Archive for the ‘Machine Learning’ Category

Research Rooted in Machine Learning Challenges Conventional … – National Institute of Justice

Researchers have developed a new analytical method to better understand how individuals move toward violent extremism.

Using machine learning, a form of artificial intelligence, the method reveals clusters of traits associated with possible pathways to terrorist acts. The resource may improve our understanding of how an individual becomes radicalized toward extremist violence.

The report on a scientific study that deploys those tools and blends elements of data science, sociology, and criminology is calling into question some common assumptions about violent extremism and the homegrown individuals who are motivated to engage in behaviors supporting violent jihadist ideologies. See Table 1.

Table 1 shows select key insights from the project aimed at developing a new computational methodology that can mine multiple large databases to screen for behaviors associated with violent extremism.

The study departs from the research communitys common use of demographic profiles of extremist individuals to predict violent intentions. Profiling runs the risk of relying on ethnic stereotypes in extremism studies and law enforcement practices, particularly with respect to American Muslims. According to the researchers, the method isolated the behaviors associated with potential terrorist trajectories, after being trained with thousands of text data coded by researchers.

Machine learning is an application of artificial intelligence that uses existing data to make predictions or classifications about individuals, actions, or events. The machine learns by observing many examples until it can statistically replicate them.

Researchers scanned large datasets to spot traits or experiences that are collectively associated with terrorist trajectories employing a process that blends machine learning (see What Is Machine Learning?), and an evidence-based behavioral model of radicalization associated with violence and other terrorism-related activities.

The machine-learning computational method analyzes, while learning from, copious data to isolate behaviors associated with potential terrorist trajectories.

The graph component depicts clusters of behavioral indicators that reveal those trajectories. The datasets generating those indicators include investigator notes, suspicious activity reports, and shared information. See "What Do We Mean by Graph? Defining It in Context."

This tool for understanding violent extremism is the work of Colorado State University and Brandeis University investigators, supported by the National Institute of Justice. The tool aims to isolate somewhat predictable radicalization trajectories of individuals or groups who may be moving toward violent extremism.

A key element of the work was the development of a Human-in-the-Loop system, which introduces a researcher into the data analysis. Because the data are so complex, the researcher mitigates difficulties by assisting the algorithm at key points during its training. As part of the process, the researcher writes and rewrites an algorithm to pick up key words, phrases, or sentences in texts. Then the researcher sorts those pieces of text with other text segments known to be associated with radicalization trajectories.

The Human-in-the-Loop factor is designed to help researchers code data faster, build toward a law enforcement intelligence capable of capturing key indicators, and enable researchers to transform textual data into a graph database. The system relies on a software-based framework designed to help overcome challenges posed by massive data volumes and complex extremist behaviors.

The research stems from the premise that radicalization is the product of deepening engagements that can be observed in changing behaviors. This concept is based on researchers observations that the radicalization process occurs incrementally.

The radicalization trajectory concept suggests that a linear pathway exists from an individual entertaining extremist ideas to ultimately taking extremist action marked by violence in the name of ideology.

The research findings validated that premise.

The researchers used 24 different behavioral indicators to search databases for evidence of growing extremism. Some examples of indicators are desire for action, issuance of threats, ideological rebellion, and steps toward violence. (See Figure 1 for an example of a set of cues, or behaviors, that the researchers associate with one behavioral indicator associated with planning a trip abroad.)

Source: Dynamic, Graph-Based Risk Assessments for the Detection of Violent Extremist Radicalization Trajectories Using Large Scale Social and Behavioral Data, by A. Jayasumana and J. Klausen, Table 5, p. 23.

Because violent extremism remains a relatively rare phenomenon, data on known individuals who committed terrorist events was mined to identify cues representing behavioral extremist trajectories. To that end, researchers collected three types of data:

The sources of collected data were public documents ranging from news articles to court documents, including indictments and affidavits supporting complaints.

Of the 1,241 individuals studied, the researchers reported that 421 engaged in domestic terrorist violence, 390 became foreign fighters, and 268 became both foreign fighters and individuals engaged in domestic terrorism. A minority (162) were convicted of nonviolent terrorism-related offenses.

Researchers analyzed time-stamped behavioral data such as travel abroad, a declaration of allegiance, information seeking, or seeking a new religious authority using graph techniques to assess the order of subjects behavioral changes and most common pathways leading to terrorism-related action. See the sidebar What do we mean by graph? Defining it in context.

The researchers made several notable findings beyond those presented in Table 1.

Although researchers found that terrorist crimes are often the work of older (at least 25 years old, on average) individuals, the agecrime relationship varied across types of terrorist offenses. They found that, on average, people who committed nonviolent extremist acts were 10 years older than those who became foreign fighters. Although younger men (median age 23) are more likely to take part in insurgencies abroad, slightly older men (median ages 25-26) who have adopted jihadist ideologies are more likely to engage in violent domestic terrorist attacks. Individuals who did something violent at home were, on average, four years older than foreign fighters.

Researchers also found that men and a few women at any age may engage in nonviolent criminal support for terrorism. Also, men are six times more likely than women to commit violent offenses, both in the United States and abroad.

According to this study, individuals who have adopted jihadist ideologies and who are immigrants are more likely than those who are homegrown to engage in domestic extremist violence.

The dataset, comprising more than 1,200 individuals who had adopted jihadist ideologies, was used to track radicalization trajectories. It was limited by the availability of sufficiently detailed text sources, which introduced an element of bias. Much of the public data on terrorism come from prosecutions, but not all terrorism-related offenses are prosecuted in state or federal U.S. courts. Some of the subjects died while fighting for foreign terror organizations, which limited the available information on them.

Although data from public documents may be freely shared, the researchers noted that research based on public sources can be extremely time consuming.

Often public education efforts on anti-terrorism take place at schools where children learn about recruitment tactics by extremist groups and warning signs of growing extremism. However, the study found that more than half of those who commit extremist violent acts in the United States are older than 23 and typically not in school. This suggests that anti-terrorism education efforts need to expand beyond school settings.

By using machine learning to identify persons on a trajectory toward extremist violence, the research supports a further move away from relying on user profiles of violent extremists and toward the use of behavioral indicators.

The research described in this article was funded by NIJ award 2017-ZA-CX-0002, awarded to Colorado State University. This article is based on the grantee report Dynamic, Graph-Based Risk Assessments for the Detection of Violent Extremist Radicalization Trajectories Using Large Scale Social and Behavioral Data, by A. Jayasumana and J. Klausen.

A graph, in the context of this research, is a mathematical representation of a collection of connections (called edges) between things (called nodes). Examples would be a social network or a crime network, or points on a map with paths connecting the points. The concept is analogous to cities, and roads or flights paths connecting them, on a map. The researchers in this violent extremism study isolated clusters of traits representing a more likely pathway to violent extremism. The concept is similar to a map app choosing roads that are least congested (allowing for most traffic) between two points. Graphs in this sense can be quite visual and make good conventional graphics.

Return to text

Link:
Research Rooted in Machine Learning Challenges Conventional ... - National Institute of Justice

The Scamdemic: Can Machine Learning Turn the Tide? – CDOTrends

The worldwide digital space was gripped by an unprecedented surge in online scams and phishing attacks in 2022. Cybersecurity company Group-IB unveiled an alarming analysis detailing this rising threat.

Their recently launched study showed that the number of scam resources created per brand soared by 162% globally, and even more drastically in the Asia-Pacific region, with a whopping increase of 211% from 2021. The report also disclosed a more than three-fold increase in detected phishing websites over the last year.

These findings underscore the persistent cyber threat landscape, shedding light on a cyber menace that cost more than USD55 billion in damages last year, according to the Global Anti Scam Alliance and ScamAdviser's 2022 Global State of Scams Report. With these alarming trends, the scamdemic shows no signs of slowing down.

Scam campaigns are not just affecting more brands each year; the impact that each individual brand faces is growing larger. Scammers are using a vast amount of domains and social media accounts to not only reach a greater number of potential victims but also evade counteraction, explained Afiq Sasman, head of the digital risk protection analytics team in the Asia Pacific at Group-IB.

The rise in scams was attributed to increased social media use and the growing automation of scam processes. Social media platforms often serve as the first point of contact between scammers and potential victims, with 58% of scam resources created on such platforms in the Asia-Pacific region last year. Group-IB's Digital Risk Protection analysts found that more than 80% of operations are now automated in scams like Classiscam.

Using automation and AI-driven text generators by cybercriminals to craft convincing scam and phishing campaigns poses an escalating threat. Such advancements allow cybercriminals to scale operations and provide increased security within their illicit ecosystems.

The study also highlighted the uptick in scam resources hosted on the .tk domain, accounting for 38.8% of all scam resources examined by Group-IB in the second half of 2022. This development reveals the increasing impact of automation in the scam industry, as affiliate programs automatically generate links on this domain zone.

The research underscores the urgent need for robust and innovative cybersecurity measures. By leveraging advanced technologies such as neural networks and machine learning, organizations can monitor millions of online resources to guard against external digital risks, protecting their intellectual property and brand identity. Only through such proactive measures can we hope to turn the tide against the rising tide of this digital 'scamdemic.

Image credit: iStockphoto/Dragon Claws

Excerpt from:
The Scamdemic: Can Machine Learning Turn the Tide? - CDOTrends

Machine learning, incentives and telematics: New tools emerge to … – Utility Dive

The transition to electric vehicles will require significant new amounts of power generation for charging, but utilities say those resources can be developed in time. A more pressing challenge may be managing new charging loads, ensuring millions of vehicles do not put undue stress on the grid.

There will be 30 million to 42 million electric vehicles on U.S. roads in 2030, and they will require about 28 million charging ports,according to the National Renewable Energy Laboratory. Utilities, distributed energy resource aggregators and research institutions are all stepping up to address the issue.

Power generation is only a part of this conversation. Just as important is improving our ability to manage demand in real time, Albert Gore, executive director of the Zero Emission Transportation Association, said Monday in a discussion of how the utility sector must approach EVs.

The industry needs to further its ability to precisely manage demand in real time, including by accurately predicting when and where increases in demand will occur, according to a new ZETA policy brief.

Utilities particularly larger electricity providers in urban areas have been working for years to nudge EV charging to off-peak hours through time-of-use rates or EV-specific rates.

Consolidated Edison, which serves New York City, expects more than a quarter million EVs in its territory by 2025 and has been working since 2017 to encourage grid-beneficial charging through its SmartCharge program, which offers incentives for drivers to avoid charging during peak times.

It's one of, if not the most, successful managed charging programs in the country,Cliff Baratta, Con Edisons electric vehicle strategy and markets section manager, said during ZETAs discussion. At the end of 2022, the utility had 20% of all light-duty EVs registered in its territory enrolled in the program.

In a lot of other places, we see that 5-6% is considered good, Baratta said. We have been able to get really strong engagement with that program, to try and entrench this grid beneficial charging behavior.

Research institutions are working to develop solutions. Argonne National Laboratory and the University of Chicago have partnered on the development of a new algorithm to manage EV charging that utilizes machine learning to efficiently schedule loads.

Distributed energy resource managers are rolling out approaches to managing the anticipated demand..

FlexCharging, which has provided managed charging programs and pilots since 2019, is rolling out a product called EVisionfor smaller utilities that may have fewer resources to devote to demand management initiatives.

Cloud-based software company Virtual Peaker on Tuesday launched a managed charging solution that allows utilities to utilize both vehicle telematics data or internet-connected EV chargers to manage vehicles in charging programs.

The company is focusing on creating a single, scalable solution to increase adoption of distributed energy resources programs and help utilities reach their goals more quickly and efficiently, Virtual Peaker founder and CEO Williams Burke said in a statement.

The companys DER platform is already being used by Efficiency Maine, the states administrator for energy efficiency and demand management programs, to manage battery systems and EV chargers during peak demand periods.

View post:
Machine learning, incentives and telematics: New tools emerge to ... - Utility Dive

Google reveals how AI and machine learning are shaping its … – ComputerWeekly.com

Google has lifted the lid on how artificial intelligence (AI) and machine learning (ML) are assisting it with helping consumers and businesses shrink the environmental footprint of their activities by allowing them to make real-time adjustments that can curb their greenhouse gas (GHG) emissions.

Details of its work in this area can be found in the tech giants most recent annualEnvironmental report. Covering the 12 months to 31 December 2022, the document provides updates on how the tech giants efforts to run its datacentres and offices on carbon-free energy (CFE) round-the-clock are progressing and how its bid to reduce the water consumed by its operations is going.

We achieved approximately 64% round-the-clock CFE across all of our datacentres and offices, [and] this year, we expanded our CFE reporting to include offices and third-party datacentres, in addition to Google-owned and operated datacentres, said the company.

At the end of 2022, our contracted watershed projects have replenished 271 million gallons of water equivalent to more than 400 Olympic-sized swimming pools to support our target to replenish 120% of the freshwater we used.

The report also documents how, seven years after declaring itself as being an AI-first company, this technology is underpinning the companys own climate change mitigation efforts.

To this point, the company said it was using AI to accelerate the development of climate change-fighting tools that can provide better information to individuals, operational optimisation for organisations, and improved predicting and forecasting.

As an example, the company pointed to the way Google Maps uses AI to help users plan journeys in a more eco-friendly way by minimising the amount of fuel and battery power they use to get from A to B.

Eco-friendly routing has helped prevent 1.2 metric tonnes of estimated carbon emissions since launch equivalent to taking approximately 250,000 fuel-based cars off the road for a year, it reported.

The technology is also proving useful in the companys work to reduce the environmental footprint of its AI models by helping the datacentres in which they are hosted run in a more energy-efficient way.

Weve made significant investments in cleaner cloud computing by making our datacentres some of the most efficient in the world and sourcing more carbon-free energy, it said in the report. Were helping our customers make real-time decisions to reduce emissions and mitigate climate risks with data and AI.

To reinforce this point, the company cited the roll-out of its Active Assist feature to Google Cloud customers, which uses machine learning to identify unused and potentially wasteful workloads so they can be stopped to save money and cut the organisations carbon emissions at the same time.

On the flipside, though, the report went on to acknowledge that ramping up the use of AI in this way also increases the amount of work its datacentres are doing, which is giving rise to concerns about the environmental impact and energy consumption habits of its AI workloads.

With AI at an inflection point, predicting the future growth of energy use and emissions from AI compute in our datacentres is challenging, the report continued.

Historically, research has shown that as AI/ML compute demand has gone up, the energy needed to power this technology has increased at a much slower rate than many forecasts predicted. We have used tested practices to reduce the carbon footprint of workloads by large margins; together, these principles have reduced the energy of training a model by up to 100x and emissions by up to 1,000x.

The report added: We plan to continue applying these tested practices and to keep developing new ways to make AI computing more efficient.

Original post:
Google reveals how AI and machine learning are shaping its ... - ComputerWeekly.com

Unlock the Power of AI A Special Release by KDnuggets and … – KDnuggets

Hello,

I hope this email finds you well, coding away and innovating in the dynamic world of Machine Learning.

Today, I am excited to announce a collaboration between Machine Learning Mastery and KDnuggets. Together, we've created something unique to enrich your Machine Learning journey.

I present to you our brand new ebook, "Maximizing Productivity with ChatGPT". While we've been known for our technical, code-heavy books that have guided many through the intricate pathways of Machine Learning, this time we're offering something different but equally impactful.

This ebook shifts the focus from pure coding and technical aspects, to understanding, interacting, and leveraging one of the most advanced AI tools in the market - ChatGPT. This is an evolution from our prior books, aimed at broadening your perspective and deepening your understanding of AI applications.

You'll discover:

In celebration of this launch, we're offering an exclusive 20% early bird discount with the code "20offearlybird" at checkout. But don't delay - this offer ends soon!

Maximizing Productivity with ChatGPT

This ebook is a testament to the fact that not all roads to mastering Machine Learning and AI are paved with code alone. Harnessing the power of AI also involves understanding its applications and learning how to effectively interact with it. "Maximizing Productivity with ChatGPT" offers you exactly that - an avenue to explore and master the usage of AI beyond the traditional coding confines.

If you have any questions, please don't hesitate to hit reply and send me an email directly. Here's to harnessing the power of AI together.

- Jason, Machine Learning Mastery Founder

Read the rest here:
Unlock the Power of AI A Special Release by KDnuggets and ... - KDnuggets