Browse Results

Showing 29,801 through 29,825 of 54,842 results

Kernel Methods for Machine Learning with Math and R: 100 Exercises for Building Logic

by Joe Suzuki

The most crucial ability for machine learning and data science is mathematical logic for grasping their essence rather than relying on knowledge or experience. This textbook addresses the fundamentals of kernel methods for machine learning by considering relevant math problems and building R programs. The book’s main features are as follows:The content is written in an easy-to-follow and self-contained style.The book includes 100 exercises, which have been carefully selected and refined. As their solutions are provided in the main text, readers can solve all of the exercises by reading the book.The mathematical premises of kernels are proven and the correct conclusions are provided, helping readers to understand the nature of kernels.Source programs and running examples are presented to help readers acquire a deeper understanding of the mathematics used.Once readers have a basic understanding of the functional analysis topics covered in Chapter 2, the applications are discussed in the subsequent chapters. Here, no prior knowledge of mathematics is assumed.This book considers both the kernel for reproducing kernel Hilbert space (RKHS) and the kernel for the Gaussian process; a clear distinction is made between the two.

Kernel Methods for Pattern Analysis

by John Shawe-Taylor Nello Cristianini

Kernel methods provide a powerful and unified framework for pattern discovery, motivating algorithms that can act on general types of data (e. g. strings, vectors or text) and look for general types of relations (e. g. rankings, classifications, regressions, clusters). The application areas range from neural networks and pattern recognition to machine learning and data mining. This book, developed from lectures and tutorials, fulfils two major roles: firstly it provides practitioners with a large toolkit of algorithms, kernels and solutions ready to use for standard pattern discovery problems in fields such as bioinformatics, text analysis, image analysis. Secondly it provides an easy introduction for students and researchers to the growing field of kernel-based pattern analysis, demonstrating with examples how to handcraft an algorithm or a kernel for a new specific application, and covering all the necessary conceptual and mathematical tools to do so.

Kernel Ridge Regression in Clinical Research

by Ton J. Cleophas Aeilko H. Zwinderman

IBM (international business machines) has published in its SPSS statistical software 2022 update a very important novel regression method entitled Kernel Ridge Regression (KRR). It is an extension of the currently available regression methods, and is suitable for pattern recognition in high dimensional data, particularly, when alternative methods fail. Its theoretical advantages are plenty and include thekernel trick for reduced arithmetic complexity,estimation of uncertainty by Gaussians unlike histograms,corrected data-overfit by ridge regularization,availability of 8 alternative kernel density models for datafit.A very exciting and wide array of preliminary KRR research has already been published by major disciplines (like studies in quantum mechanics and nuclear physics, studies of molecular affinity / dynamics, atomisation energy studies, but also forecasting economics studies, IoT (internet of things) studies for e-networks, plant stress response studies, big data streaming studies, etc). In contrast, it is virtually unused in clinical research. This edition is the first textbook and tutorial of kernel ridge regressions for medical and healthcare students as well as recollection / update bench, and help desk for professionals. Each chapter can be studied as a standalone, and, using, real as well as hypothesized data, it tests the performance of the novel methodology against traditional regression analyses. Step by step analyses of over 20 data files stored at Supplementary Files at Springer Interlink are included for self-assessment. We should add that the authors are well qualified in their field. Professor Zwinderman is past-president of the International Society of Biostatistics (2012-2015) and Professor Cleophas is past-president of the American College of Angiology (2000-2002). From their expertise they should be able to make adequate selections of modern KRR methods for the benefit of physicians, students, and investigators. The authors have been working and publishing together for 24 years and their research can be characterized as a continued effort to demonstrate that clinical data analysis is not mathematics but rather a discipline at the interface of biology and mathematics.

Kernelization: Theory of Parameterized Preprocessing

by Fedor V. Fomin Daniel Lokshtanov Saket Saurabh Meirav Zehavi

Preprocessing, or data reduction, is a standard technique for simplifying and speeding up computation. Written by a team of experts in the field, this book introduces a rapidly developing area of preprocessing analysis known as kernelization. The authors provide an overview of basic methods and important results, with accessible explanations of the most recent advances in the area, such as meta-kernelization, representative sets, polynomial lower bounds, and lossy kernelization. The text is divided into four parts, which cover the different theoretical aspects of the area: upper bounds, meta-theorems, lower bounds, and beyond kernelization. The methods are demonstrated through extensive examples using a single data set. Written to be self-contained, the book only requires a basic background in algorithmics and will be of use to professionals, researchers and graduate students in theoretical computer science, optimization, combinatorics, and related fields.

Key 5G/5G-Advanced Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access

by Douglas H. Morais

This third edition of this text covers the key technologies associated with the physical transmission of data on 5G mobile systems. Following an updated overview of these technologies, the author provides a high-level description of 3GPP’s mobile communications standard (5G/5G-Advanced) and shows how the key technologies presented earlier facilitate the transmission of very high-speed user data and control data and can provide very low latency for use cases where this is important. In the final chapter, an updated overview and the physical layer aspects of 5G NR enabled Fixed Wireless Access (FWA) networks is presented. Material in the second edition addressed mainly the key physical layer technologies and features associated with 3GPP Release 15, the first release to support 5G, and Release 16. This edition adds descriptions of some of the technological advancements supported in Releases 17 and 18, the latter being designated by 3GPP as 5G-Advanced. In addition to numerous enhancements of existing features, these releases include new features such as support for 1024-QAM in the downlink in the FR1 band, Reduced Capability (RedCAP) devices, Network Controlled repeaters, operation in the 6 GHz band and above 52.6 GHz, support for broadcast/multicast services, and Non-terrestrial Networks (NTNs). Additionally, a look ahead at some of the planned features and enhancements of Release 19 is provided. This textbook is intended for graduate and upper undergraduate engineering students and practicing engineers and technicians who have an interest in 3GPP’s 5G enabled mobile and or FWA networks and want to acquire, where missing, the necessary technology background in order to understand 3GPP’s physical layer specifications and operation. Provided are working problems and helpful examples throughout the text.

Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access

by Douglas H. Morais

This book covers the key technologies associated with the physical transmission of data on fifth generation (5G) mobile systems. Following an overview of these technologies, a high-level description of 3GPP’s mobile communications standard (5G NR) is given and it is shown how the key technologies presented earlier facilitate the transmission of control data and very high-speed user data. In the final chapter, an overview and the physical layer aspects of 5G NR enabled Fixed Wireless Access (FWA) networks is presented. This book is intended for those practicing engineers and graduate and upper undergraduate engineering students who have an interest in 3GPP’s 5G enabled mobile and or FWA networks and want to acquire, where missing, the necessary technology background in order to understand 3GPP’s physical layer specifications and operation.Provides a comprehensive covering of key 3GPP 5G NR physical layer technologies, presented in a clear, tractable fashion, with sufficient mathematics to make it technically coherent;Addresses all key 5G NR technologies, including digital modulation, LDPC and Polar coding, multicarrier based multiple access techniques, and multiple antenna techniques including MIMO and beamforming;Presents an overview of 5G NR Radio Access Network (RAN) architecture and a detailed understanding of how user and control data is transported in the physical layer by the application of the technologies presented;Provides an overview and addresses physical layer aspects of 5G NR enabled Fixed Wireless Access networks.

Key 5G Physical Layer Technologies: Enabling Mobile and Fixed Wireless Access

by Douglas H. Morais

​ This updated book, reconfigured as a textbook, covers the key technologies associated with the physical transmission of data on 5G mobile systems. Following an updated overview of these technologies, the author provides a high-level description of 3GPP’s mobile communications standard (5G NR) and shows how the key technologies presented earlier facilitate the transmission of very high-speed user data and control data and can provide very low latency for use cases where this is important. In the final chapter, an overview and the physical layer aspects of 5G NR enabled Fixed Wireless Access (FWA) networks is presented. Material in the first edition addressed mainly the key physical layer technologies and features associated with 3GPP release 15, the first release to support 5G. This edition adds descriptions of some of the technological advancements supported in release 16, including integrated access and backhaul (IAB), sidelink communication, NR positioning, operation in unlicensed bands, and multiple transmission points transmission. This textbook is intended for graduate and upper undergraduate engineering students and practicing engineers who have an interest in 3GPP’s 5G enabled mobile and or FWA networks and want to acquire, where missing, the necessary technology background in order to understand 3GPP’s physical layer specifications and operation. The author provides working problems and helpful examples throughout the text.

Key Digital Trends in Artificial Intelligence and Robotics: Proceedings of 4th International Conference on Deep Learning, Artificial Intelligence and Robotics, (ICDLAIR) 2022 - Progress in Algorithms and Applications of Deep Learning (Lecture Notes in Networks and Systems #670)

by Luigi Troiano Alfredo Vaccaro Nishtha Kesswani Irene Díaz Rodriguez Imene Brigui David Pastor-Escuredo

The book (proceedings of the 4th International Conference on Deep Learning, Artificial Intelligence and Robotics (ICDLAIR) 2022) introduces key topics from artificial intelligence algorithms and programming organisations and explains how they contribute to health care, manufacturing, law, finance, retail, real estate, accountancy, digital marketing, and various other fields. Although artificial intelligence (AI) has generated a lot of hype over the past ten years, these consequences on how we live, work, and play are still in their infancy and will likely have a significant impact in the future. The supremacy of AI in areas like speech and picture recognition, navigational apps, personal assistants for smartphones, ride-sharing apps, and many other areas is already well established. The book is primarily meant for academics, researchers, and engineers who want to employ AI applications to address real-world issues. The authors hope that businesses and technology creators will also find it appealing to utilise in industry.

Key Digital Trends Shaping the Future of Information and Management Science: Proceedings of 5th International Conference on Information Systems and Management Science (ISMS) 2022 (Lecture Notes in Networks and Systems #671)

by Lalit Garg Dilip Singh Sisodia Nishtha Kesswani Joseph G. Vella Imene Brigui Sanjay Misra Deepak Singh

This book (proceedings of ISMS 2022) is intended to be used as a reference by students and researchers who collect scientific and technical contributions with respect to models, tools, technologies and applications in the field of information systems and management science. This textbook shows how to exploit information systems in a technology-rich management field. The book introduces concepts, principles, methods, and procedures that will be valuable to students and scholars in thinking about existing organization systems, proposing new systems, and working with management professionals in implementing new information systems.

Key Technologies of Intelligentized Welding Manufacturing: Visual Sensing of Weld Pool Dynamic Characters and Defect Prediction of GTAW Process

by Zongyao Chen Zhili Feng Jian Chen

This book describes the application of vision-sensing technologies in welding processes, one of the key technologies in intelligent welding manufacturing. Gas tungsten arc welding (GTAW) is one of the main welding techniques and has a wide range of applications in the manufacturing industry. As such, the book also explores the application of AI technologies, such as vision sensing and machine learning, in GTAW process sensing and feature extraction and monitoring, and presents the state-of-the-art in computer vision, image processing and machine learning to detect welding defects using non-destructive methods in order to improve welding productivity. Featuring the latest research from ORNL (Oak Ridge National Laboratory) using digital image correlation technology, this book will appeal to researchers, scientists and engineers in the field of advanced manufacturing.

Key Technologies of Intelligentized Welding Manufacturing: The Spectral Diagnosis Technology for Pulsed Gas Tungsten Arc Welding of Aluminum Alloys (Transactions on Intelligent Welding Manufacturing)

by Yiming Huang Shanben Chen

This book presents the recent research results of the application of arc spectrum in the welding process. It sheds light on the fundamentals of monitoring welding quality using arc spectral information. By analyzing the topic both from a global and local perspective, it establishes a knowledge base of features characterizing welding statuses. Researchers, scientists and engineers in the field of intelligent welding can benefit from the book. As such, this book provides valuable knowledge, useful methods, and practical algorithms that are applicable in real-time detection of welding defects.

Keyboarding and Information Processing (Book One) (Sixth Edition)

by Amanda Robinson Lee R. Beaumont T. James Crawford Jack P. Hoggatt Jerry W. Robinson Jon A. Shank

In today's world of people doing business anytime, anywhere from PC's and laptops, proper keyboarding skills are essential. While solid keyboarding skills never change, the applications and software do. That's why Century 21 Keyboarding not only teaches users the fundamentals, it also keeps them current with new technology-a reputation it's held for more than 75 years.

Keyboarding and Word Processing Essentials: Microsoft Word 2010 (18th Edition)

by Susie H. Vanhuss Connie M. Forde Donna L. Woo

The Eighteenth Edition of KEYBOARDING AND WORD PROCESSING ESSENTIALS, LESSONS 1-55 uses proven techniques to help readers master the keyboarding and formatting skills they need for career success-from initial new-key learning to expertise in formatting business documents with Microsoft Word 2010. South-Western College Keyboarding offers a proven, time-tested approach that helps readers develop a strong foundation in basic keyboarding, steadily improve their skills, and rapidly become proficient in document formatting and business communication. Each lesson is clearly focused, well structured, and designed to provide step-by-step training and reinforcement to help readers quickly acquire and apply new skills. This one-book solution includes 55 lessons, documents, and software instructions within a space-saving easel-back format.

Keyboarding with Computer Applications

by Jack E. Johnson Delores Sykes Cotton Judith Chiri-Mulkey Carole G. Stanley

Keyboarding, Word Processing, Spreadsheets, Desktop Publishing, Databases.

Keyboarding with Computer Applications: Lessons 1-150

by Jack E. Johnson Delores Sykes Cotton Carole Glosup Stanley Judith Chiri-Mulkey

This book will appeal to every student. All elements, including the courseware, textbook, and student software manuals are fully integrated to provide students with the total learning experience.

Keyboarding, Word Processing, & Communication: Using Microsoft® Office Word and Outlook 2007

by Pearson Education

NIMAC-sourced textbook

Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications

by Stian Thorgersen Pedro Igor Silva

Learn to leverage the advanced capabilities of Keycloak, an open-source identity and access management solution, to enable authentication and authorization in applicationsKey FeaturesGet up to speed with Keycloak, OAuth 2.0, and OpenID Connect using practical examplesConfigure, manage, and extend Keycloak for optimized securityLeverage Keycloak features to secure different application typesBook DescriptionImplementing authentication and authorization for applications can be a daunting experience, often leaving them exposed to security vulnerabilities. Keycloak is an open-source solution for identity management and access management for modern applications. Keycloak - Identity and Access Management for Modern Applications is a comprehensive introduction to Keycloak, helping you get started with using it and securing your applications. Complete with hands-on tutorials, best practices, and self-assessment questions, this easy-to-follow guide will show you how to secure a sample application and then move on to securing different application types. As you progress, you will understand how to configure and manage Keycloak as well as how to leverage some of its more advanced capabilities. Finally, you'll gain insights into securely using Keycloak in production. By the end of this book, you will have learned how to install and manage Keycloak as well as how to secure new and existing applications.What you will learnUnderstand how to install, configure, and manage KeycloakSecure your new and existing applications with KeycloakGain a basic understanding of OAuth 2.0 and OpenID ConnectUnderstand how to configure Keycloak to make it ready for production useDiscover how to leverage additional features and how to customize Keycloak to fit your needsGet to grips with securing Keycloak servers and protecting applicationsWho this book is forDevelopers, sysadmins, security engineers, or anyone who wants to leverage Keycloak and its capabilities for application security will find this book useful. Beginner-level knowledge of app development and authentication and authorization is expected.

The keys of success for MLM: The keys of success

by Vicente Cuenca

"There is no riskier thing than not to take risk" A year ago, I was interviewing Mr. Francisco Javier Lopez Navarro, founding president of the international institute of Self- Employment. He is a successful entrepreneur, yet he wanted to know to improve his work. I was very surprised that this man came to me, since his company

Keyshot 3D Rendering

by Jei Lee Jo

The book includes a series of step-by-step illustrated tutorials supported by a detailed explanation for each aspect of the 3D rendering procedure. Some of the procedures or steps may be omitted if they have been previously explained in an exercise or chapter. "Keyshot 3D Rendering" is ideal for beginners and professionals who are involved with product development, entertainment, and industrial design. It is recommended for readers who already have some level of experience with 3D modelling, texturing, and rendering applications.

Keywords In and Out of Context (Synthesis Lectures on Information Concepts, Retrieval, and Services)

by Betsy Van Martens

This book explores the rich history of the keyword from its earliest manifestations (long before it appeared anywhere in Google Trends or library cataloging textbooks) in order to illustrate its implicit and explicit mediation of human cognition and communication processes. The author covers the concept of the keyword from its deictic origins in primate and proto-speech communities, through its development within oral traditions, to its initial appearances in numerous graphical forms and its workings over time within a variety of indexing traditions and technologies. The book follows the history all the way to its role in search engine optimization and social media strategies and its potential as an element in the slowly emerging semantic web, as well as in multiple voice search applications. The author synthesizes different perspectives on the significance of this often-invisible intermediary, both in and out of the library and information science context, helping readers to understand how it has come to be so embedded in our daily life.This book: Provides a thorough history of the keyword, from primate and proto-speech communities to current timesExplains how the concept of the keyword relates to human cognition and communication processesHighlights the applications of the keyword, both in and out of the library and information science context

Khnum-Ptah To Computer: The African Initialization of Computer Science

by African Creation Energy

Khnum-Ptah to Computer presents a comparative analysis between a variety of concepts, customs, cosmologies, and practices found in African Cultures to topics related to the field of Computer Science. The African origin of Binary Code, Logic, Computers, Programming, Robotics, Cyborgs, Androids, Virtual Reality, Artificial Intelligence, and Transhumanism are examined using Sound Right Reason to show a relationship between two dichotomies that have more in common than what meets the eye.

KI 2016: Advances in Artificial Intelligence

by Gerhard Friedrich Malte Helmert Franz Wotawa

This book constitutes the refereed proceedings of the 39th Annual German Conference on Artificial Intelligence, KI 2016, in conjunction with the Osterreichische Gesellschaft fur Artificial Intelligence, OGAI, held in Klagenfurt, Austria, in September 2016. The 8 revised full technical papers presented together with 12 technical communications, and 16 extended abstracts were carefully reviewed and selected from 44 submissions. The conference provides the opportunity to present a wider range of results and ideas that are of interest to the KI audience, including reports about recent own publications, position papers, and previews of ongoing work. "

KI 2018: 41st German Conference on AI, Berlin, Germany, September 24–28, 2018, Proceedings (Lecture Notes in Computer Science #11117)

by Frank Trollmann Anni-Yasmin Turhan

This book constitutes the refereed proceedings of the 41st German Conference on Artificial Intelligence, KI 2018, held in Berlin, Germany, in September 2018. The 20 full and 14 short papers presented in this volume were carefully reviewed and selected from 65 submissions. The book also contains one keynote talk in full paper length. The papers were organized in topical sections named: reasoning; multi-agent systems; robotics; learning; planning; neural networks; search; belief revision; context aware systems; and cognitive approach.

KI 2019: 42nd German Conference on AI, Kassel, Germany, September 23–26, 2019, Proceedings (Lecture Notes in Computer Science #11793)

by Christoph Benzmüller Heiner Stuckenschmidt

This book constitutes the refereed proceedings of the 42nd German Conference on Artificial Intelligence, KI 2019, held in Kassel, Germany, in September 2019. The 16 full and 10 short papers presented together with 3 extended abstracts in this volume were carefully reviewed and selected from 82 submissions. KI 2019 has a special focus theme on "AI methods for Argumentation" and especially invited contributions that use methods from all areas of AI to understand, formalize or generate argument structures in natural language.

KI 2020: 43rd German Conference on AI, Bamberg, Germany, September 21–25, 2020, Proceedings (Lecture Notes in Computer Science #12325)

by Ute Schmid Franziska Klügl Diedrich Wolter

This book constitutes the refereed proceedings of the 43rd German Conference on Artificial Intelligence, KI 2020, held in Bamberg, Germany, in September 2020.The 16 full and 12 short papers presented together with 6 extended abstracts in this volume were carefully reviewed and selected from 62 submissions.As well-established annual conference series KI is dedicated to research on theory and applications across all methods and topic areas of AI research. KI 2020 had a special focus on human-centered AI with highlights on AI and education and explainable machine learning. Due to the Corona pandemic KI 2020 was held as a virtual event.

Refine Search

Showing 29,801 through 29,825 of 54,842 results