Menu

Blog

Archive for the ‘information science’ category: Page 72

Oct 5, 2022

Discovering novel algorithms with AlphaTensor

Posted by in categories: education, information science, mathematics, robotics/AI

Algorithms have helped mathematicians perform fundamental operations for thousands of years. The ancient Egyptians created an algorithm to multiply two numbers without requiring a multiplication table, and Greek mathematician Euclid described an algorithm to compute the greatest common divisor, which is still in use today.

During the Islamic Golden Age, Persian mathematician Muhammad ibn Musa al-Khwarizmi designed new algorithms to solve linear and quadratic equations. In fact, al-Khwarizmi’s name, translated into Latin as Algoritmi, led to the term algorithm. But, despite the familiarity with algorithms today – used throughout society from classroom algebra to cutting edge scientific research – the process of discovering new algorithms is incredibly difficult, and an example of the amazing reasoning abilities of the human mind.

In our paper, published today in Nature, we introduce AlphaTensor, the first artificial intelligence (AI) system for discovering novel, efficient, and provably correct algorithms for fundamental tasks such as matrix multiplication. This sheds light on a 50-year-old open question in mathematics about finding the fastest way to multiply two matrices.

Oct 5, 2022

How Quantum Physics Leads to Decrypting Common Algorithms

Posted by in categories: computing, encryption, information science, mathematics, quantum physics, weapons

The rise of quantum computing and its implications for current encryption standards are well known. But why exactly should quantum computers be especially adept at breaking encryption? The answer is a nifty bit of mathematical juggling called Shor’s algorithm. The question that still leaves is: What is it that this algorithm does that causes quantum computers to be so much better at cracking encryption? In this video, YouTuber minutephysics explains it in his traditional whiteboard cartoon style.

“Quantum computation has the potential to make it super, super easy to access encrypted data — like having a lightsaber you can use to cut through any lock or barrier, no matter how strong,” minutephysics says. “Shor’s algorithm is that lightsaber.”

Continue reading “How Quantum Physics Leads to Decrypting Common Algorithms” »

Oct 5, 2022

As ransomware attacks increase, new algorithm may help prevent power blackouts

Posted by in categories: cybercrime/malcode, energy, information science

Millions of people could suddenly lose electricity if a ransomware attack just slightly tweaked energy flow onto the U.S. power grid.

No single power utility company has enough resources to protect the entire grid, but maybe all 3,000 of the grid’s utilities could fill in the most crucial gaps if there were a map showing where to prioritize their security investments.

Purdue University researchers have developed an to create that map. Using this tool, regulatory authorities or cyber insurance companies could establish a framework that guides the security investments of power utility companies to parts of the grid at greatest risk of causing a blackout if hacked.

Oct 4, 2022

Seeking Stability in a Relativistic Fluid

Posted by in categories: information science, particle physics, space

A fluid dynamics theory that violates causality would always generate paradoxical instabilities—a result that could guide the search for a theory for relativistic fluids.

The theory of fluid dynamics has been successful in many areas of fundamental and applied sciences, describing fluids from dilute gases, such as air, to liquids, such as water. For most nonrelativistic fluids, the theory takes the form of the celebrated Navier-Stokes equation. However, fundamental problems arise when extending these equations to relativistic fluids. Such extensions typically imply paradoxes—for instance, thermodynamic states of the systems can appear stable or unstable to observers in different frames of reference. These problems hinder the description of the dynamics of important fluid systems, such as neutron-rich matter in neutron star mergers or the quark-gluon plasma produced in heavy-ion collisions.

Oct 4, 2022

Uncovering Hidden Patterns: AI Reduces a 100,000-Equation Quantum Physics Problem to Only Four Equations

Posted by in categories: information science, quantum physics, robotics/AI

Scientists trained a machine learning tool to capture the physics of electrons moving on a lattice using far fewer equations than would typically be required, all without sacrificing accuracy. A daunting quantum problem that until now required 100,000 equations has been compressed into a bite-size task of as few as four equations by physicists using artificial intelligence. All of this was accomplished without sacrificing accuracy. The work could revolutionize how scientists investigate systems containing many interacting electrons. Furthermore, if scalable to other problems, the approach could potentially aid in the design of materials with extremely valuable properties such as superconductivity or utility for clean energy generation.

Oct 3, 2022

What is the fifth dimension?

Posted by in category: information science

We directly experience 3 spatial and 1 temporal dimensions (3+1). But here’s an interesting observation made by Kaluza and Klein almost a century ago: If you write the equations of general relativity in (4+1) dimensions, but imagine one spatial di…

Oct 3, 2022

AI shrinks 100,000-equation quantum problem to just four equations

Posted by in categories: information science, quantum physics, robotics/AI

PhonlamaiPhoto/iStock.

The Hubbard Model

Oct 2, 2022

How to choose the right NLP solution

Posted by in categories: information science, robotics/AI

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.

For decades, enterprises have jury-rigged software designed for structured data when trying to solve unstructured, text-based data problems. Although these solutions performed poorly, there was nothing else. Recently, though, machine learning (ML) has improved significantly at understanding natural language.

Continue reading “How to choose the right NLP solution” »

Oct 2, 2022

Machine learning helps scientists peer (a second) into the future

Posted by in categories: information science, robotics/AI

The past may be a fixed and immutable point, but with the help of machine learning, the future can at times be more easily divined.

Using a new type of machine learning method called next generation reservoir computing, researchers at The Ohio State University have recently found a new way to predict the behavior of spatiotemporal chaotic systems—such as changes in Earth’s weather—that are particularly complex for scientists to forecast.

The study, published today in the journal Chaos: An Interdisciplinary Journal of Nonlinear Science, utilizes a new and highly that, when combined with next generation reservoir computing, can learn spatiotemporal chaotic systems in a fraction of the time of other machine learning algorithms.

Oct 1, 2022

This Cyber Security Service Utilizes Artificial Intelligence

Posted by in categories: cybercrime/malcode, information science, robotics/AI

This post is also available in: he עברית (Hebrew)

As everyday technologies get more and more advanced, cyber security must be at the forefront of every customer. Cyber security services have become common and are often used by private companies and the public sector in order to protect themselves from potential cyber attacks.

One of these services goes under the name Darktrace and has recently been acquired by Cybersprint, a Dutch provider of advanced cyber security services and a manufacturer of special tools that use machine learning algorithms to detect cyber vulnerabilities. Based on attack path modeling and graph theory, Darktrace’s platform represents organizational networks as directional, weighted graphs with nodes where multi-line segments meet and edges where they join. In order to estimate the probability that an attacker will be able to successfully move from node A to node B, a weighted graph can be used. Understanding the insights gained will make it easier for Darktrace to simulate future attacks.

Page 72 of 280First6970717273747576Last