- Main
- Computers - Computer Science
- Machine Learning for Hackers
Machine Learning for Hackers
Drew Conway, John Myles WhiteSukakah Anda buku ini?
Bagaimana kualitas file yang diunduh?
Unduh buku untuk menilai kualitasnya
Bagaimana kualitas file yang diunduh?
If you’re an experienced programmer interested in crunching data, this book will get you started with machine learning—a toolkit of algorithms that enables computers to train themselves to automate useful tasks. Authors Drew Conway and John Myles White help you understand machine learning and statistics tools through a series of hands-on case studies, instead of a traditional math-heavy presentation.
Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.
Develop a naïve Bayesian classifier to determine if an email is spam, based only on its text
Use linear regression to predict the number of page views for the top 1,000 websites
Learn optimization techniques by attempting to break a simple letter cipher
Compare and contrast U.S. Senators statistically, based on their voting records
Build a “whom to follow” recommendation system from Twitter data
Each chapter focuses on a specific problem in machine learning, such as classification, prediction, optimization, and recommendation. Using the R programming language, you’ll learn how to analyze sample datasets and write simple machine learning algorithms. Machine Learning for Hackers is ideal for programmers from any background, including business, government, and academic research.
Develop a naïve Bayesian classifier to determine if an email is spam, based only on its text
Use linear regression to predict the number of page views for the top 1,000 websites
Learn optimization techniques by attempting to break a simple letter cipher
Compare and contrast U.S. Senators statistically, based on their voting records
Build a “whom to follow” recommendation system from Twitter data
Kategori:
Tahun:
2012
Edisi:
1
Penerbit:
O'Reilly Media
Bahasa:
english
Halaman:
322
ISBN 10:
1449303714
ISBN 13:
9781449303716
File:
PDF, 23.08 MB
Tag Anda:
IPFS:
CID , CID Blake2b
english, 2012
Membaca daring
- Mengunduh
- pdf 23.08 MB Current page
- Checking other formats...
- Mengubah menjadi
- Unlock conversion of files larger than 8 MBPremium
Ingin menambahkan toko buku? Hubungi kami melalui support@z-lib.do
Selama 1-5 menit file akan dikirim ke email Anda.
Dalam 1-5 menit file akan dikirim ke Telegram Anda.
Perhatian: Pastikan bahwa Anda telah menautkan akun Anda ke Bot Telegram Z-Library.
Dalam 1-5 menit file akan dikirim ke perangkat Kindle Anda.
Catatan: Anda perlu memverifikasi setiap buku yang ingin Anda kirim ke Kindle Anda. Periksa email Anda untuk yakin adanya email verifikasi dari Amazon Kindle.
Pengubahan menjadi sedang diproses
Pengubahan menjadi gagal
Manfaat status premium
- Kirimlah ke Pembaca online
- Batas unduhan yang ditingkatkan
- Konversi file
- Lebih banyak hasil pencarian
- Manfaat yang lain