Clojure

Protected: A recommendation system using a measure of similarity between text documents using k-means in Clojure.

Recommendation systems using measures of similarity between text documents using k-means in Clojure leveraged for digital transformation , artificial intelligence , and machine learning tasks Slope One recommendations, top rating calculations, weighted ratings, average difference between paired items, Weighted Slope One, user-based recommendations, collaborative filtering, item-based recommendations, movie recommendation data
課題解決:Problem solving

How to write papers and proposals based on paragraph writing and issue analysis

How to write a thesis or proposal based on paragraph writing and issue analysis (scientific thinking, argumentation, PowerPoint, proposal, topic sentence, paragraph, outline, correlation, rhizome, sequential, inverse tree structure, problem statement, conclusion, argumentation, reporting type, argumentation type, thesis issue, KPI, KGI, OKR, PDCA, systems thinking approach, Kazuhisa Todayama, making thesis)
ICT技術:ICT Technology

Using Docker Preparation before Docker Deployment

Leveraging Docker for digital transformation, artificial intelligence, and machine learning tasks Preparation before Docker deployment (Docker Desktop, Docker CE, Docker EE, kubernetes, Swarm, CoreOS, Atomic Host, RancherOS, Snappy Ubuntu Core)
ICT技術:ICT Technology

DevOps (Docker, etc.)

DevOps (Docker, etc.) Overview DevOps is a set of practices that combine software development (Dev) and ...
IOT技術:IOT Technology

Hardware in Computers

Hardware in Computers Overview Hardware in computers generally refers to physical parts and devices. Com...
ICT技術:ICT Technology

Application of AI to the semiconductor design process and semiconductor chips for AI applications

Design of semiconductors utilized for digital transformation, artificial intelligence, and machine learning tasks and chips for AI and AI (edge computing, Qualcomm Snapdragon Neural Processing Engine, Intel Nervana Neural Network Processor, Google TPU, NVIDIA Tesla GPU, self-learning, predictive analytics, pattern matching, optimization, anomaly detection, change detection, deep learning)
アルゴリズム:Algorithms

Protected: Optimization methods for L1-norm regularization for sparse learning models

Optimization methods for L1-norm regularization for sparse learning models for use in digital transformation, artificial intelligence, and machine learning tasks (proximity gradient method, forward-backward splitting, iterative- shrinkage threshholding (IST), accelerated proximity gradient method, algorithm, prox operator, regularization term, differentiable, squared error function, logistic loss function, iterative weighted shrinkage method, convex conjugate, Hessian matrix, maximum eigenvalue, second order differentiable, soft threshold function, L1 norm, L2 norm, ridge regularization term, η-trick)
アルゴリズム:Algorithms

Protected: Optimal arm identification and AB testing in the bandit problem_2

Optimal arm identification and AB testing in bandit problems utilized in digital transformation, artificial intelligence, and machine learning tasks sequential deletion policy, false positive rate, fixed confidence, fixed budget, LUCB policy, UCB policy, optimal arm, score-based method, LCB, algorithm, cumulative reward maximization, optimal arm identification policy, ε-optimal arm identification
アルゴリズム:Algorithms

Protected: Statistical Mathematical Theory for Boosting

Statistical and mathematical theory boosting generalized linear model, modified Newton method, log likelihood, weighted least squares method, boosting, coordinate descent method, iteratively weighted least squares method, iteratively reweighted least squares method, IRLS method, weighted empirical discriminant error, parameter update law, Hessian matrix, corrected Newton method, Newton method, Newton method, iteratively reweighted least squares method, IRLS method) used for digital transformation, artificial intelligence, machine learning tasks. iteratively reweighted least square method, IRLS method, weighted empirical discriminant error, parameter update law, Hessian matrix, corrected Newton method, modified Newton method, Newton method, Newton method, link function, logistic loss, logistic loss, boosting algorithm, logit boost, exponential loss, convex margin loss, adaboost, weak hypothesis, empirical margin loss, nonlinear optimization
アルゴリズム:Algorithms

Protected: Quasi-Newton Methods as Sequential Optimization in Machine Learning (2)Quasi-Newton Methods with Memory Restriction

Quasi-Newton method with memory restriction (sparse clique factorization, sparse clique factorization, chordal graph, sparsity, secant condition, sparse Hessian matrix, DFP formula, BFGS formula, KL divergence, quasi-Newton method, maximal clique, positive definite matrix, positive definite matrix completion, positive define matrix composition, graph triangulation, complete subgraph, clique, Hessian matrix, triple diagonal matrix Hestenes-Stiefel method, L-BFGS method)
Exit mobile version
タイトルとURLをコピーしました