中国古典:classics

Protected: Living Like Water: The Idea of Lao Tzu’s Thought The World of Being, Nothingness, and Infinity

Living Like Water: The Idea of Lao Tzu's Thought The World of With, Without, and Infinite (Taishang Laojun, Moral Tianzun, Taoism, Confucianism, Confucius, Governing Theory, Rei, Dao, Self-improvement, Class System, Status System, Feudal System, Antithesis, Jin, Yi, Morality, Book of Seclusion, Seclusion for the Weak, Passive Living, Do Nothing, Yin Yang Qi, Virtue, All Things Generated)
推論技術:inference Technology

Protected: Explainable Artificial Intelligence (11) Model-Independent Interpretation (Permutation Feature Importance)

Permutation Feature Importance is one of the posterior interpretation models that can be used to explain digital transformation (DX), artificial intelligence (AI), and machine learning (ML).
python

Protected: Applying Neural Networks to Reinforcement Learning Deep Q-Network Applying Deep Learning to Value Assessment

Application of Neural Networks to Reinforcement Learning for Digital Transformation, Artificial Intelligence, and Machine Learning tasks Deep Q-Network Prioritized Replay, Multi-step applying deep learning to value assessment Deep Q-Network applying deep learning to value assessment (Prioritized Replay, Multi-step Learning, Distibutional RL, Noisy Nets, Double DQN, Dueling Network, Rainbow, GPU, Epsilon-Greedy method, Optimizer, Reward Clipping, Fixed Target Q-Network, Experience Replay, Average Experience Replay, Mean Square Error, Mean Squared Error, TD Error, PyGame Learning Enviroment, PLE, OpenAI Gym, CNN
Clojure

Protected: Network analysis in GraphX Pregel using Clojure

Network analysis in GraphX Pregel using Clojure for digital transformation, artificial intelligence, and machine learning tasks (label propagation, twitter data, community analysis, graph structure analysis, community size, community detection, algorithms, maximum connected components, triangle counting, glittering, Google, Koenigsberg bridge, Euler path)
アーキテクチャ

AWS Cloud Service Design Patterns (2)

AWS Cloud Service Design Patterns used for Digital Transformation, Artificial Intelligence and Machine Learning tasks (Data Upload Patterns, Write Proxy, Storage Index, Direct Object Upload, Relational Database Patterns, DB Replication, Read Replica, Inmemory DB Cache, Sharing Write, Asynchronous Processing, Batch Processing Patterns, Queuing Chain, Priority Queue, Job Observer, Fanout)
アルゴリズム:Algorithms

Protected: An example of machine learning by Bayesian inference: inference by Gibbs sampling of a Poisson mixture model

Examples of machine learning with Bayesian inference utilized for digital transformation, artificial intelligence, and machine learning tasks: inference by Gibbs sampling of Poisson mixed models (algorithm, sampling of unobserved variables, Dirichlet distribution, gamma distribution, conditional distribution, categorical distribution, posterior distribution, simultaneous distribution, superparameter, knowledge model, latent variable) categorical distribution, posterior distribution, simultaneous distribution, hyperparameters, knowledge models, data generating processes, latent variables)

Ryotaro Shiba, Shotaro Ikenami and historical novels

Ryotaro Shiba, Shotaro Ikenami and historical novels (Ryosuke Kakine, Muromachi Muyori, Yoshinobu Kadoi, Ieyasu: Building Edo, Yuichi Shimpo, Shin Keian Taiheiki, Kokugoro Castle, Sho no Shield, Honobu Yonezawa, Shogo Imamura, 166th Naoki Prize, authentic mystery novel, Musashi Miyamoto, Eiji Yoshikawa, Kageyama Nakazato, Daibosatsu Pass, Onihei Hankacho, Sword for Swords, Umeyasu Fujie the Trap Man, Owl Castle, Cloud over the Hill, Ryoma Goes, Burning Sword, Kaido Yuku, Mountain Pass, 100th Birthday Anniversary)
中国古典:classics

The Analects of Confucius, a book of comprehensive “anthropology

Confucius' Analects: A Comprehensive Book of "Anthropology" (Communist Party, Chōkyū, Confucianism, Analects and Arithmetic, Shibusawa Eiichi, Loyalty, Filial Piety, Civility, Yushima Seido, Kodokan, Spring and Autumn Period)
アルゴリズム:Algorithms

Protected: Hedge Algorithm and Exp3 Measures in the Adversary Bandid Problem

Hedge algorithm and Exp3 measures in adversarial bandit problems utilized in digital transformation, artificial intelligence, and machine learning tasks pseudo-regret upper bound, expected cumulative reward, optimal parameters, expected regret, multi-armed bandit problem, Hedge Algorithm, Expert, Reward version of Hedge algorithm, Boosting, Freund, Chabile, Pseudo-Code, Online Learning, PAC Learning, Question Learning
アルゴリズム:Algorithms

Protected: Representation Theorems and Rademacher Complexity as the Basis for Kernel Methods in Statistical Mathematics Theory

Representation theorems and Rademacher complexity as a basis for kernel methods in statistical mathematics theory used in digital transformation, artificial intelligence, and machine learning tasks Gram matrices, hypothesis sets, discriminant bounds, overfitting, margin loss, discriminant functions, predictive semidefiniteness, universal kernels, the reproducing kernel Hilbert space, prediction discriminant error, L1 norm, Gaussian kernel, exponential kernel, binomial kernel, compact sets, empirical Rademacher complexity, Rademacher complexity, representation theorem
タイトルとURLをコピーしました