Posts

Showing posts from August, 2020

The Deep Learning Revolution

Book By TERRENCE J. SEJNOWSKI Sharks and Rays(Which include skates) are able to sense very weak electrical fields; indeed, they can detect the signal from a 1.5-volt battery clear across Atlantic Ocean. With this 6th sense, skates can navigate by the weak electrical signals from their motion through the earth's magnetic field, which generates microvolt signals in their electroreceptors. Hermann von Helmholtz was a nineteenth-century physicist and physician who developed a mathematical theory and an experimental approach to vision that forms the basis for our current understanding of visual perception. Vision is our most acute and also our most studied sense. With two frontal eyes, we have exquisite binocular depth perception, and half of our cortex is visual. In one tenth of a second, ten billion neurons in our visual cortex working together in parallel can identify a cup in a cluttered scene, even though we may have never seen that particular cup before and even when it m...

Machine Learning and Security

Why Machine Learning & Security? Spam As soon as academics and scientists had hooked enough computers together via the internet to create a communications network that provided value, other people realized that this medium of free transmission and broad distribution was a perfect way to advertise sketchy products, steal account credentials, and spread computer viruses ClicK Machine Learning Machine Learning is not invented by the spam fighters, but it was quickly adopted by statistically inclined technologies who saw its potential in dealing with a constantly evolving source of abuse. Email providers and Internet Service Providers (ISPs) have access to wealth to email content, metadata, and user behavior. Using email data, content based models can be built to create a generalizable approach to recognize spam. Metadata and entity reputation can be extracted from emails to predict the likelihood that an email is spam without even looking at its content. By instantiating a...