Search Constraints
Number of results to display per page
Results for:
Polyu oer sim
No
Remove constraint Polyu oer sim: No
« Previous |
1 - 20 of 114
|
Next »
Search Results
-
Others
This work introduces a handwritten Manipuri Meetei-Mayek character dataset which consists of more than 5000 data samples which were collected from a diverse population group that belongs to different age groups (from 4 years to 60 years), genders, educational backgrounds, occupations, communities from three different districts of Manipur, India (Imphal East District, Thoubal District and Kangpokpi District) during March and April 2019.
- Subjects:
- Computing
- Keywords:
- Optical pattern recognition
- Resource Type:
- Others
-
e-book
A Brief Introduction to Engineering Computation with MATLAB is specifically designed for students with no programming experience. However, students are expected to be proficient in First Year Mathematics and Sciences and access to good reference books are highly recommended. Students are assumed to have a working knowledge of the Mac OS X or Microsoft Windows operating systems. The strategic goal of the course and book is to provide learners with an appreciation for the role computation plays in solving engineering problems. MATLAB specific skills that students are expected to be proficient at are: write scripts to solve engineering problems including interpolation, numerical integration and regression analysis, plot graphs to visualize, analyze and present numerical data, and publish reports.
- Subjects:
- Mechanical Engineering and Computing
- Keywords:
- MATLAB Engineering mathematics
- Resource Type:
- e-book
-
Others
Take your SQL skills to the next level.
- Subjects:
- Computing
- Keywords:
- Database management SQL (Computer program language)
- Resource Type:
- Others
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- e-book
-
Others
Software developments is advancing the technological world today. This changes have far more reaching implications in I.T industries such as Big data, Artificial intelligence and Agile Software development methodologies. Competition in the software development ecosystem has made developers to build software that are quick and reliable and often referred to as Agile development. Agile transformation is real and requires rethinking the business management, recruitment process and data strategy in a bid to stimulate disruptive solutions from within in-house development and deployment. AI product development would require rapid transformational changes within any organization. This can be accomplished by establishing specific operating models that permit development teams with the freedom of technology choice. This publication highlights some operating models that can be adopted to improve the success of AI products using Agile software development methodologies.
- Subjects:
- Computing
- Keywords:
- Agile software development
- Resource Type:
- Others
-
Others
Algorithm Visualizer is an interactive online platform that visualizes algorithms from code. Learning an algorithm gets much easier with visualizing it.
- Subjects:
- Computing
- Keywords:
- Algorithms Information visualization
- Resource Type:
- Others
-
Courseware
This course treats various methods to design and analyze datastructures and algorithms for a wide range of problems. The most important new datastructure treated is the graph, and the general methods introduced are: greedy algorithms, divide and conquer, dynamic programming and network flow algorithms. These general methods are explained by a number of concrete examples, such as simple scheduling algorithms, Dijkstra, Ford-Fulkerson, minimum spanning tree, closest-pair-of-points, knapsack, and Bellman-Ford. Throughout this course there is significant attention to proving the correctness of the discussed algorithms. All material for this course is in English. The recorded lectures, however, are in Dutch.
- Subjects:
- Computing
- Keywords:
- Algorithms Data structures (Computer science)
- Resource Type:
- Courseware
-
Presentation
This video was recorded at European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Athens 2011. Comparing frequency counts over texts or corpora is an important task in many applications and scientific disciplines. Given a text corpus, we want to test a hypothesis, such as "word X is frequent", "word X has become more frequent over time", or "word X is more frequent in male than in female speech". For this purpose we need a null model of word frequencies. The commonly used bag-of-words model, which corresponds to a Bernoulli process with fixed parameter, does not account for any structure present in natural languages. Using this model for word frequencies results in large numbers of words being reported as unexpectedly frequent. We address how to take into account the inherent occurrence patterns of words in significance testing of word frequencies. Based on studies of words in two large corpora, we propose two methods for modeling word frequencies that both take into account the occurrence patterns of words and go beyond the bag-of-words assumption. The first method models word frequencies based on the spatial distribution of individual words in the language. The second method is based on bootstrapping and takes into account only word frequency at the text level. The proposed methods are compared to the current gold standard in a series of experiments on both corpora. We find that words obey different spatial patterns in the language, ranging from bursty to non-bursty/uniform, independent of their frequency, showing that the traditional approach leads to many false positives.
- Subjects:
- Management and Computing
- Keywords:
- Computational linguistics Text processing (Computer science) Discourse analysis -- Data processing
- Resource Type:
- Presentation
-
Courseware
This course includes interactive demonstrations which are intended to stimulate interest and to help students gain intuition about how artificial intelligence methods work under a variety of circumstances.
- Subjects:
- Computing
- Keywords:
- Artificial intelligence
- Resource Type:
- Courseware
-
e-book
Artificial intelligence (AI) is a potent buzzword and happening technology which has greatly impacted the lifestyle of every human being either directly or indirectly and is shaping the future of tomorrow. In fact, AI is fast becoming an intrinsic part of our daily life and is not confined to university research labs, even if remarkable progress has been made in this domain. The benefit of this phenomenon is widely recognized in diversified areas, ranging from medicine to security to consumer applications and business, and resulting in improvements in the quality of life of humankind. Every new disruptive technology has its own pros and cons and AI is no exception to this rule. Privacy, data protection, and the rights of individuals pose social and ethical challenges.
- Subjects:
- Computing
- Keywords:
- Artificial intelligence
- Resource Type:
- e-book
-
Others
Audacity is an easy-to-use, multi-track audio editor and recorder for Windows, macOS, GNU/Linux and other operating systems. Audacity is free, open source software
- Subjects:
- Computing
- Keywords:
- Audacity (Computer file) Digital audio editors
- Resource Type:
- Others
-
Video
With so many new users picking up virtual reality headsets for the 2019 holiday season, it's time for a 2020 beginners guide to virtual reality. Let's dive into PC Specs, recommended headsets, setup, comfort, locomotion, motion sickness, free games and a lot more.
- Subjects:
- Interactive and Digital Media and Computing
- Keywords:
- Computer simulation Virtual reality Human-computer interaction
- Resource Type:
- Video
-
Courseware
While big data infiltrates all walks of life, most firms have not changed sufficiently to meet the challenges that come with it. In this course, you will learn how to develop a big data strategy, transform your business model and your organization. This course will enable professionals to take their organization and their own career to the next level, regardless of their background and position. Professionals will learn how to be in charge of big data instead of being subject to it. In particular, they will become familiar with tools to: - assess their current situation regarding potential big data-induced changes of a disruptive nature, - identify their options for successfully integrating big data in their strategy, business model and organization, or if not possible, how to exit quickly with as little loss as possible, and - strengthen their own position and that of their organization in our digitalized knowledge economy The course will build on the concepts of product life cycles, the business model canvas, organizational theory and digitalized management jobs (such as Chief Digital Officer or Chief Informatics Officer) to help you find the best way to deal with and benefit from big data induced changes. During the course, your most pressing questions will be answered in our feedback videos with the lecturer. In the assignments of the course, you will choose a sector and a stakeholder. For this, you will develop your own strategy and business model. This will help you identify the appropriate organizational structure and potential contributions and positions for yourself.
- Subjects:
- Management and Computing
- Keywords:
- Business -- Data processing Big data
- Resource Type:
- Courseware
-
Video
A tutorial on setting up clothing to low poly character.
- Subjects:
- Interactive and Digital Media and Computing
- Keywords:
- Blender (Computer file) Three-dimensional display systems Computer animation Computer graphics
- Resource Type:
- Video
-
Presentation
This video was recorded at COIN / ACTIVE Summer School on Advanced Technologies for Knowledge Intensive Networked Organizations, Aachen 2010. Part 1. Context Computing. Context is used as a term for packaging information for a particular need. A criterion for selecting or prioritization information from a broader pool of information could be called contextual model. Search can be contextual: http://searchpoint.ijs.si. The relevance of Context in computing seems to be growing. Many application areas see an opportunity in extending its value by introducing "context sensitivity". More details do to be found in ISWC2006 Tutorial on "context sensitivity": http://videolectures.net/iswc06_athens_ga/ Part 2. Text Mining & Light Weight Semantics. Videolectures discusses the following topics: - levels of text representations - modeling the data (Support Vector Machine) - classification into large taxonomies (DMoz) - visual & contextual search (Search Point) - multilingual search - news bias, news visualization - text enrichment (Enrycher) - knowledge based summarization - question answering (AnswerArt) - Cyc knowledge base and reasoning
- Subjects:
- Management and Computing
- Keywords:
- Data mining Information resources management Business -- Data Processing Management information systems
- Resource Type:
- Presentation
-
Others
C is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations. C was originally developed by Dennis Ritchie between 1969 and 1973 at Bell Labs, and used to re-implement the Unix operating system. It has since become one of the most widely used programming languages of all time, with C compilers from various vendors available for the majority of existing computer architectures and operating systems. The best way we learn anything is by practice and exercise questions. We have started this section for those (beginner to intermediate) who are familiar with C programming. Hope, these exercises help you to improve your C programming coding skills. Currently, following sections are available, we are working hard to add more exercises.
- Subjects:
- Computing
- Keywords:
- Programming languages (Electronic computers) C (Computer program language)
- Resource Type:
- Others
-
Courseware
Introduction to computer programming within a numerical computing environment (MATLAB or similar) including types of data representation, graphical display of data, and development of modular programs with application to engineering analysis and problem solving.
- Subjects:
- Computing
- Keywords:
- Engineering -- Data processing Computer programming Engineering -- Computer programs
- Resource Type:
- Courseware
-
Presentation
This video was recorded at COIN / ACTIVE Summer School on Advanced Technologies for Knowledge Intensive Networked Organizations, Aachen 2010. Organized by COIN FP7 Integrated Project (http://www.coin-ip.eu/) and ACTIVE FP7 Integrated Project (http://www.active-project.eu), the summer school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability through innovative software solutions and share the recent research developments from well-established researchers and educators. The main topics of the summer school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modeling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies. More about the event at http://coin-active-ss.ijs.si/
-
Presentation
This video was recorded at COIN / PlanetData Winter School on Knowledge Technologies for Complex Business Environments, Ljubljana 2011. Organized by COIN FP7 Integrated Project and PlanetData FP7 Network of Excellence, the school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability with innovative services and project large-scale data management in business environments. The main topics of the winter school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modelling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies.
-
Presentation
This video was recorded at COIN / PlanetData Winter School on Knowledge Technologies for Complex Business Environments, Ljubljana 2011. Organized by COIN FP7 Integrated Project and PlanetData FP7 Network of Excellence, the school seeks to bring together students, scholars and researchers from industry in order to foster collaboration and interoperability with innovative services and project large-scale data management in business environments. The main topics of the winter school are: Interoperability and collaboration models and solutions, Enterprise interoperability and collaboration services, Innovative knowledge and semantically powered technologies, Knowledge process and context modelling, Pro-active knowledge tools, Large scale analytics and reasoning tools, Business cases and real case studies. Detailed information can be found here.
- Subjects:
- Management and Computing
- Keywords:
- Information resources management Internetworking (Telecommunication) Management information systems
- Resource Type:
- Presentation