Herself's Artificial Intelligence

Humans, meet your replacements.

Archive for the ‘news’ tag

Optimizing information credibility in smart swarms

without comments

With the advent of smartphone technology, it has become possible to conceive of entirely new classes of applications. Social swarming, in which users armed with smartphones are directed by a central director to report on events in the physical world, has several real-world applications: search and rescue, coordinated fire-fighting, and the DARPA balloon hunt challenge. In this paper, we focus on the following problem: how does the director optimize the selection of reporters to deliver credible corroborating information about an event. We first propose a model, based on common intuitions of believability, about the credibility of information. We then cast the problem posed above as a discrete optimization problem, and introduce optimal centralized solutions and an approximate solution amenable to decentralized implementation whose performance is about 20% off on average from the optimal (on real-world datasets derived from Google News) while being 3 orders of magnitude more computationally efficient. More interesting, a time-averaged version of the problem is amenable to a novel stochastic utility optimization formulation, and can be solved optimally, while in some cases yielding decentralized solutions. To our knowledge, we are the first to propose and explore the problem of extracting credible information from a network of smartphones. source

paper ( pdf )

More information:
Thruthy, Indiana U webpage to test the truthiness of something using datamining
Fast Company story on Truthy

Written by Linda MacPhee-Cobb

October 2nd, 2010 at 10:03 am

Yet another evolving creature claims basic intelligence

without comments

So many claims, it’s difficult to sort the intelligent from the educated. But at some point one or more of these claims will be true.

FOR generations, the Avidians have been cloning themselves quietly in a box. They’re not perfect, but most of their mutations go unnoticed. Then something remarkable happens. One steps forward, and that changes everything. Tens of thousands of generations down the line, some of its descendents will evolve memory.

Avidians are not microbes, or sci-fi alien life forms. They are the digital offspring of Charles Ofria and colleagues at Michigan State University (MSU) in East Lansing. They “live” in a computer world called Avida, and replicate using strings of coded computer instructions instead of DNA. But in many ways they are similar to real life: they compete with each other for resources, replicate, mutate, and evolve. They – or things like them – might eventually evolve to become artificially intelligent life forms. read more Artificial life forms evolve basic intelligence

More information:
HyperNEAT
Avida-ED
Avida-ED user manual ( pdf )
Observing mutations on the genomes of evolving Avidians (pdf)
Harnessing Digital Evolution ( $$$ )
Digital Evolution with Avidian

Written by Linda MacPhee-Cobb

August 4th, 2010 at 12:53 pm

An interesting swarm algorithm based on bats

without comments

Metaheuristic algorithms such as particle swarm optimization, firefly algorithm and harmony search are now becoming powerful methods for solving many tough optimization problems. In this paper, we propose a new metaheuristic method, the Bat Algorithm, based on the echolocation behaviour of bats. We also intend to combine the advantages of existing algorithms into the new bat algorithm. After a detailed formulation and explanation of its implementation, we will then compare the proposed algorithm with other existing algorithms, including genetic algorithms and particle swarm optimization. Simulations show that the proposed algorithm seems much superior to other algorithms, and further studies are also discussed. [download the paper pdf]

More information
Other swarm papers by Xin-She Yang

Written by Linda MacPhee-Cobb

April 25th, 2010 at 8:42 pm

Google uses quantum computing algorithm for image recognition

without comments

Written by Linda MacPhee-Cobb

December 13th, 2009 at 11:27 am

Virtual ant swarms to hunt down computer worms

without comments

So are we ready yet to hand over some of the control of our computers to evolving virtual creatures to do the dirty work for us? What happens when a virtual war breaks out on your home network? Do you get to watch the battles?

If we hand over this control how far are we willing to let virtual creatures evolve? Will they develop personality disorders and call work stoppages?

The future is closer than you think, turn around to look and you may get mowed down.

In the never-ending battle to protect computer networks from intruders, security experts are deploying a new defense modeled after one of nature’s hardiest creatures — the ant.

Unlike traditional security devices, which are static, these “digital ants” wander through computer networks looking for threats, such as “computer worms” — self-replicating programs designed to steal information or facilitate unauthorized use of machines. When a digital ant detects a threat, it doesn’t take long for an army of ants to converge at that location, drawing the attention of human operators who step in to investigate.

The concept, called “swarm intelligence,” promises to transform cyber security because it adapts readily to changing threats.

“In nature, we know that ants defend against threats very successfully,” explains Professor of Computer Science Errin Fulp, an expert in security and computer networks. “They can ramp up their defense rapidly, and then resume routine behavior quickly after an intruder has been stopped. We were trying to achieve that same framework in a computer system.” . . .

read more . . .

More information
Autonomic Computing freedom or threat?
EW Fulp Publications

Written by Linda MacPhee-Cobb

September 27th, 2009 at 3:46 pm