Lin Ma

31 Flips | 3 Magazines | 2 Likes | 1 Following | @realno | Keep up with Lin Ma on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Lin Ma”

Recurrent Neural Networks for Multivariate Time Series with Missing Values

Article |<p>Open | Published: 17 April 2018<p>Zhengping Che ORCID: orcid.org/0000-0001-6818-1125,<br>• Sanjay Purushotham,<br>• Kyunghyun Cho,<br>• David Sontag &<br>• Yan</i> …

Deep Learning

The evolution of image classification explained

• <b>meaningful</b> and• <b><br>low-dimensional</b> features that we can work on.<p>And that's where <b>convolutional neural networks</b> come in the game!<p>To tackle this issue, Yann …

Deep Learning

Methods to improve Time series forecast (including ARIMA, Holt's winter)

We use cookies on Analytics Vidhya websites to deliver our services, analyze web traffic, and improve your experience on the site. By using Analytics …

Data Science

New Theory Cracks Open the Black Box of Deep Learning

A new idea called the “information bottleneck” is helping to explain the puzzling success of today’s artificial-intelligence algorithms — and might …

Detection of timescales in evolving complex systems

Article |<p>Open | Published: 22 December 2016<p>Richard K. Darst<br>• , Clara Granell<br>• , Alex Arenas<br>• , Sergio Gómez<br>• , Jari Saramäki<br>• & Santo Fortunato<p><i>Scientific</i> …

Algorithms

7 Best Computer Forensics Tools

The computer is a reliable witness that cannot lie. Digital evidence contains an unfiltered account of a suspect’s activity, recorded in his or her …

Anti Reverse Engineering — Malware vs Antivirus Software

Anti-reverse engineering – techniques that make it difficult to reverse-engineer malware (malicious software).<p>Reverse engineering refers to methods …

Cybersecurity

The 10 Algorithms Machine Learning Engineers Need to Know

This column is by James Li, Product Intern at NewStoryCharity<p>It is no doubt that the sub-field of machine learning / artificial intelligence has …

Machine Learning

5 cybersecurity certifications that could boost your career

With every breaking news story about a major hack affecting the data stored by organizations ranging from government agencies to online dating sites, …

Employment

40 Interview Questions asked at Startups in Machine Learning / Data Science

We use cookies on Analytics Vidhya websites to deliver our services, analyze web traffic, and improve your experience on the site. By using Analytics …

A Super-Simple Makefile for Medium-Sized C/C++ Projects

I’ve used Make for a lot for small projects, but for larger ones, it was just too tedious. Until recently, there were four things I wanted my build …

Every Data Science Interview Boiled Down To Five Basic Questions

Data science interviews are notoriously complex, but most of what they throw at you will fall into one of these categories.<p>Data science interviews are daunting, complicated gauntlets for many. But despite the ways they’re evolving, the technical portion of the typical data science interview tends …

Data Science

NoSQL Databases: a Survey and Decision Guidance

Together with our colleagues at the University of Hamburg, we — that is Felix Gessert, Wolfram Wingerath, Steffen Friedrich and Norbert …

Backpropagation — How Neural Networks Learn Complex Behaviors

Learning is the most important ability and attribute of a Intelligent System. A system which acquires knowledge by experience, trial-and-error or …

Deep Learning

A visual introduction to machine learning

In machine learning, computers apply <b>statistical learning</b> techniques to automatically identify patterns in data. These techniques can be used to make …

Machine Learning

A Guide to TF Layers: Building a Convolutional Neural Network

The TensorFlow layers module provides a high-level API that makes it easy to construct a neural network. It provides methods that facilitate the …

The 10 Algorithms Machine Learning Engineers Need to Know

It is no doubt that the sub-field of machine learning / artificial intelligence has increasingly gained more popularity in the past couple of years. …

Deep Learning for Computer Vision with MATLAB

Computer vision engineers have used machine learning techniques for decades to detect objects of interest in images and to classify or identify …

Semi-supervised, unsupervised, and adaptive algorithms for large-scale time series

In this episode of the O’Reilly Data Show, I spoke with Ira Cohen, co-founder and chief data scientist at Anodot (full disclosure: I’m an advisor to …

Machine Learning

SQL vs NoSQL: you do want to have a relational storage by default

The concept of NoSQL databases has been around for a while, but there still are quite a few misunderstandings regarding the topic of relational SQL …

Diagnosing Memory Leaks in Java

Every time I suspect a memory leak, I have to go dig up these commands. So, here they are for posterity's sake:<p>First, I use the following command to …

Java Memory Architecture (Model), Garbage Collection and Memory Leaks

Java Memory Architecture (Java Memory Model)<p>The above is the Java Memory Model for the Heap as well as the PermGen for any Java Application running …

Java Memory Architecture Cheat Sheet

The diagram below is the Java Memory Model for the Heap as well as the PermGen for any Java Application running in the Java Virtual Machine (JVM). …

Simple Guide to Finding a JavaScript Memory Leak in Node.js

Share this:<p>Table of Contents<p>Something you might want to bookmark: Simple Guide to Finding a JavaScript Memory Leak in Node.js by @akras14 …

JavaScript

Fixing Java's ByteBuffer native memory "leak"

<i>TL;DR</i>: The Java NIO API caches a maximum-sized direct ByteBuffer for each thread, which looks like a native memory leak if you read or write large …

Reverse engineering and the security of software

Erratum: I apologize if somebody is left with the impression that the "pond model" is of my invention.It is not. I cannot trace the history of it, …

Uncovering security practices by reverse engineering apps and games

One of the things you have to think about when developing your mobile app or game is security. If your app relies on a server, the api is an obvious …

Malware Researcher’s Handbook (Demystifying PE File)

(For the Introduction, click here:)<p>PE File<p>Portable executable file format is a type of format that is used in Windows (both x86 and x64).<p>As per …

Reverse Engineering the BMW i3 API

I'm really enjoying driving the BMW i3.I'd love to have it tweet its driving efficiency, or upload its location to my server, or let me turn on its …

Malware Analysis Tutorials: a Reverse Engineering Approach

Author: Dr. Xiang Fu<p>Roadmap: You need to first follow <b>Tutorials 1 to 4</b> to set up the lab configuration. Then each tutorial addresses an independent …