26,2020 )
epub, pdf |eng | 2019-06-07 | Author:Avik Sengupta
We can then benchmark these functions with and without forcing subnormal numbers to zero. Take a look at the following: julia> set_zero_subnormals(false) true julia> t=rand(1000); julia> @btime heatflow($t, 1000) 1.559 ...
( Category:
Software Development
February 26,2020 )
epub |eng | 2019-03-25 | Author:Alok Malik
Principal Component Analysis The next type of dimension reduction method we will cover is called PCA. This is a very common technique used by researchers in a wide variety of ...
( Category:
Machine Theory
February 26,2020 )
epub |eng | | Author:Chi N. Thai
11.Start from the program “Gerwalk_LoadAdjust_Fast.tsk/tskx”, modify it so that:(a)It can also print a TIMER value along with the existing parameters. Use the High-Resolution Timer if you happen to work with ...
( Category:
Robotics & Automation
February 26,2020 )
epub |eng | 2019-04-13 | Author:Hobson Lane & Cole Howard & Hannes Hapke [Lane, Hobson & Howard, Cole & Hapke, Hannes]
( Category:
Neural Networks
February 26,2020 )
epub |eng | | Author:Umberto Michelucci
We can define a loss function that depends on x1 with this code6 (what the loss is doing is not relevant):def custom_loss(layer): def loss(y_true,y_pred): return K.mean(K.square(y_pred - y_true) + K.square(layer), ...
( Category:
Software Development
February 24,2020 )
epub |eng | 2017-10-27 | Author:Francois Chollet [Chollet, Francois]
Figure 6.2. Whereas word representations obtained from one-hot encoding or hashing are sparse, high-dimensional, and hardcoded, word embeddings are dense, relatively lowdimensional, and learned from data. There are two ways ...
( Category:
Neural Networks
February 24,2020 )
epub |eng | 2019-03-28 | Author:Fernández Villán, Alberto;
As you can see, in the upper part of the screenshot the original image is shown, while in the bottom part of the screenshot the original image has been modified ...
( Category:
Computer Vision & Pattern Recognition
February 24,2020 )
epub |eng | 2006-02-22 | Author:Marvin Minsky
In other words, as a system gets better it may find that it is increasingly harder to find more ways to improve itself. Evolution is often described as selecting good ...
( Category:
Cognitive Psychology
February 23,2020 )
epub |eng | 2016-09-07 | Author:Watt, Jeremy & Borhani, Reza & Katsaggelos, Aggelos
(5.11) for all . Note that with a two layer neural network basis, we have increased the number of internal parameters which are nonlinearly related layer by layer. Specifically, in ...
( Category:
Electronics
February 22,2020 )
epub |eng | | Author:Teresa Heffernan
Mind the Gap The work supporting the material development and implementation of automated robotic systems in actual military and security operations is an instance of what Stiegler calls “noetic” labor. ...
( Category:
Robotics & Automation
February 19,2020 )
Categories
Computer Vision & Pattern Recognition | Expert Systems |
Intelligence & Semantics | Machine Theory |
Natural Language Processing | Neural Networks |
Popular ebooks
Deep Learning with Python by François Chollet(12570)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8296)
Test-Driven Development with Java by Alan Mellor(6709)
Data Augmentation with Python by Duc Haba(6617)
Principles of Data Fabric by Sonia Mezzetta(6372)
Learn Blender Simulations the Right Way by Stephen Pearson(6267)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6134)
Hadoop in Practice by Alex Holmes(5958)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5806)
RPA Solution Architect's Handbook by Sachin Sahgal(5531)
Big Data Analysis with Python by Ivan Marin(5354)
The Infinite Retina by Robert Scoble Irena Cronin(5226)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5144)
Pretrain Vision and Large Language Models in Python by Emily Webber(4315)
Infrastructure as Code for Beginners by Russ McKendrick(4076)
Functional Programming in JavaScript by Mantyla Dan(4038)
The Age of Surveillance Capitalism by Shoshana Zuboff(3946)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3790)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3592)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3568)
