https://telecombcn-dl.github.io/2017-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
Recurrent Neural Networks (RNNs) continue to show outstanding performance in sequence modeling tasks. However, training RNNs on long sequences often face challenges like slow inference, vanishing gradients and difficulty in capturing long term dependencies. In backpropagation through time settings, these issues are tightly coupled with the large, sequential computational graph resulting from unfolding the RNN in time. We introduce the Skip RNN model which extends existing RNN models by learning to skip state updates and shortens the effective size of the computational graph. This model can also be encouraged to perform fewer state updates through a budget constraint. We evaluate the proposed model on various tasks and show how it can reduce the number of required RNN updates while preserving, and sometimes even improving, the performance of the baseline RNN models.
Face recognition and deep learning โดย ดร. สรรพฤทธิ์ มฤคทัต NECTECBAINIDA
Face recognition and deep learning โดย ดร. สรรพฤทธิ์ มฤคทัต NECTEC
คณะสถิติประยุกต์ สถาบันบัณฑิตพัฒนบริหารศาสตร์ ร่วมกับ Data Science Thailand ร่วมกันจัดงาน The First NIDA Business Analytics and Data Sciences Contest/Conference
Abstract: This PDSG workshop introduces basic concepts of the grandfather of neural networks - the Perceptron. Concepts covered are history, algorithm and limitations.
Level: Fundamental
Requirements: No prior programming or statistics knowledge required.
https://telecombcn-dl.github.io/2017-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
https://telecombcn-dl.github.io/2017-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
Recurrent Neural Networks (RNNs) continue to show outstanding performance in sequence modeling tasks. However, training RNNs on long sequences often face challenges like slow inference, vanishing gradients and difficulty in capturing long term dependencies. In backpropagation through time settings, these issues are tightly coupled with the large, sequential computational graph resulting from unfolding the RNN in time. We introduce the Skip RNN model which extends existing RNN models by learning to skip state updates and shortens the effective size of the computational graph. This model can also be encouraged to perform fewer state updates through a budget constraint. We evaluate the proposed model on various tasks and show how it can reduce the number of required RNN updates while preserving, and sometimes even improving, the performance of the baseline RNN models.
Face recognition and deep learning โดย ดร. สรรพฤทธิ์ มฤคทัต NECTECBAINIDA
Face recognition and deep learning โดย ดร. สรรพฤทธิ์ มฤคทัต NECTEC
คณะสถิติประยุกต์ สถาบันบัณฑิตพัฒนบริหารศาสตร์ ร่วมกับ Data Science Thailand ร่วมกันจัดงาน The First NIDA Business Analytics and Data Sciences Contest/Conference
Abstract: This PDSG workshop introduces basic concepts of the grandfather of neural networks - the Perceptron. Concepts covered are history, algorithm and limitations.
Level: Fundamental
Requirements: No prior programming or statistics knowledge required.
https://telecombcn-dl.github.io/2017-dlai/
Deep learning technologies are at the core of the current revolution in artificial intelligence for multimedia data analysis. The convergence of large-scale annotated datasets and affordable GPU hardware has allowed the training of neural networks for data analysis tasks which were previously addressed with hand-crafted features. Architectures such as convolutional neural networks, recurrent neural networks or Q-nets for reinforcement learning have shaped a brand new scenario in signal processing. This course will cover the basic principles of deep learning from both an algorithmic and computational perspectives.
Cascade classifiers trained on gammatonegrams for reliably detecting audio ev...Nicola Strisciuglio
In this paper we propose a novel method for the detection of events of interest through audio analysis. The system that we propose is based on the representation of the audio streams through a Gammatone image, which describes the time-frequency distribution of the energy of the signal; this representation is inspired by the functioning of the human auditory system. A pool of AdaBoost cascade classifiers, one for each class of events of interest, is involved in the event detection stage. The performance of the proposed system has been evaluated on a large data set of audio events for surveillance applications and the achieved results, compared with two state of the art approaches, confirm its effectiveness.
Downlaod the paper at:
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6918643
Dans un contexte économique tendu, le MIDEST, numéro un mondial des salons de sous-traitance industrielle, qui tenait sa 44ème édition du 4 au 7 novembre au Parc des Expositions de Paris Nord Villepinte, a connu un véritable succès. Alors qu’il affichait à l’ouverture une stabilité remarquable de ses surfaces d’exposition et du nombre de ses exposants, avec 1 678 entreprises venues de 45 pays, soit sensiblement le même nombre que l’an dernier, 41 048 professionnels issus de tous les secteurs industriels et de 78 nations sont venus à leur rencontre. Un visitorat, de l’aveu-même des exposants, très qualifié et porteur de projets et de perspectives d’affaires concrètes.
Parmi les nombreux temps forts, la mise à l’honneur, pour la première fois, d’un pays d’Afrique du Nord, la Tunisie, mais aussi celle de la Normandie, ont touché un large public. Le focus sur l’aéronautique et l’impression 3D, la présence du camion « Destination Plasturgie MAJOR » et l’accueil, par la Fédération des industries mécaniques (FIM), des conseillers d’orientation des établissements scolaires franciliens, ont également connu un grand succès. Une réussite complétée par les valeurs sûres que sont les Trophées, les rendez-vous d’affaires, les conférences, le plateau télé…
CERAN SHERBORNE
Contamos con los mejores cursos de ingles para niños y de frances y el mejor asesoramiento en formación de idiomas para sus hijos, tanto en escuelas como institutos.
Stamp Auction to be Held on 17th Aug’14 in the UK - TonyLesterTony Lester
Tony Lester is again coming up with stamp auctions in the UK on 17th August’14. Buy & sell the stamps knowing the right value of the stamps. In each stamp auction, we have thousands of lots of rare stamps. Inorder to know the address and other information, visit us online here: http://www.tonylester.co.uk/catalogue/
Supervised learning is a machine learning paradigm where the algorithm is trained on a labeled dataset, learning patterns and relationships between input features and corresponding output labels to make accurate predictions on new, unseen data. It involves a teacher-supervisor relationship, where the algorithm strives to minimize the error between its predictions and the actual outcomes during training.
Localization and classification. Overfeat: class agnostic versu class specific localization, fully convolutional neural networks, greedy merge strategy. Multiobject detection. Region proposal and selective search. R-CNN, Fast R-CNN, Faster R-CNN and YOLO. Image segmentation. Semantic segmentation and transposed convolutions. Instance segmentation and Mask R-CNN. Image captioning. Recurrent Neural Networks (RNNs). Language generation. Long Short Term Memory (LSTMs). DeepImageSent, Show and Tell, and Show, Attend and Tell algorithms.
Cascade classifiers trained on gammatonegrams for reliably detecting audio ev...Nicola Strisciuglio
In this paper we propose a novel method for the detection of events of interest through audio analysis. The system that we propose is based on the representation of the audio streams through a Gammatone image, which describes the time-frequency distribution of the energy of the signal; this representation is inspired by the functioning of the human auditory system. A pool of AdaBoost cascade classifiers, one for each class of events of interest, is involved in the event detection stage. The performance of the proposed system has been evaluated on a large data set of audio events for surveillance applications and the achieved results, compared with two state of the art approaches, confirm its effectiveness.
Downlaod the paper at:
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6918643
Dans un contexte économique tendu, le MIDEST, numéro un mondial des salons de sous-traitance industrielle, qui tenait sa 44ème édition du 4 au 7 novembre au Parc des Expositions de Paris Nord Villepinte, a connu un véritable succès. Alors qu’il affichait à l’ouverture une stabilité remarquable de ses surfaces d’exposition et du nombre de ses exposants, avec 1 678 entreprises venues de 45 pays, soit sensiblement le même nombre que l’an dernier, 41 048 professionnels issus de tous les secteurs industriels et de 78 nations sont venus à leur rencontre. Un visitorat, de l’aveu-même des exposants, très qualifié et porteur de projets et de perspectives d’affaires concrètes.
Parmi les nombreux temps forts, la mise à l’honneur, pour la première fois, d’un pays d’Afrique du Nord, la Tunisie, mais aussi celle de la Normandie, ont touché un large public. Le focus sur l’aéronautique et l’impression 3D, la présence du camion « Destination Plasturgie MAJOR » et l’accueil, par la Fédération des industries mécaniques (FIM), des conseillers d’orientation des établissements scolaires franciliens, ont également connu un grand succès. Une réussite complétée par les valeurs sûres que sont les Trophées, les rendez-vous d’affaires, les conférences, le plateau télé…
CERAN SHERBORNE
Contamos con los mejores cursos de ingles para niños y de frances y el mejor asesoramiento en formación de idiomas para sus hijos, tanto en escuelas como institutos.
Stamp Auction to be Held on 17th Aug’14 in the UK - TonyLesterTony Lester
Tony Lester is again coming up with stamp auctions in the UK on 17th August’14. Buy & sell the stamps knowing the right value of the stamps. In each stamp auction, we have thousands of lots of rare stamps. Inorder to know the address and other information, visit us online here: http://www.tonylester.co.uk/catalogue/
Supervised learning is a machine learning paradigm where the algorithm is trained on a labeled dataset, learning patterns and relationships between input features and corresponding output labels to make accurate predictions on new, unseen data. It involves a teacher-supervisor relationship, where the algorithm strives to minimize the error between its predictions and the actual outcomes during training.
Localization and classification. Overfeat: class agnostic versu class specific localization, fully convolutional neural networks, greedy merge strategy. Multiobject detection. Region proposal and selective search. R-CNN, Fast R-CNN, Faster R-CNN and YOLO. Image segmentation. Semantic segmentation and transposed convolutions. Instance segmentation and Mask R-CNN. Image captioning. Recurrent Neural Networks (RNNs). Language generation. Long Short Term Memory (LSTMs). DeepImageSent, Show and Tell, and Show, Attend and Tell algorithms.
Artificial Intelligence, Machine Learning and Deep LearningSujit Pal
Slides for talk Abhishek Sharma and I gave at the Gennovation tech talks (https://gennovationtalks.com/) at Genesis. The talk was part of outreach for the Deep Learning Enthusiasts meetup group at San Francisco. My part of the talk is covered from slides 19-34.
Matineh Shaker, Artificial Intelligence Scientist, Bonsai at MLconf SF 2017MLconf
Deep Reinforcement Learning with Shallow Trees:
In this talk, I present Concept Network Reinforcement Learning (CNRL), developed at Bonsai. It is an industrially applicable approach to solving complex tasks using reinforcement learning, which facilitates problem decomposition, allows component reuse, and simplifies reward functions. Inspired by Sutton’s options framework, we introduce the notion of “Concept Networks” which are tree-like structures in which leaves are “sub-concepts” (sub-tasks), representing policies on a subset of state space. The parent (non-leaf) nodes are “Selectors”, containing policies on which sub-concept to choose from the child nodes, at each time during an episode. There will be a high-level overview on the reinforcement learning fundamentals at the beginning of the talk.
Bio: Matineh Shaker is an Artificial Intelligence Scientist at Bonsai in Berkeley, CA, where she builds machine learning, reinforcement learning, and deep learning tools and algorithms for general purpose intelligent systems. She was previously a Machine Learning Researcher at Geometric Intelligence, Data Science Fellow at Insight Data Science, Predoctoral Fellow at Harvard Medical School. She received her PhD from Northeastern University with a dissertation in geometry-inspired manifold learning.
KNN algorithm is one of the simplest classification algorithm and it is one of the most used learning algorithms. KNN is a non-parametric, lazy learning algorithm. Its purpose is to use a database in which the data points are separated into several classes to predict the classification of a new sample point.
High-performance graph analysis is unlocking knowledge in computer security, bioinformatics, social networks, and many other data integration areas. Graphs provide a convenient abstraction for many data problems beyond linear algebra. Some problems map directly to linear algebra. Others, like community detection, look eerily similar to sparse linear algebra techniques. And then there are algorithms that strongly resist attempts at making them look like linear algebra. This talk will cover recent results with an emphasis on streaming graph problems where the graph changes and results need updated with minimal latency. We’ll also touch on issues of sensitivity and reliability where graph analysis needs to learn from numerical analysis and linear algebra.
Two strategies for large-scale multi-label classification on the YouTube-8M d...Dalei Li
The project to participate in the Kaggle YouTube-8M video understanding competition. Four algorithms that can be run on a single machine are implemented, namely, multi-label k-nearest neighbor, multi-label radial basis function network (one-vs-rest), and multi-label logistic regression and on-vs-rest multi-layer neural network.
Machine Learning Essentials Demystified part1 | Big Data DemystifiedOmid Vahdaty
Machine Learning Essentials Abstract:
Machine Learning (ML) is one of the hottest topics in the IT world today. But what is it really all about?
In this session we will talk about what ML actually is and in which cases it is useful.
We will talk about a few common algorithms for creating ML models and demonstrate their use with Python. We will also take a peek at Deep Learning (DL) and Artificial Neural Networks and explain how they work (without too much math) and demonstrate DL model with Python.
The target audience are developers, data engineers and DBAs that do not have prior experience with ML and want to know how it actually works.
Paper overview: "Deep Residual Learning for Image Recognition"Ilya Kuzovkin
A talk given at Computational Neuroscience Seminar @ University of Tartu. We discuss the idea behind deep neural network that has won ILSVRC (ImageNet) 2015 and COCO 2015 Image competitions.
Inference & Learning in Linear-Chain Conditional Random Fields (CRFs)Anmol Dwivedi
Find the code on: https://github.com/anmold07/Graphical_Models/tree/master/CRF%20Learning
Probabilistic Graphical Models (PGMs) provides a general
framework to model dependencies among the output variables. Among the family of graphical models include Neural Networks, Markov Networks, Ising Models, factor graphs, Bayesian Networks etc, however, this project considers linear chain Conditional Random Fields to learn the inter-dependencies among the output variables for efficient classification of handwritten word recognition. Such models are capable of representing a complex distribution over multivariate distributions as a product of local factor functions.
Find all the relevant code on: https://github.com/anmold-07/Graphical_Models
Similar to Confusion Matrices for Improving Performance of Feature Pattern Classifier Systems (20)
Results of the GPUs for GEC Competition held at GECCO 2013.
Organizers
Daniele Loiacono, Politecnico di Milano
Antonino Tumeo, Pacific Northwest National Laboratory
Webpage
http://gpu.geccocompetitions.com
Simulated Car Racing Competition held during GECCO-2013
More information at
http://groups.google.com/group/racingcompetition
http://scr.geccocompetitions.com
Organizers
Daniele Loiacono, Politecnico di Milano
Pier Luca Lanzi, Politecnico di Milano
2012 Simulated Car Racing Championship @ CIG-2012Daniele Loiacono
Third leg of the 2012 Simulated Car Racing Championship held during CIG-2012
More information at
http://games.ws.dei.polimi.it/competitions/scr/
http://groups.google.com/group/racingcompetition
http://www.geccocompetitions.com
Organizers
Daniele Loiacono, Politecnico di Milano
Luigi Cardamone, Politecnico di Milano
Pier Luca Lanzi, Politecnico di Milano
2012 Simulated Car Racing Championship @ GECCO-2012Daniele Loiacono
Second leg of the 2012 Simulated Car Racing Championship held during GECCO-2012
More information at
http://games.ws.dei.polimi.it/competitions/scr/
http://groups.google.com/group/racingcompetition
http://www.geccocompetitions.com
Organizers
Daniele Loiacono, Politecnico di Milano
Luigi Cardamone, Politecnico di Milano
Pier Luca Lanzi, Politecnico di Milano
2012 Simulated Car Racing Championship @ Evo*-2012Daniele Loiacono
First leg of the 2012 Simulated Car Racing Championship held during Evo*-2012
More information at
http://games.ws.dei.polimi.it/competitions/scr/
http://groups.google.com/group/racingcompetition
http://www.geccocompetitions.com
Organizers
Daniele Loiacono, Politecnico di Milano
Luigi Cardamone, Politecnico di Milano
Pier Luca Lanzi, Politecnico di Milano
Random Artificial Incorporation of Noise in a Learning Classifier System Envi...Daniele Loiacono
Ryan J. Urbanowicz, Nicholas A. Sinnott-Armstrong, Jason H. Moore. "Random Artificial Incorporation of Noise in a Learning Classifier System Environment", IWLCS, 2011
2011 Simulated Car Racing Championship @ GECCO-2011Daniele Loiacono
Summary f the second leg of the 2011 Simulated Car Racing Championship held during GECCO-2011
More information at
http://cig.dei.polimi.it
http://groups.google.com/group/racingcompetition
http://sourceforge.net/projects/cig/
Organizers
Daniele Loiacono, Politecnico di Milano
Luigi Cardamone, Politecnico di Milano
Martin Butz, University of Würzburg
Pier Luca Lanzi, Politecnico di Milano
Car Setup Optimization Competition @ EvoStar 2010Daniele Loiacono
The contest involved three tracks. The optimization algorithm had to find the best car setup for each one of the tracks. The contest was divided into an optimization phase and an evaluation phase.
During the optimization phase, the optimization algorithm was applied to search for the best parameter setting. During the evaluation phase, the best solution was scored according to the distance covered in a fixed amount of game time.
A parameter setting is represented by a vector of real numbers. The competition software provides an API to evaluate a specific parameter setting on a track and returns the best lap time, the top speed, the distance raced, and the damage suffered. Through the API, it is possible to specify the amount of game ticks to use for evaluating a car setup. The game tics spent for an evaluation are subtracted from the total amount of game tics available. When the 1 millions of game ticks are exhausted or the evaluation process has taken up more than 2 hours of CPU time, no further evaluation will be possible.
Organizers
•Luigi Cardamone, Politecnico di Milano, Italy
•Daniele Loiacono, Politecnico di Milano, Italy
•Markus Kemmerling, TU Dortmund, Germany
•Mike Preuss, TU Dortmund, Germany
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
Confusion Matrices for Improving Performance of Feature Pattern Classifier Systems
1. Evolutionary
Computation
Research
Group
Feature Pattern Classifier System
Handwritten Digit Classification with LCS
Ignas Kukenys
Victoria University of Wellington (now University of Otago)
Ignas@cs.otago.ac.nz
Will N. Browne
Victoria University of Wellington
Will.Browne@vuw.ac.nz
Mengjie Zhang
Victoria University of Wellington
Mengjie.Zhang@ecs.vuw.ac.nz
2. Context
l Machine learning for Robotics:
l Needs to be reinforcement-based and online
l Preferably also adaptive and transparent
l Learning from visual input is hard:
l High-dimensionality vs. sparseness of data
l Why Learning Classifier Systems
l Robust reinforcement learning
l Limited applications for visual input
2
3. Goals
l Adapt LCS to learn from image data
l Use image features that enable generalisation
l Tweak the evolutionary process
l Use a well known vision problem for evaluation
l Build a classifier system for handwritten digit
classification
3
4. Learning Classifier Systems
l LCS model an agent interacting with an
unknown environment:
l Agent observes a state of the environment
l Agent performs an action
l Environment provides a reward
l The above contract constrains learning:
l Online: one problem instance at a time
l Ground truth not available (non-supervised)
4
7. Basics of LCS
l LCS evolve a population of rules:
if condition(s) then action
l Each rule also has associated properties:
l Predicted reward for advocated action
l Accuracy based on prediction error
l Fitness based on relative accuracy
7
8. Simple rule conditions
l Traditionally LCS use 'don't care' (#) encoding:
l e.g. condition #1# matches states 010, 111, 110 and
111
l Enables rules to generalise over multiple states
l Varying levels of generalisation:
l ### matches all possible states
l 010 matches a single specific state
9. Naïve image classification
l Consider binary 3x3 pixel patterns:
l How to separate them into two classes
based on the colour of centre point?
9
10. Naïve image classification
l Environment states: 9 bit messages
l e.g. 011100001 and 100010101
l Two actions represent two classes: 0, 1
l Two rules are sufficient to solve the problem:
[### #0# ###] → 0
[### #1# ###] → 1
10
11. Naïve image classification
l Example 2: how to classify 3x3 patterns that
have “a horizontal line of 3 white pixels”?
[111 ### ###] → 1
[### 111 ###] → 1
[### ### 111] → 1
l Example 3: how to deal with 3x3 patterns “at
least one 0 on every row”?
l 27 unique rules to fully describe the
problem
11
12. Naïve image classification
l Number of rules explodes for complex patterns
l Consider 256 pixel values for grey-scale, …
l Very limited generalisation in such conditions
l Photographic and other “real world” images:
l Significantly different at “pixel level”
l Need more flexible conditions
12
14. Haar-like features
l Compute differences between pixel sums in
rectangular regions of the image
l Very efficient with the use of “integral image”
l Widely used in computer vision
l e.g. state of the art Viola & Jones face detector
l Can be flexibly placed at different scales and
positions in the image
l Enable varying levels of generalisation
14
15. Haar-like feature rules
l To obtain LCS-like rules, feature outputs need
to be thresholded:
if (feature(type, position, scale) > threshold) then action
l Flexible direction of comparison: < and >
l Range: t_low < feature < t_high
15
16. “Messy” encoding
l Multiple features form stronger rules:
if (feature_1 && feature_2 && feature_3 ...) then action
l Seems to be a limit to a useful number of
features:
16
17. MNIST digits dataset
l Well known handwritten digits dataset
l 60 000 training examples, 10 classes
l Examples from 250 subjects
l 28x28 pixel grey-scale (0..255) images
l 10 000 evaluation examples (test set, different
subjects)
17
22. Improving the FPCS
l Tournament selection
l Performs better than proportional RW
l Crossover only at feature level
l Rules swap features, not individual attributes
l Features start at “best” position, then mutate
l Instead of random position place feature where
the output is highest
l With all other fixes, performance still at 94%
22
23. Why not 100% performance?
• Online reinforcement learning
• Cannot adapt rules based on known ground truth
• Forms of complete map of all states to all
actions to their reward, e.g. learns “not a 3”
• Rather than just correct state: action mapping
• Only uses Haar-like features
• Could use ensemble of different features.
23
24. Future work
• Inner confusion matrix to “guide” learning to
“hard” areas of the problem
• Test with a supervised-learning LCS,
e.g. UCS
• Only learn accurate positive rules, rather than
complete mapping
• How to deal with outliers?
• Testing on harder image problems will likely
reveal further challenges
24
27. Conclusions
• LCS can successfully work with image data.
• Autonomously learn the number, type, scale
and threshold of features to use in a
transparent manner.
• Challenges remain to bridge the 5% gap to
supervised learning performance
27
28. Demo
• Handwritten digit classification with FPCS
28
30. Basics of LCS
l For observed state s all conditions are tested
l Matching rules form match set [M]
l For every action, a reward is predicted
l An action a is chosen (random vs. best)
l Rules in [M] advocating a form action set [A]
l [A] is updated according to reward received
l Rule Discovery, e.g. GA, is performed in [A] to
evolve better rules
30