Browse Results

Showing 40,176 through 40,200 of 53,912 results

Practical Julia: A Hands-On Introduction for Scientific Minds

by Lee Phillips

Learn to use Julia as a tool for research, and solve problems of genuine interest—like modeling the course of a pandemic—in this practical, hands-on introduction to the language.The Julia programming language is acclaimed in scientific circles for its unparalleled ease, interactivity, and speed. Practical Julia is a comprehensive introduction to the language, making it accessible even if you&’re new to programming.Dive in with a thorough guide to Julia&’s syntax, data types, and best practices, then transition to craft solutions for challenges in physics, statistics, biology, mathematics, scientific machine learning, and more. Whether you&’re solving computational problems, visualizing data, writing simulations, or developing specialized tools, Practical Julia will show you how.As you work through the book, you&’ll:• Use comprehensions and generators, higher-level functions, array initialization and manipulation, and perform operations on Unicode text• Create new syntax and generate code with metaprogramming and macros, and control the error system to manipulate program execution• Visualize everything from mathematical constructs and experimental designs to algorithm flowcharts• Elevate performance using Julia&’s unique type system with multiple dispatch• Delve into scientific packages tailored for diverse fields like fluid dynamics, agent-based modeling, and image processingWhether your interest is in scientific research, statistics, mathematics, or just the fun of programming with Julia, Practical Julia will have you writing high-performance code that can do real work in no time.Online Resources: Ready-to-run code samples, illustrations, and supplemental animations available at https://julia.lee-phillips.org.

Practical LaTeX

by George Grätzer

Practical LaTeX covers the material that is needed for everyday LaTeX documents. This accessible manual is friendly, easy to read, and is designed to be as portable as LaTeX itself. A short chapter, Mission Impossible, introduces LaTeX documents and presentations. Read these 30 pages; you then should be able to compose your own work in LaTeX The remainder of the book delves deeper into the topics outlined in Mission Impossible while avoiding technical subjects. Chapters on presentations and illustrations are a highlight, as is the introduction of LaTeX on an iPad. Students, faculty, and professionals in the worlds of mathematics and technology will benefit greatly from this new, practical introduction to LaTeX. George Grätzer, author of More Math into LaTeX (now in its 4th edition) and First Steps in LaTeX, has been a LaTeX guru for over a quarter of century. From the reviews of More Math into LaTeX: ``There are several LaTeX guides, but this one wins hands down for the elegance of its approach and breadth of coverage. '' --Amazon. com, Best of 2000, Editors Choice ``A very helpful and useful tool for all scientists and engineers. '' --Review of Astronomical Tools``A novice reader will be able to learn the most essential features of LaTeX sufficient to begin typesetting papers within a few hours of time. . . An experienced TeX user, on the other hand, will find a systematic and detailed discussion of all LaTeX features, supporting software, and many other advanced technical issues. '' --Reports on Mathematical Physics

Practical Linear Algebra: A Geometry Toolbox (Textbooks in Mathematics)

by Gerald Farin Dianne Hansford

Linear algebra is growing in importance. 3D entertainment, animations in movies and video games are developed using linear algebra. Animated characters are generated using equations straight out of this book. Linear algebra is used to extract knowledge from the massive amounts of data generated from modern technology. The Fourth Edition of this popular text introduces linear algebra in a comprehensive, geometric, and algorithmic way. The authors start with the fundamentals in 2D and 3D, then move on to higher dimensions, expanding on the fundamentals and introducing new topics, which are necessary for many real-life applications and the development of abstract thought. Applications are introduced to motivate topics. The subtitle, A Geometry Toolbox, hints at the book’s geometric approach, which is supported by many sketches and figures. Furthermore, the book covers applications of triangles, polygons, conics, and curves. Examples demonstrate each topic in action. This practical approach to a linear algebra course, whether through classroom instruction or self-study, is unique to this book. New to the Fourth Edition: Ten new application sections. A new section on change of basis. This concept now appears in several places. Chapters 14-16 on higher dimensions are notably revised. A deeper look at polynomials in the gallery of spaces. Introduces the QR decomposition and its relevance to least squares. Similarity and diagonalization are given more attention, as are eigenfunctions. A longer thread on least squares, running from orthogonal projections to a solution via SVD and the pseudoinverse. More applications for PCA have been added. More examples, exercises, and more on the kernel and general linear spaces. A list of applications has been added in Appendix A. The book gives instructors the option of tailoring the course for the primary interests of their students: mathematics, engineering, science, computer graphics, and geometric modeling.

Practical Linux DevOps: Building a Linux Lab for Modern Software Development

by John S. Tonello

Learn, develop and hone your Linux and DevOps skills by building a lab for learning, testing and exploring the latest Linux and open-source technologies. This book helps Linux users and others to master modern DevOps practices using a wide range of software and tools.Having a home or work-based Linux lab is indispensable to anyone looking to experiment with the ever-evolving landscape of new software and DevOps. With open-source tools and readily available hardware, you will end up with a lab you can use to try virtually any modern software, including Chef, Docker, Kubernetes and stalwarts like DNS, Dovecot, and Postfix for email. You'll set up pipelines for software deployment and focus on discrete projects that help you learn through doing. In the end, you'll acquire the skills needed to become better informed, more marketable engineers and developers, and better able to take on a wide array of software projects with confidence.Practical Linux DevOps is the perfect companion for those who want to learn how to build systems with utility and learn about modern hardware and software practices.What You'll LearnSet up a Linux-based virtualization environment and workstationCreate a lab network with a fully qualified domainBuild web-based applications with NGINX and LAMPUse version-control tools like GitAutomate deployments and configurationsThink like a modern DevOps engineerWho This Book Is ForNew and modestly experienced users with basic understanding of a basic understanding of Windows or Linux command line, as well as would-be and current DevOps engineers, and full-stack and other software developers

Practical Linux Forensics: A Guide for Digital Investigators

by Bruce Nikkel

A resource to help forensic investigators locate, analyze, and understand digital evidence found on modern Linux systems after a crime, security incident or cyber attack.Practical Linux Forensics dives into the technical details of analyzing postmortem forensic images of Linux systems which have been misused, abused, or the target of malicious attacks. It helps forensic investigators locate and analyze digital evidence found on Linux desktops, servers, and IoT devices. Throughout the book, you learn how to identify digital artifacts which may be of interest to an investigation, draw logical conclusions, and reconstruct past activity from incidents. You&’ll learn how Linux works from a digital forensics and investigation perspective, and how to interpret evidence from Linux environments. The techniques shown are intended to be independent of the forensic analysis platforms and tools used.Learn how to:Extract evidence from storage devices and analyze partition tables, volume managers, popular Linux filesystems (Ext4, Btrfs, and Xfs), and encryptionInvestigate evidence from Linux logs, including traditional syslog, the systemd journal, kernel and audit logs, and logs from daemons and applicationsReconstruct the Linux startup process, from boot loaders (UEFI and Grub) and kernel initialization, to systemd unit files and targets leading up to a graphical loginPerform analysis of power, temperature, and the physical environment of a Linux machine, and find evidence of sleep, hibernation, shutdowns, reboots, and crashesExamine installed software, including distro installers, package formats, and package management systems from Debian, Fedora, SUSE, Arch, and other distrosPerform analysis of time and Locale settings, internationalization including language and keyboard settings, and geolocation on a Linux systemReconstruct user login sessions (shell, X11 and Wayland), desktops (Gnome, KDE, and others) and analyze keyrings, wallets, trash cans, clipboards, thumbnails, recent files and other desktop artifactsAnalyze network configuration, including interfaces, addresses, network managers, DNS, wireless artifacts (Wi-Fi, Bluetooth, WWAN), VPNs (including WireGuard), firewalls, and proxy settingsIdentify traces of attached peripheral devices (PCI, USB, Thunderbolt, Bluetooth) including external storage, cameras, and mobiles, and reconstruct printing and scanning activity

Practical Linux Infrastructure

by Syed Ali

Practical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions. Using this book, you'll understand why scale matters, and what considerations you need to make. You'll see how to switch to using Google Cloud Platform for your hosted solution, how to use KVM for your virtualization, how to use Git, Postfix, and MySQL for your version control, email, and database, and how to use Puppet for your configuration management. For enterprise-level fault tolerance you'll use Apache, and for load balancing and high availability, you'll use HAProxy and Keepalived. For trend analysis you'll learn how to use Cacti, and for notification you'll use Nagios. You'll also learn how to utilize BIND to implement DNS, how to use DHCP (Dynamic Host Configuration Protocol), and how to setup remote access for your infrastructure using VPN and Iptables. You will finish by looking at the various tools you will need to troubleshoot issues that may occur with your hosted infrastructure. This includes how to use CPU, network, disk and memory management tools such as top, netstat, iostat and vmstat. Author Syed Ali is a senior site reliability engineering manager, who has extensive experience with virtualization and Linux cloud based infrastructure. His previous experience as an entrepreneur in infrastructure computing offers him deep insight into how a business can leverage the power of Linux to their advantage. He brings his expert knowledge to this book to teach others how to perfect their Linux environments. Become a Linux infrastructure pro with Practical Linux Infrastructure today.

Practical Linux Security Cookbook: Secure your Linux environment from modern-day attacks with practical recipes, 2nd Edition

by Tajinder Kalsi

Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux systemEnhance file system security and local and remote user authenticationUse various security tools and different versions of Linux for different tasksBook DescriptionOver the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security flaws, and these security flaws allow attackers to get into your system and modify or even destroy your important data. But there’s no need to panic, since there are various mechanisms by which these flaws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system. With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux.By the end of this book, you will be able to secure your Linux systems and create a robust environment.What you will learnLearn about vulnerabilities and exploits in relation to Linux systemsConfigure and build a secure kernel and test itLearn about file permissions and how to securely modify filesAuthenticate users remotely and securely copy files on remote systemsReview different network security methods and toolsPerform vulnerability scanning on Linux machines using toolsLearn about malware scanning and read through logsWho this book is forThis book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily.

Practical Linux Security Cookbook

by Tajinder Kalsi

Secure your Linux machines and keep them secured with the help of exciting recipes About This Book * This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster. * More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network * Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasks Who This Book Is For Practical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux File systems and administration. You should be familiar with basic Linux commands. Understanding Information security and its risks to a Linux system is also helpful in understanding the recipes more easily. However, even if you are unfamiliar with Information security, you will be able to easily follow and understand the recipes discussed. Since Linux Security Cookbook follows a practical approach, following the steps is very easy. What You Will Learn * Learn about various vulnerabilities and exploits in relation to Linux systems * Configure and build a secure kernel and test it * Learn about file permissions and security and how to securely modify files * Explore various ways to authenticate local users while monitoring their activities. * Authenticate users remotely and securely copy files on remote systems * Review various network security methods including firewalls using iptables and TCP Wrapper * Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more * Understand Bash vulnerability/security and patch management In Detail With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system. Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user authentication locally and remotely and also mitigate network attacks. Finally, you will learn to patch bash vulnerability and monitor system logs for security. With several screenshots in each example, the book will supply a great learning experience and help you create more secure Linux systems. Style and approach An easy-to-follow cookbook with step-by-step practical recipes covering the various Linux security administration tasks. Each recipe has screenshots, wherever needed, to make understanding more easy.

Practical Linux System Administration: A Guide To Installation, Configuration, And Management

by Kenneth Hess

This essential guide covers all aspects of Linux system administration, from user maintenance, backups, filesystem housekeeping, storage management, and network setup to hardware and software troubleshooting and some application management. It's both a practical daily reference manual for sysadmins and IT pros and a handy study guide for those taking Linux certification exams.You'll turn to it frequently, not only because of the sheer volume of valuable information it provides but because of the real-world examples within and the clear, useful way the information is presented. With this book at your side, you'll be able to:Install Linux and perform initial setup duties, such as connecting to a networkNavigate the Linux filesystem via the command lineInstall software from repositories and source and satisfy dependenciesSet permissions on files and directoriesCreate, modify, and remove user accountsSet up networkingFormat and mount filesystemsPerform basic troubleshooting on hardware and softwareCreate and manage logical volumesWork with SELinuxManage a firewall and iptablesShut down, reboot, and recover a systemPerform backups and restores

Practical Linux Topics

by Chris Binnie

Teaches you how to improve your hands­-on knowledge of Linux using challenging, real-world scenarios. Each chapter explores a topic that has been chosen specifically to demonstrate how to enhance your base Linux system, and resolve important issues. This book enables sysadmins, DevOps engineers, developers, and other technical professionals to make full use of Linux's rocksteady foundation. Explore specific topics in networking, e­mail, filesystems, encryption, system monitoring, security, servers, and more-- including systemd and GPG. Understand salient security concerns and how to mitigate them. Applicable to almost all Linux flavors--Debian, Red Hat, Ubuntu, Linux Mint, CentOS--Practical Linux Topics �__c�__an be used to reference other Unix-­type systems with little modification. Improve your practical know­-how and background knowledge on servers and workstations alike, increase your ability to troubleshoot and ultimately solve the daily challenges encountered by all professional Linux users. Empower your Linux skills by adding Practical Linux Topics to your library today. What you'll learn Solve a variety of challenges faced by sysadmins and DevOps engineers Understand the security implications of the actions you take Study the history behind some of the packages that you are using for a greater in-­depth understanding Become a professional at troubleshooting Extend your knowledge by learning about multiple OSs and third-party packages Who this book is for Having mastered the basics of running Linux systems this book takes you one step further to help you master the elements of Linux which you may have struggled with in the past. You have progressed past the basic stages of using Linux and want to delve into the more complex aspects. Practical Linux instantly offers answers to problematic scenarios and provides invaluable information for future reference. It is an invaluable addition to any Linux library. Table of Contents Chapter 1: Real-time Network Monitoring from the Console Chapter 2: Destroying Sensitive Data Chapter 3: Supercharged systemd Chapter 4: Zero Downtime Linux Chapter 5: Get More with wget Chapter 6: Securing SSH withPAM Chapter 7: Your Discs, Your Way Chapter 8: No SFTP Doesn't Mean No Encryption Chapter 9: Making the Most of the Screen Utility Chapter 10: Improve Your Security with SELinux Chapter 11: Nattier Networks Chapter 12: Keeping information Private with GPG Chapter 13: Get Permission From Your Peers with Sudo Chapter 14: Loop Disks and Wubi Appendix A: Hack, Break, and Fix Your Servers

Practical Linux with Raspberry Pi OS: Quick Start

by Ashwin Pajankar

Quickly start programming with Linux while learning the Raspberry Pi OS—the Linux distribution designed specifically for low-cost Raspberry Pis. This short guide reviews Linux commands, GUI, and shell scripting in a holistic manner by diving into both advanced and day-to-day tasks using the Raspberry Pi OS.You'll comfortably work with the Linux command prompt, and explore the RPi OS GUI and all its base applications. Then move into writing your own programs with shell-programming and using high-level languages such as C, C++, and Python 3. You’ll also study hardware and GPIO programming. Use Python 3 for GPIO programming to drive LEDs and pushbuttons.Examples are written in Shell, C, C++, and Python 3. Graphical output is displayed in helpful screenshots that capture just what you’ll see when working in this environment. All code examples are well tested on actual Raspberry Pi boards. After reading this book and following the examples, you’ll be able to write programs for demonstration in your academic/industrial research work, business environment, or just your circle of friends for fun! What You'll LearnNavigate the core aspects of Linux and programming on a Linux platform Install Raspberry Pi OS on a Raspberry PiProgram in Shell, C, C++, and PythonRedirect Io and work with the crontabWho This Book Is ForLinux enthusiasts, software engineers, researchers, business analysts, and managers working with the low-cost Raspberry Pi.

Practical LPIC-1 Linux Certification Study Guide

by David Clinton

This book is your complete guide to studying for the Linux Professional Institute's Server Professional (LPIC-1) certification. Every concept, principle, process, and resource that might make an appearance on the exam is fully represented. You will understand every concept by rolling up your sleeves, opening up a terminal, and trying it all yourself. You will find suggestions for practical tasks along with "test-yourself" quizzes at the end of each chapter. Whether you've decided to earn the Linux Professional Institute's Server Professional certification or you simply want to learn more about Linux administration, this book is a great choice. Right now, Linux administration skills are opening doors to some of the hottest job markets. And with the ongoing explosive growth of the cloud computing world - the vast majority of which is being built with Linux - the scope of the opportunities will only increase. Whether or not you end up taking the exam, if you manage to learn this material, you'll have done yourself a real favor. What You Will Learn Basic Linux system administration and package management Device and desktop management Bash scripting Networking fundamentals Security administration Who This Book Is For Most potential readers will already have a decent idea of what Linux is and what kinds of things can be done with it, and are looking to acquire or formalize a more structured and complete ability to confidently administrate Linux systems.

Practical LPIC-3 300: Prepare for the Highest Level Professional Linux Certification

by Antonio Vazquez

Gain the essential skills and hands-on expertise required to pass the LPIC-3 300 certification exam. This book provides the insight for you to confidently install, manage and troubleshoot OpenLDAP, Samba, and FreeIPA. Helping you to get started from scratch, this guide is divided into three comprehensive sections covering everything you'll need to prepare for the exam.Part 1 focuses on OpenLDAP and topics including securing the directory, integration with PAM and replication. Part 2 covers Samba and teaches you about Samba architecture, using different back ends, print services, and deploying Samba as a stand-alone server, PDC, and Active Directory Domain Controller. Finally, Part 3 explains how to manage FreeIPA and how to integrate it with Active Directory.Practical LPIC-3 300 is the perfect study guide for anyone interested in the LPIC-3 300 certification exam, OpenLDAP, Samba, or FreeIPA.What You'll Learn Integrate LDAP with PAM and NSS, and with Active Directory and KerberosManage OpenLDAP replication and server performance tuningUse Samba as a PDC and BDCConfigure Samba as a domain member server in an existing NT domainUse Samba as an AD Compatible Domain ControllerReplicate, manage, and integrate FreeIPA Who This Book Is For This book is for anyone who is preparing for the LPIC-3 300 exam, or those interested in learning about OpenLDAP and Samba in general.

Practical LTE based security forces PMR networks

by Arnaud Henry-Labordère

Security forces PMR networks are moving from proprietary technologies for their Mission Critical Push-To-Talk basic service, and their data services which must provide large bandwidth real-time access, to the databases. LTE Based is adopted with backup access to public MNOs to complement their own radio coverage. Specific technologies such as multicasting of visio are required so the MCPTT works within a restricted bandwidth. The need to be able to change the main MNOs to provide resilient coverage requires specific choices of SIM cards, with OTAble security domains. Practical LTE Based Security Forces PMR Networks assumes that the reader has a basic knowledge of the 4G network architecture and services, and the book focusses on the specific features and choices required to fulfill the need of security forces PMR networks. These include tactical and centralized, including LTE based voice services VoLTE and IMS. It can be used as a reference or textbook, with many detailed call flows and traces being included. The author, who has also a long teaching career in Operations Research, provides mathematical models for the optimization of tactical network federations, multicast coverage and allocation of preemptive priorities to PMR group members. He is a pioneer in the area of Virtual Roaming, an application of graph theory and telecommunications to provide roaming without direct relations, having previously published books on SMS Hubs, SS7 Hubs, Diameter Hubs, GTP Hubs. The use of M2M (monitoring devices) for security forces with mobility is covered in detail in the book, including the new LoRa virtual roaming which goes beyond the scope of PMR.

Practical Machine Learning: Innovations in Recommendation

by Ted Dunning Ellen Friedman

Building a simple but powerful recommendation system is much easier than you think. Approachable for all levels of expertise, this report explains innovations that make machine learning practical for business production settings--and demonstrates how even a small-scale development team can design an effective large-scale recommendation system.Apache Mahout committers Ted Dunning and Ellen Friedman walk you through a design that relies on careful simplification. You'll learn how to collect the right data, analyze it with an algorithm from the Mahout library, and then easily deploy the recommender using search technology, such as Apache Solr or Elasticsearch. Powerful and effective, this efficient combination does learning offline and delivers rapid response recommendations in real time.Understand the tradeoffs between simple and complex recommendersCollect user data that tracks user actions--rather than their ratingsPredict what a user wants based on behavior by others, using Mahoutfor co-occurrence analysisUse search technology to offer recommendations in real time, complete with item metadataWatch the recommender in action with a music service exampleImprove your recommender with dithering, multimodal recommendation, and other techniques

Practical Machine Learning: A New Look at Anomaly Detection

by Ellen Friedman Ted Dunning

Finding Data Anomalies You Didn't Know to Look ForAnomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what "suspects" you're looking for. This O'Reilly report uses practical examples to explain how the underlying concepts of anomaly detection work.From banking security to natural sciences, medicine, and marketing, anomaly detection has many useful applications in this age of big data. And the search for anomalies will intensify once the Internet of Things spawns even more new types of data. The concepts described in this report will help you tackle anomaly detection in your own project.Use probabilistic models to predict what's normal and contrast that to what you observeSet an adaptive threshold to determine which data falls outside of the normal range, using the t-digest algorithmEstablish normal fluctuations in complex systems and signals (such as an EKG) with a more adaptive probablistic modelUse historical data to discover anomalies in sporadic event streams, such as web trafficLearn how to use deviations in expected behavior to trigger fraud alerts

Practical Machine Learning: A New Look at Anomaly Detection

by Ellen Friedman Ted Dunning

Finding Data Anomalies You Didn't Know to Look For. Anomaly detection is the detective work of machine learning: finding the unusual, catching the fraud, discovering strange activity in large and complex datasets. But, unlike Sherlock Holmes, you may not know what the puzzle is, much less what “suspects” you’re looking for. This O’Reilly report uses practical examples to explain how the underlying concepts of anomaly detection work.From banking security to natural sciences, medicine, and marketing, anomaly detection has many useful applications in this age of big data. And the search for anomalies will intensify once the Internet of Things spawns even more new types of data. The concepts described in this report will help you tackle anomaly detection in your own project. Use probabilistic models to predict what’s normal and contrast that to what you observe; Set an adaptive threshold to determine which data falls outside of the normal range, using the t-digest algorithm; Establish normal fluctuations in complex systems and signals (such as an EKG) with a more adaptive probablistic model; Use historical data to discover anomalies in sporadic event streams, such as web traffic; Learn how to use deviations in expected behavior to trigger fraud alerts.

Practical Machine Learning

by Sunila Gollapudi

This book has been created for data scientists who want to see machine learning in action and explore its real-world application. With guidance on everything from the fundamentals of machine learning and predictive analytics to the latest innovations set to lead the big data revolution into the future, this is an unmissable resource for anyone dedicated to tackling current big data challenges. Some knowledge of Java programming and any scripting language is advisable if you want to get started immediately.

Practical Machine Learning and Image Processing: For Facial Recognition, Object Detection, and Pattern Recognition Using Python

by Himanshu Singh

Gain insights into image-processing methodologies and algorithms, using machine learning and neural networks in Python. This book begins with the environment setup, understanding basic image-processing terminology, and exploring Python concepts that will be useful for implementing the algorithms discussed in the book. You will then cover all the core image processing algorithms in detail before moving onto the biggest computer vision library: OpenCV. You’ll see the OpenCV algorithms and how to use them for image processing. The next section looks at advanced machine learning and deep learning methods for image processing and classification. You’ll work with concepts such as pulse coupled neural networks, AdaBoost, XG boost, and convolutional neural networks for image-specific applications. Later you’ll explore how models are made in real time and then deployed using various DevOps tools. All the concepts in Practical Machine Learning and Image Processing are explained using real-life scenarios. After reading this book you will be able to apply image processing techniques and make machine learning models for customized application.What You Will LearnDiscover image-processing algorithms and their applications using PythonExplore image processing using the OpenCV libraryUse TensorFlow, scikit-learn, NumPy, and other librariesWork with machine learning and deep learning algorithms for image processingApply image-processing techniques to five real-time projectsWho This Book Is ForData scientists and software developers interested in image processing and computer vision.

Practical Machine Learning Cookbook

by Atul Tripathi

Resolving and offering solutions to your machine learning problems with R About This Book • Implement a wide range of algorithms and techniques for tackling complex data • Improve predictions and recommendations to have better levels of accuracy • Optimize performance of your machine-learning systems Who This Book Is For This book is for analysts, statisticians, and data scientists with knowledge of fundamentals of machine learning and statistics, who need help in dealing with challenging scenarios faced every day of working in the field of machine learning and improving system performance and accuracy. It is assumed that as a reader you have a good understanding of mathematics. Working knowledge of R is expected. What You Will Learn • Get equipped with a deeper understanding of how to apply machine-learning techniques • Implement each of the advanced machine-learning techniques • Solve real-life problems that are encountered in order to make your applications produce improved results • Gain hands-on experience in problem solving for your machine-learning systems • Understand the methods of collecting data, preparing data for usage, training the model, evaluating the model's performance, and improving the model's performance In Detail Machine learning has become the new black. The challenge in today's world is the explosion of data from existing legacy data and incoming new structured and unstructured data. The complexity of discovering, understanding, performing analysis, and predicting outcomes on the data using machine learning algorithms is a challenge. This cookbook will help solve everyday challenges you face as a data scientist. The application of various data science techniques and on multiple data sets based on real-world challenges you face will help you appreciate a variety of techniques used in various situations. The first half of the book provides recipes on fairly complex machine-learning systems, where you'll learn to explore new areas of applications of machine learning and improve its efficiency. That includes recipes on classifications, neural networks, unsupervised and supervised learning, deep learning, reinforcement learning, and more. The second half of the book focuses on three different machine learning case studies, all based on real-world data, and offers solutions and solves specific machine-learning issues in each one. Style and approach Following a cookbook approach, we'll teach you how to solve everyday difficulties and struggles you encounter.

Practical Machine Learning for Computer Vision

by Valliappa Lakshmanan Martin Görner Ryan Gillard

This practical book shows you how to employ machine learning models to extract information from images. ML engineers and data scientists will learn how to solve a variety of image problems including classification, object detection, autoencoders, image generation, counting, and captioning with proven ML techniques. This book provides a great introduction to end-to-end deep learning: dataset creation, data preprocessing, model design, model training, evaluation, deployment, and interpretability.Google engineers Valliappa Lakshmanan, Martin Görner, and Ryan Gillard show you how to develop accurate and explainable computer vision ML models and put them into large-scale production using robust ML architecture in a flexible and maintainable way. You'll learn how to design, train, evaluate, and predict with models written in TensorFlow or Keras.You'll learn how to:Design ML architecture for computer vision tasksSelect a model (such as ResNet, SqueezeNet, or EfficientNet) appropriate to your taskCreate an end-to-end ML pipeline to train, evaluate, deploy, and explain your modelPreprocess images for data augmentation and to support learnabilityIncorporate explainability and responsible AI best practicesDeploy image models as web services or on edge devicesMonitor and manage ML models

Practical Machine Learning for Streaming Data with Python: Design, Develop, and Validate Online Learning Models

by Sayan Putatunda

Design, develop, and validate machine learning models with streaming data using the Scikit-Multiflow framework. This book is a quick start guide for data scientists and machine learning engineers looking to implement machine learning models for streaming data with Python to generate real-time insights. You'll start with an introduction to streaming data, the various challenges associated with it, some of its real-world business applications, and various windowing techniques. You'll then examine incremental and online learning algorithms, and the concept of model evaluation with streaming data and get introduced to the Scikit-Multiflow framework in Python. This is followed by a review of the various change detection/concept drift detection algorithms and the implementation of various datasets using Scikit-Multiflow.Introduction to the various supervised and unsupervised algorithms for streaming data, and their implementation on various datasets using Python are also covered. The book concludes by briefly covering other open-source tools available for streaming data such as Spark, MOA (Massive Online Analysis), Kafka, and more.What You'll LearnUnderstand machine learning with streaming data conceptsReview incremental and online learningDevelop models for detecting concept driftExplore techniques for classification, regression, and ensemble learning in streaming data contextsApply best practices for debugging and validating machine learning models in streaming data contextGet introduced to other open-source frameworks for handling streaming data.Who This Book Is ForMachine learning engineers and data science professionals

Practical Machine Learning in JavaScript: TensorFlow.js for Web Developers

by Charlie Gerard

Build machine learning web applications without having to learn a new language. This book will help you develop basic knowledge of machine learning concepts and applications. You’ll learn not only theory, but also dive into code samples and example projects with TensorFlow.js. Using these skills and your knowledge as a web developer, you’ll add a whole new field of development to your tool set. This will give you a more concrete understanding of the possibilities offered by machine learning. Discover how ML will impact the future of not just programming in general, but web development specifically. Machine learning is currently one of the most exciting technology fields with the potential to impact industries from health to home automation to retail, and even art. Google has now introduced TensorFlow.js—an iteration of TensorFlow aimed directly at web developers. Practical Machine Learning in JavaScript will help you stay relevant in the tech industry with new tools, trends, and best practices.What You'll LearnUse the JavaScript framework for MLBuild machine learning applications for the webDevelop dynamic and intelligent web contentWho This Book Is ForWeb developers and who want a hands-on introduction to machine learning in JavaScript. A working knowledge of the JavaScript language is recommended.

Practical Machine Learning in R

by Fred Nwanganga Mike Chapple

Guides professionals and students through the rapidly growing field of machine learning with hands-on examples in the popular R programming language Machine learning—a branch of Artificial Intelligence (AI) which enables computers to improve their results and learn new approaches without explicit instructions—allows organizations to reveal patterns in their data and incorporate predictive analytics into their decision-making process. Practical Machine Learning in R provides a hands-on approach to solving business problems with intelligent, self-learning computer algorithms. Bestselling author and data analytics experts Fred Nwanganga and Mike Chapple explain what machine learning is, demonstrate its organizational benefits, and provide hands-on examples created in the R programming language. A perfect guide for professional self-taught learners or students in an introductory machine learning course, this reader-friendly book illustrates the numerous real-world business uses of machine learning approaches. Clear and detailed chapters cover data wrangling, R programming with the popular RStudio tool, classification and regression techniques, performance evaluation, and more. Explores data management techniques, including data collection, exploration and dimensionality reduction Covers unsupervised learning, where readers identify and summarize patterns using approaches such as apriori, eclat and clustering Describes the principles behind the Nearest Neighbor, Decision Tree and Naive Bayes classification techniques Explains how to evaluate and choose the right model, as well as how to improve model performance using ensemble methods such as Random Forest and XGBoost Practical Machine Learning in R is a must-have guide for business analysts, data scientists, and other professionals interested in leveraging the power of AI to solve business problems, as well as students and independent learners seeking to enter the field.

Practical Machine Learning with AWS: Process, Build, Deploy, and Productionize Your Models Using AWS

by Himanshu Singh

Successfully build, tune, deploy, and productionize any machine learning model, and know how to automate the process from data processing to deployment. This book is divided into three parts. Part I introduces basic cloud concepts and terminologies related to AWS services such as S3, EC2, Identity Access Management, Roles, Load Balancer, and Cloud Formation. It also covers cloud security topics such as AWS Compliance and artifacts, and the AWS Shield and CloudWatch monitoring service built for developers and DevOps engineers. Part II covers machine learning in AWS using SageMaker, which gives developers and data scientists the ability to build, train, and deploy machine learning models. Part III explores other AWS services such as Amazon Comprehend (a natural language processing service that uses machine learning to find insights and relationships in text), Amazon Forecast (helps you deliver accurate forecasts), and Amazon Textract.By the end of the book, you will understand the machine learning pipeline and how to execute any machine learning model using AWS. The book will also help you prepare for the AWS Certified Machine Learning—Specialty certification exam.What You Will LearnBe familiar with the different machine learning services offered by AWS Understand S3, EC2, Identity Access Management, and Cloud FormationUnderstand SageMaker, Amazon Comprehend, and Amazon ForecastExecute live projects: from the pre-processing phase to deployment on AWSWho This Book Is ForMachine learning engineers who want to learn AWS machine learning services, and acquire an AWS machine learning specialty certification

Refine Search

Showing 40,176 through 40,200 of 53,912 results