Theory of automata and formal languageRabia Khalid
KleenE Star Closure, Plus operation, recursive definition of languages, INTEGER, EVEN, factorial, PALINDROME, languages of strings, cursive definition of RE, defining languages by RE,Examples
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
https://telecombcn-dl.github.io/2017-dlsl/
Winter School on Deep Learning for Speech and Language. UPC BarcelonaTech ETSETB TelecomBCN.
The aim of this course is to train students in methods of deep learning for speech and language. Recurrent Neural Networks (RNN) will be presented and analyzed in detail to understand the potential of these state of the art tools for time series processing. Engineering tips and scalability issues will be addressed to solve tasks such as machine translation, speech recognition, speech synthesis or question answering. Hands-on sessions will provide development skills so that attendees can become competent in contemporary data analytics tools.
Дмитрий Селиванов, OK.RU. Finding Similar Items in high-dimensional spaces: L...Mail.ru Group
Дмитрий рассказал о методе снижения размерности многомерных данных – Locality Sensitive Hashing. На примере задачи поиска похожих текстовых документов гости был подробно разобран алгоритм Minhash.
Theory of automata and formal languageRabia Khalid
KleenE Star Closure, Plus operation, recursive definition of languages, INTEGER, EVEN, factorial, PALINDROME, languages of strings, cursive definition of RE, defining languages by RE,Examples
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
https://telecombcn-dl.github.io/2017-dlsl/
Winter School on Deep Learning for Speech and Language. UPC BarcelonaTech ETSETB TelecomBCN.
The aim of this course is to train students in methods of deep learning for speech and language. Recurrent Neural Networks (RNN) will be presented and analyzed in detail to understand the potential of these state of the art tools for time series processing. Engineering tips and scalability issues will be addressed to solve tasks such as machine translation, speech recognition, speech synthesis or question answering. Hands-on sessions will provide development skills so that attendees can become competent in contemporary data analytics tools.
Дмитрий Селиванов, OK.RU. Finding Similar Items in high-dimensional spaces: L...Mail.ru Group
Дмитрий рассказал о методе снижения размерности многомерных данных – Locality Sensitive Hashing. На примере задачи поиска похожих текстовых документов гости был подробно разобран алгоритм Minhash.
Slides for invited talk at Dynamic Languages Symposium (DLS'15) at SPLASH 2015 in Pittsburgh
http://2015.splashcon.org/event/dls2015-papers-declare-your-language
In the Language Designer’s Workbench project we are extending the Spoofax Language Workbench with meta-languages to declaratively specify the syntax, name binding rules, type rules, and operational semantics of a programming language design such that a variety of artifacts including parsers, static analyzers, interpreters, and IDE editor services can be derived and properties can be verified automatically. In this presentation I will talk about declarative specification for two aspects of language design: syntax and name binding.
First, I discuss the idea of declarative syntax definition as supported by grammar formalisms based on generalized parsing using the SDF3 syntax definition formalism as example. With SDF3, the language designer defines syntax in terms of productions and declarative disambiguation rules. This requires understanding a language in term of (tree) structure instead of the operational implementation of parsers. As a result, syntax definitions can be used for a range of language processors including parsers, formatters, syntax coloring, outline view, syntactic completion.
Second, I discuss our recent work on the declarative specification of name binding rules, that takes inspiration from declarative syntax definition. The NaBL name binding language supports definition of name binding rules in terms of its fundamental concepts: declarations, references, scopes, and imports. I will present the theory of name resolution that we have recently developed to provide a semantics for name binding languages such as NaBL.
this presentation is an introduction to R programming language.we will talk about usage, history, data structure and feathers of R programming language.
Breaking the Softmax Bottleneck: a high-rank RNN Language ModelSsu-Rui Lee
My paper presentation slides of a nice paper in ICLR 2018. (2018/05/02 in IDEA Lab)
Paper Information:
Breaking the Softmax Bottleneck: a high-rank RNN Language Model
Zhilin Yang, Zihang Dai, Ruslan Salakhutdinov, William W. Cohen
https://arxiv.org/abs/1711.03953
As electricity is difficult to store, it is crucial to strictly maintain the balance between production and consumption. The integration of intermittent renewable energies into the production mix has made the management of the balance more complex. However, access to near real-time data and communication with consumers via smart meters suggest demand response. Specifically, sending signals would encourage users to adjust their consumption according to the production of electricity. The algorithms used to select these signals must learn consumer reactions and optimize them while balancing exploration and exploitation. Various sequential or reinforcement learning approaches are being considered.
Online violence amplifies IRL discriminations, and the lack of diversity grows in a vicious circle. Understanding cyber-violence, its forms and mechanisms, can help us fight back. To process massive volumes of data, AI finally comes into play for good.
In the energy sector, the use of temporal data stands as a pivotal topic. At GRDF, we have developed several methods to effectively handle such data. This presentation will specifically delve into our approaches for anomaly detection and data imputation within time series, leveraging transformers and adversarial training techniques.
Natasha shares her experience to delve into the complexities, challenges, and strategies associated with effectively leading tech teams dispersed across borders.
Nour and Maria present the work they did at Tweag, Modus Create innovation arm, where the GenAI team developed an evaluation framework for Retrieval-Augmented Generation (RAG) systems. RAG systems provide an easy and low-cost way to extend the knowledge of Large Language Models (LLMs) but measuring their performance is not an easy task.
The presentation will review existing evaluation frameworks, ranging from those based on the traditional ML approach of using groundtruth datasets, including Tweag's, to those that use LLMs to compute evaluation metrics.
It will also delve into the practical implementation of Tweag's chatbot over two distinct documents datasets and provide insights on chunking, embedding and how open source and commercial LLMs compare.
Sharone Dayan, Machine Learning Engineer and Daria Stefic, Data Scientist, both from Contentsquare, delve into evaluation strategies for dealing with partially labelled or unlabelled data.
Laure talked about a very hot topic in the community at the moment with the ChatGPT phenomenon: how to supervise a PhD thesis in NLP in the age of Large Language Models (LLMs)?
Abstract: Who hasn't heard of the "Pilot Syndrome"? 85% of Data Science Pilots remain pilots and do not make it to the production stage. Let's build a production-ready and end-user-friendly Data Science application. 100% python and 100% open source.
Phase 1 | Building the GUI: create an interactive and powerful interface in a few lines of code
Phase 2 | Integrated back end: Manage your models and pipelines and create scenarios the smart way
"Nature Language Processing for proteins" by Amélie Héliou, Software Engineer @ Google Research
Abstract: Over the past few months, Large Language Models have become very popular.
We'll see how a simple LLM works, from input sentence to prediction.
I'll then present an application of LLM to protein name prediction.
Twitter: @Amelie_hel
"We are not passing by, and we are not a trend". What if an automated and large scale version of the Bechdel-Wallace test could confirm the speech of Alice Diop at the Cesar 2023?
That's the objective of BechdelAI : to build a tool based on Artificial Intelligence and open-source, allowing to measure the inequalities and the under-representation of women in movies and audiovisual.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Ultra-efficient algorithms for testing well-parenthesised expressions by Tatiana Starikovskaya
1. Ultra-efficient algorithms for testing
well-parenthesised expressions
Tatiana Starikovskaya (ENS Paris)
Joint work with Eldar Fisher (Technion) and Frédéric Magniez (Paris-Diderot)
WiMLDS Paris, November 24, 2017
2. Pattern matching: you use it every time you search for something
More general: algorithms on strings (= sequences of characters)
My research area
3. My research area
Applications
• Bioinformatics
• Information Retrieval
• …
Classical approaches
• We can read the whole input
• We can afford to store linear-space
data structures
In the Big Data world, we must do better!
4. My research area
Streaming algorithms
We receive the input as a stream, and must
process it on-the-fly, without storing it
Property testing algorithms
We must decide if the input has a property P,
but we can read only a small part of the input
?
?
?
We need efficient algorithms for string processing!
5. Property testers
Wait a second! How can we make the
decision not reading the whole input?
Well, in general, we cannot…
For example, we cannot say if the input is
well-parenthesised by reading just a small
fraction of it
?
?
?
Task: We must decide if the input has a property
P, but we can read only a small part of the input
Objective: Save time
()(()())()
()(()()(()
queried parentheses
are identical
? ? ?
? ? ?
6. Property testers
We must
1. accept, if the input has the property P
2. reject, if the input is far from having the
property
3. accept or reject otherwise
Far = we must fix at least εn characters of the
input so that the property is satisfied
The output must be correct probability at least 2/3
?
?
?
Task: We must decide if the input has a property
P, but we can read only a small part of the input
Objective: Save time
()(()())()
()(()()(((
()(()()(()
ε = 0.2, n = 10, εn = 2
?
7. Well-parenthesised expressions
Dm = well-balanced strings on parentheses of m types
Task: develop a property tester that decides whether
the input is in Dm
()([]())[]([]) ()(([][)()((([]
1. It accepts all inputs that are in Dm with
probability at least 2/3
2. It rejects all inputs that are ε-far from Dm
with probability at least 2/3
Time = number of read characters!
8. Simplicity: simplest context-free language
Universality: any context-free language can be expressed
through it (Chomsky-Schützenberger theorem)
Practicality: processing of semi-structured documents
• Visibly pushdown languages
• Nested strings
Why is it interesting?
Dm = well-balanced strings on parentheses of m types
9. What do we know
()(()())()
()(()()(((
()([]())([])
()(([)()(([]
const.m =1 Alon et al.’01
m ≥ 2
Parnas et al.’03c n1/11 < T < C n2/3
c n1/5 < T < C n2/5+δ
NEW!
Dm = well-balanced strings on parentheses of m types
10. New tester for Dm-membership
Dm = well-balanced strings on parentheses of m types
Hmmm… does not look like a simple property to test!
Let’s start with a property tester for strawberries
()({()})([]){((([]())([])([{}]())}([])))
red
sweet
yellow seeds
simple
properties,
easy to test!
?
11. New tester for Dm-membership
Dm = well-balanced strings on parentheses of m types
If we replace all opening parentheses with (, and all closing
parentheses with ), the resulting string must be in D1
And we know how to test in O(1) time [Alon et al.’01]!
Not sufficient: becomes
()({()})([]){((([]())([])([{}]()))([]))}
()((()))(())((((()())(())((())()))(())))
()({{)}) ()((()))
12. New tester for Dm-membership
Dm = well-balanced strings on parentheses of m types
Each block is Dm-consistent = is a substring of a string in Dm
We test that the blocks are Dm-consistent by running our
Dm-test in a recursive fashion
()({()})([ ]){((([]() )([])([{}] ()))([]))}
()({()})([ ]){((([]() )([])([{}] ()))([]))}
b = n4/5 b = n4/5 b = n4/5 b = n4/5
13. New tester for Dm-membership
Dm = well-balanced strings on parentheses of m types
We have checked that the string is good locally, but can we
guarantee that it is good globally?
()({()})([ ]){((([]() )([])([{}] ()))([]))}
()({()})([ ]){((([]() )([])([{}] ()))([]))}
b = n4/5 b = n4/5 b = n4/5 b = n4/5
14. New tester for Dm-membership
Dm = well-balanced strings on parentheses of m types
Approximate matching graph: nodes = blocks, edge (B1,B2) =
many excess parentheses in block B1 must be matched with excess
parentheses in block B2
()({()})([ ]){((([]() )([])([{}] ()))([]))}
()({()})([ ]){((([]() )([])([{}] ()))([]))}
b = n4/5 b = n4/5 b = n4/5 b = n4/5
15. New tester for Dm-membership
Dm = well-balanced strings on parentheses of m types
()({()})([ ]){((([]() )([])([{}] ()))([]))}
()({()})([ ]){((([]() )([])([{}] ()))([]))}
1. Build an approximate matching graph
2. Run a recursive inter-block matching procedure
b = n4/5 b = n4/5 b = n4/5 b = n4/5
16. ()({()})([ ]){((([]() )([])([{}] ())}([])))
1. Build an approximate matching graph
2. Run a recursive inter-block matching procedure
]){((([]() ))((((()() (())((((()()))))
S S w/o types D1
{e1(S) = 2
e0(S) = 4
e1(S) - excess closing parentheses
e0(S) - excess opening parentheses
T1, T2, …, Tn/b - blocks of the input
Parentheses in Ti that must be matched with parentheses in Tj
min(e0(Ti), e1(Ti+1Ti+2…Tj)) - e1(Ti+1Ti+2…Tj-1)
17. ()({()})([ ]){((([]() )([])([{}] ())}([])))
1. Build an approximate matching graph
2. Run a recursive inter-block matching procedure
]){((([]() ))((((()() (())((((()()))))
S S w/o types D1
{e1(S) = 2
e0(S) = 4
Observation e1(S) = max{S’ - prefix of S} (n1(S’) - n0(S’))
n1(S’) = |closing parentheses in S’|
n0(S’) = |opening parentheses in S’|
Lemma By querying x2/Δ2 positions of a string S of length x,
we can compute a Δ-additive approximation of n1(S’) for any
substring S’ of S correctly w.h.p.
18. ()({()})([ ]){((([]() )([])([{}] ())}([])))
1. Build an approximate matching graph
2. Run a recursive inter-block matching procedure
Lemma By querying x2/Δ2 positions of a string S of length x,
we can compute a Δ-additive approximation of n1(S’) for any
substring S’ of S correctly w.h.p.
Proof
Query x2/Δ2 positions of S uniformly at random
If |S’| ≤ Δ, output Δ
Otherwise, |S’| = yΔ, where y > 1
S’ contains ~yx/Δ of the queried positions
19. ()({()})([ ]){((([]() )([])([{}] ())}([])))
1. Build an approximate matching graph
2. Run a recursive inter-block matching procedure
Lemma By querying x2/Δ2 positions of a string S of length x,
we can compute a Δ-additive approximation of n1(S’) for any
substring S’ of S correctly w.h.p.
Proof (cont.)
Xi = 1 iff the i-th queried position is a closing parenthesis
E[(Δ2/x) ⋅ Σ Xi] = (Δ2/x)⋅ n1(S’) (yx/Δ) / yΔ = n1(S’)
By additive Chernoff bound,
P[|(Δ2/x) ⋅ Σ Xi - n1(S’)| > Δ] < 2e-2
20. New tester for Dm-membership
1. Build an approximate matching graph
2. Run a recursive inter-block matching procedure
If we replace all opening parentheses with (, and all
closing parentheses with ), the resulting string ∈ D1
Test that the blocks are Dm-consistent by running
the test in a recursive fashion
Complexity: O(n2/5)
()({()})([ ]){((([]() )([])([{}] ())}([])))
()({()})([ ]){((([]() )([])([{}] ())}([])))
O(1)
O(√b)
b = n4/5
b = n4/5 b = n4/5 b = n4/5
O(n2/b2)
21. Take-home message
• Streaming or property testing settings
• We have new, ultra-efficient algorithms for string
processing
• It is enough to use a polylog space or to read a
constant number of data items in the input to solve
a problem with good guarantees
Questions? Comments?