52 skills found · Page 2 of 2
jonsterling / TT ReflectionAn experimental type theory with scoped equality reflection, and non-arbitrary proof search. This is basically a pared down version of Andromeda/Brazil, but with untyped reduction and a more Nuprl-like feel. Computational content of proofs is got via a realizability-based extraction. (Note: substitution is unsafe here, not because of a problem with the theory, but because I didn't understand how Bound works sadly.)
weasteam / Coursera Machine LearningAbout this course: Machine learning is the science of getting computers to act without being explicitly programmed. In the past decade, machine learning has given us self-driving cars, practical speech recognition, effective web search, and a vastly improved understanding of the human genome. Machine learning is so pervasive today that you probably use it dozens of times a day without knowing it. Many researchers also think it is the best way to make progress towards human-level AI. In this class, you will learn about the most effective machine learning techniques, and gain practice implementing them and getting them to work for yourself. More importantly, you'll learn about not only the theoretical underpinnings of learning, but also gain the practical know-how needed to quickly and powerfully apply these techniques to new problems. Finally, you'll learn about some of Silicon Valley's best practices in innovation as it pertains to machine learning and AI. This course provides a broad introduction to machine learning, datamining, and statistical pattern recognition. Topics include: (i) Supervised learning (parametric/non-parametric algorithms, support vector machines, kernels, neural networks). (ii) Unsupervised learning (clustering, dimensionality reduction, recommender systems, deep learning). (iii) Best practices in machine learning (bias/variance theory; innovation process in machine learning and AI). The course will also draw from numerous case studies and applications, so that you'll also learn how to apply learning algorithms to building smart robots (perception, control), text understanding (web search, anti-spam), computer vision, medical informatics, audio, database mining, and other areas.
Naman-ntc / FaceRecognitionApproach at solving the problem of Face Recognition using dimensionality reduction algorithms like PCA and LDA
Smart-AI-Memory / Empathy FrameworkCombining a five-level AI framework with git-native memory overcomes session amnesia, enabling anticipation of problems weeks early. Production results: 2000x cost reduction, 10x+ productivity, shifting AI from reactive to predictive partnership through emotional intelligence, tactical empathy, and systems thinking.
cics-nd / CAAE DRDCN InverseDeep residual networks for dimensionality reduction and surrogate modeling in high-dimensional inverse problems
surynek / ReLOCAn experimental package for solving various versions of multi-agent path finding problem (MAPF). Most of solvers in the package are based on the reduction to propositional satisfiability (SAT). This is the original implementation of the MDD-SAT solver.
vivekarvind / Face Recognition PCA LDA KNN KernelSVM Dimensionality ReductionThis project focuses on face recognition problem with respect to 5-fold cross validation, dimensionality reduction based on benchmark algorithms like K – Nearest Neighbor, Principal Component Analysis, Linear Discriminant Analysis and Kernel Support Vector Machine
zimolzak / Sight Reduction ProblemsGenerate fake sextant readings, dead reckoning positions, etc. to practice sun sight reductions for celestial navigation.
pratapkygo / NoiseCancellationCarnaticMusicVarious melodic noise filtering techniques viz. Adaptive Noise Cancellation, Spectral Methods and Deep Learning algorithms have been employed to filter music signals corrupted with additive Gaussian white noise. The noise reduction problem has been formulated as a filtering problem which is efficiently solved by using the LMS, NLMS and RLS methods in adaptive filtering and as a spectral problem solved using spectral subtraction and spectral gating techniques.
zuxinrui / SpaceMAP[ICML 2022] SpaceMAP is a dimensionality reduction method utilizing the local and global intrinsic dimensions of the data to better alleviate the 'crowding problem' analytically.
AlexNewcombe / Australian National Electricity Market With And Without Flexible Ramping ProductsAustralia's goals of increased penetration of renewable energy such as wind energy will inevitably lead to increased variability and uncertainty of the ramps in net load (load minus non-dispatchable renewable generation). This increased variability and uncertainty requires conventional generators to be more flexible, but currently this flexibility is not fully integrated in market processes. The provision of additional flexibility may cause a reduction in economic efficiency, consumer surplus and/or producer surplus as conventional generators may need to modify their output from the optimal level in order to provide flexibility to account for future variability and uncertainty. As a solution to this problem, the Midwest and Californian Independent System Operators have proposed flexible ramping products as a mechanism to manage the uncertainty and variability in net load ramps in an economically preferable manner. The mechanism essentially aims to schedule conventional generators to provide enough ramping capability, or "flexibility", to satisfy a flexible ramping capability requirement. This requirement is designed to ensure a certain range of ramps in the next interval could be met, whether the ramps actually occur or not. This study aims to explore the implementation of flexible ramping products in the specific context of the Australian National Electricity Market (NEM), to determine whether or not they can be an effective mechanism for integrating variable renewable energy in Australia in the coming decades. This model is a simplified model of the Australian NEM, in which a unit commitment and economic dispatch is designed with flexible ramping products and a flexible ramping requirement. The simplification of the NEM includes a grouping of the five states into two regions, and an aggregation of generators by offered ramping speed and actual marginal costs. Actual load and wind generation data from the 2014/15 financial year is implemented in the model to attempt to simulate the market in a realistic manner.
rajanrao / HYBRID BAND SELECTION ALGORITHMBand selection is an important dimensionality reduction (DR) methodology for hyperspectral images . Many ranking-based clustering band selection methods have been developed. However, these methods do not consider the combination of bands in different clusters but only select the desired number of clustering centers based on band ranking to construct the reduced band subset, which may lead to obtaining a set of bands with low redundancy but little information or a set of bands with a large amount of information but high redundancy, thus falling into the local optimal solution set. To solve this problem, an unsupervised hybrid hyperspectral band selection method is proposed in this paper. In this article, an inherent connection between bad band removal and target detection has been found.As we know, the result of target detection is the linear combination of all bands, and the weight coefficient of each band, i.e., the component of the filter vector, can be considered as the contribution of each band for the detection of targets of interest. Based on this fact, we develop an automatic bad band pre-removal method by using the matched filter.Then comes the progressive band selection processing of hyperspectral image classification, which performs classification in multiple stages in the sense that each stage performs Hyperspectral image classification progressively according to a specifically selected band subset.For each level we are getting best bands through band optimization technique.At last classifiers are used upon Indian pines dataset which gives us the best band selection.
thehuy2000 / CS344 OSI Assignment 3 Small ShellIn this assignment you will write smallsh your own shell in C. smallsh will implement a subset of features of well-known shells, such as bash. Your program will Provide a prompt for running commands Handle blank lines and comments, which are lines beginning with the # character Provide expansion for the variable $$ Execute 3 commands exit, cd, and status via code built into the shell Execute other commands by creating new processes using a function from the exec family of functions Support input and output redirection Support running commands in foreground and background processes Implement custom handlers for 2 signals, SIGINT and SIGTSTP Learning Outcomes After successful completion of this assignment, you should be able to do the following Describe the Unix process API (Module 4, MLO 2) Write programs using the Unix process API (Module 4, MLO 3) Explain the concept of signals and their uses (Module 5, MLO 2) Write programs using the Unix API for signal handling (Module 5, MLO 3) Explain I/O redirection and write programs that can employ I/O redirection (Module 5, MLO 4) Program Functionality 1. The Command Prompt Use the colon : symbol as a prompt for each command line. The general syntax of a command line is: command [arg1 arg2 ...] [< input_file] [> output_file] [&] …where items in square brackets are optional. You can assume that a command is made up of words separated by spaces. The special symbols <, > and & are recognized, but they must be surrounded by spaces like other words. If the command is to be executed in the background, the last word must be &. If the & character appears anywhere else, just treat it as normal text. If standard input or output is to be redirected, the > or < words followed by a filename word must appear after all the arguments. Input redirection can appear before or after output redirection. Your shell does not need to support any quoting; so arguments with spaces inside them are not possible. We are also not implementing the pipe "|" operator. Your shell must support command lines with a maximum length of 2048 characters, and a maximum of 512 arguments. You do not need to do any error checking on the syntax of the command line. 2. Comments & Blank Lines Your shell should allow blank lines and comments. Any line that begins with the # character is a comment line and should be ignored. Mid-line comments, such as the C-style //, will not be supported. A blank line (one without any commands) should also do nothing. Your shell should just re-prompt for another command when it receives either a blank line or a comment line. 3. Expansion of Variable $$ Your program must expand any instance of "$$" in a command into the process ID of the smallsh itself. Your shell does not otherwise perform variable expansion. 4. Built-in Commands Your shell will support three built-in commands: exit, cd, and status. These three built-in commands are the only ones that your shell will handle itself - all others are simply passed on to a member of the exec() family of functions. You do not have to support input/output redirection for these built in commands These commands do not have to set any exit status. If the user tries to run one of these built-in commands in the background with the & option, ignore that option and run the command in the foreground anyway (i.e. don't display an error, just run the command in the foreground). exit The exit command exits your shell. It takes no arguments. When this command is run, your shell must kill any other processes or jobs that your shell has started before it terminates itself. cd The cd command changes the working directory of smallsh. By itself - with no arguments - it changes to the directory specified in the HOME environment variable This is typically not the location where smallsh was executed from, unless your shell executable is located in the HOME directory, in which case these are the same. This command can also take one argument: the path of a directory to change to. Your cd command should support both absolute and relative paths. status The status command prints out either the exit status or the terminating signal of the last foreground process ran by your shell. If this command is run before any foreground command is run, then it should simply return the exit status 0. The three built-in shell commands do not count as foreground processes for the purposes of this built-in command - i.e., status should ignore built-in commands. 5. Executing Other Commands Your shell will execute any commands other than the 3 built-in command by using fork(), exec() and waitpid() Whenever a non-built in command is received, the parent (i.e., smallsh) will fork off a child. The child will use a function from the exec() family of functions to run the command. Your shell should use the PATH variable to look for non-built in commands, and it should allow shell scripts to be executed If a command fails because the shell could not find the command to run, then the shell will print an error message and set the exit status to 1 A child process must terminate after running a command (whether the command is successful or it fails). 6. Input & Output Redirection You must do any input and/or output redirection using dup2(). The redirection must be done before using exec() to run the command. An input file redirected via stdin should be opened for reading only; if your shell cannot open the file for reading, it should print an error message and set the exit status to 1 (but don't exit the shell). Similarly, an output file redirected via stdout should be opened for writing only; it should be truncated if it already exists or created if it does not exist. If your shell cannot open the output file it should print an error message and set the exit status to 1 (but don't exit the shell). Both stdin and stdout for a command can be redirected at the same time (see example below). 7. Executing Commands in Foreground & Background Foreground Commands Any command without an & at the end must be run as a foreground command and the shell must wait for the completion of the command before prompting for the next command. For such commands, the parent shell does NOT return command line access and control to the user until the child terminates. Background Commands Any non built-in command with an & at the end must be run as a background command and the shell must not wait for such a command to complete. For such commands, the parent must return command line access and control to the user immediately after forking off the child. The shell will print the process id of a background process when it begins. When a background process terminates, a message showing the process id and exit status will be printed. This message must be printed just before the prompt for a new command is displayed. If the user doesn't redirect the standard input for a background command, then standard input should be redirected to /dev/null If the user doesn't redirect the standard output for a background command, then standard output should be redirected to /dev/null 8. Signals SIGINT & SIGTSTP SIGINT A CTRL-C command from the keyboard sends a SIGINT signal to the parent process and all children at the same time (this is a built-in part of Linux). Your shell, i.e., the parent process, must ignore SIGINT Any children running as background processes must ignore SIGINT A child running as a foreground process must terminate itself when it receives SIGINT The parent must not attempt to terminate the foreground child process; instead the foreground child (if any) must terminate itself on receipt of this signal. If a child foreground process is killed by a signal, the parent must immediately print out the number of the signal that killed it's foreground child process (see the example) before prompting the user for the next command. SIGTSTP A CTRL-Z command from the keyboard sends a SIGTSTP signal to your parent shell process and all children at the same time (this is a built-in part of Linux). A child, if any, running as a foreground process must ignore SIGTSTP. Any children running as background process must ignore SIGTSTP. When the parent process running the shell receives SIGTSTP The shell must display an informative message (see below) immediately if it's sitting at the prompt, or immediately after any currently running foreground process has terminated The shell then enters a state where subsequent commands can no longer be run in the background. In this state, the & operator should simply be ignored, i.e., all such commands are run as if they were foreground processes. If the user sends SIGTSTP again, then your shell will Display another informative message (see below) immediately after any currently running foreground process terminates The shell then returns back to the normal condition where the & operator is once again honored for subsequent commands, allowing them to be executed in the background. See the example below for usage and the exact syntax which you must use for these two informative messages. Sample Program Execution Here is an example run using smallsh. Note that CTRL-C has no effect towards the bottom of the example, when it's used while sitting at the command prompt: $ smallsh : ls junk smallsh smallsh.c : ls > junk : status exit value 0 : cat junk junk smallsh smallsh.c : wc < junk > junk2 : wc < junk 3 3 23 : test -f badfile : status exit value 1 : wc < badfile cannot open badfile for input : status exit value 1 : badfile badfile: no such file or directory : sleep 5 ^Cterminated by signal 2 : status & terminated by signal 2 : sleep 15 & background pid is 4923 : ps PID TTY TIME CMD 4923 pts/0 00:00:00 sleep 4564 pts/0 00:00:03 bash 4867 pts/0 00:01:32 smallsh 4927 pts/0 00:00:00 ps : : # that was a blank command line, this is a comment line : background pid 4923 is done: exit value 0 : # the background sleep finally finished : sleep 30 & background pid is 4941 : kill -15 4941 background pid 4941 is done: terminated by signal 15 : pwd /nfs/stak/users/chaudhrn/CS344/prog3 : cd : pwd /nfs/stak/users/chaudhrn : cd CS344 : pwd /nfs/stak/users/chaudhrn/CS344 : echo 4867 4867 : echo $$ 4867 : ^C^Z Entering foreground-only mode (& is now ignored) : date Mon Jan 2 11:24:33 PST 2017 : sleep 5 & : date Mon Jan 2 11:24:38 PST 2017 : ^Z Exiting foreground-only mode : date Mon Jan 2 11:24:39 PST 2017 : sleep 5 & background pid is 4963 : date Mon Jan 2 11:24:39 PST 2017 : exit $ Hints & Resources 1. The Command Prompt Be sure you flush out the output buffers each time you print, as the text that you're outputting may not reach the screen until you do in this kind of interactive program. To do this, call fflush() immediately after each and every time you output text. Consider defining a struct in which you can store all the different elements included in a command. Then as you parse a command, you can set the value of members of a variable of this struct type. 2. Comments & Blank Lines This should be simple. 3. Expansion of Variable $$ Here are examples to illustrate the required behavior. Suppose the process ID of smallsh is 179. Then The string foo$$$$ in the command is converted to foo179179 The string foo$$$ in the command is converted to foo179$ 4. Built-in Commands It is recommended that you program the built-in commands first, before tackling the commands that require fork(), exec() and waitpid(). The built-in commands don't set the value of status. This means that however you are keeping track of the status, don't change it after the execution of a built-in command. A process can use chdir() (Links to an external site.) to change its directory. To test the implementation of the cd command in smallsh, don't use getenv("PWD") because it will not give you the correct result. Instead, you can use the function getcwd() (Links to an external site.). Here is why getenv("PWD") doesn't give you the correct result: PWD is an environment variable. As discussed in Module 4, Exploration: Environment "When a parent process forks a child process, the child process inherits the environment of its parent process." When you run smallsh from a bash shell, smallsh inherits the environment of this bash shell The value of PWD in the bash shell is set to the directory in which you are when you run the command to start smallsh smallsh inherits this value of PWD. When you change the directory in smallsh, it doesn't update the value of the environment variable PWD 5. Executing Other Commands Note that if exec() is told to execute something that it cannot do, like run a program that doesn't exist, it will fail, and return the reason why. In this case, your shell should indicate to the user that a command could not be executed (which you know because exec() returned an error), and set the value retrieved by the built-in status command to 1. Make sure that the child process that has had an exec() call fail terminates itself, or else it often loops back up to the top and tries to become a parent shell. This is easy to spot: if the output of the grading script seems to be repeating itself, then you've likely got a child process that didn't terminate after a failed exec(). You can choose any function in the exec() family. However, we suggest that using either execlp() or execvp() will be simplest because of the following reasons smallsh doesn't need to pass a new environment to the program. So the additional functionality provided by the exec() functions with names ending in e is not required. One example of a command that smallsh needs to run is ls (the graders will try this command at the start of the testing). Running this command will be a lot easier using the exec() functions that search the PATH environment variable. 6. Input & Output Redirection We recommend that the needed input/output redirection should be done in the child process. Note that after using dup2() to set up the redirection, the redirection symbol and redirection destination/source are NOT passed into the exec command For example, if the command given is ls > junk, then you handle the redirection to "junk" with dup2() and then simply pass ls into exec(). 7. Executing Commands in Foreground & Background Foreground Commands For a foreground command, it is recommend to have the parent simply call waitpid() on the child, while it waits. Background Commands The shell should respect the input and output redirection operators for a command regardless of whether the command is to be run in the foreground or the background. This means that a background command should use /dev/null for input only when input redirection is not specified in the command. Similarly a background command should use /dev/null for output only when output redirection is not specified in the command. Your parent shell will need to periodically check for the background child processes to complete, so that they can be cleaned up, as the shell continues to run and process commands. Consider storing the PIDs of non-completed background processes in an array. Then every time BEFORE returning access to the command line to the user, you can check the status of these processes using waitpid(...NOHANG...). Alternatively, you may use a signal handler to immediately wait() for child processes that terminate, as opposed to periodically checking a list of started background processes The time to print out when these background processes have completed is just BEFORE command line access and control are returned to the user, every time that happens. 8. Signals SIGINT & SIGTSTP Reentrancy is important when we consider that signal handlers cause jumps in execution that cause problems with certain functions. Note that the printf() family of functions is NOT reentrant. In your signal handlers, when outputting text, you must use other output functions! What to turn in? You can only use C for coding this assignment and you must use the gcc compiler. You can use C99 or GNU99 standard or the default standard used by the gcc installation on os1. Your assignment will be graded on os1. Submit a single zip file with all your code, which can be in as many different files as you want. This zip file must be named youronid_program3.zip where youronid should be replaced by your own ONID. E.g., if chaudhrn was submitting the assignment, the file must be named chaudhrn_program3.zip. In the zip file, you must include a text file called README.txt that contains instructions on how to compile your code using gcc to create an executable file that must be named smallsh. Your zip file should not contain any extraneous files. In particular, make sure not to zip up the __MACOSX directories. When you resubmit a file in Canvas, Canvas can attach a suffix to the file, e.g., the file name may become chaudhrn_program3-1.zip. Don't worry about this name change as no points will be deducted because of this. Caution During the development of this program, take extra care to only do your work on os1, our class server, as your software will likely negatively impact whatever machine it runs on, especially before it is finished. If you cause trouble on one of the non-class, public servers, it could hurt your grade! If you are having trouble logging in to any of our EECS servers because of runaway processes, please use this page to kill off any programs running on your account that might be blocking your access: T.E.A.C.H. - The Engineering Accounts and Classes HomepageLinks to an external site. Grading Criteria This assignment is worth 20% of your grade and there are 180 points available for it. 170 points are available in the test script, while the final 10 points will be based on your style, readability, and commenting. Comment well, often, and verbosely: we want to see that you are telling us WHY you are doing things, in addition to telling us WHAT you are doing. Once the program is compiled, according to your specifications given in README.txt, your shell will be executed to run a few sample commands against (ls, status, exit, in that order). If the program does not successfully work on those commands, it will receive a zero. If it works, then the grading script will be run against it (as detailed below) for final grading. Points will be assigned according to the grading script running on our class server only. Grading Method Here is the grading script p3testscript. It is a bash script that starts the smallsh program and runs commands on smallsh's command line. Most of the commands run by the grading script are very similar to the commands shown in the section Sample Program Execution. You can open the script in a text editor. The comments in the script will show you the points for individual items. Use the script to prepare for your grade, as this is how it's being earned. To run the script, place it in the same directory as your compiled shell, chmod it (chmod +x ./p3testscript) and run this command from a bash prompt: $ ./p3testscript 2>&1 or $ ./p3testscript 2>&1 | more or $ ./p3testscript > mytestresults 2>&1 Do not worry if the spacing, indentation, or look of the output of the script is different than when you run it interactively: that won’t affect your grade. The script may add extra colons at the beginning of lines or do other weird things, like put output about terminating processes further down the script than you intended. If your program does not work with the grading script, and you instead request that we grade your script by hand, we will apply a 15% reduction to your final score. So from the very beginning, make sure that you work with the grading script on our class server!
yuansuny / TspThis repository contains the C++ source codes of the machine learning for problem reduction model for solving TSP and SOP problems.
FreditorK / Optimal Control Of Agent Based DynamicsEver since the concepts of dynamic programming wereintroduced, one of the most difficult challenges has been to adequatelyaddress high-dimensional control problems. With growing dimension-ality, the utilisation of Deep Neural Networks promises to circumventthe issue of an otherwise exponentially increasing complexity. Thepaper specifically investigates the sampling issues the Deep GalerkinMethod is subjected to. It proposes a drift relaxation-based samplingapproach to alleviate the symptoms of high-variance policy approxi-mations. This is validated on mean-field control problems; namely, thevariations of the opinion dynamics presented by the Sznajd and theHegselmann-Krause model. The resulting policies induce a significantcost reduction over manually optimised control functions and show improvements on the Linear-Quadratic Regulator problem over the Deep FBSDE approach.
yuansuny / MwcThis repository contains the C++ source codes for the paper: Sun Y, Li X, Erst A. Using Statistical Measures and Machine Learning for Graph Reduction to Solve Maximum Weight Clique Problems. IEEE Transactions on Pattern Analysis and Machine Intelligence, accepted in Nov 2019.
Exampl33 / Sovereign Wealth USEconomically Inclusive Models encourage the participation of local community labor through a holistic approach that includes skill development and the foundations of resource management which develops quality of life through wealth creation and the expansion of markets. Raw material is returned to the people in the form of new products. Throughout the course of human history, it has frequently become necessary for nations to dissolve and or restructure economic systems and adjust strategies which have proven to be ineffective in stimulating development, growth and economic prosperity as economies and times change technologically. When the policies are and continually becoming increasingly oppressive in nature and exist against the natural law and the psychology of human inspiration, and are only enforced through deception and the use of force by indoctrinated constituencies, they begin to separate people from their natural desires to achieve, thrive, and prosper. Often economic development and social programs are implemented under the guise of prosperity only to be concealing the true intent of enslavement for the populace and a theft of resources. This is in defiance of the power of truth which is based on the laws of nature and of nature's right to full expression of humanity, which God entitles to all men and women. This deception is fraudulent and criminal in nature and is the equivalent of murder, for it robs humanity of its right to self-actualization, cognizant development and the realization of self-worth. The main principle behind the current economic agenda being implanted throughout the world in an effort to bring about a new economic world order, is a belief that the effective use of force and the stringent control of natural resources is the key to creating and maintaining economic power and further serves to manipulate markets by creating fictional gaps in supply and demand. This 'order out of chaos' model has been a standard for centuries. The problem is that it is based on the principles of suppression and oppression, which are implemented and maintained using force and highly supported with deception through disinformation, propaganda and oppressive operations aimed at reducing the natural expression of humanity, freedom, and independence. This is a sign of fear and incompetence stemming from the conditioning of the past age of scarcity by those in power because it is inconsistent with natural law, which supports full expression as a means of achievement. Natural power relies on truth and does not require deception to be maintained. It stands on its own accord. Power encourages a population to achieve self-actualization and economic prosperity which is reflective of a strong middle class, economic and social growth as well as development. It is a natural spiritual expression in alignment with truth and does not require manipulation to be maintained. On the other hand, there is no positive natural expression for force as it is inherently weaker and short term, its goal is to hinder the natural power of the people from being fully expressed. This is a lower spiritual form of thought and achievement that is inherently inferior to just power and is only sustained through deceptive practices. It essentially further weakens its followers & leaders and subsequently results in wide disparities of wealth and the elimination of the middle class that is necessary to maintain stability and economic growth, especially in a consumer based economy. The belief that people need to be largely suppressed is highly limiting to a society and ensures a lower expression of associated economic achievement inhibiting humanities growth and development on all levels. More specifically it inhibits the development of free creative minds, their contributions of intellectual property and innovation. The irresponsible use of natural resources is equally discouraging. We are blessed with an abundance of agricultural land, potential energy sources from wind, solar, geothermal, wave & or tidal power and vast basic materials such as cement, brick, wood, and rock that would easily address any structural and infrastructural needs. What is lacking is proper accounting and utilization of the vast natural resources readily available and the reliance on utilizing goods and services that could easily be provided in the local market rather than relying on imports. Years of war and internal conflict have created a gap in productive and practical knowledge in many regions of the world. This knowledge gap can be reconciled through the incorporation of trade schools that emphasize the reduction of imports through the utilization of what is natural to the region, while cognizant of unintended environmental consequences (such as those of using good farming topsoil for mud bricks). Building and architecturally designing structures as well as much needed infrastructure with the concept of maximum utilization of the natural resources native to the region offering a common-sense solution to the vast imbalance of trade challenges in agriculture, materials, labor, management, and expertise. This would also allow for the use of mineral profits to be used to barter for higher goods that would enhance the quality of life rather than being allocated to provide for mere survival and resulting in continued dependence. The global economy although growing extensively in a number of sectors and regions is still oppressive in nature with significant barriers to entry and managed by an overburdened government and economic system that primarily operates to diminish the prospects of the peoples growth and focuses gains and bailouts on only a few elite. The means of gaining economic control through manipulative programing of the masses is essentially killing humanities best prospects for a shared prosperous future. It is equally discouraging to find education not matching the needs of the emerging technological environment. In regions, largely in a development mode, it is necessary to focus the majority of educational emphasis on developing trade schools that can instantly impact job growth and prosperity. Affecting positively these educational concerns in developing nations now, will yield significantly improved outcomes locally, regionally and beyond, further improving psychological perceptions globally. The idea that people need to be controlled and oppressed through negative conditioning that simply thwarts achievement and ambitions is a system doomed to fail. Nothing can be achieved in the current economic system described except for chaos and the limited order maintained through fear, deception, propaganda and the manipulation of the herd or collective mentality / perception. As a result of these policies that have been implemented worldwide, we now have a world that is largely a police state and unaware of truth or its own power due to a constant flow of manipulative disinformation and propaganda. This is a grand reflection of the use of force, deception, and oppression and we see its expression in the deterioration of our economic systems and basic freedoms inherent from God. Highlights The following demonstrates the financial projections of our five primary business models. Estimates do not take into account possibilities of above average returns with many investment options that we currently have at our disposal. 1. Logistics to include shipping, security, courier service and inclusive A to B deployment of human and other resources or assets. 2. Financial to include international developmental finance, banking & credit unions, insurance and brokerage of securities. 3. Commodities to include strategic minerals (rare earths), lumber, etc... 4. Consulting to include strategic government, intelligence, business and educational. 5. Investments to include unique platforms, vehicles, traditional models, land, infrastructure, research and development. ECONOMIC STIMULUS PLAN The Economic Stimulus plan - build... Further expansion of and clarity continues to be encouraged.
qiyuanpang / DistributedLEVP.jlDistributed solvers to leading eigenvalue problem (LEVP) for dimensionality reduction in spectral clustering.
AdityaRaj028 / Design Of Algorithm For Detection Of Myocardial Infarction Using ECG SignalsHeart disorders, such as heart attacks, strokes, and other cardiovascular problems, have increased alarmingly in India. Myocardial infarction affects 30,00,000 Indians each year. A total of 70 per cent of people die. Millions of lives can be saved by early, precise diagnosis, and the survival rate can be raised even higher. An electrocardiogram measures the electrical impulses produced by the heart (ECG). The ECG signal contains many disturbances and baseline wandering, and it must be processed in order to retrieve the information of each wave, such as P, Q, R, S, T, and, on rare occasions, U. Signal processing is very important for feature extraction and noise reduction. The primary goal of this research is to find diversions and deviations in any region of the wave, particularly the ST segment with elevation or lengthening, which accurately indicates myocardial infarction. The information that has been processed can be used in clinical trials. This paper focuses on data cleaning and pre-processing chores on the PTB-XL data-set, as well as feature extraction for training Deep Learning models for detecting myocardial infarction location and severity. For reading, extracting, and denoising the time series data, a variety of Python Tool-kits have been used.
AI-MEGHA / IBM HR Analytics Employee Attrition PerformanceAttrition is a critical issue and pretty high in the industry these days. It’s the major problem which highlights in all the organizations. Though the term ‘ATTRITION’ is common, many would be at a loss to define what actually Attrition is, “Attrition is said to be the gradual reduction in the number of employees through retirement, resignation or death. It can also be said as Employee Turnover or Employee Defection” Whenever a well-trained and well-adapted employee leaves the organization, it creates a vacuum. So, the organization loses key skills, knowledge and business relationships. Modern managers and personnel administrators are greatly interested in reducing Attrition in the organization, in such a way that it will contribute to the maximum effectiveness, growth, and progress of the organization. Retaining employees is a critical and ongoing effort. One of the biggest challenges in having managers in the place that understands it is their responsibility to create and sustain an environment that fosters retention. Staff requires reinforcement, direction and recognition to grow and remain satisfied in their positions. Managers must recognize this and understand that establishing such fundamentals demonstrates their objectives to support nature and motivate their employees. The main objectives of this study are to know the reasons, why attrition occurs, to identify the factors which make employees dissatisfy, to know the satisfactory level of employees towards their job and working conditions and to find the areas where companiesare lagging behind.