Extracting the potential of PYNLPL: A Step-by-Step Guide
Author(s): Tushar Aggarwal Originally published on Towards AI. {This article was written without the assistance or use of AI tools, providing an authentic and insightful exploration of PYNLPL} Image crafted by Author Amidst the cacophony of information inundation, rest assured that this …
20 Most Elegant NumPy Tricks I Found After 3 Years of Use
Author(s): Bex T. Originally published on Towards AI. Become a NumPy samurai Image by me with Midjourney Every data scientist admires someone. For some, it might be people who create killer data visualizations; for others, it is simply anyone who answers their …
How does Active Learning Work?
Author(s): Louis Bouchard Originally published on Towards AI. Active learning explained in 5 minutes Originally published on louisbouchard.ai, read it 2 days before on my blog! We now deal with immense amounts of data thanks to the superpowers of large models, including …
Exogenous Variables in Time Series Forecasting with Facebook Prophet
Author(s): David Andres Originally published on Towards AI. Photo by John Fowler on Unsplash In the previous part of our Facebook Prophet series, we covered how to model the seasonality component. You should also recall the first part, in which we dealt …
Letβs Do: Time Series Decomposition
Author(s): Bradley Stephen Shaw Originally published on Towards AI. What makes your time series tick? Thereβs only one way to find out β by taking it apart. Photo by Sean Whelan on Unsplash Time series are quite possibly the most ubiquitous collections …
5 Powerful Cross-Validation Methods to Skyrocket Robustness of Your ML Models
Author(s): Bex T. Originally published on Towards AI. All CV procedures you need to know as a data scientist, explained Image by me with Midjourney Before I start selling the merchandise, I need to pitch the main idea. Picture a crazy world …
The future of Artificial Intelligence is Open-source! Hereβs why?
Author(s): Janik and Patrick Tinz Originally published on Towards AI. Open-source AI gets Big Tech in trouble Photo by Tim Mossholder on Unsplash Developments in open-source artificial intelligence (AI) have accelerated massively in the last three months. So it stands to reason …
Decoding the Binomial Distribution: A Fundamental Concept for Data Scientists
Author(s): Egor Howell Originally published on Towards AI. Understanding the basic building blocks of the binomial distribution Photo by Chris Briggs on Unsplash The binomial distribution is a widely used statistical distribution that Data Scientists should be familiar with, as it appears …
19 Most Elegant Sklearn Tricks I Found After 3 Years of Use
Author(s): Bex T. Originally published on Towards AI. Advanced techniques and hidden gems for effective machine learning Learn about 19 Sklearn features you have never seen that are direct and elegant replacements to common operations you do manually. Image by me with …
Bagging vs. Boosting: The Power of Ensemble Methods in Machine Learning
Author(s): Thomas A Dorfer Originally published on Towards AI. How to maximize predictive performance by creating a strong learner from multiple weak ones Image by the Author. Complex problems are rarely solved through singular thought or action. A collective weather forecast produced …
Correct Handling of Outliers to Improve Overfitting Scenarios
Author(s): Kayenga Campos Originally published on Towards AI. Correct Handling of Outliers to Improve Overfitting Scenarios Look how quantile treatment of outliers can improve model accuracy The main approach of machine learning consists of splitting the data into training and testing sets. …
Explaining Hypothesis Testing to a High School Student β Part 1
Author(s): Anmol Tomar Originally published on Towards AI. An Intuition Image by Author In the realm of data science, hypothesis testing holds immense significance as a powerful tool for making informed decisions based on observed data. By systematically examining assumptions and evaluating …
You Carry a Few Suns in Your Pocket
Author(s): Prashant Mudgal Originally published on Towards AI. Quantum behavior around the House: an intuitive explanation A few months ago, I was having a conversation with a friendβs son, who was talking about the Olympiads and how to prepare for them. I …
How AI is Used to Combat Social Engineering AttacksβββPart 2
Author(s): John Adeojo Originally published on Towards AI. An Analysis of AI Approaches to Counteract URL Phishing Image by Author: Generated with Midjourney In the first part of this series, we briefly touched on the prevalence and costliness of social engineering attacks …
How AI is Used to Combat Social Engineering Attacks β Part 1
Author(s): John Adeojo Originally published on Towards AI. An Analysis of AI Approaches to Counteract URL Phishing Image by Author: Generated with Midjourney Social engineering attacks have emerged as the preferred form of a cyber attack by criminals aiming to gain access …