自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (20)
  • 收藏
  • 关注

空空如也

TensorFlow机器学习实战指南 Machine Learning Cookbook

Chapter 1, Getting Started with TensorFlow, covers the main objects and concepts in TensorFlow. We introduce tensors, variables, and placeholders. We also show how to work with matrices and various mathematical operations in TensorFlow. At the end of the chapter we show how to access the data sources used in the rest of the book. Chapter 2, The TensorFlow Way, establishes how to connect all the algorithm components from Chapter 1 into a computational graph in multiple ways to create a simple classifier. Along the way, we cover computational graphs, loss functions, back propagation, and training with data. Chapter 3, Linear Regression, focuses on using TensorFlow for exploring various linear regression techniques, such as Deming, lasso, ridge, elastic net, and logistic regression. We show how to implement each in a TensorFlow computational graph. Chapter 4, Support Vector Machines, introduces support vector machines (SVMs) and shows how to use TensorFlow to implement linear SVMs, non-linear SVMs, and multi-class SVMs. Chapter 5, Nearest Neighbor Methods, shows how to implement nearest neighbor techniques using numerical metrics, text metrics, and scaled distance functions. We use nearest neighbor techniques to perform record matching among addresses and to classify hand-written digits from the MNIST database. Chapter 6, Neural Networks, covers how to implement neural networks in TensorFlow, starting with the operational gates and activation function concepts. We then show a shallow neural network and show how to build up various different types of layers. We end the chapter by teaching TensorFlow to play tic-tac-toe via a neural network method. Chapter 7, Natural Language Processing, illustrates various text processing techniques with TensorFlow. We show how to implement the bag-of-words technique and TF-IDF for text. We then introduce neural network text representations with CBOW and skip-gram and use these techniques for Word2Vec and Doc2Vec for making real-world predictions. Chapter 8, Convolutional Neural Networks, expands our knowledge of neural networks by illustrating how to use neural networks on images with convolutional neural networks (CNNs). We show how to build a simple CNN for MNIST digit recognition and extend it to color images in the CIFAR-10 task. We also illustrate how to extend prior trained image recognition models for custom tasks. We end the chapter by explaining and showing the stylenet/neural style and deep-dream algorithms in TensorFlow. Chapter 9, Recurrent Neural Networks, explains how to implement recurrent neural networks (RNNs) in TensorFlow. We show how to do text-spam prediction, and expand the RNN model to do text generation based on Shakespeare. We also train a sequence to sequence model for German-English translation. We finish the chapter by showing the usage of Siamese RNN networks for record matching on addresses. Chapter 10, Taking TensorFlow to Production, gives tips and examples on moving TensorFlow to a production environment and how to take advantage of multiple processing devices (for example GPUs) and setting up TensorFlow distributed on multiple machines. Chapter 11, More with TensorFlow, show the versatility of TensorFlow by illustrating how to do k-means, genetic algorithms, and solve a system of ordinary differential equations (ODEs). We also show the various uses of Tensorboard, and how to view computational graph metrics.

2018-04-26

2018年人工智能标准化白皮书

本白皮书前期在国标委工业二部和工信部科技司的指导下,通过梳理人工智 能技术、应用和产业演进情况,分析人工智能的技术热点、行业动态和未来趋势, 从支撑人工智能产业整体发展的角度出发,研究制定了能够适应和引导人工智能 产业发展的标准体系,进而提出近期急需研制的基础和关键标准项目。

2018-01-20

集成方法进行模式分类(Pattern Classification Using Ensemble Methods)

Ensemble methodology imitates our second nature to seek several opinions before making a crucial decision. The core principle is to weigh several individual pattern classifiers, and combine them in order to reach a classification that is better than the one obtained by each of them separately. Researchers from various disciplines such as pattern recognition, statistics, and machine learning have explored the use of ensemble methods since the late seventies. Given the growing interest in the field, it is not surprising that researchers and practitioners have a wide variety of methods at their disposal. Pattern Classification Using Ensemble Methods aims to provide a methodic and well structured introduction into this world by presenting a coherent and unified repository of ensemble methods, theories, trends, challenges and applications. Its informative, factual pages will provide researchers, students and practitioners in industry with a comprehensive, yet concise and convenient reference source to ensemble methods. The book describes in detail the classical methods, as well as extensions and novel approaches that were recently introduced. Along with algorithmic descriptions of each method, the reader is provided with a description of the settings in which this method is applicable and with the consequences and the trade-offs incurred by using the method. This book is dedicated entirely to the field of ensemble methods and covers all aspects of this important and fascinating methodology.

2013-07-13

Parallel Port Complete

Parallel Port Complete Programming, Interfacing, & Using the PC’s Parallel Printer Port by Jan Axelson

2010-03-21

parallel port complete

Parallel Port Complete Programming, Interfacing, & Using the PC’s Parallel Printer Port by Jan Axelson

2010-03-21

Cpu Control

CPU-Control software will handle the CPU-affinity for multicore-systems CPU-Control software will handle the CPU-affinity for multicore-systems. Instead of running each process on both CPUs you can define it as you want it. For example , if you want to seperate the firewall and the anti-virus-software from the graphics-application. CPU-Controls offers five different ways to control the CPU-affinity:Automatic: It chooses alternatingly one CPU for each new processManual: You define a list, where you can set the way to handle each processAll processes run on CPU 1, which is useful for old applications which crashes on a dual core systemAll processes run on CPU 2Deactivated. . Koma-Code Software, Koma-Mail, Yiola, CPU control, dual core

2010-03-21

Mathematics and Visualization

This book is based on selected lectures given by leading experts in Scientific Visualization during a workshop held at Schloss Dagstuhl, Germany. Topics include user issues in visualization, large data visualization, unstructured mesh processing for visualization, volumetric visualization, flow visualization, medical visualization and visualization systems. The methods of visualizing data developed by Scientific Visualization researchers presented in this book are having broad impact on the way other scientists, engineers and practitioners are processing and understanding their data from sensors, simulations and mathematics models.

2010-03-19

Computer Visualization - Graphics Techniques for Engineering and Scientific Analysis

Computer Visualization - Graphics Techniques for Engineering and Scientific Analysis

2010-03-19

Knapsack Problems. Algorithms and Computer Implementations

Knapsack Problems. Algorithms and Computer Implementations

2010-03-19

ACPI Component Architecture Programmer Reference

Information in this document is provided in connection with Intel® products. No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted by this document. Except as provided in Intel’s Terms and Conditions of Sale for such products, Intel assumes no liability whatsoever, and Intel disclaims any express or implied warranty, relating to sale and/or use of Intel products including liability or warranties relating to fitness for a particular purpose, merchantability, or infringement of any patent, copyright or other intellectual property right. Intel products are not intended for use in medical, life saving, or life sustaining applications.

2010-03-19

Quality Measures in Data Mining

The purpose of this book is to present the state of the art concerning quality/interestingness measures for data mining. The book summarizes recent developments and presents original research on this topic. The chapters include reviews, comparative studies of existing measures, proposals of new measures, simulations, and case studies. Both theoretical and applied chapters are included.

2010-01-04

Data Mining In Time-Series Databases

Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where sequential information, such as a time-stamp associated with every record, can significantly enhance our knowledge about the mined data. One example is a series of stock values: a specific closing price recorded yesterday has a completely different meaning than the same value a year ago. Since most today’s databases already include temporal data in the form of “date created”, “date modified”, and other time-related fields, the only problem is how to exploit this valuable information to our benefit. In other words, the question we are currently facing is: How to mine time series data?

2010-01-04

A Survey on Cellular Automata

A cellular automaton is a decentralized computing model providing an excellent platform for performing complex computation with the help of only local information. Researchers, scientists and practitioners from di erent elds have exploited the CA paradigm of local information, decentralized control and universal computation for modeling di erent applications. This article provides a survey of available literature of some of the methodologies employed by researchers to utilize cellular automata for modeling purposes. The survey introduces the di erent types of cellular automata being used for modeling and the analytical methods used to predict its global behavior from its local con gurations. It further gives a detailed sketch of the e orts undertaken to con gure the local settings of CA from a given global situation; the problem which has been traditionally termed as the inverse problem. Finally, it presents the di erent elds in which CA have been applied. The extensive bibliography provided with the article will be of help to the new entrant as well as researchers working in this eld.

2010-01-04

Uml Managing Software Requirements

it represents harvesting the shared software development experiences of two decades, with a focused, consistent, and measured emphasis on the requirements challenge. In so doing, the work, we hope, assimilates the experiences and opinions of some of the best minds in the industry on this unique and difficult software challenge. We firmly believe that the result—these six requisite team skills for effective requirements management—will help you deliver quality software systems on time and on budget.

2009-10-31

Nonlinear multivariate and time series analysis by NN

Nonlinear time series methods have developed rapidly over a quarter of a century and have reached an advanced state of maturity during the last decade. Implementations of these methods for experimental data are now widely accepted and fairly routine, however genuinely useful applications remain rare. The aim of this book is to focus on the practice of applying these methods to solve real problems. It is my hope that the methods presented here are sufficiently accessible, and the examples sufficiently detailed, that practitioners in other areas may use this work to begin considering further applications of nonlinear time series analysis in their own disciplines.

2009-10-31

Programming Collective Intelligence

People have used the phrase collective intelligence for decades, and it has become increasingly popular and more important with the advent of new communications technologies. Although the expression may bring to mind ideas of group consciousness or supernatural phenomena, when technologists use this phrase they usually mean the combining of behavior, preferences, or ideas of a group of people to create novel insights.

2009-10-31

Web Services Essentials.pdf

Web services offer a new and evolving paradigm for building distributed web applications. This book focuses on the essentials of web services and covers four main technologies: XML-RPC, SOAP, WSDL, and UDDI. The book offers a high-level overview of each technology. It also describes the relevant API and discusses implementation options for each technology. The book includes a broad range of working examples so that you can immediately see web services in action.

2009-08-22

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除