Category Archives: Компьютерная литература

AUTOENCODER NEURAL NETWORKS

AUTOENCODER NEURAL NETWORKS

Автор: Chun Chet Tan and Chikkannan Eswaran

Autoencoders are feedforward neural networks which can have more than one hidden layer. These networks attempt to reconstruct the input data at the output layer. Since the size of the hidden layer in the autoencoders is smaller than the size of the input data, the dimensionality of input data is reduced to a smaller-dimensional code space at the hidden layer. However, training a multilayer autoencoder is tedious. This is due to the fact that the weights at deep hidden layers are hardly optimized. The research work has focused on the characteristics, training and performance evaluation of autoencoders. The concepts of stacking and Restricted Boltzmann Machine have also been discussed in detail. Two datasets, namely ORL face dataset and MNIST handwritten digit dataset have been employed in these experiments. The performances of the autoencoders have also been compared with that of PCA. It has been shown that the autoencoders can also be used for image compression. The compression…

Beginning PowerPoint 7.0 for Windows 95 (Microsoft PowerPoint 7.0)

Beginning PowerPoint 7.0 for Windows 95 (Microsoft PowerPoint 7.0)

Автор: Inc. KT Solutions

Add to your professional skills by learning this dynamic presentation software Upon completion of this course, you’ll have a strong understanding of the basic features and functions of PowerPoint 7.0.

Искусственный интеллект и принятие решений, №2, 2015

Искусственный интеллект и принятие решений, №2, 2015

Автор:

Обсуждаются возможности организации интеллектуального анализа данных (ИАД), обеспечивающего экспертизу различных типов представления исходных данных (множеств признаков, графов, числовых векторов) однородными средствами их обработки. ДСМ-метод рассматривается как платформа для организации ИАД при анализе различных типов данных. Представлены некоторые оценки сложности вычислений, характерные для задач восстановления каузальных зависимостей из эмпирических данных. Показана наследуемость свойств трудно-разрешимости (NP-полноты и перечислительной полноты) ряда переборных задач при варьировании выразительных возможностей используемого языка представления исходных данных. Предложен детальный анализ оценок вычислительной сложности процедур ДСМ-анализа числовых данных, сформулированных в стиле метода сопутствующих изменений Д.С.Милля.

Silverlight 2

Silverlight 2

Автор: Лоран Буньон

Silverlight — новая революционная технология разработки пользовательских веб-интерфейсов, созданная корпорацией Майкрософт на основе Windows Presentation Foundation (WPF). В приложениях Silverlight используется язык разметки XAML при поддержке таких инструментов, как Expression Design и Expression Blend. Это дает возможность реализовывать поразительные эффекты (градиенты, композиции, анимации). Помимо богатого набора элементов управления, Silverlight 2 позволяет использовать не только язык JavaScript, но также С# и VB. Silverlight предоставляет вам всю мощь .NET на различных платформах (Internet Explorer и Firefox для Windows, Firefox и Safari для Macintosh и Firefox для Linux). Автор на многочисленных примерах помогает очень быстро овладеть основами этой современной технологии.

Изучаем ActionScript 3.0. От простого к сложному

Изучаем ActionScript 3.0. От простого к сложному

Автор: Рич Шуп, Зеван Россер

Это идеальное руководство по ActionScript и Flash для начинающих. Четко и ясно изложены принципы построения кода, обработки событий, отображения контента, применения классов, описаны способы переноса проектов из предыдущих версий ActionScript и многое другое. Авторы книги Рич Шуп и Зеван Россер, в течение многих лет занимающиеся разработкой на ActionScript и преподаванием этого языка, демонстрируют способы его практического применения для создания собственных проектов. Рассматриваются следующие темы: Использование языка ActionScript во Flash CS3 Professional и Flash Player Форматирование текста, работа со звуком и видео, рисование посредством написания кода и т. п. Разработка сценариев с использованием как процедурного, так и объектно-ориентированного подходов Загрузка во Flash-приложение ресурсов в форматах SWF и XML, а также графических и текстовых данных Обсуждение ошибок, типичных для программирования на ActionScript…

Teach Yourself VISUALLY PowerPoint 2016

Teach Yourself VISUALLY PowerPoint 2016

Автор: Barbara Boyd,Ray Anthony

Teach Yourself VISUALLY Are you a visual learner? Do you prefer instructions that show you how to do something and skip the long??“winded explanations? If so, then this book is for you. Open it up and you???ll find clear, step??“by??“step screen sh

Novel Technique for Robust Image Segmentation

Novel Technique for Robust Image Segmentation

Автор: Pankaj Bhambri and Amandeep Kaur

The goal of segmentation is to simplify and change the representation of an image into something that is more meaningful and easier to analyze. Image segmentation is typically used to locate objects and boundaries in images. More precisely, image segmentation is the process of assigning a label to every pixel in an image such that pixels with the same label share certain visual characteristics. The result of image segmentation is a set of segments that collectively covers the entire image, or a set of contours extracted from the image. Each of the pixels in a region are similar with respect to some characteristics or computed properly, such as color, intensity or texture. Adjacent regions are significantly different with respect to same characteristics. The technique usually adopted for improving the quality of the images by segmenting the images into various regions. Many segmentation algorithms have been developed over the years. The proposed algorithm has been implemented on a…

Transformation of Local Government using Customer Profiling UK

Transformation of Local Government using Customer Profiling UK

Автор: Proscovia M. Katumba

This exciting text keeps pace with cutting edge themes addressing issues that inform decisions of transformation in local government using customer profiling; e-government; role of customer profiling in local government; process re-engineering and change management; IT-driven approaches to customer profiling; and concerns of implementing customer profiling. Customer profiling helps provide service excellence through gaining a profound awareness of customer groups, their needs and provision of evidence for decision making, thereby increasing the efficiency of services and information delivery to citizens. This text presents findings from case studies on the benefits accrued from customer profiling. Customer profiling is a theme of the transformational government agenda intended to transform services to ‘e’ enabled services through e-government. Porter’s value chain model addresses the evidence gap by providing a framework to accelerate the implementation of customer profiling. While…

Creating Computer Simulation Systems: An Introduction to the High Level Architecture

Creating Computer Simulation Systems: An Introduction to the High Level Architecture

Автор: Frederick Kuhl, Richard Weatherly, Judith Dahmann

As simulations become increasingly important in nearly all aspects of life, we’re finding that combining existing systems is much more efficient than building newer, more complex replacements. Whether your interest is in business, the military, or entertainment or is even more general, Creating Computer Simulation Systems: An Introduction to the High Level Architecture will show you how to use the new standard for building and integrating modular simulation components and systems. The HLA, adopted by the U.S. Department of Defense, has been years in the making and recently has shot out ahead of its competitors to grab the attention of engineers and designers worldwide. The book/CD-ROM set contains an overview of the rationale and development of the HLA; a Windows-compatible implementation of the HLA Runtime Infrastructure (including test software); an extended, integrated tutorial that demonstrates its power and applicability to real-world problems; advanced topics and…

Fingerprints in Place of Passwords

Fingerprints in Place of Passwords

Автор: James Francisco

Health care is one of the most highly regulated industries in the United States. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the implementation of information systems security to protect the personal information of patients. Properly planned implementations ease the process of introducing new technologies like security systems into the workplace. Technology acceptance models can provide valuable information to managers as they prepare to introduce these new systems. This study applies the unified theory of acceptance and use of technology to investigate factors that influence nurses working in clinical setting to use a simple information technology security device such as a fingerprint scanner. Nurses working in the Southwestern United States were surveyed and their responses incorporated into the study. This study reinforces the results of previous work with respect to the importance of performance expectations to the development of intentions to…