Book Image

Apache Spark Deep Learning Cookbook

By : Ahmed Sherif, Amrith Ravindra
Book Image

Apache Spark Deep Learning Cookbook

By: Ahmed Sherif, Amrith Ravindra

Overview of this book

Organizations these days need to integrate popular big data tools such as Apache Spark with highly efficient deep learning libraries if they’re looking to gain faster and more powerful insights from their data. With this book, you’ll discover over 80 recipes to help you train fast, enterprise-grade, deep learning models on Apache Spark. Each recipe addresses a specific problem, and offers a proven, best-practice solution to difficulties encountered while implementing various deep learning algorithms in a distributed environment. The book follows a systematic approach, featuring a balance of theory and tips with best practice solutions to assist you with training different types of neural networks such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs). You’ll also have access to code written in TensorFlow and Keras that you can run on Spark to solve a variety of deep learning problems in computer vision and natural language processing (NLP), or tweak to tackle other problems encountered in deep learning. By the end of this book, you'll have the skills you need to train and deploy state-of-the-art deep learning models on Apache Spark.
Table of Contents (21 chapters)
Title Page
Copyright and Credits
Packt Upsell
Foreword
Contributors
Preface
Index

Introduction


In today's world, the need to maintain the security of information is becoming increasingly important, as well as increasingly difficult. There are various methods by which this security can be enforced (passwords, fingerprint IDs, PIN numbers, and so on). However, when it comes to ease of use, accuracy, and low intrusiveness, face recognition algorithms have been doing very well. With the availability of high-speed computing and the evolution of deep convolutional networks, it has been made possible to further increase the robustness of these algorithms. They have gotten so advanced that they are now being used as the primary security feature in many electronic devices (for example, iPhoneX) and even banking applications. The goal of this chapter is to develop a robust, pose-invariant face recognition algorithm for use in security systems. For the purposes of this chapter, we will be using the openly available MIT-CBCL dataset of face images of 10 different subjects.