SunJackson Blog


  • 首页

  • 分类

  • 关于

  • 归档

  • 标签

  • 站点地图

  • 公益404

Who spends how much, and on what?

转载自:http://andrewgelman.com/2018/08/22/who-spends-how-much-and-on-what/

Andrew


发表于 2018-08-22

阅读全文 »

Whats new on arXiv

转载自:https://advanceddataanalytics.net/2018/08/23/whats-new-on-arxiv-742/

Michael Laux


发表于 2018-08-22

Use Of Vapnik-Chervonenkis Dimension in Model Selection

阅读全文 »

Document worth reading: “Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions”

转载自:https://advanceddataanalytics.net/2018/08/22/document-worth-reading-fog-computing-survey-of-trends-architectures-requirements-and-research-directions/

Michael Laux


发表于 2018-08-22

Emerging technologies like the Internet of Things (IoT) require latency-aware computation for real-time application processing. In IoT environments, connected things generate a huge amount of data, which are generally referred to as big data. Data generated from IoT devices are generally processed in a cloud infrastructure because of the on-demand services and scalability features of the cloud computing paradigm. However, processing IoT application requests on the cloud exclusively is not an efficient solution for some IoT applications, especially time-sensitive ones. To address this issue, Fog computing, which resides in between cloud and IoT devices, was proposed. In general, in the Fog computing environment, IoT devices are connected to Fog devices. These Fog devices are located in close proximity to users and are responsible for intermediate computation and storage. Fog computing research is still in its infancy, and taxonomy-based investigation into the requirements of Fog infrastructure, platform, and applications mapped to current research is still required. This paper starts with an overview of Fog computing in which the definition of Fog computing, research trends, and the technical differences between Fog and cloud are reviewed. Then, we investigate numerous proposed Fog computing architecture and describe the components of these architectures in detail. From this, the role of each component will be defined, which will help in the deployment of Fog computing. Next, a taxonomy of Fog computing is proposed by considering the requirements of the Fog computing paradigm. We also discuss existing research works and gaps in resource allocation and scheduling, fault tolerance, simulation tools, and Fog-based microservices. Finally, by addressing the limitations of current research works, we present some open issues, which will determine the future research direction. Fog Computing: Survey of Trends, Architectures, Requirements, and Research Directions

阅读全文 »

R Packages worth a look

转载自:https://advanceddataanalytics.net/2018/08/22/r-packages-worth-a-look-1250/

Michael Laux


发表于 2018-08-22

Two Arm Bayesian Clinical Trial Design with and Without Historical Control Data (BayesCTDesign)A set of functions to help clinical trial researchers calculate power and sample size for two-arm Bayesian randomized clinical trials that do or do not …

阅读全文 »

Document worth reading: “Applications of Artificial Intelligence to Network Security”

转载自:https://advanceddataanalytics.net/2018/08/22/document-worth-reading-applications-of-artificial-intelligence-to-network-security/

Michael Laux


发表于 2018-08-22

Attacks to networks are becoming more complex and sophisticated every day. Beyond the so-called script-kiddies and hacking newbies, there is a myriad of professional attackers seeking to make serious profits infiltrating in corporate networks. Either hostile governments, big corporations or mafias are constantly increasing their resources and skills in cybercrime in order to spy, steal or cause damage more effectively. traditional approaches to Network Security seem to start hitting their limits and it is being recognized the need for a smarter approach to threat detections. This paper provides an introduction on the need for evolution of Cyber Security techniques and how Artificial Intelligence could be of application to help solving some of the problems. It provides also, a high-level overview of some state of the art AI Network Security techniques, to finish analysing what is the foreseeable future of the application of AI to Network Security. Applications of Artificial Intelligence to Network Security

阅读全文 »

Who spends how much, and on what?

转载自:https://andrewgelman.com/2018/08/22/who-spends-how-much-and-on-what/

Andrew


发表于 2018-08-22

阅读全文 »

Create a translator chatbot using Amazon Translate and Amazon Lex

转载自:https://aws.amazon.com/blogs/machine-learning/create-a-translator-chatbot-using-amazon-translate-and-amazon-lex/

Steve Turner


发表于 2018-08-22

Powered by the same deep learning technologies as Amazon Alexa, Amazon Lex is a service for building conversational interfaces into any application that uses voice and text. Amazon Translate is a neural machine translation service that delivers fast, high-quality, and affordable language translation. In this post, I show how you can use a custom slot with Amazon Lex to take free text as input, submit it to Amazon Translate for translation, and then present the result to the user. The solution is scalable, using Serverless Computing technologies and designed to allow secure, anonymous access to translation UI via Amazon Cognito. I’ll take advantage of an existing AWS CloudFormation script and Amazon CloudFront to easily create a web-based implementation of the translator bot.

阅读全文 »

New speed record set for training deep learning models on AWS

转载自:https://aws.amazon.com/blogs/machine-learning/new-speed-record-set-for-training-deep-learning-models-on-aws/

Geoff Murase


发表于 2018-08-22

fast.ai, a research lab dedicated to making deep learning more accessible, has announced that they successfully trained the ResNet-50 deep learning model on a million images in 18 minutes using 16 Amazon EC2 P3.16xlarge instances. They accomplished this milestone by spending just $40. This new speed record illustrates how you can drastically cut down the training times for deep learning models, enabling you to bring your innovations to market faster and at a lower cost.

阅读全文 »

Using gganimate to illustrate the luminance illusion

转载自:http://blog.revolutionanalytics.com/2018/08/luminance-illusion.html

David Smith


发表于 2018-08-22

Many illusions are based on the fact that our perceptions of color or brightness of an object are highly dependent on the background surrounding the object. For example, in this image (an example of the Cornsweet illusion) the upper and lower blocks are exactly the same color, according to the pixels displayed on your screen.

阅读全文 »

If you did not already know

转载自:https://advanceddataanalytics.net/2018/08/22/if-you-did-not-already-know-460/

Michael Laux


发表于 2018-08-22

Gradient Similarity Deep neural networks are susceptible to small-but-specific adversarial perturbations capable of deceiving the network. This vulnerability can lead to potentially harmful consequences in security-critical applications. To address this vulnerability, we propose a novel metric called \emph{Gradient Similarity} that allows us to capture the influence of training data on test inputs. We show that \emph{Gradient Similarity} behaves differently for normal and adversarial inputs, and enables us to detect a variety of adversarial attacks with a near perfect ROC-AUC of 95-100\%. Even white-box adversaries equipped with perfect knowledge of the system cannot bypass our detector easily. On the MNIST dataset, white-box attacks are either detected with a high ROC-AUC of 87-96\%, or require very high distortion to bypass our detector. …

阅读全文 »
1 … 243 244 245 … 398
SunJackson

SunJackson

3974 日志
5 分类
© 2018 - 2019 SunJackson