AI Algorithms (74)
AI Natural Language Processing (96)
AI Knowledge Representation Reasoning (12)
AI Robotics (183)
AI Computer Vision (13)
AI Neural Networks (66)
AI Fuzzy Logic (31)
AI Games (8)
AI Languages (141)
AI Tools (11)
AI Machine Learning (659)
Data Science (671)
Data Mining (120)
AI Deep Learning (111)
Generative AI (153)
AI Frameworks Libraries (197)
AI Ethics Safety (100)
AI Applications (427)
AI General (197)
AI AllOther (6) I’m not a developer but I am being hacked and I see same stuff in my browser how can I use my browser info to determine who has my identity Here is the browser information https://search.yahoo.com/search?p=date+camp&fr=iphone&.tsrc=apple&pcarrier=TFW&pmcc=311&pmnc=480&vm=r Please help this is on going for 6 years
628
Could you explain how to define the number of clusters in a clustering algorithm?
What is the trade-off between bias and variance?
What is the difference between artificial intelligence and machine learning?
Hill-Climbing algorithm terminates when, a) Stopping criterion met b) Global Min/Max is achieved c) No neighbor has higher value d) Local Min/Max is achieved
What is the science of data in simple words?
Write a function to check whether a particular word is a palindrome or not.
Describe the various phases of a robotics life cycle?
How do societal biases get reflected in AI models?
Do you know what's the “kernel trick” and how is it useful?
Why do we need to convert categorical variables into factor? Which functions are used to perform the conversion?
Describe the various sensor and perception systems used in self-driving cars?
What is artificial super intelligence?
What are some potential advantages of neuromorphic computing?
Explain the decision tree classification?
Why is data cleaning essential in data science?