- เมื่อได้โมเดลออกมาต้องลอง interpret โมเดล เช่น อ่าน decision tree ให้ได้
- เมื่อได้ผลกาพยากรณ์ออกมาเป็นค่าแล้วต้องอธิบายสาเหตุว่าทำไมได้ค่าเท่านั้น เช่น พยากรณ์ว่าตู้ ATM นี้มี demand มากต้องอธิบายได้ว่าเพราะอะไร เพราะคนบริเวณนั้นยังไม่ใช้ cashless app. เพราะ ส่วนใหญ่เป็นผู้สูงอายุ เป็นต้น
วันพฤหัสบดีที่ 8 พฤศจิกายน พ.ศ. 2561
การอภิปรายผลของการพยากรณ์ด้วย machine learning
วันพุธที่ 7 พฤศจิกายน พ.ศ. 2561
Data types in data mining : discrete, nominal, continuous, binary, ordinal
Src: https://stats.stackexchange.com/questions/159902/is-nominal-ordinal-binary-for-quantitative-data-qualitative-data-or-both
Nominal เรียกอีกอย่างหนึ่งว่า categorical
Discretization = quantization = the process of constraining an input from a continuous or otherwise large set of values (such as the real numbers) to a discrete set (such as the integers). เช่น แรงดัน 2.5 ถึง 5V. ให้ถือเป็น 1; Opposite is "nominal to numeric" process.
A cardinal number tells "how many." Cardinal numbers are also known as "
วันจันทร์ที่ 5 พฤศจิกายน พ.ศ. 2561
HTTP Strict Transport Security (HSTS)
HTTP Strict Transport Security (HSTS) allows web servers to declare that web browsers (or other complying user agents) should interact with it using only secure HTTPS connections,[1] and never via the insecure HTTP protocol.
When a web application issues HSTS Policy to user agents, user agents behave as follows:
1. Automatically turn any insecure links referencing the web application into secure links. (For instance, http://example.com/some/page/ will be modified to https://example.com/some/page/before accessing the server.)
2. If the security of the connection cannot be ensured (e.g. the server's TLS certificate is not trusted), the user agent must terminate the connection (and should not allow the user to access the application.
The HSTS Policy helps protect web application users against some passive (eavesdropping) and active network attacks. A man-in-the-middle attacker has a greatly reduced ability to intercept requests and responses between a user and a web application server.
HSTS can fix is SSL-stripping man-in-the-middle attacks, working by transparently converting a secure HTTPS connection into a plain HTTP connection. The user can see that the connection is insecure, but crucially there is no way of knowing whether the connection should be secure. Many websites do not use TLS/SSL, therefore there is no way of knowing (without prior knowledge) whether the use of plain HTTP is due to an attack, or simply because the website hasn't implemented TLS/SSL.
--wiki
When a web application issues HSTS Policy to user agents, user agents behave as follows:
1. Automatically turn any insecure links referencing the web application into secure links. (For instance, http://example.com/some/page/ will be modified to https://example.com/some/page/before accessing the server.)
2. If the security of the connection cannot be ensured (e.g. the server's TLS certificate is not trusted), the user agent must terminate the connection (and should not allow the user to access the application.
The HSTS Policy helps protect web application users against some passive (eavesdropping) and active network attacks. A man-in-the-middle attacker has a greatly reduced ability to intercept requests and responses between a user and a web application server.
HSTS can fix is SSL-stripping man-in-the-middle attacks, working by transparently converting a secure HTTPS connection into a plain HTTP connection. The user can see that the connection is insecure, but crucially there is no way of knowing whether the connection should be secure. Many websites do not use TLS/SSL, therefore there is no way of knowing (without prior knowledge) whether the use of plain HTTP is due to an attack, or simply because the website hasn't implemented TLS/SSL.
--wiki
วันอาทิตย์ที่ 14 ตุลาคม พ.ศ. 2561
วันพฤหัสบดีที่ 11 ตุลาคม พ.ศ. 2561
วันศุกร์ที่ 5 ตุลาคม พ.ศ. 2561
วันพุธที่ 26 กันยายน พ.ศ. 2561
vision mission strategy
### Vision
* **The aspirational future state.**
* A clear and inspiring picture of what the organization wants to achieve in the long term.
* Sets the overall direction and purpose.
* Example: "To be the world's leading provider of sustainable energy solutions."
### Mission
* **The company's purpose and reason for existence.**
* Defines the organization's core values, customers, and products or services.
* Bridges the gap between the vision and the strategies.
* Example: "To develop and deliver clean, affordable energy solutions that improve lives and protect the planet."
### Strategies
* **The roadmap to achieve the vision.**
* Specific plans and actions to realize the mission and vision.
* Involve resource allocation, competitive advantage, and market positioning.
* Example: "Expand into new renewable energy markets, invest in research and development for advanced technologies, and build strategic partnerships."
### The Interplay
* **Vision inspires mission.** The vision provides the overarching goal, motivating the definition of the mission.
* **Mission guides strategies.** The mission clarifies the organization's purpose, informing the development of effective strategies.
* **Strategies align with vision and mission.** Strategies should be directly linked to achieving the mission and ultimately realizing the vision.
**In essence:**
* The **vision** is the destination.
* The **mission** is the journey.
* **Strategies** are the steps along the way.
วันพุธที่ 19 กันยายน พ.ศ. 2561
วันจันทร์ที่ 17 กันยายน พ.ศ. 2561
ปรัชญา (philosophy)
A system of thought based on or involving such study.
An underlying theory or set of ideas relating to a particular field of activity or to life as a whole.
An underlying theory or set of ideas relating to a particular field of activity or to life as a whole.
วันอังคารที่ 11 กันยายน พ.ศ. 2561
Project consultant
https://m.pantip.com/topic/32250148?
ตามนี้ แต่ถ้าไม่ใช่พนักงานประจำ แค่รับทำเป็น project ก็เรียกว่า project consultant
ตามนี้ แต่ถ้าไม่ใช่พนักงานประจำ แค่รับทำเป็น project ก็เรียกว่า project consultant
วันเสาร์ที่ 8 กันยายน พ.ศ. 2561
Cross Browser Friendly Frameworks and tester
https://medium.com/@sarahelson81/how-to-make-a-cross-browser-compatible-website-40796eaeda05
https://www.lambdatest.com/index-new-landing.html?utm_source=Medium&utm_medium=Blog&utm_campaign=Blogpost&utm_term=indexnewlanding
https://www.lambdatest.com/index-new-landing.html?utm_source=Medium&utm_medium=Blog&utm_campaign=Blogpost&utm_term=indexnewlanding
Breakthrough vs. groundbreaking
As adjectives the difference between groundbreaking and breakthrough
is that groundbreaking is innovative; new, different; doing something that has never been done before while breakthrough is characterized by major progress or overcoming some obstacle.วันศุกร์ที่ 24 สิงหาคม พ.ศ. 2561
วันพุธที่ 22 สิงหาคม พ.ศ. 2561
DVR
Local storage server of cctv.
Being replaced by cloud storage.
New cctv uses PoE and cloud storage.
Being replaced by cloud storage.
New cctv uses PoE and cloud storage.
วันศุกร์ที่ 10 สิงหาคม พ.ศ. 2561
Classes of ANN
Feedforward neural network VS. Recurrent neural network:
Networks such as the previous one are commonly called feedforward, because their graph is a directed acyclic graph. Networks with cycles are commonly called recurrent.
Cf. wiki
Networks such as the previous one are commonly called feedforward, because their graph is a directed acyclic graph. Networks with cycles are commonly called recurrent.
Cf. wiki
วันอังคารที่ 7 สิงหาคม พ.ศ. 2561
Simulation VS. Emulation
- Simulation focuses on modeling for analysis and study but Emulation aims for usage as a substitute.
- An emulator can replace the original for 'real' use. A simulator is a model for analysis.A remote desktop emulates a PC. If a flight-simulator could transport you from A to B then it would be a flight-emulator.
- Simulation:
Definition: A simulation is an approximate imitation of a system or process.Purpose: It aims to model the behavior or characteristics of a system without necessarily reproducing its exact internal workings.Level of abstraction: Simulations often operate at a higher level of abstraction, focusing on overall behavior rather than exact replication.Performance: Generally faster and less resource-intensive than emulation.Accuracy: May sacrifice some accuracy for speed and simplicity.Example: A flight simulator that mimics the experience of flying an aircraft without replicating every detail of the actual aircraft's systems.
- Emulation:
Definition: An emulation is a more exact replication of a system, typically at a lower level.
Purpose: It aims to recreate the functionality of a specific system as accurately as possible.Level of detail: Emulators typically operate at a lower level, often replicating hardware or software components in detail.Performance: Generally slower and more resource-intensive than simulation due to the higher level of detail.Accuracy: Strives for high accuracy, often aiming to be indistinguishable from the original system.Example: A software emulator that allows you to run games from an old gaming console on a modern computer by replicating the original console's hardware.
- In summary, simulation focuses on modeling overall behavior, while emulation aims for a more exact replication of a system.
สมัครสมาชิก:
บทความ (Atom)