neural network

Uncategorized

Protected: Explainable Machine Learning (18)Adversarial Examples

Explainable Machine Learning with Adversarial Sample Approach utilized for Digital Transformation, Artificial Intelligence, and Machine Learning tasks Cyber Security, Surrogate Models, Neural Networks, Black Box Attack, Expectation Over Transformation algorithm, EOT, InceptionV3, TensorFlow, Fast gradient method, VGG16 classifier, ImageNet, adversarial patch, 1-pixel attack, L-BFGS method, Fast gradient sign method
アルゴリズム:Algorithms

Protected: Overview of Weaknesses and Countermeasures in Deep Reinforcement Learning and Two Approaches to Improve Environment Recognition

An overview of the weaknesses and countermeasures of deep reinforcement learning utilized in digital transformation, artificial intelligence, and machine learning tasks and two approaches of improving environmental awareness Mixture Density Network, RNN, Variational Auto Encoder, World Modles, Expression Learning, Strategy Network Compression, Model Free Learning, Sample-Based Planning Model, Dyna, Simulation-Based, Sample-Based, Gaussian Process, Neural Network, Transition Function, Reward Function) World Modles, Representation Learning, Strategy Network Compression, Model-Free Learning, Sample-Based Planning Model, Dyna, Simulation-Based, Sample-Based, Gaussian Process, Neural Network, Transition Function, Reward Function, Simulator , learning capability, transition capability
アルゴリズム:Algorithms

Protected: Application of Neural Networks to Reinforcement Learning Policy Gradient, which implements a strategy with a function with parameters.

Application of Neural Networks to Reinforcement Learning for Digital Transformation, Artificial Intelligence, and Machine Learning tasks Policy Gradient to implement strategies with parameterized functions (discounted present value, strategy update, tensorflow, and Keras, CartPole, ACER, Actor Critoc with Experience Replay, Off-Policy Actor Critic, behavior policy, Deterministic Policy Gradient, DPG, DDPG, and Experience Replay, Bellman Equation, policy gradient method, action history)
python

Protected: the application of neural networks to reinforcement learning(1) overview

Overview of the application of neural networks to reinforcement learning utilized in digital transformation, artificial intelligence and machine learning tasks (Agent, Epsilon-Greedy method, Trainer, Observer, Logger, Stochastic Gradient Descent, Stochastic Gradient Descent, SGD, Adaptive Moment Estimation, Adam, Optimizer, Error Back Propagation Method, Backpropagation, Gradient, Activation Function Stochastic Gradient Descent, SGD, Adaptive Moment Estimation, Adam, Optimizer, Error Back Propagation, Backpropagation, Gradient, Activation Function, Batch Method, Value Function, Strategy)
アルゴリズム:Algorithms

Protected: Implementation of model-free reinforcement learning in python (2) Monte Carlo and TD methods

Python implementations of model-free reinforcement learning such as Monte Carlo and TD methods Q-Learning, Value-based methods, Monte Carlo methods, neural nets, Epsilon-Greedy methods, TD(lambda) methods, Muli-step Learning, Rainbow, A3C/A2C, DDPG, APE-X DDPG, Muli-step Learning) Epsilon-Greedy method, TD(λ) method, Muli-step Learning, Rainbow, A3C/A2C, DDPG, APE-X DQN
グラフ理論

What is a Complex Network? A New Approach to Deciphering Complex Relationships Reading Memo

Overview of graph theory for analyzing complex network information used in artificial intelligence tasks (lattices and networks, Bacon and Erdesh numbers, small worlds, Beki rules, contagion transmission pathways, communication networks, neural networks, community networks).
python

Protected: Mathematical elements in neural networks (2) Stochastic gradient descent method and error back propagation method

Mathematical description of stochastic gradient descent and error back propagation methods for implementing neural networks used in digital transformation and artificial intelligence tasks.
python

Protected: Hello World of Neural Networks, Implementation of Handwriting Recognition with MNIST Data

On the Implementation with python and Keras of HelloWorld and handwriting recognition of neural networks in machine learning using neural nets for digital transformation and artificial intelligence tasks.
微分積分:Calculus

Word2Vec

An overview of Wprd2Vec, an application of deep learning models to natural language processing.
アルゴリズム:Algorithms

History of Digital Game AI(1)(Intelligent Man Machine Interaction)

Game AI overview, reflective AI, structural AI, finite state machines (FSM), genetic algorithms, neural networks for tips on acquiring artificial intelligence technology.
Exit mobile version
タイトルとURLをコピーしました