Tag Archives: box

#431678 This Week’s Awesome Stories From ...

ARTIFICIAL INTELLIGENCE
Can A.I. Be Taught to Explain Itself?Cliff Kuang | New York Times“Kosinski’s results suggested something stranger: that artificial intelligences often excel by developing whole new ways of seeing, or even thinking, that are inscrutable to us. It’s a more profound version of what’s often called the ‘black box’ problem—the inability to discern exactly what machines are doing when they’re teaching themselves novel skills—and it has become a central concern in artificial-intelligence research.”
BIOTECH
Semi-Synthetic Life Form Now Fully Armed and OperationalAntonio Regalado | MIT Technology Review “By this year, the team had devised a more stable bacterium. But it wasn’t enough to endow the germ with a partly alien code—it needed to use that code to make a partly alien protein. That’s what Romesberg’s team, reporting today in the journal Nature, says it has done.”
COMPUTING
4 Strange New Ways to ComputeSamuel K. Moore | IEEE Spectrum “With Moore’s Law slowing, engineers have been taking a cold hard look at what will keep computing going when it’s gone…What follows includes a taste of both the strange and the potentially impactful.”
INNOVATION
Google X and the Science of Radical CreativityDerek Thompson | The Atlantic “But what X is attempting is nonetheless audacious. It is investing in both invention and innovation. Its founders hope to demystify and routinize the entire process of making a technological breakthrough—to nurture each moonshot, from question to idea to discovery to product—and, in so doing, to write an operator’s manual for radical creativity.”
PRIVACY AND SECURITY
Uber Paid Hackers to Delete Stolen Data on 57 Million PeopleEric Newcomer | Bloomberg “Hackers stole the personal data of 57 million customers and drivers from Uber Technologies Inc., a massive breach that the company concealed for more than a year. This week, the ride-hailing firm ousted its chief security officer and one of his deputies for their roles in keeping the hack under wraps, which included a $100,000 payment to the attackers.”
Image Credit: singpentinkhappy / Shutterstock.com Continue reading

Posted in Human Robots

#431238 AI Is Easy to Fool—Why That Needs to ...

Con artistry is one of the world’s oldest and most innovative professions, and it may soon have a new target. Research suggests artificial intelligence may be uniquely susceptible to tricksters, and as its influence in the modern world grows, attacks against it are likely to become more common.
The root of the problem lies in the fact that artificial intelligence algorithms learn about the world in very different ways than people do, and so slight tweaks to the data fed into these algorithms can throw them off completely while remaining imperceptible to humans.
Much of the research into this area has been conducted on image recognition systems, in particular those relying on deep learning neural networks. These systems are trained by showing them thousands of examples of images of a particular object until they can extract common features that allow them to accurately spot the object in new images.
But the features they extract are not necessarily the same high-level features a human would be looking for, like the word STOP on a sign or a tail on a dog. These systems analyze images at the individual pixel level to detect patterns shared between examples. These patterns can be obscure combinations of pixel values, in small pockets or spread across the image, that would be impossible to discern for a human, but highly accurate at predicting a particular object.

“An attacker can trick the object recognition algorithm into seeing something that isn’t there, without these alterations being obvious to a human.”

What this means is that by identifying these patterns and overlaying them over a different image, an attacker can trick the object recognition algorithm into seeing something that isn’t there, without these alterations being obvious to a human. This kind of manipulation is known as an “adversarial attack.”
Early attempts to trick image recognition systems this way required access to the algorithm’s inner workings to decipher these patterns. But in 2016 researchers demonstrated a “black box” attack that enabled them to trick such a system without knowing its inner workings.
By feeding the system doctored images and seeing how it classified them, they were able to work out what it was focusing on and therefore generate images they knew would fool it. Importantly, the doctored images were not obviously different to human eyes.
These approaches were tested by feeding doctored image data directly into the algorithm, but more recently, similar approaches have been applied in the real world. Last year it was shown that printouts of doctored images that were then photographed on a smartphone successfully tricked an image classification system.
Another group showed that wearing specially designed, psychedelically-colored spectacles could trick a facial recognition system into thinking people were celebrities. In August scientists showed that adding stickers to stop signs in particular configurations could cause a neural net designed to spot them to misclassify the signs.
These last two examples highlight some of the potential nefarious applications for this technology. Getting a self-driving car to miss a stop sign could cause an accident, either for insurance fraud or to do someone harm. If facial recognition becomes increasingly popular for biometric security applications, being able to pose as someone else could be very useful to a con artist.
Unsurprisingly, there are already efforts to counteract the threat of adversarial attacks. In particular, it has been shown that deep neural networks can be trained to detect adversarial images. One study from the Bosch Center for AI demonstrated such a detector, an adversarial attack that fools the detector, and a training regime for the detector that nullifies the attack, hinting at the kind of arms race we are likely to see in the future.
While image recognition systems provide an easy-to-visualize demonstration, they’re not the only machine learning systems at risk. The techniques used to perturb pixel data can be applied to other kinds of data too.

“Bypassing cybersecurity defenses is one of the more worrying and probable near-term applications for this approach.”

Chinese researchers showed that adding specific words to a sentence or misspelling a word can completely throw off machine learning systems designed to analyze what a passage of text is about. Another group demonstrated that garbled sounds played over speakers could make a smartphone running the Google Now voice command system visit a particular web address, which could be used to download malware.
This last example points toward one of the more worrying and probable near-term applications for this approach: bypassing cybersecurity defenses. The industry is increasingly using machine learning and data analytics to identify malware and detect intrusions, but these systems are also highly susceptible to trickery.
At this summer’s DEF CON hacking convention, a security firm demonstrated they could bypass anti-malware AI using a similar approach to the earlier black box attack on the image classifier, but super-powered with an AI of their own.
Their system fed malicious code to the antivirus software and then noted the score it was given. It then used genetic algorithms to iteratively tweak the code until it was able to bypass the defenses while maintaining its function.
All the approaches noted so far are focused on tricking pre-trained machine learning systems, but another approach of major concern to the cybersecurity industry is that of “data poisoning.” This is the idea that introducing false data into a machine learning system’s training set will cause it to start misclassifying things.
This could be particularly challenging for things like anti-malware systems that are constantly being updated to take into account new viruses. A related approach bombards systems with data designed to generate false positives so the defenders recalibrate their systems in a way that then allows the attackers to sneak in.
How likely it is that these approaches will be used in the wild will depend on the potential reward and the sophistication of the attackers. Most of the techniques described above require high levels of domain expertise, but it’s becoming ever easier to access training materials and tools for machine learning.
Simpler versions of machine learning have been at the heart of email spam filters for years, and spammers have developed a host of innovative workarounds to circumvent them. As machine learning and AI increasingly embed themselves in our lives, the rewards for learning how to trick them will likely outweigh the costs.
Image Credit: Nejron Photo / Shutterstock.com Continue reading

Posted in Human Robots

#431130 Innovative Collaborative Robot sets new ...

Press Release by: HMK
As the trend of Industry 4.0 takes the world by storm, collaborative robots and smart factories are becoming the latest hot topic. At this year’s PPMA show, HMK will demonstrate the world’s first collaborative robot with built-in vision recognition from Techman Robot.
The new TM5 Cobot from HMK merges systems that usually function separately in conventional robots, the Cobot is the only collaborative robot to incorporate simple programming, a fully integrated vision system and the latest safety standards in a single unit.
With capabilities including direction identification, self-calibration of coordinates and visual task operation enabled by built-in vision, the TM5 can fine-tune in accordance with actual conditions at any time to accomplish complex processes that used to demand the integration of various equipment; it requires less manpower and time to recalibrate when objects or coordinates move and thus significantly improves flexibility as well as reducing maintenance cost.
Photo Credit: hmkdirect.com
Simple.Programming could not be easier. Using an easy to use flow chart program, TM-Flow will run on any tablet, PC or laptop over a wireless link to the TM control box, complex automation tasks can be realised in minutes. Clever teach functions and wizards also allow hand guided programming and easy incorporation of operation such as palletising, de-palletising and conveyor tracking.
SmartThe TM5 is the only cobot to feature a full colour vision package as standard mounted on the wrist of the robot, which in turn, is fully supported within TM-Flow. The result allows users to easily integrate the robot to the application, without complex tooling and the need for expensive add-on vision hardware and programming.
SafeThe recently CE marked TM5 now incorporates the new ISO/TS 15066 guidelines on safety in collaborative robots systems, which covers four types of collaborative operation:a) Safety-rated monitored stopb) Hand guidingc) Speed and separation monitoringd) Power and force limitingSafety hardware inputs also allow the Cobot to be integrated to wider safety systems.
When you add EtherCat and Modbus network connectivity and I/O expansion options, IoT ready network access and ex-stock delivery, the TM5 sets a new benchmark for this evolving robotics sector.
The TM5 is available with two payload options, 4Kg and 6Kg with a reach of 900mm and 700mm respectively, both with positioning capabilities to a repeatability of 0.05mm.
HMK will be showcasing the new TM5 Cobot at this year’s PPMA show at the NEC, visit stand F102 to get hands on the with the Cobot and experience the innovative and intuitive graphic HMI and hand-guiding features.
For more information contact HMK on 01260 279411, email sales@hmkdirect.com or visit www.hmkdirect.com
Photo Credit: hmkdirect.com
The post Innovative Collaborative Robot sets new benchmark appeared first on Roboticmagazine. Continue reading

Posted in Human Robots

#430988 The Week’s Awesome Stories From Around ...

BIOTECH
Lab-Grown Food Startup Memphis Meats Raises $17 Million From DFJ, Cargill, Bill Gates, OthersPaul Sawers | Venture Beat “Meat grown in a laboratory is the future, if certain sustainable food advocates have their way, and one startup just raised a bucketload of cash from major investors to make this goal a reality….Leading the $17 million series A round was venture capital (VC) firm DFJ, backer of Skype, Tesla, SpaceX, Tumblr, Foursquare, Baidu, and Box.”
ROBOTICS
Blossom: A Handmade Approach to Social Robotics From Cornell and GoogleEvan Ackerman | IEEE Spectrum “Blossom’s overall aesthetic is, in some ways, a response to the way that the design of home robots (and personal technology) has been trending recently. We’re surrounding ourselves with sterility embodied in metal and plastic, perhaps because of a perception that tech should be flawless. And I suppose when it comes to my phone or my computer, sterile flawlessness is good.”
AUTOMOTIVE
Mercedes’ Outrageously Swoopy Concept Says Nein to the Pod-Car FutureAlex Davies | WIRED “The swooping concept car, unveiled last weekend at the Pebble Beach Concoursd’Elegance, rejects all notions of practicality. It measures nearly 18.7 feet long and 6.9 feet wide, yet offers just two seats…Each wheel gets its own electric motor that draws power from the battery that comprises the car’s underbody. All told, they generate 750 horsepower, and the car will go 200 miles between charges.”
EDTECH
Amazon’s TenMarks Releases a New Curriculum for Educators That Teaches Kids Writing Using Digital Assistants, Text Messaging and MoreSarah Perez | TechCrunch“Now, the business is offering an online curriculum for teachers designed to help students learn how to be better writers. The program includes a writing coach that leverages natural language processing, a variety of resources for teachers, and something called “bursts,” which are short writing prompts kids will be familiar with because of their use of mobile apps.”
VIRTUAL REALITY
What We Can Learn From Immersing Mice, Fruit Flies, and Zebrafish in VRAlessandra Potenza | The Verge “The VR system, called FreemoVR, pretty much resembles a holodeck from the TV show Star Trek. It’s an arena surrounded by computer screens that immerses the animals in a virtual world. Researchers tested the system on mice, fruit flies, and zebrafish, and found that the animals reacted to the virtual objects and environments as they would to real ones.” Continue reading

Posted in Human Robots

#428130 Autonomous – A Sci-Fi Short movie

AUTONOMOUS is an award-winning Sci-Fi short film that unofficially premiered at the 35th SGAI International Conference on Artificial Intelligence at the University of Cambridge. It recently won the Silver Award at The Box Film Festival 2016 (UK) and is an official selection in ten more film festivals around the world.
Featured Photo Credit: George VarotsisPremise: When a mistrustful rogue, who earns a living by sending “obsolete” humanoid robots to the scrap heap, has a change of heart and decides it’s time to call it quits, he stumbles upon a conspiracy that will reveal his life’s darkest secret.

You can watch the film here: https://www.youtube.com/watch?v=Dj92Mh2l8kk

The post Autonomous – A Sci-Fi Short movie appeared first on Roboticmagazine. Continue reading

Posted in Human Robots