Brain-inspired computing could tackle big problems in a small way

[ad_1] Brain-inspired Gaussian devices based on two-dimensional materials allow energy efficient and probabilistic computing. Credit: Saptarshi Das, Penn State While computers have become smaller and more powerful and supercomputers and parallel computing have become the standard, we are about to hit a wall in energy and miniaturization. Now, Penn State researchers have designed a 2-D […]

Investigating the self-attention mechanism behind BERT-based architectures

[ad_1] September 11, 2019 feature Investigated BERT architecture has the architecture of 12 layers by 12 heads. Each cell in this figure shows the performance of BERT if the corresponding head is switched off. Darker colors indicate higher performance, and white cells indicate heads without which BERT’s performance decreases. Stanford Sentiment Treebank (SST-2): There are […]

Machine learning looks for useful data in U.S. thunderstorm reports

[ad_1] A thunderstorm’s shelf cloud approaches the Iowa State campus. Credit: Bill Gallus Bill Gallus has been known to chase a summer storm or two. But he didn’t have to go after this one. On July 17, 2019, a thunderstorm approached the Iowa State University campus. Gallus, a professor of geological and atmospheric sciences, headed […]

Using Spotify data to predict what songs will be hits

[ad_1] Model Results on the validation and test sets. Credit: Middlebrook & Sheik. Two students and researchers at the University of San Francisco (USF) have recently tried to predict billboard hits using machine-learning models. In their study, pre-published on arXiv, they trained four models on song-related data extracted using the Spotify Web API, and then […]

Bots might prove harder to detect in 2020 elections

[ad_1] Credit: CC0 Public Domain USC Information Sciences Institute (USC ISI) computer scientist, Emilio Ferrara, has new research indicating that bots or fake accounts enabled by artificial intelligence on social media have evolved and are now better able to copy human behaviors in order to avoid detection. In the journal First Monday, research by Ferrara […]

New technology allows software components to be isolated from each other with little computation

[ad_1] Combining a hardware feature processors from the semiconductor firm of Intel with a software method, researchers at the Max Planck Institute for Software Systems in Kaiserslautern and Saarbrücken have come up with a new technology called ERIM to isolate software components from each other. In this way, for example, credit card data or passwords […]

Artificial intelligence uncovers new details about Old Master paintings

[ad_1] The Ghent Altarpiece closed. Credit: Copyright holder, Saint-Bavo’s Cathedral, – Art in Flanders; photo Dominique Provost. Artificial intelligence has been used to analyse high-resolution digital X-ray images of the world famous Ghent Altarpiece, as part of an investigative project led by UCL. The finding is expected to improve our understanding of art masterpieces […]

How I cracked a 70-year-old coded message from beyond the grave

[ad_1] The American Survival Research Foundation offered a reward of $1,000 for cracking one of Thouless’s two codes within three years of his death. It was not claimed. Credit: In recent weeks I managed to decrypt a difficult cipher that, despite expert codebreakers’ best efforts, had remained unsolved for 70 years. The code was […]

Humans and AI team up to improve clickbait detection

[ad_1] Credit: CC0 Public Domain Humans and machines worked together to help train an artificial intelligence—AI—model that outperformed other clickbait detectors, according to researchers at Penn State and Arizona State University. In addition, the new AI-based solution was also able to tell the difference between clickbait headlines that were generated by machines—or bots—and ones written […]

Keeping high-performance computers cybersecure

[ad_1] Credit: Pacific Northwest National Laboratory Pacific Northwest National Laboratory is leading efforts to address next generation computing’s critical role in protecting the nation from cybersecurity threats. PNNL’s Center for Advanced Technology Evaluation (CENATE) sponsored a roundtable earlier this month to bring the high-performance computing community together and tackle cybersecurity challenges. “This roundtable enabled researchers […]