 |
|
|
|
 Natural Language Processing with PythonThis book offers a highly accessible introduction to Natural Language Processing, the field that underpins a variety of language technologies, ranging from predictive text and email filtering to automatic summarization and translation. With Natural Language Processing with Python, you'll learn how to write Python programs to work with large... |  |  Introduction to Java and Software Design: Swing UpdateIntroduction to Java and Software Design represents a significant transition in the development of the Dale series, with much that is new. This book has been developed from the ground up to be a Java text. It is not a Java translation of our previous texts. However, we have retained our familiar easy-to-read style and clear approach to introducing... |  |  Transformers for Natural Language Processing: Build innovative deep neural network architectures for NLP with Python, PyTorch, TensorFlow, BERT, RoBERTa, and more
Take your NLP knowledge to the next level and become an AI language understanding expert by mastering the quantum leap of Transformer neural network models
Key Features
-
Build and implement state-of-the-art language models, such as the original Transformer, BERT, T5, and GPT-2, using...
|
|
|
 |  |  Learning Machine Translation (Neural Information Processing)The Internet gives us access to a wealth of information in languages we don't understand. The investigation of automated or semi-automated approaches to translation has become a thriving research field with enormous commercial potential. This volume investigates how machine learning techniques can improve statistical machine translation, currently... |  |  Terrorism Informatics: Knowledge Management and Data Mining for Homeland SecurityTerrorism informatics has been defined as the application of advanced methodologies, information fusion and analysis techniques to acquire, integrate process, analyze, and manage the diversity of terrorism-related information for international and homeland security-related applications. The wide variety of methods used in terrorism informatics are... |
|
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 |