Proficient in tensorflow 1. X. translation completed

Time:2020-9-19

Original text: Mastering tensorflow 1. X

Protocol: CC by-nc-sa 4.0

Don’t worry about your image, just about how to achieve your goals. ——Principles, living principles 2.3. C

  • Online reading
  • Apachecn interview and job exchange group 724187166
  • Apachecn learning resources

catalog

  • Proficient in tensorflow 1. X
  • 1、 Tensorflow 101
  • 2、 Tensorflow advanced library
  • 3、 Keras 101
  • 4、 Classical machine learning using tensorflow
  • 5、 Neural network and MLP using tensorflow and keras
  • 6、 RNN using tensorflow and keras
  • 7、 Time series data and RNN using tensorflow and keras
  • 8、 Text data and RNN using tensorflow and keras
  • 9、 CNN using tensorflow and keras
  • 10、 Self encoder using tensorflow and keras
  • 11、 TF service: tensorflow model in production
  • 12、 Transfer learning and pre training model
  • 13、 Intensive learning
  • 14、 Generate countermeasure network
  • 15、 Distributed model using tensorflow cluster
  • 16、 Tensorflow model on mobile and embedded platforms
  • 17、 Tensorflow and keras in R
  • 18、 Debugging tensorflow model
  • 19、 Tensor processing unit

Contribution Guide

This project needs proofreading. Please submit pull request.

Please be brave to translate and improve your translation. Although we pursue excellence, we don’t require you to be perfect, so please don’t worry about translation errors – in most cases, our server has recorded all translations, so you don’t have to worry about irreparable damage because of your mistakes. (adapted from Wikipedia)

contact information

person in charge

  • Feilong: 562826179

other

  • We propose issue on our Apache CN / Apache CN TF zh GitHub
  • Email to email:[email protected].
  • Contact the group leader / administrator in our organizational learning exchange group

Sponsor us

Sponsor us

Through the reward function of the platform, or click here( https://imgconvert.csdnimg.cn… )。

Recommended Today

Java security framework

The article is mainly divided into three parts1. The architecture and core components of spring security are as follows: (1) authentication; (2) authority interception; (3) database management; (4) authority caching; (5) custom decision making; and;2. To build and use the environment, the current popular spring boot is used to build the environment, and the actual […]