Category Archives: computing

It almost passed the Turing Test

This morning on AOL instant messenger, I got hit with some bizarre messages out of the blue:

kemptcoho: Let's look at the world with respect to theta.

doranchak: ok, let's do that

kemptcoho: what up
kemptcoho: so who is this?

doranchak: i was going to ask you the same thing

kemptcoho: and why am I your fellow prisoner? ha
kemptcoho: and I am Adam...

doranchak: adam who?

kemptcoho: Well now if I give everything away with nothing back then where is the fun?
kemptcoho: remember you sent me a message first...

doranchak: no, i didn't
doranchak: you did

kemptcoho: [06:36] DecayingCoho: Hello, my fellow prisoner!
[06:36] JudgeKaos: what up

What the hell???

So, I start thinking, maybe this was one of those AIM robots. This type of chat robot scrapes messages from blog posts and other online content. The robot then sends one of these messages to a person via AIM. If the person responds, the robot sends the response to some other person on AIM. When THAT person responds, the message is funneled back to the first person. And so it goes, causing all sorts of confusion.

Here’s where I start to wise up on what’s happening:


doranchak: oooh
doranchak: are you a trout bot? (Ed.: A trout bot is a variation of TheGreatHatsby)

kemptcoho: no....

doranchak: prove it 🙂
doranchak: ahh
doranchak: you're a coho bot
doranchak: my mistake 🙂

kemptcoho: and one proves they are not a bot how?

doranchak: that's a good existential question

kemptcoho: so you still haven't given me any indication as to who you are...

doranchak: my mommy told me not to talk to strangers

kemptcoho: or where I would know you from and what would prompt you to message me

doranchak: hey, whoever's on the other end of this: look up "coho bots" on wikipedia
doranchak: there's a bot funneling our responses back and forth to each other

kemptcoho: nice so we were put in touch by a bot how wonderful

doranchak: yeah, these bots are annoying, aren't they?

kemptcoho: very much so
kemptcoho: I was wondering why someone just messaged me outta the blue

doranchak: yeah, i was wondering that too

kemptcoho: I figured it was someone from the overnight forums at crackberry

doranchak: did you post "Let's look at the world with respect to theta." somewhere online?
doranchak: the bot scrapes messages like that to fool people into thinking they are talking to real people

kemptcoho: cant say that I did

doranchak: i wonder where it found that message

kemptcoho: so you are a real person?

doranchak: yeah; "kemptcoho" is the bot. it has two chats going on at once: one with me, and one with you. it's taking my messages to it and passing them along to you, and vice-versa.

kemptcoho: one word
kemptcoho: ANNOYING!

doranchak: agreed. 🙂
doranchak: well, nice chatting with you anyway. have a good day!

What a waste of time. But it was interesting to experience the scam. I think a lot of people get really angry when they experience the bot since it seems like some weirdo is stalking them (this is kind of what I felt at the beginning of the conversation above).

Atlanta GECCO trip report

Article sections: Atlanta | GECCO 2008 | Contests | Research

Atlanta

The Atlanta trip was a lot of fun. We stayed in a really nice rental house not far from Turner Field. The McCubbins managed to put up with me for a week and even went so far as to make dinner for me on several occasions. You haven’t had a good meal until you’ve tried their cooking. Mmm, tuna bites, fruit and goat cheese salad, steak, and black bottomed cupcakes. Our friends Jon and Kate are also accomplished cooks – we should host a cookoff between both couples so we can reap the delicious benefits.


Gecco Trip, Atlanta, Day 6 - Our rental house

Our rental house

Between home-cooked meals we sampled a variety of Atlanta dining options. Chris and I ate at Gladys and Rons Chicken and Waffles, a restaurant chain started by Gladys Knight that serves the most delicious fried chicken and waffles I’ve ever had. The waffles are warm and soft on the inside and nice and crispy on the outside. Perfect. And eating there has only amplified my weakness for fried chicken. I also managed to meet up with the Atlanta-based contingent of my LegalEdge coworkers at the Vortex Bar and Grill. While I did not sample the infamous bypass burgers, I did partake of the big-ass mushroom swiss burger, and my brain’s burger receptors were alight with glee. This celebration of manliness was a mere coverup for the earlier, emasculating experience of eating at the American Girl Boutique and Bistro to celebrate Eris’ fifth birthday. Despite the pink/pastel surroundings, bad service, and proliferation of little girls tending to their creepy shark-eyed dolls, we had a great time and the food was really good.

We checked out the Georgia Aquarium and World of Coca Cola during our stay. The aquarium is fantastic; definitely a must-see. The whale shark tank there is a massive, imposing, wondrous display. The Coca Cola museum is fun but they really hammer you with Coca Cola propaganda while you are there. YOU MUST DRINK IT. The tasting room is awesome, though. In it you can try unlimited samples of around 70 different Coca-Cola products sold around the world. We shuffled among dispensers over the sticky floors and tasted all sorts of delicious sugary carbonated water, and occasionally experienced horrid drinks such as Beverly. The tasting room gets you nice and high on sugar and caffeine before you go to the gift shop, which is the only way to exit the museum. A brilliant scheme to coax dollars from your wallet.


Georgia Aquarium / Coca Cola Museum (youtube link)

My trip photos | Chris and Angel’s trip photos

GECCO 2008

According to Nic McPhee’s twitters, GECCO 2008 had 471 attendees from 46 countries. This universal appeal of scientific research is one of things I liked about last year’s GECCO conference, too. This year’s conference, though, was almost as bad as last year’s when it came to feeding the attendees. Food was given out during the two hour poster session where I was presenting my poster, but all the food was gone in less than 20 minutes, and it was not replenished. Boo!

Keynotes

Nevertheless, there were plenty of fascinating presentations and workshops. The keynotes were again from experts in the field of biology, source of many of the great ideas in evolutionary computing. Dr. Martin I. Meltzer, senior health economist at the Centers for Disease Control, gave an interesting keynote talk about developing scientific models to study public health policy and how well we’d react to sudden outbreaks of disease. In particular, he used the example of pandemic influenza. Overall it was a fascinating but extremely depressing talk, since much of it dwelled on how unprepared we are for situations such as the 1918 flu pandemic. Well-known biology professor, popular science blogger, fierce skeptic, and “expelled from Expelled” victim PZ Meyers gave the second keynote talk. He spoke about the importance of development during evolutionary processes (aka “evo-devo”). For example, many animals share the same exact genes but the organisms themselves have vast differences. The differences are due to other important developmental processes outside of the animals’ genes. He talked about some interesting specific examples, such as development of bats and mice. Cretekos et al (2008) recently chopped out a regulatory sequence from bats and stuck them into mice. The mice then developed longer forelimbs, corresponding to the lengthened forelimbs of bats needed for flight. PZ’s blog post explains this in more detail (and with cool pictures!) This example showed that there are many elements at play that create variety in organisms, and many of these elements are strongly influenced by their environment. We are only barely beginning to understand how these things all work together to form life.

PZ’s other interesting example of environmental factors in evolutionary development was Suzuki and Nijhout’s 2006 paper “Evolution of a Polyphenism by Genetic Accommodation”. The researchers were able to evolve environmentally-driven traits in a type of caterpillar. In cooler temperatures, the evolved caterpillars remain black in color. But some of the ones exposed to hotter temperatures turn green in color; all the rest remain black. So the experimenters selected the greenest caterpillars and let them breed with each other. They also selected the black, unchanging caterpillars and bred them with each other. Over a small number of generations, descendants of the green-changing caterpillars more reliably changed colors, while the unchanging caterpillars reliably resisted changing colors in hotter temperatures. Read PZ’s post for more interesting info on how this all works. It reminds me of Ryan Somma’s post about Daisyworld, a thought experiment world in which black and white daisies affect the temperature of their planet as well as their own survival.


Gecco Trip, Atlanta, Day 4 - PZ Meyers keynote

PZ Meyers giving his evo-devo keynote

Here are some other links recounting PZ’s Atlanta visit: PZ blogging about a meet up with his blog readers. Detailed description of the keynote. PZ’s post about his GECCO keynote (including a PDF of his slides).

Contests

Chris and I entered the 2D packing problem contest, where you have to evolve a grid of numbers that yield the highest scores for adjacent pairs of numbers. We didn’t win but we did well enough to give a presentation about our approach. We developed an “embryonic” growth technique to evolve the 2D grid, using block-based growth, and something that ended up looking like mold.

Animation of the “mold” evolution technique. Brighter red spots indicate formation of high-scoring areas of the grid. Click to see the supersized version.

Other contests included evolving Rubik’s cube solvers on a massively parallel grid computing platform (the winner gets $1000), evolving L-systems to match pre-existing images, and evolving intelligent agents to search a virtual landscape for food as efficiently as possible. Nobody qualified for the Rubik’s cube contest, and nobody entered the L-system contest. Which is too bad, since they are very interesting problems. And the $1000 bounty for the Rubik’s cube problem remains unclaimed; Parabon is keeping the competition open and is upping the ante to $2000 for GECCO 2009.

There was also the so-called “HUMIES” awards, which is a competition to showcase evolutionary methods that match or outperform human efforts to solve problems. The winning paper used genetic programming to evolve ways to find special algebraic terms that no human has been able to accomplish.

Interesting research

Below is a list of some of the other presentations and papers that interested me:

  • Games: Moshe Sipper spoke about evolving artificial players for Robocode, backgammon, and chess. The evolved Robocode player was able to beat all of its competitors, which were all written by humans. The evolved backgammon player beat “pubeval”, a strong hand-written backgammon algorithm, 62% of the time. Sipper claims the evolved player will beat human players “most of the time”. The evolved chess-playing AI was able to win or draw against Crafty, a hand-written chess-playing program that is a top competitor at the World Computer Chess Championships.
  • Kenneth Stanley discussed “generative and developmental systems”. He explored the question, “how is it possible that 100 trillion connections in the human brain can arise from a mere 30,000 genes in the human genome?” The belief is that biological processes such as embryonic development cause complex things to emerge. If we stole some of these ideas from nature and used them in evolutionary computing, maybe we could solve some really interesting and difficult problems. Dr. Stanley cited the work of Gregory Hornby, who evolved robots and other objects using an L-system grammar. The advantage of using an L-system is you can get complex behaviors out of very compact, simplistic rules instead of describing or defining each part individually.

    Animations of Hornby’s evolved L-system robots. Click the images if they don’t animate for you.


    Dr. Stanley went on to describe a technique to evolve abstract representations for development, based on how evolutionary artwork is made. This was a big surprise to me; I’ve done a little bit of evolutionary art research, so I was happy to discover that there are real uses for the techniques other than just making pretty pictures. Along the way, the technique Dr. Stanley described turned into a side project called Picbreeder where computer-generated art is evolved via an online community. I’ve been wanting to see something like this!

    Sample high-ranked pictures from Picbreeder.org.

  • In the defense applications track, we saw a talk about evolving swarm behaviors for unmanned aerial vehicles (UAVs). Some of the swarming, self-organizing, and attacking behaviors are inspired by behaviors of insects such as bees and wasps. Several interesting micro-UAV technologies were mentioned, such as the Black Widow, UAVs with flapping wings (including bat wings), and parasitic (!!!) UAVs such as SilentEyes (it is launched from larger UAVs). Don’t do anything suspicious, or a swarm of these damned things will form a stinging cloud around you.

    Black Widow micro-UAV. Watch out for its poisonous bite.


    In another talk, an Australian researcher described their technique of evolving collective intelligence for UAVs to detect and report bush fires (that’s Australian for “wildfires”). Their challenge was to evolve swarm behaviors so the UAVs have the best possible coverage of the surveyed area, and also so the UAVs can adapt if there are malfunctions in members of the swarm.

There were many more interesting papers, too numerous to describe, showcasing the widespread and diverse applications of evolutionary computing. Some examples include evolving circuits with high testability, automatic defect classification in electronic wafer manufacturing, quantifying quality degradation on voice-over-IP networks, detection of malware (including zero-day virus attacks) using techniques inspired by biological immune systems, evolving color schemes for people with color blindness, investment portfolio optimization, modeling the Milky Way galaxy using BOINC volunteer computing, developing no-loss strategies for tic-tac-toe, finding deadlocks in large concurrent java programs, radar jamming, evolving functions that can detect computer program code plagiarism by students (beware, cheaters!), automatic route planning that takes traffic into consideration, automatic composition of rock music using genetic algorithms (seriously?), interactive evolution of facial composites of suspects in criminal investigations, detection of moving objects in videos, using a bacterial foraging algorithm to detect circles on images (wait, what?), evolving a World Computer Chess Champion-beating chess program by mimicking the behavior of a mentor, and prediction of whether a company will have financial losses.

The list goes on. But I’ve punished you long enough with this mercilessly long post. Long story short: Trip good. Science good. Computers fun.

Geek celebrity moment

My friend Chris recently got to meet Jeff Hawkins (neuroscientist, founder of Palm Computing and Handspring, inventor of the Palm Pilot and the Treo, author of On Intelligence, founder of Numenta, developer of the idea of “Hierarchical Temporary Memory”):



“Can you sign my Palm Pilot?”

Pretty nifty! Chris gets to play with Numenta’s HTM software at his job at APL (lucky bastard). But everyone else can play, too, because the software is available to everyone here: Numenta Platform for Intelligent Computing (NuPIC). Get your A.I. on!

GECCO @ Hotlanta

I’ve finally finished my crazy Zodiac cipher poster for GECCO 2008 in Atlanta next week:



Click image for biggie size, or get the PDF version. And here’s the 2-page paper if you want it.

Last year, I used PowerPoint (gasp) to create the poster. What a huge pain that was. This year, I used OmniGraffle, by far the best damned diagramming software I have ever used.

It should be a fun conference; I’m excited to hear about the results of all the competitions. Chris and I entered the “2D Packing Problem” contest; alas, our entry did not win. Still, we had a lot of fun trying out different ideas – it was a very fun problem to work on. The other contests should be fun to hear about, especially the Rubik’s Cube Solver contest. Entrants in this contest get to use a commercial grid computing platform to breed Rubik’s Cube solving algorithms.

ALIENS!

Your computer might find them. I’ve had Seti@Home running in the BOINC distributed computing platform for a while now. My Mac Pro eight-core beast has been chewing through radio telescope data for a while now, and I recently came across a nifty website-badge that shows my progress:



Wow, I’m up to 84,155th place!! To give you an idea of how far away from 1st place I am, my “credit” score, which indicates how much computing time I’ve contributed, is currently 60,669. The top contributor has 458,338,508 credits. As of January 2008, the SETI@home project by itself has amassed 3.4 million years of computing time from its contributors. An incredible achievement!

Be sure to check out this list of BOINC-supported distributed computing projects. There’s some interesting stuff in there. Go sign up and put your lazy CPU to work while you sleep. FOR SCIENCE!

New Media Flotsam

I thought I would post a roundup of convenient links to RSS feeds for all my social media debris (blog, Flickr, YouTube, Digg, del.icio.us, last.fm, Twitter, LinkedIn, etc.). But FriendFeed already does it elegantly with a single simple page:

http://friendfeed.com/doranchak

And, with a single consolidated RSS feed to go with it:

http://friendfeed.com/doranchak?format=atom

If you aren’t familiar with RSS, read this, or this, or this. My favorite RSS reader is Google Reader because I can use it anywhere; check it out here.

Twenty-first century technology enables me to bore you more efficiently than ever before!

Free genetic programming book available

At the EvoStar 2008 evolutionary computation conference in Naples, Italy (man, I wish I could have gone), three scientists have released the completely free and downloadable book, “A Field Guide To Genetic Programming”.

Genetic programming (GP) is a systematic, domain-independent method for getting computers to solve problems automatically starting from a high-level statement of what needs to be done. Using ideas from natural evolution, GP starts from an ooze of random computer programs, and progressively refines them through processes of mutation and sexual recombination, until high-fitness solutions emerge. All this without the user having to know or specify the form or structure of solutions in advance. GP has generated a plethora of human-competitive results and applications, including novel scientific discoveries and patentable inventions.

This unique overview of this exciting technique is written by three of the most active scientists in GP.

This is an incredibly useful and practical book for anyone interested in artificial intelligence and machine learning. It is an up-to-date guide to the subject, summarizing two decades of research.

What kind of problems are genetic programs good at solving? The book tells you what traits these problems have:

  • The interrelationships among the relevant variables is unknown or poorly understood (or where it is suspected that the current understanding may possibly be wrong).
  • Finding the size and shape of the ultimate solution is a major part of the problem.
  • Significant amounts of test data are available in computer-readable form.
  • There are good simulators to test the performance of tentative solutions to a problem, but poor methods to directly obtain good solutions.
  • Conventional mathematical analysis does not, or cannot, provide analytic solutions.
  • An approximate solution is acceptable (or is the only result that is ever likely to be obtained).
  • Small improvements in performance are routinely measured (or easily measurable) and highly prized.

Get the book here.

The joys of breeding

Last week was a good week for my strange little diversions with genetic algorithms. Two things happened that helped to validate the legitimacy (in my mind) of using genetic algorithms to solve certain problems. The first was receiving a copy of the March issue of Muse Magazine, a children’s magazine about science, art, and history. A little blurb about my evolutionary art project for last year’s GECCO conference appeared in the magazine.




Shiny!

I wish I had the time to continue to improve the art generated by that technique. It was a lot of fun to play with. There are many other ideas I want to try, such as adding new measurements to compare things like texture and composition, but, alas, not enough time to explore them. One day I hope to return to this.

Meanwhile, I’ve been wasting way too much free time trying to develop a genetic algorithm to attack the unsolved Zodiac killer cipher. The results have been somewhat minimal so far, but it’s a start. I’ve been playing with this stuff since March of last year, so I figured I should have something to show for all the time I’ve put into this research. I decided to write and submit a research paper to this year’s GECCO conference on evolutionary computing, and my paper was accepted as a poster presentation. W00t! I had a lot of fun at last year’s GECCO conference; I look forward to absorbing all the fascinating cutting-edge presentations this year. Here is the title and abstract from my paper:

Evolutionary Algorithm for Decryption of Monoalphabetic Homophonic Substitution Ciphers Encoded as Constraint Satisfaction Problems

ABSTRACT
A homophonic substitution cipher is a substitution cipher in which each plaintext letter maps to a set of one or more ciphertext symbols. Monoalphabetic homophonic ciphers do not allow ciphertext symbols to map to more than one plaintext letter. The selection of ciphertext symbol mappings is intended to conceal language statistics in the enciphered messages. Statistical-based attacks that are known to be quite effective on simple substitution ciphers are very difficult to apply to homophonic substitution ciphers that employ good selections of ciphertext symbol mappings. Word boundaries are often not known, increasing the difficulty of decryption. We present a dictionary-based attack using a genetic algorithm that encodes solutions as plaintext word placements subjected to constraints imposed by the cipher symbols. For a test case to develop the technique, we use a famous cipher (with a known solution) created by the Zodiac serial killer. We present several successful decryption attempts using moderate dictionary sizes of up to five hundred words. Attempts are ongoing to increase the robustness of this technique by making it work with larger dictionaries and a variety of test ciphers.

Since then, I’ve gotten the technique to work against the test cipher with dictionary sizes of 1200 words, but the algorithm is very sensitive to various parameters when it is running, so it’s not very robust yet. There is still a lot of work to do.

Maybe I should get a normal hobby.

Zodiac cipher solver program updated

A new version of zkdecrypto is available for all you cipher enthusiasts. The zkdecrypto team has been very busy adding new features and fixing bugs.

* Program is now both smaller and MUCH faster
* Ability to now open both ASCII and numeric ciphers
* Ability to now save the loaded cipher
* Exclusions and locked letters are now saved in the “key” file
* New Redo function in addition to Undo
* New pattern analysis and sequential analysis reports
* 1-click ability to add full alphabet to “Additional Key Letters”
* New “Word List” feature that lists words found in the plaintext

…and more.

Click here for more information and download links.

New cipher-solving program available

Brax Cisco, Wesley Hopper, and Michael Eaton have just beta-released their wonderful “Zodiac Decrypto” program, a fun piece of software designed to attack the Zodiac ciphers as well as other substitution ciphers. It uses letter-level n-gram frequency analysis (no, not Engram analysis!) to estimate the validity of solutions generated by the software’s hillclimbing process. The software runs in Windows.



Cracktastic softwares

Give it a shot!

Download

Project Page