Friday, March 4

Genetic algorithm examples

Ultimate Zip Cracker Software Download
Translate Request has too much data
Parameter name: request
Translate Request has too much data
Parameter name: request

There’s been a lot of buzz recently on reddit and HN about genetic algorithms. Some impressive new demos have surfaced and I’d like to take this opportunity to review some of the cool things people have done with genetic algorithms, a fascinating subfield of evolutionary computing / machine learning (which is itself a part of the broader study of artificial intelligence (ah how academics love to classify things (and nest parentheses (especially computer scientists)))).

If you’re new to genetic algorithms, don’t be put off by the awesome/scary name – you might like to check out my own modest contribution to the field of abusing science to make cool useless things; the hello world genetic algorithm tutorial. It’s written as a short genetic algorithm tutorial to help beginners understand genetic algorithms from the ground up (and it has a pretty interactive demo in JavaScript too!).

So here’s my top five evolutionary scripts:

Number Five – Evolving a Car

The earliest genetic algorithm I can remember seeing online is the original boxcar script, which evolves a car capable of traversing a landscape. It’s written in flash and source code is available which is pretty cool. It pops up on reddit etc from time to time. The earliest discussion I can find was from 2008. Here’s another thread from 2 months ago. This idea has recently been reborn at boxcar2d.com, where you get a little more control over the parameters – mutation rate, number of wheels, etc.

It’s pretty easy to see what the fitness function will be; how far the car can travel. This script also gives an answer to a common question; people often wonder what the point of a genetic algorithm is, asking things like “If you know what constitutes a good solution, why can’t you just create a good solution from scratch?”. The car evolution script demonstrates that in some cases knowing what makes a solution a good one doesn’t always imply that we know how to achieve that. We know that we want the cars to travel far, but we mightn’t know whether a short wheelbase is good, or whether large or small wheels are helpful and so on. Genetic Algorithms offer an easy way to explore the space of possible solutions.

Number Four – Lego Structures

This is a spectacular demonstration of the power of genetic algorithms – using them to evolve schematics for lego structures (which of course, the researcher then print out and create for real!). Some examples include evolving a lego bridge, a lego tree, a crane capable of carrying half a kilo, and a three dimensional table optimised for height, surface area, strength and lightness!

In the example above, candidate solutions were considered fitter the greater distance they spanned – the final bridge candidate was nearly two metres in length!

Besides combining lego and computers into a package of unbridled awesome, there are a few interesting lessons to learn from this:

1) The researchers probably couldn’t have created this length bridge by hand without a lot of effort, so the GA simulation allowed them not only to produce a decent real solution efficiently, but also allowed them to build a bridge without having any knowledge of how to build bridges (none of the humans needed to be architects). So that’s encouraging for fields where there are no existent human experts.

2) The bridge isn’t that good. I mean, it’s great, but it takes no load, and there’s probably a ‘better’ way to build a 2 metre bridge from lego – if you tasked an engineer with the problem I doubt they’d produce anything like the above structure. Which tells us that human experts, if extant, will probably be better than evolved solutions. And we also learn that it’s hugely important to get the right fitness function – the researchers didn’t add any load carrying ability to the algorithm, so it didn’t optimise for that. Perfectly understandable and expected, but something to be aware of if you’re designing your own genetic algorithm. Do you really want to assume you have an infinite supply of bricks or should the fitness function penalise a little for excessive material usage? Questions to ask yourself as a researcher.

I’m not meaning to imply that the guys who built this bridge overlooked anything – they knew exactly what they were doing – but I think their results illustrate quite nicely that even with fancy genetic algorithms, a computer will still always do exactly what it’s told to. They wanted a long bridge. That’s what they got.

Number Three – Artificial Creatures

If you thought the boxcar demo was cool, you’ll love this. While the boxcar was two dimensional and merely attached already-rotating wheels to struts to achieve motion, Nicolas Lassabe’s work involves evolving from basic building blocks creatures which are capable of interacting with a three dimensional physical environment – first walking, then climbing stairs, traversing moving objects, and finally operating in cooperation. You can watch the video below, and visit his website all about his research into artificial life.

These artificial creatures are a fascinating way to visualise the process of evolution, and offer a brilliant muse into the workings of natural selection. Moreover, I can see potential applications for resourceful robots which might scan an environment for parts it might be able to use and then use an evolutionary algorithm to find a good way of incorporating those parts into itself. Or something. Either way, I guarantee that when the robots come to cleanse the earth of organic scum, they’ll have evolved from these cute colourful critters originally. Be warned.

Number Two – Mona Lisa

Evolving Mona Lisa using Genetic Algorithms

This class of demo scripts are impressively visual. The task is to rearrange and re-colour some polygons in order to maximise the similarity with the Mona Lisa. It’s mesmerising to watch the triangles shuffle around on the canvas, gradually forming the face, eyes, mouth and so on.

There have been a few different Mona Lisa demos, but the earliest I can find is Roger Alsing’s Genetic Mona Lisa demo from December 2008. This demo (output pictured above) wasn’t even strictly a genetic algorithm – the solutions were represented in a chromosome and mutation occured, but there was no crossover operation (although Roger insisted it still qualified).

Since then, several authors have attempted the same using different technologies and approaches. Jacob Seidelin wrote an awesome version in Jan 2009 which is truly genetic, and furthermore works in JavaScript and html5 canvas! The awesomeness is almost too much to bear.

What strikes me about these is that you clearly see rapid progress towards the target image, but then a kind of local optimum is reached where the evolved image improves only at a very slow pace. This indicates a less-than-perfect mutation or encoding method. Indeed, perfect fitness can never be achieved using a limited set of  polygons. Roger Alsing hinted at greater success with the detailed areas by using spline curves, pictured below, but no more has been heard about this.

Mona Lisa Evolved

Besides being a very fun demo to watch, there’s a strong intuitive sense that this could be applied to image compression; if you take a very fit candidate image, the chromosome will likely be a lot smaller than the original image data. Moreover, the chromosome will effectively be a vector graphic – infinitely scaleable. So there’s serious practical potential in genetic image compression and vectorisation. Neat. Encoding time is probably going to be an issue though.

Number One – Evolution IS a blind watchmaker

A clever and original demonstration of genetic algorithms. In this demo, the population starts with springs, gears, ratchets and hands, and it tries to evolve a working clock.

No shortcuts are taken; at the start the algorithm doesn’t know the correct ratios, number of teeth in the gears, correct number of components or which components fit together nicely. Watch the video as simple pendulums slowly evolve into hour, minute and second counting clocks. And even 4-handed clocks which have a 2 minute hand are unexpectedly evolved.

The presentation is framed within the wider creationism/evolution debate, and makes for an impressive demonstration of the power of evolution, and furthermore, the matlab code is made available in the video’s description! Impressive, educational and original!


If you’d like to learn more about genetic algorithms, check out my genetic algorithm tutorial with interactive demo and code, and post your go-to examples of genetic algorithms in the comments!


Related Posts:

This entry was posted on March 3, 2011, 3:28 pm and is filed under machine learning. You can follow any responses to this entry through RSS 2.0. You can leave a response, or trackback from your own site.

Ultimate Zip Cracker Software Download

A new publication from the Federal information security risk management

Ultimate Zip Cracker Software Download

ScienceDaily (2 March 2011) , the National Institute of standards and technology (NIST) published the final version of special publication that can help organizations to more effectively integrate information security planning and goals of their mission-critical functions.

Enterprise: security information management, mission, and system information (NIST Special Publication 800-39) provides the basics of a three-tiered, risk-management approach changes fundamentally how we manage information security risk to the federal level, "says Ron Ross, a NIST and the main authors of the publication.

For decades, organizations have to manage risk at the level of the information system, which resulted in a very narrow perspective that constrain risk-based decisions by senior management, explains Ross. SP 800-39 calls for a holistic approach to determine what senior leaders need to be protected is based on the core tasks of the Organization, and business functions. For example, administrators of power distribution network is related to the need to ensure the security of your computer keeps hackers interfering with the plant's power generation or to get into the power grid to bring disaster.

The publication is the fourth in a series of risks and manage information security guidelines developed by the joint task force transformation initiative, a joint partnership between the Department of Defense, intelligence community, Committee on national security systems, NIST.

A risk management approach to the multi-tiered described SP 800-39 organization progress for information systems. The goal is to ensure that the strategic considerations and decisions with respect to drive investment in operational risk management organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations (collaborative or partnering with federal agencies and contractors), the nation.

This type of risk-based decisions, is critical as organizations advanced persistent threats of sophisticated cyber attacks that may harm or weakened the support information systems in the Federal Government's critical applications.

"SP 800-39 is engaged in building a more secure information systems ultimately will allow senior leaders, and administrators better understand the mission, the risk to their business brought by organizations to increasingly use information technology and connectivity, dependency ???"???? Ross.

SP 800-39, security information management: Organization, mission and display of information system, developed in support of federal information security management Act (FISMA). Can be downloaded from http://csrc.nist.gov/publications/nistpubs/800-39/SP800-39-final.pdf.

Email or share this story:


The source of the story:

The above story printed (with writers adaptations by a teamdaily science) from materials that can be by the National Institute of standards technology (NIST).

Note: If no source is cited, instead.

Disclaimer: hdioth in this article do not necessarily reflect those of his team or ScienceDaily.

Ultimate Zip Cracker Software Download

Tuesday, March 1

How to write protect your USB Flash drive

Ultimate Zip Cracker Software Download

 

USB Write ProtectMany a time, it becomes necessary for us to write protect USB flash drive us to protect it from viruses and other malicious programs. Because flash drives are so popular and most widely used for moving data between computers is the primary objective of the invaders as a way to get infections spread around the world. Also, since the USB drive is not read-only memory (ROM), the data inside can be easily modified or deleted by malicious programs.

But, unfortunately, most new drives flash does not come with a feature such as switch manufacturers to reduce production costs. Therefore, the only way to write protect your USB flash drive is to turn this feature on your own computer.

This can be done by adding a small entry in the Windows registry, which acts as a switch that can be activated to use the write-protected or disabled to allow write access. Simply follow these steps:

1. open the Registry Editor (open "Run" dialog regedit , type and hit "Enter").

2. navigate to following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\

3. create a new key named StorageDevicePoliciesas. To do this right-click the controland click new-> key and name the StorageDevicePoliciesas.

4. Now right-click StorageDevicePolicies and create a new->(32-bit representation), DWORD and name the WriteProtectas.

Write-Protect USB Drive

 

 

 

 

 

5. double-click WriteProtect in and set the value data in 1.

Now, the right to protection for USB drives on your computer is enabled (requires restart) and thus would not be possible for anyone or any program for adding/deleting contents from USB flash drive. Any attempt to copy or download of files on the USB drive will cause the following error message appears.

USB-Write Protect Error

 

 

 

 

 

 

 

To go back and remove the write-protection, all you have to do is simply changing the value data for WriteProtect (step 5) 1 back to 0. write access to all USB devices are now re-enabled.

Sometimes it may seem difficult to remember and follow the steps above every time you want to enable/disable the write-protection. Therefore, as an alternative way, there are many tools available to automatically enable/disable write-protected. One of my favorite tool is USB write protect by Naresh Manadhar. Using this tool you can restrict write access to your USB drives with a click of a button. You can download this tool from the following link:

Popularity: 2% [?]

Read also visitors who read this post:

  1. How to protect your computer against Keyloggers

  2. How to change the background for the logon screen in Windows 7

  3. How to modify the Windows product Id

  4. 10 tips to avoid Adware


  By using this site you agree to our following/legal disclaimer

Ultimate Zip Cracker Software Download

Security and privacy issues in PDF

Ultimate Zip Cracker Software Download

Facultad de Informática UPM researchersScienceDaily (Feb. 22, 2011) compiled information about security and privacy for authors or readers of PDF documents, the most popular format for publishing of digital documents.

This work by researchers from Facultad de Informática de Madrid Universidad Politécnica set of privacy threats security surveys related to a digital document. It handles information related to your publisher that he leaked after the document is sent over the Internet, as well as information related to the reader that can be downloaded each time they open for inspection. The work focuses primarily on the PDF document format is the most popular digital document publication.

Publishing digital documents on the Internet is a serious security and privacy threats to authors and readers. Previous research by scholars in the distributed systems laboratory of the Facultad de Informática of UPM is leaking information addressed in the FAQ of a Microsoft Office document. This study focuses on PDF format, which is the de facto standard for document exchange. Many institutions around the world have adopted PDF as a standard, their estimated that billions of PDF documents that are published or downloaded each day. The results of this research were baiomn of systems and software.

Published documents can contain additional data related to the author, such as user name, the location of the document's author, even parts of deleted documents before publication.

Some of this information, such as user name or the last day of the document was referred to as metadata, applications use the reader or editor to improve the user experience; However, they may cause privacy breaches, mainly because the authors are not aware of their discovery to publish the document. Other sensitive information leaked due to poor design of the document template. For example, whenever a paragraph of a document is deleted, the paragraph did not remove the PDF but rather than mark it as "invisible". In this way, the calling application did not imagine the text that was deleted when the document is opened for reading. Therefore deleted data is saved with the document, can be read by any malicious user who knows where to find it. UPM researchers developed several tools to extract information from PDF document readers that are inaccessible.

Information leakage prevention

There are cases where many popular publication document costs a lot more information than the publishers is to communicate. For example, the Coalition Provisional Authority of Iraq post the PDF on "event" Calipari Sgrena-May 2005. Black boxes were used to hide the names of some of the people involved in the incident, but all were discovered easily by copying the text from the original document into a text editor. Several companies and institutions have distributed instructions to avoid leaking information in documents released after the reported news about documents published on the Internet that contains sensitive information that was not supposed to be made public.

From the perspective of the reader, open a downloaded PDF document could expose sensitive information such as IP address of the user's computer, user name, potentially other information stored on the computer that is used to open the document. The reason for this is the interactive features of PDF applications. You can automatically run a number of actions, such as connecting to a Web site or read data from the disk each time a PDF is opened for reading. Ideally, you should warn the user of the risks of action taken, OK. This study emphasized that in many settings, particularly when you open a PDF inside a Web browser, are caused when performing actions without notice to the user or the agreement. Their work, researchers describe how UPM it will be possible to recall and information about all of the user who downloads the PDF reader.

Finally, the researchers believe that UPM PDF format is a medium powerful document conversion. The main purpose of their work is to make users aware of the risks that they face each time they publish a document on the Internet and to provide time guidelines effective to reduce the leakage of sensitive information.

Email or share this story:


The source of the story:

The above story is published (with writers adaptations by a teamdaily science) materials provided by Facultad de Informática de la Universidad Politécnica de Madrid.

A journal:

  1. Aniello Castiglione, Alfredo de Santis, Claudio Soriente. Security and privacy as portable document format. Journal of systems and software, 2010; 83 (10): DOI: 10.1016/1813 j. jss. 2010.05 .062

Note: If no source is cited, instead.

Disclaimer: hdioth in this article do not necessarily reflect those of his team or ScienceDaily.

Ultimate Zip Cracker Software Download

Monday, February 28

What Bing would you said on Google

Ultimate Zip Cracker Software Download

So Bing for their response to allegations of copying their Google results. I don't think Bing have been sharply their response as it would have been.

Today I'm going to write a post, I think that would've written by Bing. Be clear – I'm absolutely no relationship with any of these companies (using gmail, analytics and adsense), I'm only insert it here from my view of the situation. After that, I'll get back to blogging about cool web stuff and stop ruining My chances of ever working for Google ...


At the beginning, you can search the text on the page to determine whether this page relevant to your query. This works well, especially in the choice of the length of the page and any other documents in the collection and the relative density of keywords on the page. This method of retrieving the information is in scientific circles, known as the TFxIDF.

The trouble with the TFxIDF on the basis of search is that you never designed to deal with people trying to intentionally manipulate search results. Carefully choose specific keywords in the document, you can quite easily manipulate this "bag" approach to search.

In 1998 Larry Page and Sergey Brin is to demonstrate the power of using the number of inbound links on a Web page has as the signal to determine the quality of this page. This is called "pagerank" in their most important book "The Anatomy of a large-scale Hypertextual Web search engine", and formed the basis of their search engine Google.

A great side effect of this kind of link chart based approach is that the page will take measures as it is outside the control of the author of this page in the order is determined by how many other people link that is much more complex games (even though it is not possible).

In the years after the creation of a Google search every time the company received some form of PageRank and dramatically improve the quality of search results at a flat rate.

Today, you may build a search engine indexing only enough a lot of pages, the calculation chart links between them and the combination of measures with data on the TFxIDF incoming links.

But to really search engines is the head and shoulders above the competition, you can start using the other signal. For example, Google recently announced that they were starting to look at the speed of page as a signal of quality. Bing with thousands of signals; incoming connections, the number of tweets, sentiment analysis, linking, sharing data and the like.

Bing is the motivation was: "we want to see good quality links to Bing. How people express the quality of the link? By clicking on them! ". For people who have subscribed to the toolbar, Bing, Microsoft began to collect information about the links you have clicked. This profile was anonymised and sent encrypted, so nobody MS could spy on their users. So that the association between the pages has been created – not only that the page refers to 5 other pages, but also that these 5 pages more frequently clicked the Association. This gives Bing the relationship between the link appears on the page and the page refers to the link. Bing is not for every site, whether it's for your blog or search engine or purchase site. The information collected on the Bing what links people are clicking on and which is used as one of the signals to determine the page quality – the theory is that the quality of the pages get more clicks. Other Web users also about this great is that as PageRank, takes over the control over the search order of author-it has been decided in order, so theoretically means less spam and more relevant, high quality, search engine.

When Google their experiment, created a special page on their site, which contains the words that exist nowhere else on the Web, then installed the Bing toolbar and clicked the link these "synthetic" pages. Bing toolbar sent MS data, much like a piece for all pages and their system of integrated "data to the other signals as well as normal.

But what meant was that when he then went to Google and Bing to search for unique words, all the other signal if you have any input data only if the Bing from their "signal, and so it was, as used by the system. Not surprisingly, the Bing returned on the same pages as well as Google, because all the data that was in the world on this query! Bing didn't collect data, therefore, that it was from Google, Bing collected it Bing toolbar users.

Microsoft wrote a neat little tool that allows you to collect "click-stream data from any website and Google crier announced, because he also worked on their site. If they had spoken to Bing first without making all these allegations, I think that the whole situation could have calmed. But even so – now Bing is known that the "data can be taken advantage of such as this, Bing will look deep into how best to stop this happening.


So this is what I liked to see Bing would you say that in its reply to Google. The fact that they were not as clear-cut in their denial would suggest that the picture is not completely correct, the event or that Bing had other things, but wanted to communicate in the message.

OK, I think the end to this problem is now – still tired from the wrong information in the comment threads on this topic.

Update: Oh boy. Matt Cutts wrote a fantastic blog, only some of the other evidence. It is necessary to swallow my pride here and say: it really looks like Bing, they have been specifically aimed at Google.

Matt refers to the Microsoft research paper, which contains the damning evidence:

We are a "reverse" parameters from the URL of the meeting [formulation query] and see how each search engine encodes the query and the fact that the user received the URL by clicking on a proposal from the spelling query

The book is available here: Learning Phrase-Based spelling error models of the ratio of the Data.

My apologies Matt and Google. I think initially submitted in support of the conclusion wasn't searched and therefore my blog post. But this Revelation we strongly refer to Bing intentionally and specifically targeting Google result pages, which is very clearly copying from Google. Shame on you, I am Bing, how could you have that it was OK to do?


Related posts:

This entry was posted on 3. February 2011, 10: 49 PM and is filed under web. You can track any responses to this entry through the RSS 2.0. You can leave a response, or trackback from your own page.

Ultimate Zip Cracker Software Download