Skip to content

schubertjan/ml-prague-2024

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Notes from ML Prague conference 22 to 24.4.2024.

Summary of topics:

Can LLM reason?

  • Deductive/Inductive/Abductive
  • Reasoning requires some abstraction

Deductive prompt

Complete this argument:

French cars have faulty engines. 
I own a french car
Therefore, my car has <complete>

Inductive prompt

Complete the argument:

90% of cyclists who complete training program ABC go to ride Tour de France.
Piere completed training program ABC.
Therefore, Piere will  <complete>

Abductive reasoning

My egine didnt start in the morning, list reasons why

Abstraction

Prompt

Complete the next step in this sequence:

ab
aabb
aaaabbbb

Answer

Certainly! Let’s analyze the given sequence:

ab: This sequence consists of alternating letters ‘a’ and ‘b’. To continue the pattern, we add another ‘a’ and ‘b’, resulting in ‘aaabbb’.
aabb: Here, we have two 'a’s followed by two 'b’s. To extend the sequence, we add another pair of 'a’s and 'b’s, giving us ‘aaaabbbb’.
aaaabbbb: Continuing the trend, we add one more ‘a’ and ‘b’ to get ‘aaaaabbbbb’.
So, the next term in the sequence is ‘aaaaabbbbb’. If you have any more sequences or questions, feel free to ask! 😊

Example of LLM reasoning Ceasar Cipher https://en.wikipedia.org/wiki/Caesar_cipher. LLM can decipher known ciphers (like the one from Wiki) but unable to generalize. It can complete single steps if prompted.

Prompt:

Knowing this information:

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.[1]

The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenère cipher, and still has modern application in the ROT13 system. As with all single-alphabet substitution ciphers, the Caesar cipher is easily broken and in modern practice offers essentially no communications security.

Decipher this cipher:
QEB NRFZH YOLTK CLU GRJMP LSBO QEB IXWV ALD

Prompt:

Knowing this information:

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.[1]

The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenère cipher, and still has modern application in the ROT13 system. As with all single-alphabet substitution ciphers, the Caesar cipher is easily broken and in modern practice offers essentially no communications security.

'Qlaxv fp Qrbpaxv'

Prompt:

Write a python code that will cipher text using this method

Prompt:

Write a python code that will be able to decipher using this cipher method. The function should detect any shift.

Knowing this information:

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.[1]

The encryption step performed by a Caesar cipher is often incorporated as part of more complex schemes, such as the Vigenère cipher, and still has modern application in the ROT13 system. As with all single-alphabet substitution ciphers, the Caesar cipher is easily broken and in modern practice offers essentially no communications security.

This is where an agent based system like langchain might be useful https://www.langchain.com/. This is a tool that combines some set steps and uses LLMs to perform specific operatons within these steps.

Use analysis from https://www.kaggle.com/code/priy998/imdb-sqlite/notebook and compere to LLM: prompts: Check how many movies are present in iMDB Find all directors with name starting with Steven

Finding new planets

Methods:

Take data labeled by statistical method and train a ML model.

Map cell tower data to road segments

Use info about cell tower connections to gps to road segments. Using labeled data from a fleet of vehicles with GPS signal.

Example: https://dataclair.ai/case-study/optimization-for-outdoor-campaigns

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published