Page 2,106«..1020..2,1052,1062,1072,108..2,1202,130..»

Robots and Automation Move From Novelty to Necessity in Hotels – Skift

Given the constraints of todays labor market and the speed to onboard new hospitality talent its time to push the envelope when it comes to artificial intelligence, robotics, and automation.

Carley Thornell

No frequent traveler has escaped the toothpaste walk of shame the stroll to the front desk to grab a forgotten toiletry, during which that guest prays no one wants face time.

But thats been eliminated at the eight California hotels owned by Seaview Investors, thanks to robot ambassadors that deliver hotels, sundries and dental necessities in five minutes or less.

The goal isnt to replace anybody, (but) just make the jobs better for those who work here, said Tiffany Jassel Bevins, Seaviews director of asset management.

It allows staff to deliver more personalized service to guests in front of them. And we have so much positive feedback on TripAdvisor (surrounding the robots).

The technology from Silicon Valley-based Relay Robotics is programmed to mingle and tell jokes, said Steve Cousins, the companys chief technical officer. But while offering something a bit different from other hotels attracts guests, it can also expand the boundaries of what technology can accomplish.

Just ask Klaas van Lookeren Campagne. The CitizenM CEO says a digital-first strategy has led to the brand being the most profitable per square foot among its competitors. We are living now after the pandemic in the fight for resources. I think everybody is struggling for good employees, he said. Guess what, if you have the highest guest satisfaction and these cool tools, of course they like to work for you.

Innovations like one app for guests and another for employees mean CitizenM ambassadors or employees can relay details about neighborhood attractions directly to a customers device. Ambassadors can also make a room key at the bar, for instance, while having a chat and a cocktail, eliminating the wait at a traditional front desk.

That experience has made retaining staff easier. If you look at our website theres hardly any (open jobs for) hoteliers, we are only looking for data engineers I think thats the direction (youre moving toward), van Lookeren Campagne said.

Other companies have been driven by necessity to make dramatic shits in their operations. Accor launched a pilot at ibis Styles London Gloucester Road, the brands first fully digital hotel in Northern Europe. Its the first step in a roll-out plan that will impact at least 50 percent of its hotels in Europe over the next few years.

This is not about robots or faceless technology. This is about the smart integration of innovative, customer-facing technology at pace and at scale. Technology is part of our daily lives and is now fully part of our hotel experience, said Carla Milovanov, Accors senior vice president for customer technology services. With this important step, we give our guests the opportunity to adapt their hotel stay according to their preferences.

Accors technology already automates some hotel distribution activities, and allows staff to spend more time with guests rather than on administrative or manual tasks. Click Pay Collect enables ordering from a hotels digital menu from just a phone, eliminating calls to a restaurant or placing paper on a doorknob. Since the ordering is fully integrated within the hotels ecosystem, expenses can be charged to the room and paid on check-out.

Other features in the cloud are set to transform the physical check-in and check-out experience, too. Accors Gloucester Road property premiered the Accor Key, a smartphone-enabled code that allows guests to access elevators and enter their rooms, eliminating the need for check-in desks altogether.

Meanwhile, hotels like The Cosmopolitan of Las Vegas have taken to streamlining guest communication a step further with use of artificial intelligence. The sassy Rose chatbot originally launched customer service like restaurant recommendations, requests for extra pillows, and guided tours of the property via text message. Director of Digital Marketing Lindsey Riggs said guest engagement is so high that the hotel created a Digital Guest Services Team, which monitors conversations throughout the day and helps Cosmopolitan respond to inquiries within 60 seconds

Thanks to (artificial intelligence), Rose has the ability to use conversational data to learn from guest interaction with her over time, which helps us better understand what our guests want and need, Riggs said.

Data show that guests who interact with Rose are on average 30 percent more satisfied with their stay as compared to those who do not, said Riggs. Highly engaged guests those who send Rose five or more texts during their stay record stays 28 percent longer than those who dont interact with her.

This tells us Roses unique and playful personality not only strengthens relationships and overall guest satisfaction, but her undeniably unique tone of voice is what helps her standout from others in the hospitality industry, Riggs said.

And while human staff can often wilt in the wee hours in a city filled with late-night high-rollers, automation allows The Cosmopolitan of Las Vegas to have an always-on brand ambassador, Riggs said.

Read more from the original source:
Robots and Automation Move From Novelty to Necessity in Hotels - Skift

Read More..

A prairie company is working on the development of an artificial intelligence data recording kit – FortSaskOnline.com

Mojow Autonomous Solutions will benefit from a $419 thousand dollar investment for digitization in farming under the Canadian Agricultural Partnerships AgriScience program.

Co-founder and President Owen Kinch says they focus on digital technology for agriculture and the money will help in their development of an autonomous navigation controller to be used in agriculture.

He says it's helping build those prototypes, go out into the field in the summertime, and collect the specific data that we require to build the the deep learning models that we need to develop for for our specific broadacre applications.

"So the continuous intake of real time image data from the peripherals of a tractor, for example. It allows the module Navigation Controller to gain a high level of relative position accuracy between the tractor and any other physical object encountered within its working environment. So, really what it does is it reacts to a changing work environment, much like human operators do today while they're in the cab."

One of the greatest challenges facing farmers today is the availability of skilled labor to execute time sensitive operations that impact farming outcomes.

Kinch says autonomy offers a safe and productive alternative to address that challenge head on.

"Our mission is to streamline on farm operations through innovative digital technologies AI and robotics."

Mojow Autonomous Solutions says the AI Data Recording Kit (EYEBOX) is a small, rugged, sensor suite that contains multiple cameras, as well as GPS, combined with a powerful computer unit for real-time processing of collected data.Kinch says rather than employees processing data, the Eye-Box will work automatically and allow farmers and employees to focuson other daily tasks.

A recent twitter post shows Mojow Autonomous Solutions Inc. has 2,000 acres of land rolling (Autonomously) scheduled across fourseparate farms during the spring of 2022.

Kinch is hoping to haveaprototype at the Ag in Motion event in July.

Mojow Autonomous Solutions is located out of Edmonton, with the corporate headquarters in White City.

Read the original post:
A prairie company is working on the development of an artificial intelligence data recording kit - FortSaskOnline.com

Read More..

Real Trust in Artificial Intelligence: Solera report says 79 percent of drivers trust AI to handle claims process – Collision Repair Mag

Toronto, Ontario A recent consumer survey from Solera suggests that people are getting more comfortable putting their trust in artificial intelligence, reporting that 79 percent of drivers would trust an AI to handle the entirety of their claims experience.

Society appears to be growing more accustomed to interacting with intelligent machines, as the latest edition of Solera Innovation Index 2022 notes a seven percent year-over-year increase in comfortability with fully AI-driven claims management.

Furthermore, 65 percent of respondents said they would choose a repairer using AI to minimize the risk of error in the claims process.

The benefits of AI are also being felt on the insurance end of things, with 58 percent of insurers using AI reporting improved business resilience and 55 percent claiming it created faster decision-making capabilities.

For bodyshops and OEMS, 52 percent saw improved profitability and 50 percent saw increased staff productivity because of AI.

Cost still remains the most prevalent barrier for anyone looking to access AI, however, as 73 percent of insurers and 75 percent of bodyshops and OEMs cited cost as the main obstacle for implementation.

Soleras Innovation Index 2022 infographic on AI in automotive claims can be found here.

Originally posted here:
Real Trust in Artificial Intelligence: Solera report says 79 percent of drivers trust AI to handle claims process - Collision Repair Mag

Read More..

Review: The Mind and the Moon, by Daniel Bergner – The New York Times

It is with great skill that Bergner places Carolines story in context of the history of modern psychiatry. Its hard to do justice to the sweep of the larger story he tells, but probably the most shocking part is the utter randomness that has characterized so much of the modern search for psycho-pharmaceuticals, combined with the utterly devastating side effects they can have. Bergner tracks the history of treatments like lithium, S.S.R.I.s and antipsychotics. In many cases, researchers only stumbled across the drugs potential to ameliorate symptoms. Of lithium, he writes that 19th-century doctors used it to treat kidney stones. Later it was among the ingredients in 7-Up. Even though lithium was approved by the F.D.A. for psychiatric use in 1970, no one had more than a vague concept of how the drug worked neurologically, Bergner notes, and they still dont.

Bergner interviews a group of researchers who, despite the accidental origins of numerous pharmaceuticals, strive today to develop them into substances that will truly improve peoples lives. This is an interesting set of interviewees, all dedicated, hardworking, highly knowledgeable scientists, who frankly acknowledge how poor the efficacy of many drugs is, how much of a toll they can take on people who use them and how little we know about how the brain actually works.

Bergners subjects, as well as the scientists and clinicians he interviews, also attest to the fuzziness of many diagnostic and behavioral boundaries. Standard diagnoses often collapse what some scientists believe are different conditions into one, whereas other diagnoses wall off conditions that are perhaps not so different at all. Its possible that psychosis, for example, is not really one disorder but dozens of them.

Where the history of drug development has been astonishingly haphazard, and our grasp of brain function is disturbingly low-level, the history of psycho-pharmaceutical marketing has been clever and effective. I still recall when an undergraduate friend confidently told me that her recent bout with depression had resulted from a chemical imbalance in her brain. I was dazzled by the explanation. It made her sadness cleaner, more easily resolved, less unglamorous.

It turns out that we had both signed on to the chemical imbalance theory, which proposed, in the 1960s, that depression could result from a deficiency of neurotransmitters. This ultimately evolved into the idea that too many or too few neurochemicals could cause different kinds of mental illness, such as psychosis. Biology became ascendant in our understanding of psychiatric conditions, which led to a vision of medicalized mental health that one of Bergners scientists calls a house of cards. The idea that S.S.R.I.s, for example, could further our understanding of disorders, the scientist observed, was like saying, I have pain so I must have an aspirin deficiency.

Read the original:
Review: The Mind and the Moon, by Daniel Bergner - The New York Times

Read More..

Ranking Kendrick Lamars The Heart Part 5 Deepfakes From Least To Most Bizarre – Okayplayer

Music - 2 hours ago

Ahead of the release of his upcoming album, Mr. Morale & The Big Steppers, Kendrick Lamar has released another installment of his The Heart series. The Heart Part 5 debuted on Sunday; accompanying its release was a pretty surreal music video where Lamar, against a red backdrop, transforms into different Black celebrities as he performs the song. Through the use of deepfake technology (the use of AI to replace the likeness of one person with another in video and other digital media), Kendrick Lamar becomes O.J. Simpson, Kanye West, JussieSmollett, Will Smith, Kobe Bryant, and Nipsey Hussle throughout the six-minute long video.

Now, deepfakes are inherently weird, and this is surely the first time weve seen them used in such a way by a mainstream rap artist. As inventive as it is, there is a bizarreness to the music video as Lamars face isnt just replaced with the faces of living (and dead) Black celebrities, but he raps some of his verses while donning those faces, too.

But which deepfakes were the most bizarre? How about the least? Well, rather than try and interpret every second of the music video (Kendrick fans on Twitter are already going above and beyond around that), weve done the real hard work of ranking the deepfakes used in The Heart Part 5 from least to most bizarre.

As with all six deepfakes, theyre all pretty accurate in their likeness, especially Jussie Smolletts. Although hes one of the most unexpected of the bunch, hes not the most bizarre.

Considering Kanye is actually a rapper, its not too unnerving seeing his face rapping Kendricks lyrics. However, Kendricks hair paired with Kanyes face might be the most bizarre if our ranking was based solely on that.

Is it just me or does the deepfake of Will Smith just look like a light skin Andr 3000?

The Kobe deepfake is one of two deceased figures used in the video, and that adds to the bizarreness of it all. But the likeness just feels too uncanny.

Its the one that starts everything off and its so unexpected. The moment Kendrick covered his face only for a deepfake of O.J. to appear, I had to scroll back a few seconds to make sure I wasnt losing my mind. That, paired with the fact that its O.J., is why this deepfake is one of the most bizarre ones from the video.

What makes the Nipsey deepfake the most bizarre is that not only is this the other deceased figure used in the video, but that Kendrick also raps from the perspective of the late rapper when he dons his face. As Nipsey, he directs a few lines at the Crenshaw rappers brother Sam Asghedom:

And Sam, Ill be watchin over youMake sure my kids watch all my interviewsMake sure you live all the dreams we produceKeep that genius in your brain on the move

And he also exonerates Nipseys killer (I forgive you, just know your souls in question) which, depending on how you view it, could be seen as taking ones creative license a little too far. But theres no denying how eerie it is to see Kendrick transform into Nipsey and essentially stay as him until the song comes to a close.

Read this article:
Ranking Kendrick Lamars The Heart Part 5 Deepfakes From Least To Most Bizarre - Okayplayer

Read More..

Deep roots? Try changing with the times | Letters To Editor | santafenewmexican.com – Santa Fe New Mexican

Country

United States of AmericaUS Virgin IslandsUnited States Minor Outlying IslandsCanadaMexico, United Mexican StatesBahamas, Commonwealth of theCuba, Republic ofDominican RepublicHaiti, Republic ofJamaicaAfghanistanAlbania, People's Socialist Republic ofAlgeria, People's Democratic Republic ofAmerican SamoaAndorra, Principality ofAngola, Republic ofAnguillaAntarctica (the territory South of 60 deg S)Antigua and BarbudaArgentina, Argentine RepublicArmeniaArubaAustralia, Commonwealth ofAustria, Republic ofAzerbaijan, Republic ofBahrain, Kingdom ofBangladesh, People's Republic ofBarbadosBelarusBelgium, Kingdom ofBelizeBenin, People's Republic ofBermudaBhutan, Kingdom ofBolivia, Republic ofBosnia and HerzegovinaBotswana, Republic ofBouvet Island (Bouvetoya)Brazil, Federative Republic ofBritish Indian Ocean Territory (Chagos Archipelago)British Virgin IslandsBrunei DarussalamBulgaria, People's Republic ofBurkina FasoBurundi, Republic ofCambodia, Kingdom ofCameroon, United Republic ofCape Verde, Republic ofCayman IslandsCentral African RepublicChad, Republic ofChile, Republic ofChina, People's Republic ofChristmas IslandCocos (Keeling) IslandsColombia, Republic ofComoros, Union of theCongo, Democratic Republic ofCongo, People's Republic ofCook IslandsCosta Rica, Republic ofCote D'Ivoire, Ivory Coast, Republic of theCyprus, Republic ofCzech RepublicDenmark, Kingdom ofDjibouti, Republic ofDominica, Commonwealth ofEcuador, Republic ofEgypt, Arab Republic ofEl Salvador, Republic ofEquatorial Guinea, Republic ofEritreaEstoniaEthiopiaFaeroe IslandsFalkland Islands (Malvinas)Fiji, Republic of the Fiji IslandsFinland, Republic ofFrance, French RepublicFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabon, Gabonese RepublicGambia, Republic of theGeorgiaGermanyGhana, Republic ofGibraltarGreece, Hellenic RepublicGreenlandGrenadaGuadaloupeGuamGuatemala, Republic ofGuinea, RevolutionaryPeople's Rep'c ofGuinea-Bissau, Republic ofGuyana, Republic ofHeard and McDonald IslandsHoly See (Vatican City State)Honduras, Republic ofHong Kong, Special Administrative Region of ChinaHrvatska (Croatia)Hungary, Hungarian People's RepublicIceland, Republic ofIndia, Republic ofIndonesia, Republic ofIran, Islamic Republic ofIraq, Republic ofIrelandIsrael, State ofItaly, Italian RepublicJapanJordan, Hashemite Kingdom ofKazakhstan, Republic ofKenya, Republic ofKiribati, Republic ofKorea, Democratic People's Republic ofKorea, Republic ofKuwait, State ofKyrgyz RepublicLao People's Democratic RepublicLatviaLebanon, Lebanese RepublicLesotho, Kingdom ofLiberia, Republic ofLibyan Arab JamahiriyaLiechtenstein, Principality ofLithuaniaLuxembourg, Grand Duchy ofMacao, Special Administrative Region of ChinaMacedonia, the former Yugoslav Republic ofMadagascar, Republic ofMalawi, Republic ofMalaysiaMaldives, Republic ofMali, Republic ofMalta, Republic ofMarshall IslandsMartiniqueMauritania, Islamic Republic ofMauritiusMayotteMicronesia, Federated States ofMoldova, Republic ofMonaco, Principality ofMongolia, Mongolian People's RepublicMontserratMorocco, Kingdom ofMozambique, People's Republic ofMyanmarNamibiaNauru, Republic ofNepal, Kingdom ofNetherlands AntillesNetherlands, Kingdom of theNew CaledoniaNew ZealandNicaragua, Republic ofNiger, Republic of theNigeria, Federal Republic ofNiue, Republic ofNorfolk IslandNorthern Mariana IslandsNorway, Kingdom ofOman, Sultanate ofPakistan, Islamic Republic ofPalauPalestinian Territory, OccupiedPanama, Republic ofPapua New GuineaParaguay, Republic ofPeru, Republic ofPhilippines, Republic of thePitcairn IslandPoland, Polish People's RepublicPortugal, Portuguese RepublicPuerto RicoQatar, State ofReunionRomania, Socialist Republic ofRussian FederationRwanda, Rwandese RepublicSamoa, Independent State ofSan Marino, Republic ofSao Tome and Principe, Democratic Republic ofSaudi Arabia, Kingdom ofSenegal, Republic ofSerbia and MontenegroSeychelles, Republic ofSierra Leone, Republic ofSingapore, Republic ofSlovakia (Slovak Republic)SloveniaSolomon IslandsSomalia, Somali RepublicSouth Africa, Republic ofSouth Georgia and the South Sandwich IslandsSpain, Spanish StateSri Lanka, Democratic Socialist Republic ofSt. HelenaSt. Kitts and NevisSt. LuciaSt. Pierre and MiquelonSt. Vincent and the GrenadinesSudan, Democratic Republic of theSuriname, Republic ofSvalbard & Jan Mayen IslandsSwaziland, Kingdom ofSweden, Kingdom ofSwitzerland, Swiss ConfederationSyrian Arab RepublicTaiwan, Province of ChinaTajikistanTanzania, United Republic ofThailand, Kingdom ofTimor-Leste, Democratic Republic ofTogo, Togolese RepublicTokelau (Tokelau Islands)Tonga, Kingdom ofTrinidad and Tobago, Republic ofTunisia, Republic ofTurkey, Republic ofTurkmenistanTurks and Caicos IslandsTuvaluUganda, Republic ofUkraineUnited Arab EmiratesUnited Kingdom of Great Britain & N. IrelandUruguay, Eastern Republic ofUzbekistanVanuatuVenezuela, Bolivarian Republic ofViet Nam, Socialist Republic ofWallis and Futuna IslandsWestern SaharaYemenZambia, Republic ofZimbabwe

View post:
Deep roots? Try changing with the times | Letters To Editor | santafenewmexican.com - Santa Fe New Mexican

Read More..

Alex Garland’s Men has more than one thing on its mind – The Verge

Despite all of the mystery that Men, writer / director Alex Garlands new folk horror for A24, has been shrouded in, the movies story about a haunted woman trying to find peace in a world full of leering, lecherous men is a surprisingly straightforward one. Men is often arresting in its brutality as it spins a stomach-turning tale about the multifaceted monster that misogyny truly is. But Men struggles to keep its messages and all their headiness in focus largely because of its frustrating obsession with making you question just how much of its otherworldliness is real.

Men tells the story of Harper Marlowe (Jessie Buckley), a young widow who takes off to the English countryside for a solitary retreat following her husband James (Paapa Essiedu) unexpected and grisly death by suicide. Men doesnt reveal much about either Harper or James as individual people or what first brought them together as a couple, but through flashbacks, the movie details the toxic mix of abuse and emotional manipulation that ultimately led to the end of their marriage. Though Harper knows that leaving James was the right decision and that James suicide was not her fault, she cant help but feel partially responsible and psychologically trapped by the traumatic circumstances of his death.

That feeling of being stuck and harmed by someones emotional violence even after theyve died is one of the first manifestations of the malevolent entity that Mens title refers to. Men illustrates that, while Harpers trip is something she wants to do for herself, most everyone she interacts with save for her friend Riley (Gayle Rankin) readily presumes that shes traveling with a man because she couldnt possibly have the desire to get out on her own.

Everyone is a loaded concept within the context of Men, in part because there truly arent all that many other people living in the remote and impossibly quaint village where Harpers rented out a luxurious manor all to herself. Aside from Geoffrey (Rory Kinnear), the awkward, bumbling parody of an English countryman who owns the house where Harpers staying, the only other people really living in the village seem to be a small assortment of male townsfolk all of whom are also inexplicably and unsettlingly portrayed by Kinnear. Whether or not Harper herself can see that every male-identified person she meets in the village has the same grown mans face isnt clear, and Men leaves that question open for you to interpret as its story becomes increasingly strange and symbolic.

Though Men clues you in to the danger circling around Harper, it isnt until she ventures out into the nearby woods for a walk and encounters a naked man Kinnear once again that it becomes apparent to her. Being chased through a secluded forest by a crazed man covered in bruises and cuts is alarming all on its own. But an important element of the horror Men conjures is how easy it is for the men around Harper to dismiss her fear regardless of how undeniably justified it is.

Though theyre important feelings she experiences as Men unfolds, neither fear nor guilt is what defines Buckleys Harper, a woman who reflexively hides parts of who she is from strangers more out of caution than anything else. As one of the few women to appear in Men, Harper unexpectedly becomes a kind of final girl as the movie mutates into a home invasion thriller thats equal parts cerebral and straightforward. Mens implicitly supernatural trappings invite you to question its heroines state of mind. But Buckley brings a steadfast resolve to her performance as Harper, reinforcing the idea that the only person who could imagine this simply being in her head is someone whos never known what it feels like to have their agency and bodily autonomy disregarded because of their sex or gender.

The strange energy that each of Kinnears different characters has occasionally plays as enigmatic because Men doesnt really clue you in to all that much about who they are outside of the fact that, in different ways, they all have bones to pick with women. Geoffreys simpering, emotional stuntedness may make it difficult for, say, the villages priest or barkeep to see much of themselves in him. But Men shows you how the thing that unites them is an almost elemental disdain and lust for Harper.

At times especially when its male characters are reveling in their most base, id-driven sexual impulses Men bears a certain narrative similarity to Emerald Fennels Promising Young Woman. But unlike Promising Young Woman, where you were partially meant to be horrified because of how awful all of its seemingly good men truly were, Men leaves little room for questioning how each of its titular characters is an existential threat to Harper.

Much of what takes place in Mens final acts is genuinely mind-boggling and fucked up in ways that make you appreciate Garland for being willing to go there. That said, the way Men comes to a close will also make you question the degree to which Garland thought through the optics and implications of his story as a whole beyond their immediate ability to make you profoundly uncomfortable.

Men wants to leave you thinking more deeply about what its trying to say, and its likely that many people who end up seeing the film will feel inclined to. But the same heightened reality that makes Mens scares so potent ultimately has a muddling effect on the movies message, so much so that you cant be sure whether Garland himself understood what he was trying to say.

Men also stars Sarah Twomey, Zak Rothera-Oxley, and Sonoya Mizuno. The movie hits theaters on May 20th.

Go here to see the original:
Alex Garland's Men has more than one thing on its mind - The Verge

Read More..

CCTV+: Mother’s Day: Xi Bears Mother’s Words in Mind to Honor Duties to Nation, People – PR Newswire

Qi, who was born in 1924, joined the Communist Party of China (CPC) in 1939 at the age of 15, becoming a staunch supporter of the Party's values and beliefs.

Over the years, Qi taught her son many important lessons of life through her words and deeds, such as to serve the country with selfless loyalty, work hard and handle all affairs well, and be strict with oneself.

Xi put on the backpack and left home at the age of 15 to live and work with the farmers in Liangjiahe Village of northwest China's Shaanxi Province.

During the years in the countryside, Xi was accompanied by a sewing bag embroidered with "mom's heart" made by Qi. The words were meant to remind Xi of staying true to one's original aspiration for the country and the revolutionary cause, which are spirits shared by both the mother and the son.

During Xi's entire upbringing, his mother often urges him to be strict with himself, especially when he is in a leadership position. Xi's philosophy and practice of governing the country has always been featured by maintaining integrity and solidarity to serve the public good.

In June 2000, Qi visited Beiliang Red Army Primary School in Zhaojin township, northwest China's Shaanxi Province.

The Beiliang Red Army Primary School, which was opened in 1955, used to be a revolutionary site, where the Chenjiapo Conference was held.

Seeing its dilapidated classrooms and shabby facilities, Qi mobilized her whole family to donate to relocate and rebuild the school.

Over the years, Xi has always kept in mind his mother's words, stayed true to his original aspiration, and taken on his due responsibilities. For Xi, to serve the people wholeheartedly is his "greatest filial piety" to his mother.

Link: https://youtu.be/Ff4kHNcGO5c

SOURCE CCTV+

See original here:
CCTV+: Mother's Day: Xi Bears Mother's Words in Mind to Honor Duties to Nation, People - PR Newswire

Read More..

Prominence of the training data preparation in geomagnetic storm prediction using deep neural networks | Scientific Reports – Nature.com

Dataset

The data used for the present analysis are: the solar wind (SW) plasma parameters; the interplanetary magnetic field (IMF); the Dst index. The entire dataset has been obtained from the National Space Science Data Center of NASA, namely, from the OMNI database30. In particular, we used hourly averages of the three components ((B_x), (B_y), (B_z)) of the IMF in the GSM (Geocentric Solar Magnetospheric) reference frame (i.e. the x-axis of the GSM coordinate system is defined along the line connecting the center of the Sun to the center of the Earth; the origin is defined at the center of the Earth and is positive towards the Sun; the y-axis is defined as the cross product of the GSM x-axis and the magnetic dipole axis and is positive towards dusk; The z-axis is defined as the cross-product of the x- and y-axes; the magnetic dipole axis lies within the xz plane), the SW plasma temperature (T), density (D), total speed (V), pressure (P), and eastwest component of the electric field ((E_y) derived from (B_z) and (V_x)).

The dataset covers the period January 1990November 2019, and includes half of the 22nd solar cycle, all of the 23rd, and almost all of the 24th. To produce a robust forecasting of the Dst index, it is crucial to determine how the dataset is split and processed for the training and evaluation of the model. On the other hand, adopting a correct methodology for treating data is crucial to avoid bias especially when both a machine learning approach is used to develop predictive models and the data are time series.

If data are periodic, it is safe to train the model considering at least one complete period and test it on different periods. In fact, being the arrow of time fixed and the future unknown, the training operation that make use of points that follow the data used in the test can introduce bias. Therefore, the validation and test data-sets must be constructed by points of the time series that follow what is used for training one. In the present case, since we have only data from two solar cycles, the best option is to use one cycle for training and the other for both validation and test. Anyway, such a choice forces the validation to contain data relative to the first half of a solar cycle with a distribution of Dst values and storms different from the test set. Therefore, in our opinion, the most efficient choice for the validation and test process is to select points randomly for the two datasets.

Training a supervised fashion Deep Learning (DL) model requires both a balanced sampling of data referring to quiet and storm periods, and a proper evaluation of the metrics used to measure the performances. If not, the model will learn to predict only the most frequent case represented in the training set. Moreover, the standard performance metrics, computed on the full validation and test dataset, would produce a the prediction that would be correct most of the time but wrong in most relevant cases.

Taking care of these two aspects, we split the dataset using all the data before 1/1/2009 for training, and the remaining part for validation and test. In this way, we have at least one solar cycle for the training and one for the evaluation of the model. As previously said, for the validation and test we can choose dataset subsequent in time (i.e. ordered) or an equal number of points randomly from those available after 1/1/2009. The difference between random and ordered selection are displayed in Fig.1. In panel a the validation data includes the points in the first half of the cycle while the test is the other half. It is evident that the tail of the two distributions is different: in the validation dataset, events with very low Dst, which are particularly important being connected with storms, are missing. The situation completely changes when the points are picked randomly. In this case, the distributions are quite similar and also similar to the training dataset, representing the best starting point for the development of a data-driven predictive model. The last problem, directly connected to the data distribution, is that there are only few events associated with storms. In the framework used in this paper, where the algorithm learns by looking at the data, if the distribution is highly peaked around some value of the target variable, the algorithm will learn to predict only such values. To avoid this issue, we apply a re-weighting function for the sampling of the data that feed the algorithms training. In this way, every value of Dst is almost equally probable. The difference between the nominal distribution and the flatten (weighted) distribution is presented in Fig.1c.

Normalized distributions of Dst in the dataset used for training, validation and test. (a) Validation is the first half of the solar cycle period, test the second half. (b) Points for validation and test are randomly extracted. Train dataset includes all the available points before 1/1/2009. (c) Train dataset without and with re-weighting the low Dst events.

The points discussed above limit also the applicability of standard cross-validation methods usually recommended in machine learning applications to test the robustness of the models. While specific schemes of cross-validations have been developed for time series (e.g., the TimeSeriesSplit function available in the Scikit Python library), we prefer not to adopt this type of check because this kind of split increases the size of the training dataset, namely: in the first iterations, there are much fewer storms than in the latest. This automatically will favor the last iterations of the procedure in predicting storms, introducing an indirect bias in the interpretation of the results.

All the features are scaled linearly on a compact range as an additional pre-processing step. The scale is fitted on the training dataset, mapping these min and max values of data in 0.1 and 0.9, respectively. This choice leaves some room to accommodate smaller or larger values than those available in the training dataset that can emerge in future measurements of the variables.

The architecture of the Neural Network considered in this study is close to the one used in26 where a Long Short-Term Memory (LSTM) module is combined with a Fully Connected Network (FCNN). LSTM is a recurrent layer composed of cells designed to process long time series. The input of the proposed network is time series containing the variables described in Dataset for the 12 points in the time window ([t-11, t]). Each cell of the LSTM layer (Fig.2) receives in input one element (x_{t_i}) of this time series together with the outputs of the previous cells: the hidden state, (h_{t_{i-1}}), and the memory state, (c_{t_{i-1}}). As schematically depicted in the figure, these three sources of information are processed through fully connected layers and element-wise operations, all internal to the cells. In standard application of LSTM, the hidden state from the last cell represents the networks prediction, and the hidden states of all the other cells are not considered. In our approach, we collect and concatenate all the hidden states ([h_{t-11}, h_t]) in a multidimensional vector. This vector is then fed as input of a fully connected module. The output of this FCNN is the forecast of the Dst index for the hours ([t+1, t+12]).

Neural Network architecture used to forecast the Dst index as described in the text. In the LSTM cell, the square blocks are Fully Connected layers with activation function, while the circles are elementwise operations.

In optimizing DL networks, two types of parameters need to be fixed: the layers weights and the hyper-parameters specifying the architecture. During training, the back-propagation procedure takes care of the former, which can be millions or even billions (in our case 25,244). The others, typically limited in number (in our case 7), are usually determined manually by testing different solutions and considering only the training and validation dataset in the evaluation to avoid bias.

We found that better predictions are obtained using the following values for the hyper parameters:

LSTM, number of hidden layers: 2,

LSTM, size of the hidden layers: 8,

FCNN, number of layers: 4,

FCNN, number of output features for each layer: 96, 96, 48, 12.

Batch normalization is applied to the input vector of the FCNN, ReLU activation function, and a dropout layer with a drop factor of 0.2 follows every fully connected layer except the last one.

The loss function minimized during the training of the network is the Mean Absolute Error (MAE) function

$$begin{aligned} {text {MAE}} = frac{1}{N}sum _{i=1}^{N}left| y_{pred} - y_{true}right| _i end{aligned}$$

(1)

We use the Adam optimizer and a learning rate of (10^{-5}). During the training, back-propagation is applied after computing the loss on samples extracted from the dataset in batches. The procedure is repeated an arbitrary number of times. Statistics are collected after iterating back-propagation on as many samples as the number of elements in the training dataset: this is called an epoch. The training ends once the loss function stops decreasing on the validation dataset. We used batches of size 256 and stopped training after 10,000 epochs. Examples of the loss function behaviors are presented in Fig.3.

History of the loss function in the 10,000 epochs of the training.

The code with the implementation of the network architecture and the procedure to generate the training, validation, and test datasets are available as a Python notebook in the public GitLab repository gitlab.fbk.eu/dsip/dsip_physics/dsip_ph_space/Dstw.

A typical baseline forecast method for time series is the persistent model. The assumption at the base of this approach is that nothing changes between the last known value and all the future points:

$$begin{aligned} Dst(t + n) = Dst(t),quad nin mathbb {N}. end{aligned}$$

(2)

It is expected that the predictive power of this model will decrease with the increase of the forecast horizon; on the contrary, in the short term, assuming persistence is often a good approximation of the actual trend.

Different metrics can be considered to highlight and study models features and compare their predictive power. However, the focus of this work is the importance of how the training data are selected and used. This is appreciable even considering only the most common of these metrics, the Root Mean Squared Error (RMSE), defined as:

$$begin{aligned} text {RMSE}=sqrt{frac{sum _{i=1}^N left( y_{pred_i}-y_{true}right) ^2}{N}}. end{aligned}$$

(3)

Read the original here:
Prominence of the training data preparation in geomagnetic storm prediction using deep neural networks | Scientific Reports - Nature.com

Read More..

Cloud Computing Technologies Market to Witness Massive Growth by 2029 | Amazon.com, Inc., Microsoft Corporation – Digital Journal

New Jersey, N.J., May 8, 2022 A2Z Market Research published new research on Global Cloud Computing Technologies Market covering the micro level of analysis by competitors and key business segments (2022-2029). The Global Cloud Computing Technologies explores a comprehensive study on various segments like opportunities, size, development, innovation, sales, and overall growth of major players. The research is carried out on primary and secondary statistics sources and it consists of both qualitative and quantitative detailing.

Emerging technologies such as artificial intelligence (AI) and machine learning are facilitating cloud expansion by enabling businesses to harness the capabilities of AI. The COVID-19 pandemic has become a huge economic challenge for the world. Remote work has become the latest trend, and it is expected to remain so in the long term, as organizations, managers, and employees continue to opt for it due to the epidemic.

Get PDF Sample Report + All Related Table and Graphs @:

https://www.a2zmarketresearch.com/sample-request/640239

Some of the Major Key players profiled in the study are Amazon.com, Inc., Microsoft Corporation, Google LLC, Oracle, Cisco Systems, Inc., Alphabet Inc., Salesforce.com, Inc., SAP SE, Dell Technologies Inc., IBM, Alibaba Group Holding Limited, Rackspace Technology, Inc., Adobe Inc.,

Various factors are responsible for the markets growth trajectory, which are studied at length in the report. In addition, the report lists down the restraints that are posing threat to the global Cloud Computing Technologies market. This report is a consolidation of primary and secondary research, which provides market size, share, dynamics, and forecast for various segments and sub-segments considering the macro and micro environmental factors. It also gauges the bargaining power of suppliers and buyers, threat from new entrants and product substitutes, and the degree of competition prevailing in the market.

Global Cloud Computing Technologies Market Segmentation:

Market Segmentation: By Type

by ServiceInfrastructure as a Service (IaaS)Platform as a Service (PaaS)Software as a Service (SaaS)by DeploymentPublic CloudPrivate CloudHybrid Cloud

Market Segmentation: By Application

BFSIIT and TelecommunicationsRetail and Consumer GoodsManufacturingEnergy and UtilitiesHealthcare and Life SciencesMedia and EntertainmentGovernment and Public SectorOthers

Key market aspects are illuminated in the report:

Executive Summary: It covers a summary of the most vital studies, the Global Cloud Computing Technologies market increasing rate, modest circumstances, market trends, drivers and problems as well as macroscopic pointers.

Study Analysis: Covers major companies, vital market segments, the scope of the products offered in the Global Cloud Computing Technologies market, the years measured and the study points.

Company Profile: Each Firm well-defined in this segment is screened based on a products, value, SWOT analysis, their ability and other significant features.

Manufacture by region: This Global Cloud Computing Technologies report offers data on imports and exports, sales, production and key companies in all studied regional markets

Market Segmentation: By Geographical Analysis

The Middle East and Africa (GCC Countries and Egypt)North America (the United States, Mexico, and Canada)South America (Brazil etc.)Europe (Turkey, Germany, Russia UK, Italy, France, etc.)Asia-Pacific (Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)

For Any Query or Customization: https://a2zmarketresearch.com/ask-for-customization/640239

The cost analysis of the Global Cloud Computing Technologies Market has been performed while keeping in view manufacturing expenses, labor cost, and raw materials and their market concentration rate, suppliers, and price trend. Other factors such as Supply chain, downstream buyers, and sourcing strategy have been assessed to provide a complete and in-depth view of the market. Buyers of the report will also be exposed to a study on market positioning with factors such as target client, brand strategy, and price strategy taken into consideration.

Key questions answered in the report include:

Table of Contents

Global Cloud Computing Technologies Market Research Report 2022 2029

Chapter 1 Cloud Computing Technologies Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global Cloud Computing Technologies Market Forecast

Buy the Full Research Report of Global Cloud Computing Technologies Market @: :

https://www.a2zmarketresearch.com/checkout

If you have any special requirements, please let us know and we will offer you the report as you want. you can also get an individual chapter-wise sections or region-wise report versions like North America, Europe or Asia.

About A2Z Market Research:

The A2Z Market Research library provides syndication reports from market researchers around the world. Ready-to-buy syndication Market research studies will help you find the most relevant business intelligence.

Our Research Analyst Provides business insights and market research reports for large and small businesses.

The company helps clients build business policies and grow in that market area. A2Z Market Research is not only interested in industry reports dealing with telecommunications, healthcare, pharmaceuticals, financial services, energy, technology, real estate, logistics, F & B, media, etc. but also your company data, country profiles, trends, information and analysis on the sector of your interest.

Contact Us:

Roger Smith

1887 WHITNEY MESA DR HENDERSON, NV 89014

[emailprotected]

+1 775 237 4147

Read more from the original source:
Cloud Computing Technologies Market to Witness Massive Growth by 2029 | Amazon.com, Inc., Microsoft Corporation - Digital Journal

Read More..