A.I, Data and Software Engineering

Authortungnd

Got a bachelor of Telecommunication Engineering from Shanghai University (China), Master of Information, Systems, and Technologies from Paris Sud 11 (France), and PhD of Computer Science from Auckland University of Technology. Current research interests include multi-agent systems (A.I), data science, and software engineering.

GOOGLE CLOUD Top 5 CHEAT SHEETS

Sometimes a picture is worth a thousand words, and that’s where these cheat sheets come in handy. Cloud Developer Advocate Priyanka Vergadia has built a number of guides that help developers visually navigate critical decisions, whether it’s determining the best way to move to the cloud, or deciding on the best storage options. Below are five of her top cheat sheets in one handy...

SAMPLING Bagging vs Pasting

crop doctor demonstrating dose of vaccine against coronavirus in laboratory

One way to get a diverse set of classifiers is to use very different training algorithms,as just discussed. Another approach is to use the same training algorithm for everypredictor but to train them on different random subsets of the training set. Whensampling is performed with replacement, this method is called bagging(short for bootstrap aggregating). When sampling is performed without...

squared hinge loss

Petamind A.I

The squared hinge loss is a loss function used for “maximum margin” binary classification problems. Mathematically it is defined as: where ŷ the predicted value and y is either 1 or -1. Thus, the squared hinge loss is: 0* when the true and predicted labels are the same and* when ŷ≥ 1 (which is an indication that the classifier is sure that it’s the correct label)quadratically increasing with the...

Dealing with missing data

Petamind A.I

In real-world data, there are some instances where a particular element is absent because of various reasons, such as corrupt data, failure to load the information, or incomplete extraction. Handling the missing values is one of the greatest challenges faced by analysts because making the right decision on how to handle it generates robust data models. Let us look at different ways of imputing...

SECURITY GROUPS VS NETWORK ACLS

time lapse photography of blue lights

As the two common method for securing the cloud, the differences between NACL (network access control list) and security groups have been discussed below: Network ACLSecurity GroupNetwork Access Control List that helps provide a layer of security to the amazon web services. There are two kinds of NACL- Customized and default.A security group has to be explicitly assigned to an instance; it...

A.I, Data and Software Engineering

PetaMinds focuses on developing the coolest topics in data science, A.I, and programming, and make them so digestible for everyone to learn and create amazing applications in a short time.