Introduction to Survival Analysis The term survival time is used to describe the length of time until a specified event. The widespread use of these models in medicine to analyze survival times leads to the name survival analysis. machine-learning papers featured
How to train your Neural Network? Basic set of steps to follow while training a neural network. A lot of these are just recommendations. There are no rules in the world of neural networks. machine-learning andrew-ng
Backpropagation Implementation and Gradient Checking Approximate implementation of backpropagation without regularization using NumPy, and Gradient Checking for the Derivatives. machine-learning andrew-ng
Backpropagation Derivation The post delves into the mathematics of how backpropagation is defined. It has its roots in partial derivatives and is easily understandable andrew-ng machine-learning mathematics
Program in PyTorch PyTorch is an open source machine learning library for Python, based upon Torch, an open-source machine learning library, a scientific computing framework, and a script language based on Lua programming language. machine-learning pytorch library
Images, Noise and Filters Though images are generally associated with vision and perception, it can also be understood as a function in the field of computer science. machine-learning computer-vision image-processing udacity
What is Computer Vision? The goal of computer vision is to write computer programs that can interpret images. machine-learning computer-vision image-processing udacity
Understanding TensorFlow TensorFlow is an open source, data flow graph based, numerical computation library. Nodes in the graph represent mathematical operations, while edges represent the multidimensional data arrays communicated between them. machine-learning tensorflow library
B-Money A scheme for a group of untraceable digital pseudonyms to pay each other with money and to enforce contracts amongst themselves without outside help. concept references
Bitcoin A Peer-to-Peer Electronic Cash System that prevents double spending using the hash-based proof-of-work driven network transactions, that are authenticated by global consensus. concept references papers