Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Transformers for Natural Language Processing: Build innovative deep neural network architectures for NLP with Python, PyTorch, TensorFlow, BERT, RoBERTa, and more
Transformers for Natural Language Processing: Build innovative deep neural network architectures for NLP with Python, PyTorch, TensorFlow, BERT, RoBERTa, and more

Take your NLP knowledge to the next level and become an AI language understanding expert by mastering the quantum leap of Transformer neural network models

Key Features

  • Build and implement state-of-the-art language models, such as the original Transformer, BERT, T5, and GPT-2, using...
DNA Damage Recognition
DNA Damage Recognition

Stands as the most comprehensive guide to the subject―covering every essential topic related to DNA damage identification and repair.

Covering a wide array of topics from bacteria to human cells, this book summarizes recent developments in DNA damage repair and recognition while providing timely reviews on the molecular...

The Doctor in the Victorian Novel
The Doctor in the Victorian Novel

With the character of the doctor as her subject, Tabitha Sparks follows the decline of the marriage plot in the Victorian novel. As Victorians came to terms with the scientific revolution in medicine of the mid-to-late nineteenth century, the novel's progressive distance from the conventions of the marriage plot can be indexed through a rising...

Cluster Analysis for Data Mining and System Identification
Cluster Analysis for Data Mining and System Identification

Data clustering is a common technique for statistical data analysis, which is used in many fields, including machine learning, data mining, pattern recognition, image analysis and bioinformatics. Clustering is the classification of similar objects into different groups, or more precisely, the partitioning of a data set into subsets...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
The Culture of Critique: An Evolutionary Analysis of Jewish Involvement in Twentieth-Century Intellectual and Political Movements
The Culture of Critique: An Evolutionary Analysis of Jewish Involvement in Twentieth-Century Intellectual and Political Movements
MacDonald provides a theoretical analysis and review of data on the widespread tendency among certain highly influential, Jewish-dominated intellectual movements to develop radical critiques of gentile culture that are compatible with the continuity of Jewish identification. Particular attention is paid to Boasian anthropology, psychoanalysis,...
RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Linear Systems (Control Systems, Robotics and Manufacturing)
Linear Systems (Control Systems, Robotics and Manufacturing)

Linear systems have all the necessary elements (modeling, identification, analysis and control), from an educational point of view, to help us understand the discipline of automation and apply it efficiently. This book is progressive and organized in such a way that different levels of readership are possible. It is addressed both to...

Acute Promyelocytic Leukemia: Molecular Genetics, Mouse Models and Targeted Therapy (Current Topics in Microbiology and Immunology)
Acute Promyelocytic Leukemia: Molecular Genetics, Mouse Models and Targeted Therapy (Current Topics in Microbiology and Immunology)

Over the past 10 years, work on acute promyelocytic leukemia (APL) has become the paradigm of translational research that began with the discovery of a recurrent chromosomal translocation, followed by the identification of the genes and proteins involved, finding their molecular functions in transcriptional control, establishing mouse models...

Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Scientific Methods in Mobile Robotics: Quantitative Analysis of Agent Behaviour
Mobile robots are widely applied in a range of applications from transportation, surveillance through to health care. In all these applications it is clearly important to be able to analyse and control the performance of the mobile robot and it is therefore surprising that formalised methods to achieve this are not readily available. This book...
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

Inkjet Technology for Digital Fabrication
Inkjet Technology for Digital Fabrication

Whilst inkjet technology is well-established on home and small office desktops and is now having increasing impact in commercial printing, it can also be used to deposit materials other than ink as individual droplets at a microscopic scale. This allows metals, ceramics, polymers and biological materials (including living cells) to be...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy