pha
Nonlinear time-series embedding by monotone variational inequality
In the wild, we often encounter collections of sequential data such as electrocardiograms, motion capture, genomes, and natural language, and sequences may be multichannel or symbolic with nonlinear dynamics. We introduce a new method to learn low-dimensional representations of nonlinear time series without supervision and can have provable recovery guarantees. The learned representation can be used for downstream machine-learning tasks such as clustering and classification. The method is based on the assumption that the observed sequences arise from a common domain, but each sequence obeys its own autoregressive models that are related to each other through low-rank regularization. We cast the problem as a computationally efficient convex matrix parameter recovery problem using monotone Variational Inequality and encode the common domain assumption via low-rank constraint across the learned representations, which can learn the geometry for the entire domain as well as faithful representations for the dynamics of each individual sequence using the domain information in totality. We show the competitive performance of our method on real-world time-series data with the baselines and demonstrate its effectiveness for symbolic text modeling and RNA sequence clustering.
- North America > United States > Minnesota > Hennepin County > Minneapolis (0.14)
- North America > United States > Pennsylvania > Philadelphia County > Philadelphia (0.04)
- Asia > Middle East > Jordan (0.04)
- (9 more...)
- Information Technology > Artificial Intelligence > Natural Language (1.00)
- Information Technology > Artificial Intelligence > Representation & Reasoning > Mathematical & Statistical Methods (0.87)
- Information Technology > Artificial Intelligence > Machine Learning > Statistical Learning > Clustering (0.66)
Assessing the Adversarial Security of Perceptual Hashing Algorithms
Madden, Jordan, Bhavsar, Moxanki, Dorje, Lhamo, Li, Xiaohua
Perceptual hashing algorithms (PHAs) are utilized extensively for identifying illegal online content. Given their crucial role in sensitive applications, understanding their security strengths and weaknesses is critical. This paper compares three major PHAs deployed widely in practice: PhotoDNA, PDQ, and NeuralHash, and assesses their robustness against three typical attacks: normal image editing attacks, malicious adversarial attacks, and hash inversion attacks. Contrary to prevailing studies, this paper reveals that these PHAs exhibit resilience to black-box adversarial attacks when realistic constraints regarding the distortion and query budget are applied, attributed to the unique property of random hash variations. Moreover, this paper illustrates that original images can be reconstructed from the hash bits, raising significant privacy concerns. By comprehensively exposing their security vulnerabilities, this paper contributes to the ongoing efforts aimed at enhancing the security of PHAs for effective deployment.
- North America > United States > New York > Broome County > Binghamton (0.04)
- North America > United States > Virginia (0.04)
- North America > United States > Ohio (0.04)
- (2 more...)
Towards Automated Readable Proofs of Ruler and Compass Constructions
Marinković, Vesna, Šukilović, Tijana, Marić, Filip
Although there are several systems that successfully generate construction steps for ruler and compass construction problems, none of them provides readable synthetic correctness proofs for generated constructions. In the present work, we demonstrate how our triangle construction solver ArgoTriCS can cooperate with automated theorem provers for first order logic and coherent logic so that it generates construction correctness proofs, that are both human-readable and formal (can be checked by interactive theorem provers such as Coq or Isabelle/HOL). These proofs currently rely on many high-level lemmas and our goal is to have them all formally shown from the basic axioms of geometry.
Watch how an elephant has learned how to peel a BANANA after observing zookeepers eating the fruit
Delicious, rich in potassium and come with their own, biodegradable packaging; bananas are truly one of the ultimate snacks. And it's not just humans who think so, as the fruit is a popular delicacy with much of the animal kingdom, including gorillas, bats and elephants. Most of the time, elephants will scoop up bananas with their trunk and put the whole thing into their mouths. However, one particularly picky Asian elephant at Berlin Zoo appears to not enjoy eating the fruit's tough skin, as she has learnt how to peel it off. Incredible footage reveals how Pang Pha squeezes the banana to break off its top, shakes out its contents, discards the peel, picks up the soft pulp and pops it into her mouth.
- Europe > Germany (0.05)
- Asia > China > Yunnan Province (0.05)
- Leisure & Entertainment > Zoo & Circus (0.89)
- Health & Medicine > Therapeutic Area > Neurology (0.33)
Bioplastic Design using Multitask Deep Neural Networks
Kuenneth, Christopher, Lalonde, Jessica, Marrone, Babetta L., Iverson, Carl N., Ramprasad, Rampi, Pilania, Ghanshyam
Non-degradable plastic waste stays for decades on land and in water, jeopardizing our environment; yet our modern lifestyle and current technologies are impossible to sustain without plastics. Bio-synthesized and biodegradable alternatives such as the polymer family of polyhydroxyalkanoates (PHAs) have the potential to replace large portions of the world's plastic supply with cradle-to-cradle materials, but their chemical complexity and diversity limit traditional resource-intensive experimentation. In this work, we develop multitask deep neural network property predictors using available experimental data for a diverse set of nearly 23000 homo- and copolymer chemistries. Using the predictors, we identify 14 PHA-based bioplastics from a search space of almost 1.4 million candidates which could serve as potential replacements for seven petroleum-based commodity plastics that account for 75% of the world's yearly plastic production. We discuss possible synthesis routes for these identified promising materials. The developed multitask polymer property predictors are made available as a part of the Polymer Genome project at https://PolymerGenome.org.
- North America > United States > New Mexico > Los Alamos County > Los Alamos (0.05)
- North America > United States > North Carolina > Durham County > Durham (0.04)
- North America > United States > Georgia > Fulton County > Atlanta (0.04)
- Europe (0.04)
- Materials > Chemicals > Commodity Chemicals > Petrochemicals > Polymers & Plastics (1.00)
- Government (1.00)
- Energy (1.00)
- Health & Medicine (0.88)
Fuzzy C-means-based scenario bundling for stochastic service network design
Jiang, Xiaoping, Bai, Ruibin, Landa-Silva, Dario, Aickelin, Uwe
Stochastic service network designs with uncertain demand represented by a set of scenarios can be modelled as a large-scale two-stage stochastic mixed-integer program (SMIP). The progressive hedging algorithm (PHA) is a decomposition method for solving the resulting SMIP. The computational performance of the PHA can be greatly enhanced by decomposing according to scenario bundles instead of individual scenarios. At the heart of bundle-based decomposition is the method for grouping the scenarios into bundles. In this paper, we present a fuzzy c-means-based scenario bundling method to address this problem. Rather than full membership of a bundle, which is typically the case in existing scenario bundling strategies such as k-means, a scenario has partial membership in each of the bundles and can be assigned to more than one bundle in our method.
- Europe > United Kingdom > England > Nottinghamshire > Nottingham (0.14)
- Asia > China > Zhejiang Province > Ningbo (0.05)
Google uses machine learning to keep its 2 billion Android users safe
Google introduced Google Play Protect at its I/O 2017 developer conference. The platform brought in a comprehensive set of security standards that helps Android find malicious apps and take actions against them. Google accounts a lot of that to AI and machine learning. For that, in a recent blogpost, Google talks about how the addition of the technology has helped strengthen the security of the platform, and made it possible to keep 2 billion Android users safe. One of the key operations of Google Play Protect is to look for PHAs (potentially harmful apps) in the Android ecosystem.
- Information Technology > Communications > Mobile (1.00)
- Information Technology > Artificial Intelligence > Machine Learning (1.00)
Improving Determinization in Hindsight for On-line Probabilistic Planning
Yoon, Sungwook (Palo Alto Research Center) | Ruml, Wheeler (University of New Hampshire) | Benton, J. (Arizona State University) | Do, Minh (Palo Alto Research Center)
Recently, "determinization in hindsight" has enjoyed surprising success in on-line probabilistic planning. This technique evaluates the actions available in the current state by using non-probabilistic planning in deterministic approximations of the original domain. Although the approach has proven itself effective in many challenging domains, it is computationally very expensive. In this paper, we present three significant improvements to help mitigate this expense. First, we use a method for detecting potentially useful actions, allowing us to avoid estimating the values of unnecessary ones. Second, we exploit determinism in the domain by reusing relevant plans rather than computing new ones. Third, we improve action evaluation by increasing the chance that at least one determin- istic plan reaches a goal. Taken together, these improvements allow determinization in hindsight to scale significantly better on large or mostly-deterministic problems.
- North America > United States > California > Santa Clara County > Palo Alto (0.04)
- North America > United States > New Hampshire (0.04)
- North America > United States > Arizona > Maricopa County > Tempe (0.04)
- North America > Mexico > Gulf of Mexico (0.04)
Mobile Agent Based Solutions for Knowledge Assessment in elearning Environments
Dinsoreanu, Mihaela, Godja, Cristian, Anghel, Claudiu, Salomie, Ioan, Coffey, Tom
E-learning is nowadays one of the most interesting of the "e- " domains available through the Internet. The main problem to create a Web-based, virtual environment is to model the traditional domain and to implement the model using the most suitable technologies. We analyzed the distance learning domain and investigated the possibility to implement some e-learning services using mobile agent technologies. This paper presents a model of the Student Assessment Service (SAS) and an agent-based framework developed to be used for implementing specific applications. A specific Student Assessment application that relies on the framework was developed.