人工知能:Artificial Intelligence

アルゴリズム:Algorithms

Protected: Confidence Region Methods in Sequential Optimization in Machine Learning

Confidence region methods (dogleg method, norm constraint, model function optimization, approximate solution of subproblems, modified Newton method, search direction, globally optimal solution, Newton method, steepest descent method, confidence region radius, confidence region, descent direction, step width) in continuous optimization in machine learning used for digital transformation, artificial intelligence, machine learning tasks.
アルゴリズム:Algorithms

Recommendation Technology

  Recommendation Technology Overview Recommendation technology using machine learning can analyze a user's pas...
アルゴリズム:Algorithms

Protected: TRPO/PPO and DPG/DDPG, an improvement of the Policy Gradient method of reinforcement learning

TRPO/PPO and DPG/DDPG (Pendulum, Actor Critic, SequentialMemory, SequentialMemory, and SequentialMemory), which are improvements of Policy Gradient methods of reinforcement learning used for digital transformation, artificial intelligence, and machine learning tasks. Adam, keras-rl, TD error, Deep Deterministic Policy Gradient, Deterministic Policy Gradient, Advanced Actor Critic, A2C, A3C, Proximal Policy Optimization, Trust Region Policy Optimization, Python)
Clojure

Protected: A recommendation system using a measure of similarity between text documents using k-means in Clojure.

Recommendation systems using measures of similarity between text documents using k-means in Clojure leveraged for digital transformation , artificial intelligence , and machine learning tasks Slope One recommendations, top rating calculations, weighted ratings, average difference between paired items, Weighted Slope One, user-based recommendations, collaborative filtering, item-based recommendations, movie recommendation data
アルゴリズム:Algorithms

Protected: Optimization methods for L1-norm regularization for sparse learning models

Optimization methods for L1-norm regularization for sparse learning models for use in digital transformation, artificial intelligence, and machine learning tasks (proximity gradient method, forward-backward splitting, iterative- shrinkage threshholding (IST), accelerated proximity gradient method, algorithm, prox operator, regularization term, differentiable, squared error function, logistic loss function, iterative weighted shrinkage method, convex conjugate, Hessian matrix, maximum eigenvalue, second order differentiable, soft threshold function, L1 norm, L2 norm, ridge regularization term, η-trick)
アルゴリズム:Algorithms

Protected: Optimal arm identification and AB testing in the bandit problem_2

Optimal arm identification and AB testing in bandit problems utilized in digital transformation, artificial intelligence, and machine learning tasks sequential deletion policy, false positive rate, fixed confidence, fixed budget, LUCB policy, UCB policy, optimal arm, score-based method, LCB, algorithm, cumulative reward maximization, optimal arm identification policy, ε-optimal arm identification
アルゴリズム:Algorithms

Protected: Statistical Mathematical Theory for Boosting

Statistical and mathematical theory boosting generalized linear model, modified Newton method, log likelihood, weighted least squares method, boosting, coordinate descent method, iteratively weighted least squares method, iteratively reweighted least squares method, IRLS method, weighted empirical discriminant error, parameter update law, Hessian matrix, corrected Newton method, Newton method, Newton method, iteratively reweighted least squares method, IRLS method) used for digital transformation, artificial intelligence, machine learning tasks. iteratively reweighted least square method, IRLS method, weighted empirical discriminant error, parameter update law, Hessian matrix, corrected Newton method, modified Newton method, Newton method, Newton method, link function, logistic loss, logistic loss, boosting algorithm, logit boost, exponential loss, convex margin loss, adaboost, weak hypothesis, empirical margin loss, nonlinear optimization
アルゴリズム:Algorithms

Protected: Quasi-Newton Methods as Sequential Optimization in Machine Learning (2)Quasi-Newton Methods with Memory Restriction

Quasi-Newton method with memory restriction (sparse clique factorization, sparse clique factorization, chordal graph, sparsity, secant condition, sparse Hessian matrix, DFP formula, BFGS formula, KL divergence, quasi-Newton method, maximal clique, positive definite matrix, positive definite matrix completion, positive define matrix composition, graph triangulation, complete subgraph, clique, Hessian matrix, triple diagonal matrix Hestenes-Stiefel method, L-BFGS method)
アルゴリズム:Algorithms

Protected: An example of machine learning by Bayesian inference: inference by collapsed Gibbs sampling of a Poisson mixture model

Inference by collapsed Gibbs sampling of Poisson mixed models as an example of machine learning by Bayesian inference utilized in digital transformation, artificial intelligence, and machine learning tasks variational inference, Gibbs sampling, evaluation on artificial data, algorithms, prior distribution, gamma distribution, Bayes' theorem, Dirichlet distribution, categorical distribution, graphical models
Symbolic Logic

Overview of the Knowledge Graph and summary of related presentations at the International Society for the Study of Knowledge Graphs (ISWC)

Overview of knowledge graphs used for digital transformation, artificial intelligence, and machine learning tasks and summary of related presentations at the International Society for the World Wide Web Conference ISWC (ISWC, natural language processing, reasoning techniques, data analytics, robotics, IOT, search engine, inference engine Entity Extraction, Picture Entity Linking, Relational Learning, Deep Learning, Fusion of Logic and Probability, Relationship Extraction, Topic Models, Chatbots, Question Answering, Semantic Web Technologies, Knowledge Information Processing, RDF Store, SPARQL, Ontology Matching, Database Technologies)
タイトルとURLをコピーしました