hummingbird

テクノロジー:Technology

Tex/Latex, the world’s standard tool for writing papers, and Mathjax, the web math display tool

Tex/Latex, the world standard tool for preparing papers for external presentation in digital transformation, artificial intelligence, and machine learning tasks, and Mathjax, a web math display tool (CloudLatex, SublimeText, plugins, LatexTools, DVI, PDF, Donald E. Knuth, The Art of Computer Programming)
推論技術:inference Technology

Protected: Explainable Artificial Intelligence (13)Model Independent Interpretation (Local Surrogate :LIME)

This content is password protected. To view it please enter your password below: Password:
アルゴリズム:Algorithms

Protected: Application of Neural Networks to Reinforcement Learning Policy Gradient, which implements a strategy with a function with parameters.

Application of Neural Networks to Reinforcement Learning for Digital Transformation, Artificial Intelligence, and Machine Learning tasks Policy Gradient to implement strategies with parameterized functions (discounted present value, strategy update, tensorflow, and Keras, CartPole, ACER, Actor Critoc with Experience Replay, Off-Policy Actor Critic, behavior policy, Deterministic Policy Gradient, DPG, DDPG, and Experience Replay, Bellman Equation, policy gradient method, action history)
Clojure

Protected: Network analysis with Pagerank using Clojure Glittering

Network analysis with Pagerank (label propagation, Twitter user group analysis, influencers, communities, community graphs, accounts, followers, dumping factor, page rank algorithm) using Clojure Glittering for digital transformation, artificial intelligence and machine learning tasks.
アーキテクチャ

AWS Cloud Service Design Patterns (3)

AWS Cloud Service Design Patterns utilized for Digital Transformation, Artificial Intelligence, and Machine Learning tasks (Operations and Maintenance Patterns, Bootstrap, Cloud DI, Stack Development, Server Swapping, Monitoring Integration, Weighted Transition, Log Aggregation, Ondemand Activation, Network Patterns, Backnet, Functional Firewall, and Operational Activation). Monitoring Integration, Weighted Transition, Log Aggregation, Ondemand Activation, Network Patterns, Backnet, Functional Firewall, Operational Firewall, Multi Load Balancer, WAF Proxy, CloudHub, Sorry Page, Self Registration, RDP Proxy, Floating Gateway, Shared Service, High Availability NAT)
web技術:web technology

Protected: On cloud-native and service-centric development

On cloud-native and service-centric development leveraged for digital transformation, artificial intelligence, and machine learning tasks inter-organizational, siloed, KPIs, business value, Conway's Law, organizational restructuring, process reform, CNCF Incubating Stage, CNCF Graduate Stage, CNCF Sandbox Stage, Technical Oversight Committee, End User Advisory Board, Cloud Native Application Development, Kubernetes Application Modernization, The Twelve-Factor App, 12 Application Principles, Container Orchestration, APIs, Service Based Architecture, SOA, Service Oriented Architecture, Microservices, Sparse Coupling, Delivery Performance, MTTR, Lead Time, Change Loss Rate, Deployment Frequency, Docker
ICT技術:ICT Technology

Theory, Mathematics and Algorithms for Artificial Intelligence Technology

Theory and basic algorithms of artificial intelligence techniques (metaheuristics, graph algorithms, dynamic programming, sphere theory, logic, mathematics) used in digital transformation, artificial intelligence and machine learning tasks.
ICT技術:ICT Technology

Artificial Intelligence Technology

Artificial Intelligence technologies used for Digital Transformation (DX), Artificial Intelligence (AI) and Machine Learning (ML) tasks
中国古典:classics

The Thought of Zhuangzi: How the Mind Can Be Free

The Thought of Zhuangzi: How the Mind Can Be Free (Qimoten, Delusion, Delusion of Hearing, Irreconcilable Character, Zen, The Human World Arc, O Teio Arc, Tokujinshi Arc, Anti-Common Sense, Saigyo Hoshi, Kamo Chomei, Matsuo Basho, Sengai Yoshihon, Ryokan, Yukawa Hideki, O Teio Arc, The Seven Bones of Chaos, Novel, Zhuang Zhou)
アルゴリズム:Algorithms

Protected: Exp3.P measures and lower bounds for the adversarial multi-armed bandit problem Theoretical overview

Theoretical overview of Exp3.P measures and lower bounds for adversarial multi-arm bandit problems utilized in digital transformation, artificial intelligence, and machine learning tasks cumulative reward, Poly INF measures, algorithms, Arbel-Ruffini theorem, pseudo-riglet upper bounds for Poly INF measures, closed-form expressions, continuous differentiable functions, Audibert, Bubeck, INF measures, pseudo-riglet upper bounds for INF measures, random choice algorithms, optimal order measures, highly probable riglet upper bounds) closed form, continuous differentiable functions, Audibert, Bubeck, INF measures, pseudo-riglet lower bounds, random choice algorithms, measures of optimal order, highly probable riglet upper bounds
タイトルとURLをコピーしました