code-2022

input_data part 1 # Let’s read in our document-term matrix import pandas as pd import pickle data = pd.read_pickle(‘dtm_stop.pkl’) data In [ ]: # Import the necessary modules for LDA with gensim # Terminal / Anaconda Navigator: conda install -c conda-forge gensim from gensim import matutils, models import scipy.sparse # import logging # logging.basicConfig(format=’%(asctime)s : %(levelname)s : %(message)s’, level=logging.INFO) In [ ]: # One […]

Sandeman Provincial Hospital Quetta Survey

Seventick community is organizing a survey to understand satisfaction analysis of people regarding Sandeman Provincial Hospital Quetta Survey. The data is being collected just for the analysis purpose and would be the property of seventick community by all aligns. Complete the survey and help us analyze your views about the basic health system in your province.

Resources: Artificial intelligence

Below we give a few pointers that we have found useful. Keep learning, stay curious. “The future has not been written. There is no fate but what we make for ourselves.” (John Connor). Our advisor, Risto Siilasmaa’s “What is Machine Learning” video (1h 18min) A friendly introduction to machine learning (Luis Serrano/Udacity) (30min) Andrew Ng’s Machine Learning MOOC at Coursera Udacity School of AI Machine Learning […]

Face2Face: Artificial intelligence

Face2Face is a real-time Face capture and reenactment of RGB Videos. We present a novel approach for real-time facial reenactment of a monocular target video sequence (e.g., Youtube video). The source sequence is also a monocular video stream, captured live with a commodity webcam. Our goal is to animate the facial expressions of the target video by a source actor […]

Dos attack

Disclaimer: the following content is meant for information purpose only and disfavor any kind of Hacking. In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. There are mainly two types of […]