hummingbird

哲学:philosophy

Protected: From the Special Lecture “Socrates’ Defense,” “Starting Points in Philosophy.”

This content is password protected. To view it please enter your password below: Password:
Uncategorized

Protected: Explainable Machine Learning (18)Adversarial Examples

Explainable Machine Learning with Adversarial Sample Approach utilized for Digital Transformation, Artificial Intelligence, and Machine Learning tasks Cyber Security, Surrogate Models, Neural Networks, Black Box Attack, Expectation Over Transformation algorithm, EOT, InceptionV3, TensorFlow, Fast gradient method, VGG16 classifier, ImageNet, adversarial patch, 1-pixel attack, L-BFGS method, Fast gradient sign method
アルゴリズム:Algorithms

Protected: Implementation of two approaches to improve environmental awareness, a weak point of deep reinforcement learning.

Implementation of two approaches to improve environment awareness, a weakness of deep reinforcement learning used in digital transformation, artificial intelligence, and machine learning tasks (inverse predictive, constrained, representation learning, imitation learning, reconstruction, predictive, WorldModels, transition function, reward function Weaknesses of representation learning, VAE, Vision Model, RNN, Memory RNN, Monte Carlo methods, TD Search, Monte Carlo Tree Search, Model-based learning, Dyna, Deep Reinforcement Learning)
アルゴリズム:Algorithms

Protected: Regression analysis using Clojure (2) Multiple regression model

This content is password protected. To view it please enter your password below: Password:
Clojure

Overview of web crawling technologies and implementation in Python/Clojure

Overview of web crawling technologies used for digital transformation, artificial intelligence and machine learning tasks and their implementation in Python/Clojure jsoup, clj-http, enlive, clojure.data.json, HTML, CSS jsoup, HTML, CSS, XPATH, JSON, BeautifulSoup, Scrapy, data extraction, natural language processing, databases, search, SNS analysis
ICT技術:ICT Technology

Overview of Kubernetes, environment setup, and reference books

Overview and configuration of Kubernetes used for digital transformation, artificial intelligence and machine learning tasks, reference books (Microservices, Spinnaker, Blue, Containers, Cloud Natives, Skaffold, Clair, Security, BuildKit, Kaniko, Operator, Helm, Chart, Sock Shop, YAML, Prometheus, Grafana, Pod, Minikube)

On the Road to Inaba and Hoki

Ryotaro Shiba's Road to Inaba and Hoki (Eshima Ohashi Bridge, Beta Tread Bridge, Mizuki Shigeru Road, Mizuki Shigeru Memorial Museum, Sakaiminato, Kaike Onsen, Kaike Triathlon, Hoki Daisen, Kurayoshi, Kurayoshi Kasuri, Ikinoshima, Inaba no Shirousagi, Okuninushi no Mikoto, Yatsujin, Izumo Country, Inaba no Genza, Myokojin, Yanagi Muneyoshi, D. T. Suzuki, Zen, folk art, Japan Folk Mingeikan, Manyoshu, Otomo Iemochi, Taika no Kaihin, Soga Iruka, Prince Nakataio, Inaba no Kokubu, Hayano, Nagisan, Momotaro, Izumo Taisha, Yaqi Taibe, Susano-onomikoto, Kibitsuhiko-nomikoto, Chizu-cho, Tottori, Chugoku Mountains)
キリスト教

Protected: What is Philosophy from the Special Lecture “Socrates’ Defense”

This content is password protected. To view it please enter your password below: Password:
アルゴリズム:Algorithms

Protected: Optimal arm bandit and Bayes optimal when the player’s candidate actions are large or continuous(1)

Optimal arm bandit and Bayes optimal linear curl, linear bandit, covariance function, Mattern kernel, Gaussian kernel, positive definite kernel function, block matrix, inverse matrix formulation, prior simultaneous probability density, Gaussian process, Lipschitz continuous, Euclidean norm, simple riglet, black box optimization, optimal arm identification, regret, cross checking, leave-one-out cross checking, continuous arm bandit
アルゴリズム:Algorithms

Protected: Sparse machine learning based on trace-norm regularization

Sparse machine learning based on trace norm regularization for digital transformation, artificial intelligence, and machine learning tasks PROPACK, random projection, singularity decomposition, low rank, sparse matrix, update formula for proximity gradient, collaborative filtering, singular value solver,. Trace norm, prox action, regularization parameter, singular value, singular vector, accelerated proximity gradient method, learning problem with trace norm regularization, semidefinite matrix, square root of matrix, Frobenius norm, Frobenius norm squared regularization, Torres norm minimization, binary classification problem, multi-task learning group L1 norm, recommendation systems
タイトルとURLをコピーしました