Databases & Big Data
epub, mobi, pdf |eng | 2017-08-17 | Author:Juan Nunez-Iglesias, Stéfan van der Walt, Harriet Dashnow
import numpy as np pred = np.array([0, 1, 0, 0, 1, 1, 1, 0, 1, 1]) You can check how well you’ve done by comparing it to a vector of ...
( Category:
Data Processing
May 19,2019 )
epub |eng | | Author:By Joshua Greene & By Jay Strawn
What should you be careful about? There is a protocol named IteratorProtocol, which allows you to customize how your object is iterated. You simply implement a next() method that returns ...
( Category:
Data Modeling & Design
May 19,2019 )
epub |eng | | Author:By René Cacheaux & By René Cacheaux & Josh Berlin & By Josh Berlin & René Cacheaux
Going through the steps one by one: PickMeUpViewController injects its PickMeUpViewModel into DropoffLocationPickerViewController. DropoffLocationPickerViewController creates a DropoffLocationPickerContentRootView with the PickMeUpViewModel. DropoffLocationPickerContentRootView tells its DropoffLocationPickerViewModel when the user selects a new ...
( Category:
Information Theory
May 19,2019 )
azw3, epub |eng | 2019-03-29 | Author:Francisco Juretig
( Category:
Data Processing
May 10,2019 )
epub |eng | 2019-03-29 | Author:Rudy Lai
Testing our custom RDD Let's start this test to check if this has created our RDD. By doing this, we can extend our parent RDD and add behavior to our ...
( Category:
Intelligence & Semantics
May 6,2019 )
epub |eng | 2018-12-17 | Author:Stanley Siegel & Chris Williams & Scott Donaldson [Stanley Siegel]
Guarding Against Counterfeit E-Mails and Secure E-Mail Because e-mail protocols are inherently insecure, it may be possible for attackers to generate and send counterfeit e-mails. Counterfeit e-mails may appear to ...
( Category:
Hacking
May 6,2019 )
epub |eng | 2019-03-15 | Author:Will Button
Then we're going to use async and await to get the deployed version of our contract from the Ethereum network. So, let me break a async and await down for ...
( Category:
Encryption
May 6,2019 )
epub |eng | 2019-03-11 | Author:Alex Gorelik [Alex Gorelik]
Establishing Trust Once an analyst finds the pertinent data set, the next question becomes whether the data can be trusted. While analysts sometimes have the luxury of access to clean, ...
( Category:
Data Mining
May 5,2019 )
epub |eng | 2019-03-25 | Author:Salman A. Baset
Smart contract considerations As we mentioned, smart contracts are vital to business interaction between the participants of any blockchain network. As they essentially contain the rules and conditions under which ...
( Category:
Cryptography
May 5,2019 )
epub |eng | 2019-03-29 | Author:Yoon Hyup Hwang
User-based collaborative filtering and recommendations In order to build a user-based collaborative filtering algorithm, we need to compute cosine similarities between users. Let's take a look at the following code: ...
( Category:
Intelligence & Semantics
May 4,2019 )
epub, pdf |eng | 2019-02-13 | Author:Arjuna Sky Kok
def fillPosts(self, posts): self.clearTweetsField() for post in posts: label_field = QtWidgets.QLabel(post) self.tweets_layout.addWidget(label_field) The same strategy is used in the two following methods. We clear the bookmark widgets from the bookmarks ...
( Category:
Cryptography
May 4,2019 )
epub, pdf |eng | 2019-11-24 | Author:Aileen Nielsen [Aileen Nielsen]
Scatter plots The traditional method of using scatter plots is just as useful for time series data as it is for other kinds of data. We can use scatter plots ...
( Category:
Machine Theory
May 3,2019 )
epub | | | Author:Machine Learning in Python
Our tree has an accuracy of 0.838 on the training set. But remember that this is not a good indicator. This is especially true for decision trees as this method ...
( Category:
Machine Theory
May 3,2019 )
epub |eng | 2019-03-29 | Author:Krish Naik
portfolio_returns=[] portfolio_volatilities=[] for x in range(1000): weights=np.random.random(num_assets) weights/=np.sum(weights) portfolio_returns.append(np.sum(weights*log_returns.mean())*250) portfolio_volatilities.append(np.sqrt(np.dot(weights.T,np.dot(log_returns.cov(),weights)))) portfolio_returns,portfolio_volatilities The output generated is shown in the following screenshot: In the loop, we are generating two weights, whose sums ...
( Category:
Data Modeling & Design
May 3,2019 )
epub |eng | 2019-02-26 | Author:Fabian Hueske
Implementing Operator List State with the ListCheckpointed Interface Operator state is managed per parallel instance of an operator. All events that are processed in the same parallel task of an ...
( Category:
Electronic Data Interchange (EDI)
May 2,2019 )
Categories
Access | Data Mining |
Data Modeling & Design | Data Processing |
Data Warehousing | MySQL |
Oracle | Other Databases |
Relational Databases | SQL |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9784)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8309)
Azure Data and AI Architect Handbook by Olivier Mertens & Breght Van Baelen(6787)
Building Statistical Models in Python by Huy Hoang Nguyen & Paul N Adams & Stuart J Miller(6762)
Serverless Machine Learning with Amazon Redshift ML by Debu Panda & Phil Bates & Bhanu Pittampally & Sumeet Joshi(6648)
Data Wrangling on AWS by Navnit Shukla | Sankar M | Sam Palani(6435)
Driving Data Quality with Data Contracts by Andrew Jones(6375)
Machine Learning Model Serving Patterns and Best Practices by Md Johirul Islam(6136)
Learning SQL by Alan Beaulieu(6003)
Weapons of Math Destruction by Cathy O'Neil(5795)
Big Data Analysis with Python by Ivan Marin(5387)
Data Engineering with dbt by Roberto Zagni(4390)
Solidity Programming Essentials by Ritesh Modi(4041)
Time Series Analysis with Python Cookbook by Tarek A. Atwan(3898)
Pandas Cookbook by Theodore Petrou(3600)
Blockchain Basics by Daniel Drescher(3305)
Hands-On Machine Learning for Algorithmic Trading by Stefan Jansen(2914)
Feature Store for Machine Learning by Jayanth Kumar M J(2819)
Learn T-SQL Querying by Pam Lahoud & Pedro Lopes(2802)
Mastering Python for Finance by Unknown(2748)
