Get up to speed with the deep learning concepts of Pytorch using a problem-solution approach. Starting with an introduction to PyTorch, you'll get familiarized with tensors, a type of data structure used to calculate arithmetic operations and also learn how they operate. You will then take a look at probability distributions using PyTorch and get acquainted with its concepts. Further you will dive into transformations and graph computations with PyTorch. Along the way you will take a look at common issues faced with neural network implementation and tensor differentiation, and get the best solutions for them.
Moving on to algorithms; you will learn how PyTorch works with supervised and unsupervised algorithms. You will see how convolutional neural networks, deep neural networks, and recurrent neural networks work using PyTorch. In conclusion you will get acquainted with natural language processing and text processing using PyTorch.
What You Will Learn
Master tensor operations for dynamic graph-based calculations using PyTorch
Create PyTorch transformations and graph computations for neural networks
Carry out supervised and unsupervised learning using PyTorch
Work with deep learning algorithms such as CNN and RNN
Build LSTM models in PyTorch
Use PyTorch for text processing
Who This Book Is For
Readers wanting to dive straight into programming PyTorch.
Adaptive Cooling of Integrated Circuits Using Digital Microfluidics Thanks to increasing power consumption and component density, localized "hot spots" are becoming a serious challenge in IC (integrated circuit) chip design - so serious, in fact, that Intel recently had to yank a circuit because it was literally burning. For IC engineers grappling with high power dissipation and thermal issues, new... Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit "I think this book will be the first standard introductory book on mobile agents." José M. Vidal, University of South Carolina
Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are...
Hacking: The Next Generation (Animal Guide) With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the... Oracle Application Express 3.2: The Essentials and More