I am a long time developer in multiple languages. My focus is 3D graphics and graphics APIs, (OpenGL, Direct3D, Unity) along with music technology and audio. I have been experimenting with Inverse Kinematics (IK) 3D characters driven by MIDI data in realtime animating characters. My main goals are performance technologies and education technologies. I created an AI driven piano tutor. I want to determine if AI can be used as an expert programming tool to aid my efforts and make me more productive.
The basic idea is to realize a portable and assisted 3D scanner to be used where it is difficult to reach and navigate rooms and places.
For security providers, sophisticated machine learning provides fast and accurate threat detection, including zero-day and previously unknown threats. Advanced heuristics and rules allow machine learning models to help determine in near real time if a file, URL, IP, or application is a threat, and then communicate that information broadly.
Despite an ever changing threat landscape, machine learning enables very high detection rates over time. Machine learning technology is now emerging as a critical component across all of the various domains of cybersecurity.
Machine learning can power next-generation endpoint protection, mobile protection, threat intelligence, web security and network anomaly detection offerings. It enables threat activity across multiple security domains to be contextually associated in real time.
With modern technology becoming obsolete in cyber security, we need to come up with innovative ideas to increase the notch up in the fight against unauthorized access to our information and data. I will be taking help of Theano,Torch,Microsoft CNTKA framework to start with and then modify the implementation as i move in later stages of the project. I will be trying to modify various protection algorithms and try to come up with a ML algorithm that takes help of deep learning frameworks. I will also be taking help of Gensim to validate my data collection as efficiently as possible. The changes to encryption and decryption techniques will be studied thoroughly in later stages. In a manner where DNA cannot be replicated , similarly developing a neural network net around my algorithm against network intrusion will be the deciding factor in the efficiency of the modified algorithm. I will also taking help of Apache Hadoop in analyzing my stored data from cyber attacks and storing the result of my predicament in Apache Spark to make real-time decisions. The main problem in using machine learning algorithms in cyber security is the creation of an overhead which has an adverse effect on algorithm's performance. To eliminate it to a appreciable stage I will be taking help of BlueData without any changes to Hadoop or Spark framework. Finally the performance of the algorithm will be tested with the help of BigBench kit to get a full report on the project.
Implementation of machine learning in cyber security.
working on the future of AI.
Structural Health Assessment (SHA) is a nondestructive technique to monitor the functionality of a certain structure or system. It utilizes the measured dynamic response of the system to detect, localize and quantify any damage or failure in that system. Current parametric approaches try to predict the damage in the structure by identifying its stiffness parameters. Such approaches require complicated analytical modeling for the structure, as well as complicated analytical analysis to extract the system parameters. Statistical modeling is currently trending, it uses a library of signatures for the structure responses, any further response from the structure can be classified as one or a combination of the damage scenarios recorded in that library. This current proposal aims to utilize a pre-generated library of damage scenarios to classify any new damage that occurs further. The investigated structure is a two-story single-bay frame structure as shown in the figure.
Questions to be answered using this analysis: Having the excitation and response of the structure, what is the damage scenario that best describes the current state of this structure? That is, is it a single or multiple element damages? What are those damaged elements? And to what extent is each damage?
Data analytics technique will be used: This problem does not require clustering, it is only a classification problem. The main challenge is the nonlinearity. Having the records of two structure responses for two single-element damage scenarios, they cannot be both combined to predict the response of a multiple-element damage. Thus, we need to consider the nonlinear effect in the classification. An initial approach is the Nearest Neighbour, it is simple but cannot account for nonlinearity. This requires a huge number of scenarios to be generated and then fed into the feature space for further analysis. A further approach to be applied is LASSO that could count for nonlinearity and cross relations between different elements of the structure. Other approaches can be used later based on the achieved progress in the previous two approaches.
No users to show at the moment.
No users to show at the moment.