2023-04

仏教:Buddhism

On the Road: A Stroll through Kyoto’s Famous Temples and Daitokuji Temple – Dada, Zen, and a Rest

Ryotaro Shiba's Stroll along the Road to Kyoto's Famous Temples and Daitokuji Temple: Dada, Zen, and Ikkyu Shoenan, Fudemo Daiyokai, Noh, Kinshun Zenchiku, Zeami, Tea Ceremony, Shiho, Murata Shuko, Rohan, Kaso Sogun, James Joyce, Marcel Duchamp, Dadaism, Takahashi Shinkichi, Rinzai Zen, Baojyubashi, Tsutenkyo, Gagunbashi, Tofukuji, Tenryuji, Nanzenji, Kenninji, Eisai, Shino
哲学:philosophy

Protected: From the Special Lecture “Socrates’ Defense,” “Starting Points in Philosophy.”

This content is password protected. To view it please enter your password below: Password:
Uncategorized

Protected: Explainable Machine Learning (18)Adversarial Examples

Explainable Machine Learning with Adversarial Sample Approach utilized for Digital Transformation, Artificial Intelligence, and Machine Learning tasks Cyber Security, Surrogate Models, Neural Networks, Black Box Attack, Expectation Over Transformation algorithm, EOT, InceptionV3, TensorFlow, Fast gradient method, VGG16 classifier, ImageNet, adversarial patch, 1-pixel attack, L-BFGS method, Fast gradient sign method
アルゴリズム:Algorithms

Protected: Implementation of two approaches to improve environmental awareness, a weak point of deep reinforcement learning.

Implementation of two approaches to improve environment awareness, a weakness of deep reinforcement learning used in digital transformation, artificial intelligence, and machine learning tasks (inverse predictive, constrained, representation learning, imitation learning, reconstruction, predictive, WorldModels, transition function, reward function Weaknesses of representation learning, VAE, Vision Model, RNN, Memory RNN, Monte Carlo methods, TD Search, Monte Carlo Tree Search, Model-based learning, Dyna, Deep Reinforcement Learning)
アルゴリズム:Algorithms

Protected: Regression analysis using Clojure (2) Multiple regression model

This content is password protected. To view it please enter your password below: Password:
Clojure

Overview of web crawling technologies and implementation in Python/Clojure

Overview of web crawling technologies used for digital transformation, artificial intelligence and machine learning tasks and their implementation in Python/Clojure jsoup, clj-http, enlive, clojure.data.json, HTML, CSS jsoup, HTML, CSS, XPATH, JSON, BeautifulSoup, Scrapy, data extraction, natural language processing, databases, search, SNS analysis
ICT技術:ICT Technology

Overview of Kubernetes, environment setup, and reference books

Overview and configuration of Kubernetes used for digital transformation, artificial intelligence and machine learning tasks, reference books (Microservices, Spinnaker, Blue, Containers, Cloud Natives, Skaffold, Clair, Security, BuildKit, Kaniko, Operator, Helm, Chart, Sock Shop, YAML, Prometheus, Grafana, Pod, Minikube)

On the Road to Inaba and Hoki

Ryotaro Shiba's Road to Inaba and Hoki (Eshima Ohashi Bridge, Beta Tread Bridge, Mizuki Shigeru Road, Mizuki Shigeru Memorial Museum, Sakaiminato, Kaike Onsen, Kaike Triathlon, Hoki Daisen, Kurayoshi, Kurayoshi Kasuri, Ikinoshima, Inaba no Shirousagi, Okuninushi no Mikoto, Yatsujin, Izumo Country, Inaba no Genza, Myokojin, Yanagi Muneyoshi, D. T. Suzuki, Zen, folk art, Japan Folk Mingeikan, Manyoshu, Otomo Iemochi, Taika no Kaihin, Soga Iruka, Prince Nakataio, Inaba no Kokubu, Hayano, Nagisan, Momotaro, Izumo Taisha, Yaqi Taibe, Susano-onomikoto, Kibitsuhiko-nomikoto, Chizu-cho, Tottori, Chugoku Mountains)
キリスト教

Protected: What is Philosophy from the Special Lecture “Socrates’ Defense”

This content is password protected. To view it please enter your password below: Password:
アルゴリズム:Algorithms

Protected: Optimal arm bandit and Bayes optimal when the player’s candidate actions are large or continuous(1)

Optimal arm bandit and Bayes optimal linear curl, linear bandit, covariance function, Mattern kernel, Gaussian kernel, positive definite kernel function, block matrix, inverse matrix formulation, prior simultaneous probability density, Gaussian process, Lipschitz continuous, Euclidean norm, simple riglet, black box optimization, optimal arm identification, regret, cross checking, leave-one-out cross checking, continuous arm bandit
タイトルとURLをコピーしました