208,923 research outputs found

    AI, ML, and Algorithms, Oh My: How Technology Affects Search Results

    Get PDF
    AI, ML, and Algorithms, Oh My: How Technology Affects Search Results There’s no doubt that artificial/augmented intelligence, machine learning, and algorithms affect your search results. Most business researchers understand that their web searches are influenced by the underlying technologies and that the algorithms in play are numerous and not disclosed by search engine companies. However, AI is also used by our library subscription databases—you know, the ones we pay money for. Learn the five basic things you should know about the effect of these technologies on your search results

    Camera-based deep learning AI assistant system for basketball training

    Get PDF
    The YOLO, a Computer Vision Algorithms, is brought out to analyze the basketball player’s status as a dataset. It can record the players’ behavior on the court including dribbling, shooting, and running. In this way, the app could collect the field goal you made and missed. First, you should use this app to record a video of your shoot training. After that, the AI would analyze and brings out a 3d virtual diagram to interpret your performance. This diagram will show the hot zone and cold zone for your field goal. Also, the track of your ball will be displayed on the video so that you can know if the angle of your shooting is too low or too high. In the end, the AI-based on machine learning will give out a plan according to your performance on shooting. As a training mobile application supported by camera-based action recognition, the target audience is the basketball amateur players who don’t have the resources as pro players do. This project will be designed as a new training experience and will be delivered as a promo video that shows how to use the application and also the scenario people use

    Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform

    Get PDF
    The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. The latter are based on three different ciphering algorithms, used as keystream generators: Advanced Encryption Standard (AES), SNOW 3G and ZUC. These algorithms are used in Long Term Evolution (LTE) terminals to perform user data confidentiality and integrity protection. In the first place, a thorough study of the algorithms has been conducted. Then, we have used Matlab to generate a reference model of the algorithms and the High-Level Synthesis (HLS) design flow to generate the Register-Transfer Level (RTL) description from algorithmic descriptions in C++. The keystream generation and integrity blocks have been tested at RTL level. The confidentiality block has been described along with the control, datapath and interface block at a RTL level using System C language. The hardware blocks have been integrated into a processor capable of performing hardware confidentiality and integrity protection: the crypto processor. This Intellectual Property (IP) has been integrated and tested in a cycle accurate virtual platform. The outcome of this Master’s Thesis is a crypto processor capable of performing the proposed confidentiality and integrity algorithms under request.The Internet of Things (IoT) is one of the big revolutions that our society is expected to go through in the near future. This represents the inter-connection of devices, sensors, controllers, and any items, refereed as things, through a network that enables machine-to-machine communication. The number of connected devices will greatly increase. The applications taking advantage of IoT will enable to develop a great amount of technologies such as smart homes, smart cities and intelligent transportation. The possibilities allowed are huge and not yet fully explored. Picture yourself in the near future having a nice dinner with some friends. Then, you suddenly recall that your parking ticket expires in five minutes and unfortunately your car is parked some blocks away. You are having a good time and feel lazy to walk all the way to where you parked your car to pay for a time extension. Luckily enough, the parking meter is part of the IoT network and allows you, with the recently installed new application in your smart-phone, to pay this bill from anywhere you are. This payment will be sent to the parking meter and your time will be extended. Problem solved, right? Well, the risk comes when you perform your payment, not knowing that your "worst enemy" has interceded this communication and is able to alter your transaction. Perhaps, this individual decides to cancel your payment and you will have to pay a fine. Or even worse, this person steals your banking details and uses your money to take the vacations you’ve always wanted. There are many examples in our everyday life where we expose our personal information. With an increasing number of devices existing and using wireless communications without the action of an human, the security is a key aspect of IoT. This Master’s Thesis addresses the need to cover these security breaches in a world where an increasing amount of devices are communicating with each other. With the expansion of IoT where billions of devices will be connected wirelessly, our data will be widely spread over the air. The user will not be able to protect their sensible data without these securing capabilities. Therefore, different security algorithms used in today’s and tomorrow’s wireless technologies have been implemented on a chip to secure the communication. The confidentiality and integrity algorithms aim to solve the two aspects of the problem: protect the secrecy of banking details and prevent the alteration of the communication’s information. In this Master’s Thesis we have developed a hardware processor for securing data during a wireless communication, specifically designed for IoT applications. The developed system is realized with minimal area and power in mind, so that they can be fitted even in the smallest devices. We have compared many different hardware architectures, and after exploring many possible implementations, we have implemented the security algorithms on a hardware platform. We believe the content of this Thesis work is of great interest to anybody interested in hardware security applied to the IoT field. Furthermore, due to the processes and methodology used in this work, it will also be of interest to people who want to know more about how higher level programming languages can be used to describe such a specialized circuit, like one performing security algorithms. Finally, people interested in hardware and software co-simulation will find in this project a good example of the utilization of such system modeling technique

    A New Pseudo Real-time Single-action Game Challenge and Competition for AI

    Get PDF
    Treball final de Grau en Disseny i Desenvolupament de Videojocs. Codi: VJ1241. Curs acadèmic: 2022/2023This work presents TotalBotWar, a new pseudo real-time single-action challenge for game AI for mobile devices, as well as some initial experiments that benchmark the framework with different agents. The game is based on the real-time battles of the popular TotalWar games series where players manage an army to defeat the opponents one. In the proposed game, a turn consists of an order to control one of your units. One interesting feature of the game is that if a particular unit does not receive an order in a turn, it will continue performing the action specified in a previous turn. The turnwise branching factor becomes overwhelming for traditional algorithms and the partial observability of the game state makes the proposed game an interesting platform to test modern AI algorithms. It should be added that it is not necessary to know about programming to play, also the manual game mechanics have been implemented in which you can control your troops with the mouse. Finally, for reasons that will be explained in the following chapters, the structure of the developed system is not the conventional one, but a Cloud Gaming [26] style structure has been necessary

    An Atypical Survey of Typical-Case Heuristic Algorithms

    Full text link
    Heuristic approaches often do so well that they seem to pretty much always give the right answer. How close can heuristic algorithms get to always giving the right answer, without inducing seismic complexity-theoretic consequences? This article first discusses how a series of results by Berman, Buhrman, Hartmanis, Homer, Longpr\'{e}, Ogiwara, Sch\"{o}ening, and Watanabe, from the early 1970s through the early 1990s, explicitly or implicitly limited how well heuristic algorithms can do on NP-hard problems. In particular, many desirable levels of heuristic success cannot be obtained unless severe, highly unlikely complexity class collapses occur. Second, we survey work initiated by Goldreich and Wigderson, who showed how under plausible assumptions deterministic heuristics for randomized computation can achieve a very high frequency of correctness. Finally, we consider formal ways in which theory can help explain the effectiveness of heuristics that solve NP-hard problems in practice.Comment: This article is currently scheduled to appear in the December 2012 issue of SIGACT New

    Modeling practical thinking

    Get PDF
    Intellectualists about knowledge how argue that knowing how to do something is knowing the content of a proposition (i.e, a fact). An important component of this view is the idea that propositional knowledge is translated into behavior when it is presented to the mind in a peculiarly practical way. Until recently, however, intellectualists have not said much about what it means for propositional knowledge to be entertained under thought's practical guise. Carlotta Pavese fills this gap in the intellectualist view by modeling practical modes of thought after Fregean senses. In this paper, I take up her model and the presuppositions it is built upon, arguing that her view of practical thought is not positioned to account for much of what human agents are able to do

    FYS: Ethics And Technology (PHIL 07/CPSC 15) Syllabus

    Get PDF
    There has been an accelerated shift in the influence of computing technology and the use of algorithms in our daily lives. With this technology comes serious ethical questions. Philosophers are often well-equipped to wrestle with ethical questions, but less well-equipped to wrestle with questions of technology itself. Computer scientists are well-equipped to deal with the problems and challenges of technology, but less well-equipped to deal with the ethical problems and challenges that technology can pose. In this co-taught course, we bring together the two fields to address ethical questions involving social media, data mining, self-driving cars, artificial intelligence, and other topics
    • …
    corecore