Search Constraints
Number of results to display per page
Results for:
Polyu oer sim
No
Remove constraint Polyu oer sim: No
« Previous |
1 - 10 of 114
|
Next »
Search Results
-
Others
This work introduces a handwritten Manipuri Meetei-Mayek character dataset which consists of more than 5000 data samples which were collected from a diverse population group that belongs to different age groups (from 4 years to 60 years), genders, educational backgrounds, occupations, communities from three different districts of Manipur, India (Imphal East District, Thoubal District and Kangpokpi District) during March and April 2019.
- Subjects:
- Computing
- Keywords:
- Optical pattern recognition
- Resource Type:
- Others
-
e-book
A Brief Introduction to Engineering Computation with MATLAB is specifically designed for students with no programming experience. However, students are expected to be proficient in First Year Mathematics and Sciences and access to good reference books are highly recommended. Students are assumed to have a working knowledge of the Mac OS X or Microsoft Windows operating systems. The strategic goal of the course and book is to provide learners with an appreciation for the role computation plays in solving engineering problems. MATLAB specific skills that students are expected to be proficient at are: write scripts to solve engineering problems including interpolation, numerical integration and regression analysis, plot graphs to visualize, analyze and present numerical data, and publish reports.
- Subjects:
- Mechanical Engineering and Computing
- Keywords:
- MATLAB Engineering mathematics
- Resource Type:
- e-book
-
Others
Take your SQL skills to the next level.
- Subjects:
- Computing
- Keywords:
- Database management SQL (Computer program language)
- Resource Type:
- Others
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- e-book
-
Others
Software developments is advancing the technological world today. This changes have far more reaching implications in I.T industries such as Big data, Artificial intelligence and Agile Software development methodologies. Competition in the software development ecosystem has made developers to build software that are quick and reliable and often referred to as Agile development. Agile transformation is real and requires rethinking the business management, recruitment process and data strategy in a bid to stimulate disruptive solutions from within in-house development and deployment. AI product development would require rapid transformational changes within any organization. This can be accomplished by establishing specific operating models that permit development teams with the freedom of technology choice. This publication highlights some operating models that can be adopted to improve the success of AI products using Agile software development methodologies.
- Subjects:
- Computing
- Keywords:
- Agile software development
- Resource Type:
- Others
-
Others
Algorithm Visualizer is an interactive online platform that visualizes algorithms from code. Learning an algorithm gets much easier with visualizing it.
- Subjects:
- Computing
- Keywords:
- Algorithms Information visualization
- Resource Type:
- Others
-
Courseware
This course treats various methods to design and analyze datastructures and algorithms for a wide range of problems. The most important new datastructure treated is the graph, and the general methods introduced are: greedy algorithms, divide and conquer, dynamic programming and network flow algorithms. These general methods are explained by a number of concrete examples, such as simple scheduling algorithms, Dijkstra, Ford-Fulkerson, minimum spanning tree, closest-pair-of-points, knapsack, and Bellman-Ford. Throughout this course there is significant attention to proving the correctness of the discussed algorithms. All material for this course is in English. The recorded lectures, however, are in Dutch.
- Subjects:
- Computing
- Keywords:
- Algorithms Data structures (Computer science)
- Resource Type:
- Courseware
-
Presentation
This video was recorded at European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD), Athens 2011. Comparing frequency counts over texts or corpora is an important task in many applications and scientific disciplines. Given a text corpus, we want to test a hypothesis, such as "word X is frequent", "word X has become more frequent over time", or "word X is more frequent in male than in female speech". For this purpose we need a null model of word frequencies. The commonly used bag-of-words model, which corresponds to a Bernoulli process with fixed parameter, does not account for any structure present in natural languages. Using this model for word frequencies results in large numbers of words being reported as unexpectedly frequent. We address how to take into account the inherent occurrence patterns of words in significance testing of word frequencies. Based on studies of words in two large corpora, we propose two methods for modeling word frequencies that both take into account the occurrence patterns of words and go beyond the bag-of-words assumption. The first method models word frequencies based on the spatial distribution of individual words in the language. The second method is based on bootstrapping and takes into account only word frequency at the text level. The proposed methods are compared to the current gold standard in a series of experiments on both corpora. We find that words obey different spatial patterns in the language, ranging from bursty to non-bursty/uniform, independent of their frequency, showing that the traditional approach leads to many false positives.
- Subjects:
- Management and Computing
- Keywords:
- Computational linguistics Text processing (Computer science) Discourse analysis -- Data processing
- Resource Type:
- Presentation
-
Courseware
This course includes interactive demonstrations which are intended to stimulate interest and to help students gain intuition about how artificial intelligence methods work under a variety of circumstances.
- Subjects:
- Computing
- Keywords:
- Artificial intelligence
- Resource Type:
- Courseware
-
e-book
Artificial intelligence (AI) is a potent buzzword and happening technology which has greatly impacted the lifestyle of every human being either directly or indirectly and is shaping the future of tomorrow. In fact, AI is fast becoming an intrinsic part of our daily life and is not confined to university research labs, even if remarkable progress has been made in this domain. The benefit of this phenomenon is widely recognized in diversified areas, ranging from medicine to security to consumer applications and business, and resulting in improvements in the quality of life of humankind. Every new disruptive technology has its own pros and cons and AI is no exception to this rule. Privacy, data protection, and the rights of individuals pose social and ethical challenges.
- Subjects:
- Computing
- Keywords:
- Artificial intelligence
- Resource Type:
- e-book