Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that face enterprise application developers. The author, noted object-oriented designer Martin Fowler, noticed that despite changes in technology--from Smalltalk to CORBA to Java to .NET--the same b ...
Advanced_modelling_in_finance_using_Excel_and_VBA(pdf) The book adopts a step-by-step approach to understanding the more sophisticated aspects of Excel macros and VBA programming, showing how these programming techniques can be used to model and manipulate financial data, as applied to equities, b ...
AdaBoost is an efficient tool in machine learning. It can combine a series of weak learners into a strong learner. Besides pattern classification, it also can be applied into feature selection. This document explains the use of AdaBoost.
Swarm intelligence algorithms are based on natural
behaviors. Particle swarm optimization (PSO) is a
stochastic search and optimization tool. Changes in the
PSO parameters, namely the inertia weight and the
cognitive and social acceleration constants, affect the
performance of the search process. Th ...
On-Line MCMC Bayesian Model Selection
This demo demonstrates how to use the sequential Monte Carlo algorithm with reversible jump MCMC steps to perform model selection in neural networks. We treat both the model dimension (number of neurons) and model parameters as unknowns. The derivation and deta ...
This demo nstrates how to use the sequential Monte Carlo algorithm with reversible jump MCMC steps to perform model selection in neural networks. We treat both the model dimension (number of neurons) and model parameters as unknowns. The derivation and details are presented in: Christophe Andrieu, N ...
This example demonstrates the use of the ADC block and PWM blocks. The generated DSP code produces the pulse waveform whose duty cycle is changing as the voltage applied to ADC input changes. The waveform period is kept constant.
A semantic session analysis method partitioning Web usage logs is presented.Semantic W eb usage log preparation model enhances usage logs with semantic.The M arkov chain
mode1 based on ontology semantic measurement is used to identi.
ing which active session a request should belong to.The corn— ...