Listing 1 - 4 of 4 |
Sort by
|
Choose an application
This book reconsiders key issues, such as description and explanation, which affect data analytics. For starters: the soul does not exist. Once released from this cumbersome roommate, we are left with complex biological systems: namely, ourselves, who must configure their environment in terms of worlds that are compatible with what they sense. Far from supplying yet another cosmogony, the book provides the cultivated reader with computational tools for describing and understanding data arising from his surroundings, such as climate parameters or stock market trends, even the win/defeat story of his son football team. Besides the superposition of the very many universes considered by quantum mechanics, we aim to manage families of worlds that may have generated those data through the key feature of their compatibility. Starting from a sharp engineering of ourselves in term of pairs consisting of genome plus a neuron ensemble, we toss this feature in different cognitive frameworks within a span of exploitations ranging from probability distributions to the latest implementations of machine learning. From the perspective of human society as an ensemble of the above pairs, the book also provides scientific tools for analyzing the benefits and drawbacks of the modern paradigm of the world as a service.
Mathematics --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- fuzzy logic --- cybernetica --- wiskunde --- KI (kunstmatige intelligentie) --- Computational intelligence. --- Artificial intelligence. --- Neural networks (Computer science). --- Computational Intelligence. --- Artificial Intelligence. --- Mathematical Models of Cognitive Processes and Neural Networks. --- AI (artificiële intelligentie)
Choose an application
This book provides a systematic study on the security of deep learning. With its powerful learning ability, deep learning is widely used in CV, FL, GNN, RL, and other scenarios. However, during the process of application, researchers have revealed that deep learning is vulnerable to malicious attacks, which will lead to unpredictable consequences. Take autonomous driving as an example, there were more than 12 serious autonomous driving accidents in the world in 2018, including Uber, Tesla and other high technological enterprises. Drawing on the reviewed literature, we need to discover vulnerabilities in deep learning through attacks, reinforce its defense, and test model performance to ensure its robustness. Attacks can be divided into adversarial attacks and poisoning attacks. Adversarial attacks occur during the model testing phase, where the attacker obtains adversarial examples by adding small perturbations. Poisoning attacks occur during the model training phase, where the attacker injects poisoned examples into the training dataset, embedding a backdoor trigger in the trained deep learning model. An effective defense method is an important guarantee for the application of deep learning. The existing defense methods are divided into three types, including the data modification defense method, model modification defense method, and network add-on method. The data modification defense method performs adversarial defense by fine-tuning the input data. The model modification defense method adjusts the model framework to achieve the effect of defending against attacks. The network add-on method prevents the adversarial examples by training the adversarial example detector. Testing deep neural networks is an effective method to measure the security and robustness of deep learning models. Through test evaluation, security vulnerabilities and weaknesses in deep neural networks can be identified. By identifying and fixing these vulnerabilities, the security and robustness of the model can be improved. Our audience includes researchers in the field of deep learning security, as well as software development engineers specializing in deep learning.
Mathematics --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- informatica --- wiskunde --- AI (artificiële intelligentie) --- Artificial intelligence. --- Computer engineering. --- Computer networks. --- Neural networks (Computer science). --- Artificial Intelligence. --- Computer Engineering and Networks. --- Mathematical Models of Cognitive Processes and Neural Networks.
Choose an application
Write algorithms and program in the new field of quantum computing. This book covers major topics such as the physical components of a quantum computer: qubits, entanglement, logic gates, circuits, and how they differ from a traditional computer. Also, Practical Quantum Computing for Developers discusses quantum computing in the cloud using IBM Q Experience including: the composer, quantum scores, experiments, circuits, simulators, real quantum devices, and more. You’ll be able to run experiments in the cloud on a real quantum device. Furthermore, this book shows you how to do quantum programming using the QISKit (Quantum Information Software Kit), Python SDK, and other APIs such as QASM (Quantum Assembly). You’ll learn to write code using these languages and execute it against simulators (local or remote) or a real quantum computer provided by IBM’s Q Experience. Finally, you’ll learn the current quantum algorithms for entanglement, random number generation, linear search, integer factorization, and others. You’ll peak inside the inner workings of the Bell states for entanglement, Grover’s algorithm for linear search, Shor’s algorithm for integer factorization, and other algorithms in the fields of optimization, and more. Along the way you’ll also cover game theory with the Magic Square, an example of quantum pseudo-telepathy where parties sharing entangled states can be observed to have some kind of communication between them. In this game Alice and Bob play against a referee. Quantum mechanics allows Alice and Bob to always win! By the end of this book, you will understand how this emerging technology provides massive parallelism and significant computational speedups over classical computers, and will be prepared to program quantum computers which are expected to replace traditional computers in the data center. You will: Use the Q Experience Composer, the first-of-its-kind web console to create visual programs/experiments and submit them to a quantum simulator or real device on the cloud Run programs remotely using the Q Experience REST API Write algorithms that provide superior performance over their classical counterparts Build a Node.js REST client for authenticating, listing remote devices, querying information about quantum processors, and listing or running experiments remotely in the cloud Create a quantum number generator: The quintessential coin flip with a quantum twist Discover quantum teleportation: This algorithm demonstrates how the exact state of a qubit (quantum information) can be transmitted from one location to another, with the help of classical communication and quantum entanglement between the sender and receiver Peek into single qubit operations with the classic game of Battleships with a quantum twist Handle the counterfeit coin problem: a classic puzzle that consists of finding a counterfeit coin in a beam balance among eight coins in only two turns.
Mathematics --- Computer science --- Programming --- Information systems --- Computer. Automation --- quantumcomputers --- Python (informatica) --- cloud computing --- computers --- programmeertalen --- wiskunde --- gegevensanalyse --- computerkunde --- Programming languages (Electronic computers). --- Neural networks (Computer science) . --- Quantum computers. --- Big data. --- Python (Computer program language) --- Programming Languages, Compilers, Interpreters. --- Mathematical Models of Cognitive Processes and Neural Networks. --- Quantum Computing. --- Big Data. --- Python.
Choose an application
This book describes a novel methodology for studying algorithmic skills, intended as cognitive activities related to rule-based symbolic transformation, and argues that some human computational abilities may be interpreted and analyzed as genuine examples of extended cognition. It shows that the performance of these abilities relies not only on innate neurocognitive systems or language-related skills, but also on external tools and general agent–environment interactions. Further, it asserts that a low-level analysis, based on a set of core neurocognitive systems linking numbers and language, is not sufficient to explain some specific forms of high-level numerical skills, like those involved in algorithm execution. To this end, it reports on the design of a cognitive architecture for modeling all the relevant features involved in the execution of algorithmic strategies, including external tools, such as paper and pencils. The first part of the book discusses the philosophical premises for endorsing and justifying a position in philosophy of mind that links a modified form of computationalism with some recent theoretical and scientific developments, like those introduced by the so-called dynamical approach to cognition. The second part is dedicated to the description of a Turing-machine-inspired cognitive architecture, expressly designed to formalize all kinds of algorithmic strategies.
Cognitive psychology --- Psychology --- Mathematics --- Computer science --- Computer. Automation --- computers --- cognitieve psychologie --- bewustzijn --- persoonlijkheidsleer --- wiskunde --- computerkunde --- Philosophy of mind. --- Computers. --- Neural networks (Computer science) . --- Cognitive psychology. --- Philosophy of Mind. --- Computation by Abstract Devices. --- Mathematical Models of Cognitive Processes and Neural Networks. --- Cognitive Psychology.
Listing 1 - 4 of 4 |
Sort by
|