舉報

會員
Machine Learning in Java
Astheamountofdataintheworldcontinuestogrowatanalmostincomprehensiblerate,beingabletounderstandandprocessdataisbecomingakeydifferentiatorforcompetitiveorganizations.Machinelearningapplicationsareeverywhere,fromself-drivingcars,spamdetection,documentsearch,andtradingstrategies,tospeechrecognition.Thismakesmachinelearningwell-suitedtothepresent-dayeraofbigdataandDataScience.Themainchallengeishowtotransformdataintoactionableknowledge.MachineLearninginJavawillprovideyouwiththetechniquesandtoolsyouneed.Youwillstartbylearninghowtoapplymachinelearningmethodstoavarietyofcommontasksincludingclassification,prediction,forecasting,marketbasketanalysis,andclustering.ThecodeinthisbookworksforJDK8andabove,thecodeistestedonJDK11.Movingon,youwilldiscoverhowtodetectanomaliesandfraud,andwaystoperformactivityrecognition,imagerecognition,andtextanalysis.Bytheendofthebook,youwillhaveexploredrelatedwebresourcesandtechnologiesthatwillhelpyoutakeyourlearningtothenextlevel.Byapplyingthemosteffectivemachinelearningmethodstoreal-worldproblems,youwillgainhands-onexperiencethatwilltransformthewayyouthinkaboutdata.
最新章節
- Leave a review - let other readers know what you think
- Other Books You May Enjoy
- Summary
- Venues and conferences
- Websites and blogs
- Competitions
品牌:中圖公司
上架時間:2021-06-10 18:25:59
出版社:Packt Publishing
本書數字版權由中圖公司提供,并由其授權上海閱文信息技術有限公司制作發行
- Leave a review - let other readers know what you think 更新時間:2021-06-10 19:30:50
- Other Books You May Enjoy
- Summary
- Venues and conferences
- Websites and blogs
- Competitions
- Online courses
- Datasets
- Web resources and competitions
- Machine learning as a service
- Machine learning in the cloud
- Predictive model markup language
- SEMMA methodology
- CRISP-DM
- Standards and markup languages
- Model maintenance
- Getting models into production
- The importance of evaluation
- Model chaining
- Feature selection
- Class unbalance
- Noisy data
- Machine learning in real life
- What Is Next?
- Summary
- Model performance
- Training and testing
- Feature generation
- Email spam dataset
- Detecting email spam
- Restoring a model
- Saving a model
- Reusing a model
- Evaluating a model
- Modeling
- BBC dataset
- Topic modeling for BBC News
- Pre-processing text data
- Importing from file
- Importing from directory
- Importing data
- Working with text data
- Installing Mallet
- Text classification
- Topic modeling
- Introducing text mining
- Text Mining with Mallet - Topic Modeling and Spam Detection
- Summary
- Plugging the classifier into a mobile app
- Reducing spurious transitions
- Building a classifier
- Collecting training data
- Feature extraction
- Loading the data collector
- Installing Android Studio
- Collecting data from a mobile phone
- The plan
- Activity recognition pipeline
- Mobile phone sensors
- Introducing activity recognition
- Activity Recognition with Mobile Phone Sensors
- Summary
- Building a multilayer convolutional network
- Building a deep belief network
- Building a single-layer regression model
- Building models
- Loading the data
- MNIST dataset
- Getting DL4J
- Deeplearning4j
- Image classification
- Deep convolutional networks
- Restricted Boltzmann machine
- Autoencoder
- Feedforward neural networks
- Perceptron
- Neural networks
- Introducing image recognition
- Image Recognition with Deeplearning4j
- Summary
- Density-based k-nearest neighbors
- Creating histograms
- Loading the data
- Histogram-based anomaly detection
- Using Encog for time series
- Anomaly detection in time series data
- Dataset
- Anomaly detection in website traffic
- Dataset rebalancing
- The vanilla approach
- Modeling suspicious patterns
- Dataset
- Fraud detection in insurance claims
- An example using ELKI
- Outlier detection using ELKI
- Plan recognition
- Transaction analysis
- Pattern analysis
- Analysis types
- Anomalous pattern detection
- Suspicious pattern detection
- Unknown unknowns
- Suspicious and anomalous behavior detection
- Fraud and Anomaly Detection
- Summary
- Content-based filtering
- Online learning engine
- Evaluation
- Adding custom rules to recommendations
- Item-based filtering
- User-based filtering
- Collaborative filtering
- In-memory databases
- Loading data from a database
- Loading data from a file
- Loading the data
- Book ratings dataset
- Building a recommendation engine
- Configuring Mahout in Eclipse with the Maven plugin
- Getting Apache Mahout
- Exploitation versus exploration
- Hybrid approach
- Content-based filtering
- Collaborative filtering
- Calculating similarity
- User-based and item-based analysis
- Key concepts
- Basic concepts
- Recommendation Engines with Apache Mahout
- Summary
- IT operations analytics
- Customer relationship management
- Census data
- Protein sequences
- Medical diagnosis
- Other applications in various areas
- FP-Growth
- Apriori
- Discover patterns
- The supermarket dataset
- FP-Growth algorithm
- Apriori algorithm
- Confidence
- Lift
- Support
- Itemset and rule
- Database of transactions
- Basic concepts
- Association rule learning
- Affinity analysis
- Market basket analysis
- Affinity Analysis
- Summary
- Ensemble methods – MOA
- Performance evaluation
- Model selection
- Attribute selection
- Data preprocessing
- Before we start
- Advanced modeling with ensembles
- Implementing the Naive Bayes baseline
- Evaluating models
- Basic modeling
- Loading the data
- Getting the data
- Basic Naive Bayes classifier baseline
- Evaluation
- Dataset
- Challenge
- The customer relationship database
- Customer Relationship Prediction with Ensembles
- Summary
- Clustering using ELKI
- Clustering using Encog
- Evaluation
- Clustering algorithms
- Clustering
- Tips to avoid common regression problems
- Regression trees
- Regression using MOA
- Linear regression using Encog
- Linear regression
- Building and evaluating the regression model
- Analyzing attributes
- Loading the data
- Regression
- Active learning
- Lazy learning
- Decision tree
- Baseline classifiers
- Evaluation
- Classification using massive online analysis
- Classification using Encog
- Choosing a classification algorithm
- The confusion matrix
- Evaluation and prediction error metrics
- Classifying new data
- Learning algorithms
- Feature selection
- Loading data
- Data
- Classification
- Before you start
- Basic Algorithms - Classification Regression and Clustering
- Summary
- Big data application architecture
- Dealing with big data
- Traditional machine learning architecture
- Building a machine learning application
- Comparing libraries
- MOA
- ELKI
- The Encog Machine Learning Framework
- MALLET
- Deeplearning4j
- Apache Spark
- Apache Mahout
- Java machine learning
- Weka
- Machine learning libraries
- The need for Java
- Java Libraries and Platforms for Machine Learning
- Summary
- Stratification
- Leave-one-out validation
- Cross-validation
- Train and test sets
- Underfitting and overfitting
- Generalization and evaluation
- Correlation coefficient
- Mean absolute error
- Mean squared error
- Evaluating regression
- Logistic regression
- Linear regression
- Regression
- Roc curves
- Precision and recall
- Evaluating classification
- Ensemble learning
- Artificial neural networks
- Kernel methods
- Probabilistic classifiers
- Decision tree learning
- Classification
- Supervised learning
- Clustering
- The curse of dimensionality
- Non-Euclidean distances
- Euclidean distances
- Finding similar items
- Unsupervised learning
- Data reduction
- Data transformation
- Remove outliers
- Filling missing values
- Data cleaning
- Data preprocessing
- Sampling traps
- Generating data
- Finding or observing data
- Data collection
- Measurement scales
- Data and problem definition
- Applied machine learning workflow
- Solving problems with machine learning
- Machine learning and data science
- Applied Machine Learning Quick Start
- Reviews
- Get in touch
- Conventions used
- Download the color images
- Download the example code files
- To get the most out of this book
- What this book covers
- Who this book is for
- Preface
- Packt.com
- Why subscribe?
- About Packt
- Packt is searching for authors like you
- About the reviewer
- About the authors
- Contributors
- Title Page
- coverpage
- coverpage
- Title Page
- Contributors
- About the authors
- About the reviewer
- Packt is searching for authors like you
- About Packt
- Why subscribe?
- Packt.com
- Preface
- Who this book is for
- What this book covers
- To get the most out of this book
- Download the example code files
- Download the color images
- Conventions used
- Get in touch
- Reviews
- Applied Machine Learning Quick Start
- Machine learning and data science
- Solving problems with machine learning
- Applied machine learning workflow
- Data and problem definition
- Measurement scales
- Data collection
- Finding or observing data
- Generating data
- Sampling traps
- Data preprocessing
- Data cleaning
- Filling missing values
- Remove outliers
- Data transformation
- Data reduction
- Unsupervised learning
- Finding similar items
- Euclidean distances
- Non-Euclidean distances
- The curse of dimensionality
- Clustering
- Supervised learning
- Classification
- Decision tree learning
- Probabilistic classifiers
- Kernel methods
- Artificial neural networks
- Ensemble learning
- Evaluating classification
- Precision and recall
- Roc curves
- Regression
- Linear regression
- Logistic regression
- Evaluating regression
- Mean squared error
- Mean absolute error
- Correlation coefficient
- Generalization and evaluation
- Underfitting and overfitting
- Train and test sets
- Cross-validation
- Leave-one-out validation
- Stratification
- Summary
- Java Libraries and Platforms for Machine Learning
- The need for Java
- Machine learning libraries
- Weka
- Java machine learning
- Apache Mahout
- Apache Spark
- Deeplearning4j
- MALLET
- The Encog Machine Learning Framework
- ELKI
- MOA
- Comparing libraries
- Building a machine learning application
- Traditional machine learning architecture
- Dealing with big data
- Big data application architecture
- Summary
- Basic Algorithms - Classification Regression and Clustering
- Before you start
- Classification
- Data
- Loading data
- Feature selection
- Learning algorithms
- Classifying new data
- Evaluation and prediction error metrics
- The confusion matrix
- Choosing a classification algorithm
- Classification using Encog
- Classification using massive online analysis
- Evaluation
- Baseline classifiers
- Decision tree
- Lazy learning
- Active learning
- Regression
- Loading the data
- Analyzing attributes
- Building and evaluating the regression model
- Linear regression
- Linear regression using Encog
- Regression using MOA
- Regression trees
- Tips to avoid common regression problems
- Clustering
- Clustering algorithms
- Evaluation
- Clustering using Encog
- Clustering using ELKI
- Summary
- Customer Relationship Prediction with Ensembles
- The customer relationship database
- Challenge
- Dataset
- Evaluation
- Basic Naive Bayes classifier baseline
- Getting the data
- Loading the data
- Basic modeling
- Evaluating models
- Implementing the Naive Bayes baseline
- Advanced modeling with ensembles
- Before we start
- Data preprocessing
- Attribute selection
- Model selection
- Performance evaluation
- Ensemble methods – MOA
- Summary
- Affinity Analysis
- Market basket analysis
- Affinity analysis
- Association rule learning
- Basic concepts
- Database of transactions
- Itemset and rule
- Support
- Lift
- Confidence
- Apriori algorithm
- FP-Growth algorithm
- The supermarket dataset
- Discover patterns
- Apriori
- FP-Growth
- Other applications in various areas
- Medical diagnosis
- Protein sequences
- Census data
- Customer relationship management
- IT operations analytics
- Summary
- Recommendation Engines with Apache Mahout
- Basic concepts
- Key concepts
- User-based and item-based analysis
- Calculating similarity
- Collaborative filtering
- Content-based filtering
- Hybrid approach
- Exploitation versus exploration
- Getting Apache Mahout
- Configuring Mahout in Eclipse with the Maven plugin
- Building a recommendation engine
- Book ratings dataset
- Loading the data
- Loading data from a file
- Loading data from a database
- In-memory databases
- Collaborative filtering
- User-based filtering
- Item-based filtering
- Adding custom rules to recommendations
- Evaluation
- Online learning engine
- Content-based filtering
- Summary
- Fraud and Anomaly Detection
- Suspicious and anomalous behavior detection
- Unknown unknowns
- Suspicious pattern detection
- Anomalous pattern detection
- Analysis types
- Pattern analysis
- Transaction analysis
- Plan recognition
- Outlier detection using ELKI
- An example using ELKI
- Fraud detection in insurance claims
- Dataset
- Modeling suspicious patterns
- The vanilla approach
- Dataset rebalancing
- Anomaly detection in website traffic
- Dataset
- Anomaly detection in time series data
- Using Encog for time series
- Histogram-based anomaly detection
- Loading the data
- Creating histograms
- Density-based k-nearest neighbors
- Summary
- Image Recognition with Deeplearning4j
- Introducing image recognition
- Neural networks
- Perceptron
- Feedforward neural networks
- Autoencoder
- Restricted Boltzmann machine
- Deep convolutional networks
- Image classification
- Deeplearning4j
- Getting DL4J
- MNIST dataset
- Loading the data
- Building models
- Building a single-layer regression model
- Building a deep belief network
- Building a multilayer convolutional network
- Summary
- Activity Recognition with Mobile Phone Sensors
- Introducing activity recognition
- Mobile phone sensors
- Activity recognition pipeline
- The plan
- Collecting data from a mobile phone
- Installing Android Studio
- Loading the data collector
- Feature extraction
- Collecting training data
- Building a classifier
- Reducing spurious transitions
- Plugging the classifier into a mobile app
- Summary
- Text Mining with Mallet - Topic Modeling and Spam Detection
- Introducing text mining
- Topic modeling
- Text classification
- Installing Mallet
- Working with text data
- Importing data
- Importing from directory
- Importing from file
- Pre-processing text data
- Topic modeling for BBC News
- BBC dataset
- Modeling
- Evaluating a model
- Reusing a model
- Saving a model
- Restoring a model
- Detecting email spam
- Email spam dataset
- Feature generation
- Training and testing
- Model performance
- Summary
- What Is Next?
- Machine learning in real life
- Noisy data
- Class unbalance
- Feature selection
- Model chaining
- The importance of evaluation
- Getting models into production
- Model maintenance
- Standards and markup languages
- CRISP-DM
- SEMMA methodology
- Predictive model markup language
- Machine learning in the cloud
- Machine learning as a service
- Web resources and competitions
- Datasets
- Online courses
- Competitions
- Websites and blogs
- Venues and conferences
- Summary
- Other Books You May Enjoy
- Leave a review - let other readers know what you think 更新時間:2021-06-10 19:30:50