Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.Ved tilmelding accepterer du vores persondatapolitik.
Du kan altid afmelde dig igen.
Generative modeling is one of the hottest topics in AI. Its now possible to teach a machine to excel at human endeavors such as painting, writing, and composing music. With this practical book, machine-learning engineers and data scientists will discover how to re-create some of the most impressive examples of generative deep learning models, such as variational autoencoders,generative adversarial networks (GANs), encoder-decoder models and world models.Author David Foster demonstrates the inner workings of each technique, starting with the basics of deep learning before advancing to some of the most cutting-edge algorithms in the field. Through tips and tricks, youll understand how to make your models learn more efficiently and become more creative.Discover how variational autoencoders can change facial expressions in photosBuild practical GAN examples from scratch, including CycleGAN for style transfer and MuseGAN for music generationCreate recurrent generative models for text generation and learn how to improve the models using attentionUnderstand how generative models can help agents to accomplish tasks within a reinforcement learning settingExplore the architecture of the Transformer (BERT, GPT-2) and image generation models such as ProGAN and StyleGAN
This volume constitutes selected papers presented during the Second International Conference on Intelligent Systems and Pattern Recognition, ISPR 2022, held in Hammamet, Tunisia, in March 2022. Due to the COVID-19 pandemic the conference was held online. The 22 full papers and 10 short papers presented were thoroughly reviewed and selected from the 91 submissions. The papers are organized in the following topical sections: computer vision; data mining; pattern recognition; machine and deep learning.
This book constitutes the refereed proceedings of the 15th IAPR International Workshop on Document Analysis Systems, DAS 2022, held in La Rochelle, France, in May 2022.The full papers presented were carefully reviewed and selected from numerous submissions addressing key techniques of document analysis.
This book constitutes refereed proceedings of the 28th International Workshop on Frontiers of Computer Vision, IW-FCV 2022, held in Hiroshima, Japan, in February 2022. Due to the COVID-19 pandemic the conference was held online.The 24 full papers presented in this volume were thoroughly reviewed and selected from 63 submissions. The papers are organized according to the following topics: camera, 3D, and imaging; learning algorithm; object detection/segmentation; recognition/generation.
This book constitutes the refereed proceedings of the 5th International Conference on Intelligence Science, ICIS 2022, held in Xi'an, China, in August 2022. The 41 full and 5 short papers presented in this book were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Brain cognition; machine learning; data intelligence; language cognition; remote sensing images; perceptual intelligence; wireless sensor; and medical artificial intelligence.
This two-volume set LNCS 13188 - 13189 constitutes the refereed proceedings of the 6th Asian Conference on Pattern Recognition, ACPR 2021, held in Jeju Island, South Korea, in November 2021. The 85 full papers presented were carefully reviewed and selected from 154 submissions. The papers are organized in topics on: classification, action and video and motion, object detection and anomaly, segmentation, grouping and shape, face and body and biometrics, adversarial learning and networks, computational photography, learning theory and optimization, applications, medical and robotics, computer vision and robot vision.
Financial identity theft is well understood with clear underlying motives. Medical identity theft is new and presents a growing problem. The solutions to both problems however, are less clear. The Economics of Financial and Medical Identity Theft discusses how the digital networked environment is critically different from the world of paper, eyeballs and pens. Many of the effective identity protections are embedded behind the eyeballs, where the presumably passive observer is actually a fairly keen student of human behavior. The emergence of medical identity theft and the implications of medical data privacy are described in the second section of this book. The Economics of Financial and Medical Identity Theft also presents an overview of the current technology for identity management. The book closes with a series of vignettes in the last chapter, looking at the risks we may see in the future and how these risks can be mitigated or avoided.