This document discusses some of the challenges in developing AI systems that utilize machine learning. It notes that machine learning systems rely on probabilities and statistics based on training data, making quality assurance difficult. It is also difficult to fully understand and interpret models from deep neural networks. The document suggests that new approaches are needed for developing machine learning-based systems, as traditional software engineering approaches do not work well. Establishing the field of "machine learning engineering" is important for building AI systems that can reliably ensure quality.
A review: Artificial intelligence and expert systems for cyber securitybijejournal
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats
in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The
essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The
system uses various datasets like a machine and deep learning as well as reinforced learning in order to make
intelligent decisions. The Internet of Things (IoT) is one of the major concerns for cyber security because it is
potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily
gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest
and potentially the weakest link in the cyber security environment. This review intends to present AI and expert
systems for cyber security
Artificial intelligence (AI) is a multidisciplinary field of science and engineering whose goal is to create intelligent machines.
We believe that AI will be a force multiplier on technological progress in our increasingly digital, data-driven world. This is because everything around us today, ranging from culture to consumer products, is a product of intelligence.
The State of AI Report is now in its sixth year. Consider this report as a compilation of the most interesting things we’ve seen with a goal of triggering an informed conversation about the state of AI and its implication for the future.
We consider the following key dimensions in our report:
Research: Technology breakthroughs and their capabilities.
Industry: Areas of commercial application for AI and its business impact.
Politics: Regulation of AI, its economic implications and the evolving geopolitics of AI.
Safety: Identifying and mitigating catastrophic risks that highly-capable future AI systems could pose to us.
Predictions: What we believe will happen in the next 12 months and a 2022 performance review to keep us honest.
Produced by Nathan Benaich and Air Street Capital team
A review: Artificial intelligence and expert systems for cyber securitybijejournal
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats
in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The
essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The
system uses various datasets like a machine and deep learning as well as reinforced learning in order to make
intelligent decisions. The Internet of Things (IoT) is one of the major concerns for cyber security because it is
potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily
gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest
and potentially the weakest link in the cyber security environment. This review intends to present AI and expert
systems for cyber security
Artificial intelligence (AI) is a multidisciplinary field of science and engineering whose goal is to create intelligent machines.
We believe that AI will be a force multiplier on technological progress in our increasingly digital, data-driven world. This is because everything around us today, ranging from culture to consumer products, is a product of intelligence.
The State of AI Report is now in its sixth year. Consider this report as a compilation of the most interesting things we’ve seen with a goal of triggering an informed conversation about the state of AI and its implication for the future.
We consider the following key dimensions in our report:
Research: Technology breakthroughs and their capabilities.
Industry: Areas of commercial application for AI and its business impact.
Politics: Regulation of AI, its economic implications and the evolving geopolitics of AI.
Safety: Identifying and mitigating catastrophic risks that highly-capable future AI systems could pose to us.
Predictions: What we believe will happen in the next 12 months and a 2022 performance review to keep us honest.
Produced by Nathan Benaich and Air Street Capital team
Towards Secure and Interpretable AI: Scalable Methods, Interactive Visualizat...polochau
We have witnessed tremendous growth in Artificial intelligence (AI) and machine learning (ML) recently. However, research shows that AI and ML models are often vulnerable to adversarial attacks, and their predictions can be difficult to understand, evaluate and ultimately act upon.
Discovering real-world vulnerabilities of deep neural networks and countermeasures to mitigate such threats has become essential to successful deployment of AI in security settings. We present our joint works with Intel which include the first targeted physical adversarial attack (ShapeShifter) that fools state-of-the-art object detectors; a fast defense (SHIELD) that removes digital adversarial noise by stochastic data compression; and interactive systems (ADAGIO and MLsploit) that further democratize the study of adversarial machine learning and facilitate real-time experimentation for deep learning practitioners.
Finally, we also present how scalable interactive visualization can be used to amplify people’s ability to understand and interact with large-scale data and complex models. We sample from projects where interactive visualization has provided key leaps of insight, from increased model interpretability (Gamut with Microsoft Research), to model explorability with models trained on millions of instances (ActiVis deployed with Facebook), increased usability for non-experts about state-of-the-art AI (GAN Lab open-sourced with Google Brain; went viral!), and our latest work Summit, an interactive system that scalably summarizes and visualizes what features a deep learning model has learned and how those features interact to make predictions. We conclude by highlighting the next visual analytics research frontiers in AI.
=== Presenter Bio ===
Polo Chau
Associate Professor and ML Area Leader, College of Computing
Associate Director, MS Analytics
Georgia Institute of Technology
Polo Chau is an Associate Professor of Computing at Georgia Tech. He co-directs Georgia Tech's MS Analytics program. His research group bridges machine learning and visualization to synthesize scalable interactive tools for making sense of massive datasets, interpreting complex AI models, and solving real world problems in cybersecurity, human-centered AI, graph visualization and mining, and social good. His Ph.D. in Machine Learning from Carnegie Mellon University won CMU's Computer Science Dissertation Award, Honorable Mention. He received awards and grants from NSF, NIH, NASA, DARPA, Intel (Intel Outstanding Researcher), Symantec, Google, Nvidia, IBM, Yahoo, Amazon, Microsoft, eBay, LexisNexis; Raytheon Faculty Fellowship; Edenfield Faculty Fellowship; Outstanding Junior Faculty Award; The Lester Endowment Award; Symantec fellowship (twice); Best student papers at SDM'14 and KDD'16 (runner-up); Best demo at SIGMOD'17 (runner-up); Chinese CHI'18 Best paper. His research led to open-sourc
We believe that AI will be a force multiplier on technological progress in our increasingly digital, data-driven world. This is because everything around us today, ranging from culture to consumer products, is a product of intelligence.
In this report, we set out to capture a snapshot of the exponential progress in AI with a focus on developments in the past 12 months. Consider this report as a compilation of the most interesting things we’ve seen that seeks to trigger an informed conversation about the state of AI and its implication for the future. This edition builds on the inaugural State of AI Report 2018, which can be found here.
We consider the following key dimensions in our report:
- Research: Technology breakthroughs and their capabilities.
- Talent: Supply, demand and concentration of talent working in the field.
- Industry: Large platforms, financings and areas of application for AI-driven innovation today and tomorrow.
- China: Large platforms, financings and areas of application for AI-driven innovation today and tomorrow.
- Politics: Public opinion of AI, economic implications and the emerging geopolitics of AI.
Collaboratively produced in East London, UK by:
- Nathan Benaich, Founder of Air Street Capital (www.airstreet.com) and RAAIS (www.raais.co).
- Ian Hogarth, Visiting Professor at UCL's IIPP (https://www.twitter.com/IIPP_UCL) and angel investor.
Artificial Intelligence in the Military: An Overview of the Capabilities, App...Adib Bin Rashid
Artificial intelligence (AI) has become a reality in today’s world with the rise of the 4th industrial revolution, especially in the
armed forces. Military AI systems can process more data more efectively than traditional systems. Due to its intrinsic computing
and decision-making capabilities, AI also increases combat systems’ self-control, self-regulation, and self-actuation. Artifcial
intelligence is used in almost every military application, and increased research and development support from military research
agencies to develop new and advanced AI technologies is expected to drive the widespread demand for AI-driven systems in the
military. This essay will discuss several AI applications in the military, as well as their capabilities, opportunities, and potential
harm and devastation when there is instability. The article looks at current and future potential for developing artificial intelligence
algorithms, particularly in military applications. Most of the discussion focused on the seven patterns of AI, the usage and
implementation of AI algorithms in the military, object detection, military logistics, and robots, the global instability induced by
AI use, and nuclear risk. Te article also looks at the current and future potential for developing artifcial intelligence algorithms,
particularly in military applications.
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...ijtsrd
For the IT sector and software specialists, software failure prediction and proneness have long been seen as crucial issues. Conventional methods need prior knowledge of errors or malfunctioning modules in order to identify software flaws inside an application. By using machine learning approaches, automated software fault recovery models allow the program to substantially forecast and recover from software problems. This feature helps the program operate more efficiently and lowers errors, time, and expense. Using machine learning methods, a software fault prediction development model was presented, which might allow the program to continue working on its intended mission. Additionally, we assessed the models performance using a variety of optimization assessment benchmarks, including accuracy, f1 measure, precision, recall, and specificity. Convolutional neural networks and its hyperbolic tangent functions are the basis of the deep learning prediction model FPRNN HTF Forward Pass RNN with Hyperbolic Tangent Function technique. The assessment procedure demonstrated the high accuracy rate and effective application of CNN algorithms. Moreover, a comparative measure is used to evaluate the suggested prediction model against other methodologies. The gathered data demonstrated the superior performance of the FPRNN HTF technique. Swati Rai | Dr. Kirti Jain "Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Tangent Function" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-6 , December 2023, URL: https://www.ijtsrd.com/papers/ijtsrd60159.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/60159/study-of-software-defect-prediction-using-forward-pass-rnn-with-hyperbolic-tangent-function/swati-rai
AI Safety and Regulations Navigating the Post COVID Era Aims, Opportunities, ...ijtsrd
Artificial Intelligence AI has become an integral part of our post COVID world, influencing various aspects of our lives, from healthcare to remote work and education. While AI offers numerous advantages, it also poses significant risks, including ethical dilemmas, bias, privacy concerns, and potential job displacement. This abstract explores the evolving landscape of AI safety and regulations in the wake of the COVID 19 pandemic. AI safety encompasses efforts to ensure that AI systems are developed and deployed responsibly, preventing unintended consequences and safeguarding individuals and society at large. In parallel, AI regulations aim to establish a framework that guides the ethical and accountable use of AI technologies. These regulations address data privacy, bias mitigation, transparency, and accountability, among other critical aspects. The advantages of AI safety and regulation are evident in their capacity to protect public health, privacy, and fairness. In healthcare, they ensure the accuracy of diagnostic AI systems and safeguard patient data. In remote work and education, they promote equitable access to AI enhanced services. Additionally, AI safety and regulation play a crucial role in supply chain resilience, mental health support, and the development of digital health records and vaccine passports. However, several limitations and challenges need to be acknowledged. Rapid technological advancements often outpace regulatory frameworks, making it challenging to maintain relevance. Global variations in regulations can create complexities for international cooperation. Overregulation can stifle innovation, while a lack of enforcement can render regulations toothless. The future trends in AI safety and regulation will be shaped by the lessons learned from the COVID 19 pandemic. We anticipate global collaboration and standardization efforts, the proliferation of ethical AI frameworks, and sector specific regulations. Transparent AI, accountability laws, and adaptive regulations will play a significant role in shaping the responsible development and deployment of AI technologies. In conclusion, AI safety and regulation are essential components of a post COVID world that seeks to harness the benefits of AI while mitigating its potential risks. The responsible development and use of AI technologies are crucial in ensuring a secure, equitable, and ethical digital future. Manish Verma "AI Safety and Regulations: Navigating the Post-COVID Era: Aims, Opportunities, and Challenges: A ChatGPT Analysis" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-6 , December 2023, URL: https://www.ijtsrd.com/papers/ijtsrd60087.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/60087/ai-safety-and-regulations-navigating-the-postcovid-era-aims-opportunities-and-challenges-a-chatgpt-analysis/manish-verma
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
"In any organization it is an essential task to protect the data from unauthorized users. Information Systems hardware, software, networks, and data resources need to be protected and secured to ensure quality, performance, and integrity. Security management deals with the accuracy, integrity, and safety of information resources. When effective security measures are in place, they can reduce errors, fraud, and losses. In the current work, the authors have proposed a model for encryption of a text phrase employing genetic algorithm. The entropy inherently available in genetic algorithm is exploited for introducing chaos in a text phrase thereby rendering it unreadable. The no of cross over points and mutation points decides the strength of the algorithm. The prototype of the model is implemented for testing the operational feasibility of the model and the few test cases are presented Dr. Poornima G. Naik | Mr. Pandurang M. More | Dr. Girish R. Naik ""A Model for Encryption of a Text Phrase using Genetic Algorithm"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Fostering Innovation, Integration and Inclusion Through Interdisciplinary Practices in Management , March 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23063.pdf
Paper URL: https://www.ijtsrd.com/computer-science/data-processing/23063/a-model-for-encryption-of-a-text-phrase-using-genetic-algorithm/dr-poornima-g-naik"
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
State of AI Report 2023 - ONLINE presentationssuser2750ef
State of AI Report 2023 - ONLINE.pptx
When conducting a PEST analysis for the Syrian conflict, it's important to consider the political, economic, socio-cultural, and technological factors that have influenced and continue to impact the situation in Syria. Here's a high-level overview of a PEST analysis for the Syrian conflict:
1. Political Factors:
- Government Instability: Ongoing civil war and conflict have led to political instability and a complex power struggle between various factions and international players.
- Foreign Intervention: Involvement of external powers and regional actors has exacerbated the conflict and added geopolitical complexities to the situation.
- International Relations: Relations with global powers like the United States, Russia, and regional players like Iran and Turkey significantly impact the conflict dynamics.
2. Economic Factors:
- Humanitarian Crisis: The conflict has resulted in a severe humanitarian crisis, causing widespread displacement, destruction of infrastructure, and economic decline.
- Sanctions and Trade Barriers: International sanctions and disrupted trade have further worsened the economic situation in Syria, affecting the livelihoods of the population.
- Resource Depletion: Conflict-driven resource depletion, including loss of agricultural lands and disruption of industries, has weakened the economy.
3. Socio-cultural Factors:
- Civilian Suffering: The conflict has led to a significant loss of life, displacement of populations, and severe trauma among civilians, impacting social cohesion and community structures.
- Ethnic and Religious Divisions: Deep-seated ethnic and religious divisions have fueled the conflict, leading to sectarian tensions and societal fragmentation.
- Refugee Crisis: The conflict has triggered a massive refugee crisis, with millions of Syrians seeking asylum in neighboring countries and beyond, straining regional stability.
4. Technological Factors:
- Communication and Propaganda: Technology, including social media, has been used for communication, mobilization, and spreading propaganda by various actors in the conflict.
- Warfare Technology: Advancements in warfare technology and the use of drones, cyber warfare, and other advanced weaponry have transformed the nature of conflict in Syria.
- Cybersecurity Concerns: The conflict has also raised concerns about cybersecurity threats, misinformation campaigns, and digital vulnerabilities in the region.
This analysis provides a broad understanding of the multifaceted nature of the Syrian conflict, highlighting the diverse factors at play and the complex challenges facing Syria and the international community.
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
The short access to facts on social media networks in addition to its exponential upward push also made it tough to distinguish among faux information or actual facts. The quick dissemination thru manner of sharing has more high quality its falsification exponentially. It is also essential for the credibility of social media networks to avoid the spread of fake facts. So its miles rising research task to robotically check for misstatement of information thru its source, content material, or author and save you the unauthenticated assets from spreading rumours. This paper demonstrates an synthetic intelligence primarily based completely approach for the identification of the fake statements made by way of the use of social network entities. Versions of Deep neural networks are being applied to evalues datasets and have a look at for fake information presence. The implementation setup produced most volume 99% category accuracy, even as dataset is tested for binary (real or fake) labelling with multiple epochs.
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
The short access to facts on social media networks in addition to its exponential upward push also made it
tough to distinguish among faux information or actual facts. The quick dissemination thru manner of sharing has more high quality its falsification exponentially. It is also essential for the credibility of social media networks to avoid the spread of fake facts. So its miles rising research task to robotically check for
misstatement of information thru its source, content material, or author and save you the unauthenticated
assets from spreading rumours. This paper demonstrates an synthetic intelligence primarily based completely approach for the identification of the fake statements made by way of the use of social network
entities. Versions of Deep neural networks are being applied to evalues datasets and have a look at for
fake information presence. The implementation setup produced most volume 99% category accuracy, even
as dataset is tested for binary (real or fake) labelling with multiple epochs.
Top 10 Cited Network Security Research Articles 2021 - 2022IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Status und Ausblick - Wie wird sich KI technisch weiterentwickeln? Münchner K...Willi Schroll
Zuwachs des BSP weltweit durch Einsatz der KI: 16 Billionen USD (= 14%) bis 2030 (PWC). Prozesse werden optimiert, Ressourcen effizienter eingesetzt, Mobilität neu gedacht, KI wird aus der Cloud gezogen oder ist als AI-on-Chip direkt in smarten Dingen verbaut. V.a. in Kombination mit IoT, AR, Blockchain, Business + Market Data werden völlig neue Geschäftsmodelle denkbar. Wie ist dieses Potenzial zu heben? Wo ist Licht, wo ist Schatten? Wo lauern Illusionen schneller Machbarkeit? Welches sind die low hanging fruits der KI? Kommt die Autonomisierungswelle als Tsunami über Wirtschaft, Arbeit und Gesellschaft?
Aus den Folien:
06 • KI-Systematik: Techniken, Funktionen, Anwendung, Treiber (WIPO)
07 • 5-Stufen-Modell der Automation des Entscheidens (Bitkom)
• Phasenmodell der KI
• KI im Kontext der Innovationsfelder der digitalen Transformation
09 • Kontext der Innovationsfelder
10 • Research Trends & Challenges – inkl.
Large-scale machine learning
Deep learning
Reinforcement learning
Collaborative systems
Crowdsourcing and human computation
Neuromorphic Computing
- AI Challenges
e.g. Ethics by design, Integration of techniques
- Politics & Society Challenges,
e.g. AI-enabled deep fakes (truth crisis), AI impact on job market, AI geopolitics (China)
11 • Watchlist
• PAI: hyper-personalized AI
Vsd. Ansätze sind kombinierbar: personalisierter digitaler Assistent, Digital Twin der Person, Avatar mit Funktion der Stellvertretung, Verhandlungsmandat, Analyse der Verhaltensmuster, instant Coaching, Verhaltenstherapie, Security/Cybersecurity/Health
• XAI: explainable AI, transparency
Wenn AI-Mechanismen nicht nachvollziehbar sind, leidet die Vertrauenswürdigkeit. Auch die Gesetzgeber stellen neue Anforderungen. XAI soll die Transparenz herstellen.
• QAI: quantum computing based AI
Bestimmte Berechnungsprobleme in der KI könnten mit Quanten Computing gelöst werden. Google-Teams forschen z. B. an Quantum Neural Networks.
...
中身はほぼ以下の論文紹介です!
Soremekun, E., Papadakis, M., Cordy, M., & Traon, Y. Le. (2022). Software Fairness: An Analysis and Survey. ArXiv. Retrieved from http://arxiv.org/abs/2205.08809
WM2SP16 Keynote: Current and Future challenge of Model and Modelling on Secur...Nobukazu Yoshioka
My talk includes current models and modelling on Security and Privacy: Conceptual Models such as SIG, Common Criteria, STIX, SCPM, UML based models such as Misusecase, UMLsec, secureUML, and GORE models such as SecureTropos, i*/Tropos, KAOS etc.
Additionally, research challenges on the Security and Privacy Model and Modelling are discussed.
Operation on Models on Security and Privacy with consistency
Hybrid Models on Security and Privacy
Big data and Machine Learning on Security and Privacy Modelling
Ahmed Elkhodary & Jon Whittle : "A Survey of Approaches to Adaptive Security", International Workshop on Software Engineering for Adaptive and Self-Managing System (SEAMS’07)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
3. 2
機械学習を応用したAIシステムへの期待
n DNNの画像の認識率は人間を超える
n 画像認識の自動化によるAIシステムの普及
n BERT等により、文脈に沿った自然言語処理が
可能になってきている
n 文脈に沿った処理の自動化への期待
Content-Based Image Retrieval using Deep Learning
AlexNet ResNet GoogLeNet
(戦略プロポーザル)AI応用システムの安全性・信頼性を確保する新世代ソフトウェア工学の確立
/CRDS-FY2018-SP-03, https://www.jst.go.jp/crds/report/report01/CRDS-FY2018-SP-03.html
17. 16
機械学習応用システムの開発の難しさ
n 要求の難しさ
n 機械学習への期待が大きい
u どんな振る舞いでも自動導出できる??
u 訓練データがないと正確な判断ができない
n そもそもどこまでできるのか、やりたいか、判断していい
のかが不明
n テスト・品質保証の難しさ
n 訓練の妥当性の確認の難しさ
n 振る舞いを完全に把握できない
u モラルに反する振る舞い
n 新たなセキュリティ・プライバシーの問題
n 意図的に判断を狂わせる攻撃
n 訓練データに含まれる個人情報を推測
24. 23
実行環境・状況の複雑さ、不確かさ
Czarnecki, K., & Salay, R. (2018). Towards a Framework to Manage Perceptual Uncertainty for Safe
Automated Driving. International Conference on Computer Safety, Reliability, and Security, 439–445.
23
32. 31
DNNの脆弱性:Adversarial Examples (敵対的
標本)
Eykholt, K., Evtimov, I., Fernandes, E., Li, B., Rahmati, A., Xiao, C., Song, D.
Robust Physical-World Attacks on Deep Learning Models, CVPR 2018
Carlini, N., & Wagner, D. (2017). Towards Evaluating the
Robustness of Neural Networks. Proceedings - IEEE
Symposium on Security and Privacy, 39–57.
34. 33
特定の特徴をもたせた敵対的標本
Sharif, M., Bhagavatula, S., Bauer, L., & Reiter, M. K. (2019). A general framework for adversarial examples with
objectives. ACM Transactions on Privacy and Security, 22(3). https://doi.org/10.1145/3317611
Xu, K., Zhang, G., Liu, S., Fan, Q., Sun, M., Chen, H., … Lin, X. (2020).
Adversarial T-Shirt! Evading Person Detectors in a Physical World. arXiv.
https://doi.org/10.1007/978-3-030-58558-7_39
38. 37
動的な訓練へのアタック例:
Malware検知
Suciu, O., Mărginean, R., Kaya, Y., Daumé, H., & Dumitraş, T. (2018). Technical Report: When Does Machine Learning FAIL? Generalized Transferability
for Evasion and Poisoning Attacks. In the 27th USENIX Security Symposium (pp. 1299–1316). Retrieved from http://arxiv.org/abs/1803.06975
42. 41
研究動向
n 2018年(MLSE設立時)から急激に研究が増え
てきている
著名なソフトウェア⼯学の国際会議のMLSE関連論⽂数
n ICSE:
n 2020: 17件, 2019:7件, 2018:1件、2017: 0件
n ASE:
n 2020: 8件、2019: 4件、 2018: 4件、2017: 0件
n FSE
n 2020: 25件、2019: 4件、2018: 1件、2017: 0件
n RE
n 2020: 3件、 2019: 1件、2018: 1件、2017: 0件
n REFSQ
n 2020: 1件、 2019: 0件、2018: 0件、2017: 0件
平成30年度成果報告書 産業分野における人工知能及びその内の機械学習の活用状況及び人工知能技術の安全性に関する調査
43. 42
研究分野の動向
新しく立ち上がった国際会議
n The AAAI's Workshop on Artificial Intelligence Safety, 2019-: https://safeai.webs.upv.es/
n International Workshop on Artificial Intelligence Safety Engineering (WAISE) @
SAFECOMP, 2018-: https://www.waise.org/
n AISafety @IJCAI, 2019-: https://www.aisafetyw.org/
n 2020 USENIX Conference on Operational Machine Learning:
https://www.usenix.org/conference/opml20
n The Conference on Systems and Machine Learning (SysML): https://mlsys.org/
n International Workshop on Machine Learning Systems Engineering (iMLSE)@APSEC, 2018-
Safe AIに関するセンター
n Center for AI Safety (Stanford University, USA): http://aisafety.stanford.edu/
n PRECISE Center of Safe AI (University of Pennsylvania, USA):
https://precise.seas.upenn.edu/safe-autonomy
コミュニティ
n The Software Engineering for Machine Learning Applications (Polytechnique Montreal,
Canada) https://semla.polymtl.ca/organizers/
46. 45
保証範囲の明確化
Rahimi, M., & Chechik, M. (2019). Toward Requirements Specification for Machine-Learned Components. In 27th International Requirements Engineering Conference (pp. 241–244).
47. 46
原因追求:原因、不都合の分類
Nargiz Humbatova, Gunel Jahangirova, Gabriele Bavota, Vincenzo Riccio, Andrea Stocco,
Paolo Tonella, Taxonomy of Real Faults in Deep Learning Systems, ICSE 2020
Md Johirul Islam, Rangeet Pan, Giang Nguyen, Hridesh Rajan, Repairing Deep
Neural, Networks: Fix Patterns and Challenges, ICSE 2020
48. 47
原因追求: 意味を考えて何を間違いやすいか
分析
Cynthia C. S. Liem and Annibale Panichella, Oracle Issues in Machine Learning and
Where to Find Them, 8th International Workshop on Realizing Artificial Intelligence
Synergies in Software Engineering, 2020
49. 48
シナリオベースの影響分析
Ribeiro, M. T., & Guestrin, C. (2016). “Why Should I Trust You?” Explaining the
Predictions of Any Classifier. In the 22nd ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining - KDD ’16 (pp. 1135–1144).
出力に寄与している入力を抽出
出力に寄与している訓練データを抽出
Pang Wei Koh, Percy Liang, Understanding Black-box Predictions via Influence Functions,
Proceedings of the 34th International Conference on Machine Learning, PMLR 70:1885-1894, 2017.
50. 49
解析可能なモデルを変換・抽出
WFAで
モデル抽出
Takamasa Okudono, Masaki Waga, Taro Sekiyama, Ichiro Hasuo:
Weighted Automata Extraction from Recurrent Neural Networks via
Regression, AAAI 2020
Satoshi Hara, Kohei Hayashi, Making Tree Ensembles Interpretable: A Bayesian
Model Selection Approach, Proceedings of the Twenty-First International Conference
on Artificial Intelligence and Statistics, PMLR 84:77-85, 2018.
場合分けを大まかに理解する
53. 52
敵対的標本への対策
訓練の工夫
n 敵対的標本で訓練
u さまざまな敵対的標本を生成
u 起こりうる敵対的標本を優先的に発見
n ロバストネスを担保した訓練済みモデルの構築
n 入力が少し変わっただけで、判断を大きく変えない訓練済みモデル
u 訓練済みモデルの弱点を発見する研究
n 訓練済みモデルを蒸留や書き換えによって軽量化
n ロバストネスに関する論理的保証
u 特定の大きさ以下のノイズに対して予測が不変であることを証明
システム上の工夫
n 入力データを書き換えて誤判断しないようにする
n ノイズを加える。 訓練データと同じ特徴(分散)をもつデータに書き換える。
n アタックの検知
n 通常とは異なる入力、振る舞いを検知
n (出力の信頼度など) 不要な情報を公開しない
54. 53
アタックされたデータで訓練されたかを自動判定
発火パターンをクラスタリングすることで判定
Chen, B., Carvalho, W., Baracaldo, N., Ludwig, H., Edwards, B., Lee, T., … Srivastava, B. (2019). Detecting Backdoor
Attacks on Deep Neural Networks by Activation Clustering. In AAAI Workshop on Artificial Intelligence Safety (p. 8).
55. 54
今後(も)有望な研究
n DNNの訓練の理解:
リバースエンジニアリング
n シナリオベースの影響分析 ⇒ 説明性(XAI)の研究
抽象化
n DNNからの解析可能なモデルを生成・変換
微調整
n 訓練済みモデルの解析と修正
n セマンティクスを考慮したDNN(知識融合型訓練)
n 解析しやすい・分割しやすい・解釈性が高いDNNアーキテクチャ
n 不正解のリスク、正解の価値を考慮した訓練
n 機械学習の最新セキュリティ研究が実際のAIシステムにどこまで有用
かの評価と整理
n 敵対的標本がAIシステム上どれくらいリスクとなり得るかを整理
DNN(関数)と意味モデル(セマンティクス)
とのギャップを埋める
63. 62
お断り
n 推論に使った訓練済みモデルは、Yolo v3をCOCO
で訓練させたモデルです。
n そのため、現実的でない訓練モデル・訓練データの可能
性があります
n 例に出した写真は以下のオープンデータセットに含
まれているものです。研究目的以外には使えません
。利用制限に関しては各オープンデータのサイトを
御覧ください。
n BDD100K: A Large-scale Diverse Driving Video
Database: https://bair.berkeley.edu/blog/2018/05/30/bdd/
n Caltech Pedestrian Detection Benchmark:
http://www.vision.caltech.edu/Image_Datasets/CaltechPed
estrians/