最近的
![Methods to prevent overfitting and solve ill-posed problems in statistics: Ridge Regression and LASSO](https://writelatex.s3.amazonaws.com/published_ver/4536.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=4d9fdc63bebfa0c1fbdad625372dcfb782aeda584318ba5e2876deca0a8525c6)
Methods to prevent overfitting and solve ill-posed problems in statistics: Ridge Regression and LASSO
Linear regression is one of the most widely used statistical methods available today. It is used by data analysts and students in almost every discipline. However, for the standard ordinary least squares method, there are several strong assumptions made about data that is often not true in real world data sets. This can cause numerous problems in the least squares model. One of the most common issues is a model overfitting the data. Ridge Regression and LASSO are two methods used to create a better and more accurate model. I will discuss how overfitting arises in least squares models and the reasoning for using Ridge Regression and LASSO include analysis of real world example data and compare these methods with OLS and each other to further infer the benefits and drawbacks of each method.
Chris Van Dusen
![Should Self-Driving Cars be bound by Isaac Asimov's Three Laws of Robotics?](https://writelatex.s3.amazonaws.com/published_ver/10819.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=bc60229ed51a4646536ae32d18a7ac27323528a78a57342b3b563487983f39e4)
Should Self-Driving Cars be bound by Isaac Asimov's Three Laws of Robotics?
Discussing whether an Autonomous Car should be bounded by the 3 Laws of Robotics by comparing their definitions. This is the first research paper I have ever written so the references would be a lackluster.
Pradhyumnaa Ganapathi Subramanian
![G2B](https://writelatex.s3.amazonaws.com/published_ver/11276.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=d60026d95c1cb0e2bd3a9b57cbdb2077ed0a9a838067f55374f123bbd000fc9d)
G2B
Tugas E-Business tentang G2B
Hanifah & Wayan
![experiments with the dynamics of the Riemann zeta function](https://writelatex.s3.amazonaws.com/published_ver/5704.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=7639bc4bf086763d5b1571526d42dc13a700354b0c6eb078e26cc21542dc7202)
experiments with the dynamics of the Riemann zeta function
We describe computer experiments suggesting that there is an infinite family L of Riemann zeta cycles Λ of each size L = 1, 2, 3, ....
Barry Brent
![The Effects And Dangers Of Online Advertisements](https://writelatex.s3.amazonaws.com/published_ver/5506.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=d24894366d5df0fafd8cf58c2779515094c140c2cb809bf69c17d1d065dbde85)
The Effects And Dangers Of Online Advertisements
Human life has developed in many aspects since the evolution of computer started. The main function of creating new technologies is to make human life easier. New technologies are being invented everyday which creates limitless opportunities for developers to make use of these technologies to serve a specific purpose or task. The Advertising used to be print paper or TV ads. Today mobile and online video creates new ways to contact with customers. Today Ads are kind of the most popular online advertising market in the world and trading ad spaces over the Internet. Currently the social online ads like Facebook and YouTube have some preferred set of users they wish to reach by showing their ads but some cases force the users to watch their Advertising. Ethan Zuckerman wad created the first pop-up advertising on the web was 15-Aug-2014. The pop-up advertising most using in the pc application and browser, and APPs for smartphone. The small internet windows that pop up on your screen can be useful, annoying or dangerous often used by advertisers to get your attention or by viruses to trick you into clicking on them. This guide gives them basic information about your identity. Some dangerous pop-up can leak your private information like your name, number, credit card member, and etc. In this paper we sum up, all these facts contribute to show how danger the pop-up advertising with developing new pop-up advertising to leak the user identity.
almokri
![EL CELULAR](https://writelatex.s3.amazonaws.com/published_ver/1915.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=876b1ae82c12379f27cdc474548954d361ad05e92d5aa7cb931ccd9660429878)
EL CELULAR
Ensayo El Celular
Luis Felipe Cabal Paredes
![Operating Systems Project: Kernel Optimization](https://writelatex.s3.amazonaws.com/published_ver/5049.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=cf56ff08e89ef7f76ef67f7a49649b02482d34449f52c7afac92caddddfab52f)
Operating Systems Project: Kernel Optimization
An attempt of achieving a Kernel optimaization using Ubuntu 16..04.1 LTS, Phoronix Test Suite and different value changes and tests for an internal Kernel variable: the runtime value.
Jorge Dominic Márquez Muñoz, Juan Manuel Romero Guardado
![Requirements for Evaluating Proposals](https://writelatex.s3.amazonaws.com/published_ver/9506.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=c04aa6272a16b86a2392b238798c52c5c403eea56cf4b506f0c72c9dacecafab)
Requirements for Evaluating Proposals
Student of Master of Science in Information Systems at Uganda Martyrs University
Abel Katongore
![Operative Systems Midterm Project](https://writelatex.s3.amazonaws.com/published_ver/5045.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240630T142752Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240630/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=27a144994e77430929978b5059751a87b6158750e906f9c7da1d9a778afc5ca0)
Operative Systems Midterm Project
In this paper, we measure the memory performance throughout the Phoronix test "RAMspeed SMP". We decide to test this specific benchmark because we know how important is the memory for the system performance. This document shows how much the memory performance could change if we modify some variables in the linux kernel.
Daniel Jiménez