


The 'FunSearch” training method announced by Google DeepMind: enables AI models to solve complex discrete mathematical problems
According to news on December 15, Google DeepMind recently announced a model training method called "FunSearch", which claims to be able to calculate "upper-limit problems" and "boxing problems" A series of "complex problems involving mathematics and computer science."
The content that needs to be rewritten is: ▲ Source: Google DeepMind (hereinafter referred to as DeepMind)
It is reported that the FunSearch model training method is mainly introduced for AI models An "Evaluator" system is developed. The AI model outputs a series of "creative problem-solving methods", and the "Evaluator" is responsible for judging the problem-solving methods output by the model. After repeated iterations, it can be trained Develop AI models with stronger mathematical capabilities.
Google's DeepMind used the PaLM 2 model for testing and established a dedicated "code pool" to input a series of questions in the form of code and set up the evaluator process. The model then automatically selects problems from the code pool, generates "creative new solutions" in each iteration, and submits them to the evaluator for evaluation. Among them, the "best solution" will be re-added to the code pool and start another round of iterationThis site noticed that theFunSearch training method is particularly good at "Discrete Mathematics (Combinatorics)". After training The model trained by this method can easily solve extreme value combinatorial mathematics problems. In a press release, the researchers introduced the process of calculating the "upper-level problem (a central problem in mathematics involving counting and permutations)" by the model. .
is different from other exploits Compared with the AI training method of neural network learning, the output code of the model trained by the FunSearch training method is easier to check and deploy, which means it is easier to be integrated into the actual industrial environment.
The above is the detailed content of The 'FunSearch” training method announced by Google DeepMind: enables AI models to solve complex discrete mathematical problems. For more information, please follow other related articles on the PHP Chinese website!

This article explores the growing concern of "AI agency decay"—the gradual decline in our ability to think and decide independently. This is especially crucial for business leaders navigating the increasingly automated world while retainin

Ever wondered how AI agents like Siri and Alexa work? These intelligent systems are becoming more important in our daily lives. This article introduces the ReAct pattern, a method that enhances AI agents by combining reasoning an

"I think AI tools are changing the learning opportunities for college students. We believe in developing students in core courses, but more and more people also want to get a perspective of computational and statistical thinking," said University of Chicago President Paul Alivisatos in an interview with Deloitte Nitin Mittal at the Davos Forum in January. He believes that people will have to become creators and co-creators of AI, which means that learning and other aspects need to adapt to some major changes. Digital intelligence and critical thinking Professor Alexa Joubin of George Washington University described artificial intelligence as a “heuristic tool” in the humanities and explores how it changes

LangChain is a powerful toolkit for building sophisticated AI applications. Its agent architecture is particularly noteworthy, allowing developers to create intelligent systems capable of independent reasoning, decision-making, and action. This expl

Radial Basis Function Neural Networks (RBFNNs): A Comprehensive Guide Radial Basis Function Neural Networks (RBFNNs) are a powerful type of neural network architecture that leverages radial basis functions for activation. Their unique structure make

Brain-computer interfaces (BCIs) directly link the brain to external devices, translating brain impulses into actions without physical movement. This technology utilizes implanted sensors to capture brain signals, converting them into digital comman

This "Leading with Data" episode features Ines Montani, co-founder and CEO of Explosion AI, and co-developer of spaCy and Prodigy. Ines offers expert insights into the evolution of these tools, Explosion's unique business model, and the tr

This article explores Retrieval Augmented Generation (RAG) systems and how AI agents can enhance their capabilities. Traditional RAG systems, while useful for leveraging custom enterprise data, suffer from limitations such as a lack of real-time dat


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

WebStorm Mac version
Useful JavaScript development tools

Atom editor mac version download
The most popular open source editor

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software