VOTING POWER100.00%
DOWNVOTE POWER100.00%
RESOURCE CREDITS100.00%
REPUTATION PROGRESS0.00%
Net Worth
0.000USD
STEEM
0.004STEEM
SBD
0.000SBD
Effective Power
3.361SP
├── Own SP
0.000SP
└── Incoming DelegationsDeleg
+3.361SP
Detailed Balance
| STEEM | ||
| balance | 0.004STEEM | STEEM |
| market_balance | 0.000STEEM | STEEM |
| savings_balance | 0.000STEEM | STEEM |
| reward_steem_balance | 0.000STEEM | STEEM |
| STEEM POWER | ||
| Own SP | 0.000SP | SP |
| Delegated Out | 0.000SP | SP |
| Delegation In | 3.361SP | SP |
| Effective Power | 3.361SP | SP |
| Reward SP (pending) | 0.000SP | SP |
| SBD | ||
| sbd_balance | 0.000SBD | SBD |
| sbd_conversions | 0.000SBD | SBD |
| sbd_market_balance | 0.000SBD | SBD |
| savings_sbd_balance | 0.000SBD | SBD |
| reward_sbd_balance | 0.000SBD | SBD |
{
"balance": "0.004 STEEM",
"savings_balance": "0.000 STEEM",
"reward_steem_balance": "0.000 STEEM",
"vesting_shares": "0.000000 VESTS",
"delegated_vesting_shares": "0.000000 VESTS",
"received_vesting_shares": "5472.996220 VESTS",
"sbd_balance": "0.000 SBD",
"savings_sbd_balance": "0.000 SBD",
"reward_sbd_balance": "0.000 SBD",
"conversions": []
}Account Info
| name | maxime01codex |
| id | 1537392 |
| rank | 1,350,218 |
| reputation | 373221087 |
| created | 2021-05-29T19:24:57 |
| recovery_account | steem |
| proxy | None |
| post_count | 6 |
| comment_count | 0 |
| lifetime_vote_count | 0 |
| witnesses_voted_for | 0 |
| last_post | 2021-06-05T18:47:03 |
| last_root_post | 2021-06-05T18:47:03 |
| last_vote_time | 2021-06-08T05:26:36 |
| proxied_vsf_votes | 0, 0, 0, 0 |
| can_vote | 1 |
| voting_power | 0 |
| delayed_votes | 0 |
| balance | 0.004 STEEM |
| savings_balance | 0.000 STEEM |
| sbd_balance | 0.000 SBD |
| savings_sbd_balance | 0.000 SBD |
| vesting_shares | 0.000000 VESTS |
| delegated_vesting_shares | 0.000000 VESTS |
| received_vesting_shares | 5472.996220 VESTS |
| reward_vesting_balance | 0.000000 VESTS |
| vesting_balance | 0.000 STEEM |
| vesting_withdraw_rate | 0.000000 VESTS |
| next_vesting_withdrawal | 1969-12-31T23:59:59 |
| withdrawn | 0 |
| to_withdraw | 0 |
| withdraw_routes | 0 |
| savings_withdraw_requests | 0 |
| last_account_recovery | 1970-01-01T00:00:00 |
| reset_account | null |
| last_owner_update | 1970-01-01T00:00:00 |
| last_account_update | 1970-01-01T00:00:00 |
| mined | No |
| sbd_seconds | 0 |
| sbd_last_interest_payment | 1970-01-01T00:00:00 |
| savings_sbd_last_interest_payment | 1970-01-01T00:00:00 |
{
"id": 1537392,
"name": "maxime01codex",
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM7Fz6CW9hq6x9TFuhuJE4FqBLg2fZnsdptmg1q5MG7FRZecDQAH",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5GA5P5kTv84G9tJxApqQAvERQK1F273J5mnTRe9ZjzSEF1BeAL",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5krArJkr1pyWZDaDxPzQRS5DEEK1whk9XuoEJ3NH9oRA2dPUtj",
1
]
]
},
"memo_key": "STM7dNy3SstP2SdJJMnFX3ugTmCX3FeapreuTdBNDLyJmjTRNPJW4",
"json_metadata": "{}",
"posting_json_metadata": "",
"proxy": "",
"last_owner_update": "1970-01-01T00:00:00",
"last_account_update": "1970-01-01T00:00:00",
"created": "2021-05-29T19:24:57",
"mined": false,
"recovery_account": "steem",
"last_account_recovery": "1970-01-01T00:00:00",
"reset_account": "null",
"comment_count": 0,
"lifetime_vote_count": 0,
"post_count": 6,
"can_vote": true,
"voting_manabar": {
"current_mana": "5472996220",
"last_update_time": 1769186427
},
"downvote_manabar": {
"current_mana": 1368249055,
"last_update_time": 1769186427
},
"voting_power": 0,
"balance": "0.004 STEEM",
"savings_balance": "0.000 STEEM",
"sbd_balance": "0.000 SBD",
"sbd_seconds": "0",
"sbd_seconds_last_update": "1970-01-01T00:00:00",
"sbd_last_interest_payment": "1970-01-01T00:00:00",
"savings_sbd_balance": "0.000 SBD",
"savings_sbd_seconds": "0",
"savings_sbd_seconds_last_update": "1970-01-01T00:00:00",
"savings_sbd_last_interest_payment": "1970-01-01T00:00:00",
"savings_withdraw_requests": 0,
"reward_sbd_balance": "0.000 SBD",
"reward_steem_balance": "0.000 STEEM",
"reward_vesting_balance": "0.000000 VESTS",
"reward_vesting_steem": "0.000 STEEM",
"vesting_shares": "0.000000 VESTS",
"delegated_vesting_shares": "0.000000 VESTS",
"received_vesting_shares": "5472.996220 VESTS",
"vesting_withdraw_rate": "0.000000 VESTS",
"next_vesting_withdrawal": "1969-12-31T23:59:59",
"withdrawn": 0,
"to_withdraw": 0,
"withdraw_routes": 0,
"curation_rewards": 0,
"posting_rewards": 0,
"proxied_vsf_votes": [
0,
0,
0,
0
],
"witnesses_voted_for": 0,
"last_post": "2021-06-05T18:47:03",
"last_root_post": "2021-06-05T18:47:03",
"last_vote_time": "2021-06-08T05:26:36",
"post_bandwidth": 0,
"pending_claimed_accounts": 0,
"vesting_balance": "0.000 STEEM",
"reputation": 373221087,
"transfer_history": [],
"market_history": [],
"post_history": [],
"vote_history": [],
"other_history": [],
"witness_votes": [],
"tags_usage": [],
"guest_bloggers": [],
"rank": 1350218
}Withdraw Routes
| Incoming | Outgoing |
|---|---|
Empty | Empty |
{
"incoming": [],
"outgoing": []
}From Date
To Date
steemdelegated 3.361 SP to @maxime01codex2026/01/23 16:40:27
steemdelegated 3.361 SP to @maxime01codex
2026/01/23 16:40:27
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 5472.996220 VESTS |
| Transaction Info | Block #102862442/Trx 70369ca3ee6ec2338c123b998d380f2abfe9196d |
View Raw JSON Data
{
"trx_id": "70369ca3ee6ec2338c123b998d380f2abfe9196d",
"block": 102862442,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2026-01-23T16:40:27",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "5472.996220 VESTS"
}
]
}steemdelegated 3.462 SP to @maxime01codex2024/12/17 11:53:30
steemdelegated 3.462 SP to @maxime01codex
2024/12/17 11:53:30
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 5637.215417 VESTS |
| Transaction Info | Block #91308717/Trx a13d5ceb17ef2c29bffb23a34dc8693d6898c181 |
View Raw JSON Data
{
"trx_id": "a13d5ceb17ef2c29bffb23a34dc8693d6898c181",
"block": 91308717,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2024-12-17T11:53:30",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "5637.215417 VESTS"
}
]
}steemdelegated 3.566 SP to @maxime01codex2023/11/14 03:35:39
steemdelegated 3.566 SP to @maxime01codex
2023/11/14 03:35:39
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 5806.348949 VESTS |
| Transaction Info | Block #79862897/Trx f447b9d1ccb5dd8af0da98d121fd6b744e570044 |
View Raw JSON Data
{
"trx_id": "f447b9d1ccb5dd8af0da98d121fd6b744e570044",
"block": 79862897,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-11-14T03:35:39",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "5806.348949 VESTS"
}
]
}steemdelegated 5.369 SP to @maxime01codex2023/09/22 01:43:03
steemdelegated 5.369 SP to @maxime01codex
2023/09/22 01:43:03
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 8743.627735 VESTS |
| Transaction Info | Block #78352483/Trx 170ae187160987f1ef9a97701b5338de0f762124 |
View Raw JSON Data
{
"trx_id": "170ae187160987f1ef9a97701b5338de0f762124",
"block": 78352483,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2023-09-22T01:43:03",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "8743.627735 VESTS"
}
]
}steemdelegated 5.485 SP to @maxime01codex2022/12/20 03:01:48
steemdelegated 5.485 SP to @maxime01codex
2022/12/20 03:01:48
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 8931.853707 VESTS |
| Transaction Info | Block #70447711/Trx b0f3a7be76ace243e86c01422b28adcd20650dd2 |
View Raw JSON Data
{
"trx_id": "b0f3a7be76ace243e86c01422b28adcd20650dd2",
"block": 70447711,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-12-20T03:01:48",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "8931.853707 VESTS"
}
]
}steemdelegated 5.595 SP to @maxime01codex2022/04/23 21:01:30
steemdelegated 5.595 SP to @maxime01codex
2022/04/23 21:01:30
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 9110.545546 VESTS |
| Transaction Info | Block #63569098/Trx 4d0712c9f06501d633c883aff474ef0fa6bf6c3e |
View Raw JSON Data
{
"trx_id": "4d0712c9f06501d633c883aff474ef0fa6bf6c3e",
"block": 63569098,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2022-04-23T21:01:30",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "9110.545546 VESTS"
}
]
}steemdelegated 5.707 SP to @maxime01codex2021/09/07 07:12:27
steemdelegated 5.707 SP to @maxime01codex
2021/09/07 07:12:27
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 9292.777921 VESTS |
| Transaction Info | Block #57038394/Trx db357ecf967ed8c9246aa365b0fa97ea9eb43233 |
View Raw JSON Data
{
"trx_id": "db357ecf967ed8c9246aa365b0fa97ea9eb43233",
"block": 57038394,
"trx_in_block": 7,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-09-07T07:12:27",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "9292.777921 VESTS"
}
]
}steemdelegated 17.174 SP to @maxime01codex2021/08/04 07:24:27
steemdelegated 17.174 SP to @maxime01codex
2021/08/04 07:24:27
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 27966.105660 VESTS |
| Transaction Info | Block #56065885/Trx 5cdf828192bd8749c19668fa1ab4d9ab23358d27 |
View Raw JSON Data
{
"trx_id": "5cdf828192bd8749c19668fa1ab4d9ab23358d27",
"block": 56065885,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-08-04T07:24:27",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "27966.105660 VESTS"
}
]
}crypto.piotrsent 0.003 STEEM to @maxime01codex- "Regarding the latest information and development of Steemauto. Old SteemAuto is already being switched off. Today, I would like to introduce you to new version of SteemAuto launched by one of most rep..."2021/06/12 15:07:54
crypto.piotrsent 0.003 STEEM to @maxime01codex- "Regarding the latest information and development of Steemauto. Old SteemAuto is already being switched off. Today, I would like to introduce you to new version of SteemAuto launched by one of most rep..."
2021/06/12 15:07:54
| from | crypto.piotr |
| to | maxime01codex |
| amount | 0.003 STEEM |
| memo | Regarding the latest information and development of Steemauto. Old SteemAuto is already being switched off. Today, I would like to introduce you to new version of SteemAuto launched by one of most reputable witness. You can find it here: https://worldofxpilar.com/dash.php . I've helped testing it and it's WORKING GREAT so far (In case if you would have any questions, consider joining their discord channel: https://discord.com/invite/VAHHsmnNaJ ) |
| Transaction Info | Block #54567603/Trx 6a1e7b80b3ad7c7179a44e15256a8422e578e21e |
View Raw JSON Data
{
"trx_id": "6a1e7b80b3ad7c7179a44e15256a8422e578e21e",
"block": 54567603,
"trx_in_block": 48,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-12T15:07:54",
"op": [
"transfer",
{
"from": "crypto.piotr",
"to": "maxime01codex",
"amount": "0.003 STEEM",
"memo": "Regarding the latest information and development of Steemauto. Old SteemAuto is already being switched off. Today, I would like to introduce you to new version of SteemAuto launched by one of most reputable witness. You can find it here: https://worldofxpilar.com/dash.php . I've helped testing it and it's WORKING GREAT so far (In case if you would have any questions, consider joining their discord channel: https://discord.com/invite/VAHHsmnNaJ )"
}
]
}2021/06/08 05:29:00
2021/06/08 05:29:00
| voter | maxime01codex |
| author | techzim |
| permlink | someone-tried-to-sneak-a-backdoor-into-code-used-by-80-of-the-internet |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54441770/Trx 5d13640f18c104aacf4dfc05a08f7d34ed177926 |
View Raw JSON Data
{
"trx_id": "5d13640f18c104aacf4dfc05a08f7d34ed177926",
"block": 54441770,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-08T05:29:00",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "techzim",
"permlink": "someone-tried-to-sneak-a-backdoor-into-code-used-by-80-of-the-internet",
"weight": 10000
}
]
}2021/06/08 05:26:36
2021/06/08 05:26:36
| voter | maxime01codex |
| author | steemitblog |
| permlink | steemit-crypto-academy-weekly-update-17-june-7th-2021-recruiting-more-professors |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54441722/Trx de7eb4a4f338e14b469ec56376d81800d771346a |
View Raw JSON Data
{
"trx_id": "de7eb4a4f338e14b469ec56376d81800d771346a",
"block": 54441722,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-08T05:26:36",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "steemitblog",
"permlink": "steemit-crypto-academy-weekly-update-17-june-7th-2021-recruiting-more-professors",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @sqlinsix / data-expiration-with-mongodb2021/06/08 05:26:18
maxime01codexupvoted (100.00%) @sqlinsix / data-expiration-with-mongodb
2021/06/08 05:26:18
| voter | maxime01codex |
| author | sqlinsix |
| permlink | data-expiration-with-mongodb |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54441716/Trx 2c296d2ee0c8ceee2b64771fb2d334499e939595 |
View Raw JSON Data
{
"trx_id": "2c296d2ee0c8ceee2b64771fb2d334499e939595",
"block": 54441716,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-08T05:26:18",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "sqlinsix",
"permlink": "data-expiration-with-mongodb",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @graduate / tesla-now-accepts-bitcoin-in-the-us2021/06/08 05:25:27
maxime01codexupvoted (100.00%) @graduate / tesla-now-accepts-bitcoin-in-the-us
2021/06/08 05:25:27
| voter | maxime01codex |
| author | graduate |
| permlink | tesla-now-accepts-bitcoin-in-the-us |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54441699/Trx 5b5f4711ea6fd8aa2da5ce5e8b05a2e3a1d80e98 |
View Raw JSON Data
{
"trx_id": "5b5f4711ea6fd8aa2da5ce5e8b05a2e3a1d80e98",
"block": 54441699,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-08T05:25:27",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "graduate",
"permlink": "tesla-now-accepts-bitcoin-in-the-us",
"weight": 10000
}
]
}maxime01codexpublished a new post: understand-the-deep-q-learning-method-an-usefull-technic-for-ai2021/06/07 10:21:48
maxime01codexpublished a new post: understand-the-deep-q-learning-method-an-usefull-technic-for-ai
2021/06/07 10:21:48
| parent author | |
| parent permlink | ai |
| author | maxime01codex |
| permlink | understand-the-deep-q-learning-method-an-usefull-technic-for-ai |
| title | Understand The deep Q learning method : an usefull technic for AI |
| body | # Understand The deep Q learning method : an usefull technic for AI ## Foreword One of the most popular models in the deep reinforcement-learning sub-branch is the algorithm called Deep Q Network or DQN. Understanding this method is extremely important. It is the basis of many deep reinforcement-learning algorithms. The DQN model was first proposed by researchers at Google DeepMind in 2013 in a paper called Playing Atari with Deep Reinforcement Learning. In it, they described the DQN architecture and explained why this method was so effective especially for Atari games. In this period, it is no exaggeration to say that the DQN method appeared in a good time. Indeed, other methods based on the Q function had made it possible to advance in the field of reinforcement learning. However, researchers remained at an impasse. At the same time, the tabular Q-learning method was on the rise and had solved some problems regarding the accumulation of states in reinforcement problems. Despite everything, it was not very effective in the context of observation of large ensembles. Therefore, from there to evoking a solution for the resolution of video games, it was inconceivable. The complexity was too great for them. Having to read all of the pixels and their states was inconceivable. The algorithms would have had too many states to consider. Tests have shown that the available reinforcement methods did not even come close to a satisfactory solution. Especially since in some environments the number of observations is almost endless. Quickly, it was necessary to decide on the ranges of parameters to be taken into account to distinguish the crucial states from those that are not relevant. For a video game, a single pixel will not make a difference in a game. It is therefore possible to create a larger assembly as part of the image as a state. However, even so, it is necessary to be able to distinguish areas of the screen where the action is relevant to the sequence of events. One solution in this case has been to provide both a state and an action mapped into a single value. In machine learning, we talk about a regression problem. There are several concrete ways to represent and train this type of representation. Here we will describe one of them. Because of its efficiency and its ease in spreading over different problems, the Deep Q Network has become essential for reinforcement learning. ## The genesis of DQN Remember that the goal of reinforcement learning as a whole is to find the optimal policy that will give us the maximum return. In order to calculate this policy, we first start by calculating the emblematic function of the DQN method, the Q function. Recall that the function Q is the function of value and state. It indicates the value of a state-action pair. Its use allows us to use the result obtained by the agent starting from a state s and executing the action “a” following a policy π. In the case of the DQN method, we have to calculate the set of state-action values with the Q function. However, in some cases it can be extremely long and complicated to calculate the Q-value of each action-state pair. Instead of calculating Q values iteratively, we can use one of the many approximation functions. Here in the context of the DQN, it will be with a neural network that we will do. In this way, we can then parameterize our function Q with a parameter theta and calculate the Q value with parameter theta. We just feed the state of our environment into a neural network and it will return the Q value of all possible actions from that state. Once the Q values are found, we can select the best action like the one with the maximum Q value. Since we are using a neural network to approximate the Q values, the neural network is called the Q network. Since most of the time we are dealing with a deep neural network to approximate the Q value, then our deep neural network is called a deep Q network or DQN. Now you know all about the genesis of DQN. However, at this point, many questions remain unanswered. Let us try to take it one step further. ## The interactions with the environment Before going into details about the DQN method, it is important to review the agent's interactions with its environment. We know that for the agent it is necessary to interact with the environment in order to receive rewards but also data for training. We can act randomly as is done in some cases. But in the context of a video game, for example, is it really relevant? What is the probability of winning in this scenario? It's very rare. So it will take several games before you achieve enough success. An alternative would be to use our approximate Q function as a source of behavior. We find the principle mentioned in the context of the iterative value method. If our representation of Q is good, then the experience we get from acting on the environment will show us that the agent's data is valid for training. In a low-quality approximation, we detect it by experience. The concern here is that our agent can get caught up in bad deeds without trying to behave differently. We return to our dilemma of exploitation - exploration. It is important to give the agent the opportunity to explore the environment and build a series of transitions and actions with various outputs. Even though we should not let it act in just any manner, we are above all looking for efficiency. For example, it would be silly to reproduce actions whose sequence has already been presented and did not yield any interesting data. Research has shown that an initially randomized system, when the approximation cannot be used, is very often an interesting alternative since it provides a basis that offers sufficient and varied interactions with the environment. Eventually, as our training system progresses, the randomized behavior becomes ineffective and we can model our approximation Q and choose what action to take. This one proposing with our training, a more serious approximation. A method that applies this proposition very well is the ϵ-greedy method. It will simply alternate between a random phenomenon and the policies of Q by using the hyper parameter ϵ. By varying ϵ, we choose the part of randomness in our actions. We start in practice with ϵ = 1.0, to gradually end around a value varying between 0.05 or 0.02 depending on the case. This method helps both to explore the environment at the start of the experiment, but also to maintain a good policy afterwards by switching to the Q function. There are other solutions to deal with the subject of exploration and exploitation. However, that will not be our subject here. ## How to train a network in deep Q Learning ? This is a question we can legitimately ask ourselves. Truthfully speaking, the good training of the network provides the quality of the results of the algorithm. So let us see the researchers' proposal on this subject. Recall that we run our algorithm with the network parameter θ. Its initial value is random in order to be able to start approaching the optimal Q function. Since we are in the phase of initializing the function, the result will never be optimal. We are therefore going to train the network over several iterations. We try by this principle to find the optimal parameter θ. Once the optimal parameter θ has been found, we will have the optimal Q function. Then we can extract the optimal policy from the optimal Q function. One of the most popular solutions to find optimal θ and Q is the use of a deep neural network. We find this approach especially in the context of representation associated with images on the screen. ### The training data: The basis of Q-learning is borrowed from the supervised machine learning model. Indeed, we are trying to work with a complex nonlinear function, in our case Q with a neural network. To do this we have to calculate targets for the function using the Bellman equation to claim to have a supervised learning problem at hand. This is a good idea, but to use an optimization SGD (the little name behind this technique), our training data must be independent and identically distributed (I.I.D principle). In our case, our data does not agree with this principle. To remedy this, we can use a buffer in which we record our past experiences and our training samples. This collection will replace the latest experiments. We are talking about the replay buffer technique. We use this buffer called replay buffer to collect the agent's experience. The replay buffer will simply serve as a collection of experiences that we set aside to use for training. From there, based on that experience, we train our network. ### Replay buffer : This tuple in our replay buffer, also called in French, experience buffer. We usually denote it with D. This information transition is what is trivially called the agent experience. The idea of using a buffer to store user experience is interesting since we train our DQN with the experience we sampled in the buffer. In this way, we collect the agent's transition information during several episodes and we save it in the replay buffer. Transition information is stored in a stack (our replay buffer) where the newly entered data will be added to the bottom of the stack. However, this method has a disadvantage. In fact, we are going to store the experiences here one by one. From experience to experience, these will often be similar. To avoid this, we can integrate some random transition into the replay buffer before training the network. Remember that the replay buffer has a storage limit, and can therefore only keep a certain number of agent experiences. When this is filled, the new entries overwrite the old ones. The replay buffer is generally constructed like the structure of a queue. That is, so that the first entries are the first exits. Therefore, each addition after the full battery will eliminate the oldest experience and make room for the new one. At the same time, this allows the sample replay buffer to be improved. The further we go in training, the better the experiences tend to be. ### Using the loss function, a great ally: In our DQN method, we want to predict the values of Q. Now, these are continuous values. This will add complexity to the prediction. To overcome this, we use in DQN a regression task. The most popular method is the mean squared error, also noted MSE. It will come to play the role of loss function during the regression. The principle of the MSE can be translated as the squared average of the difference between the target value and the predicted value, we note that as follows:  Where y plays the role of target value, y " of the predicted value and K the number of training samples. Our goal is to train our network and try to minimize the MSE between the target Q value and the predicted Q value as much as possible. Obviously, the goal is to get the optimal Q value, which also comes down to minimizing error. Since the difference between the target Q value and the current Q value tends towards 0 as one approaches the optimal Q value. We use the Bellman equation for this. You will find an article covering the concept of this equation here. We know that the optimal Q value can be obtained using the Bellman Optimal equation:  Where R (s, a, s ’) represents the immediate reward r, obtained by performing an action in state s leading to state s’. It is therefore possible to replace R (s, a, s ’) simply by r. In our equation, we can also remove the expected factor E. Indeed, we will approximate this factor by taking a sample of K transitions from the replay buffer and recovering an average value. Thus according to the optimal Bellman equation, the optimal value Q is the sum of the rewards to which we add the maximum value Q reduced to the next action-state pair:  We can also define our loss as the difference between the target value (the optimal Q value) and the predicted value (the Q value predicted by DQN). The loss function will then be expressed:  By substituting the above equation for the previous one, we get this simplified formula:  We calculated the predicted Q-value using the network parameter θ. Now let's see how to calculate the target value. We have seen that it is the sum of the rewards to which we add the maximum Q value reduced to the next action-state pair. Similar to the predicted Q-value, we can calculate the Q-value of the next action-state pair by using the same network parameter, θ. Indeed, notice in our equation that we have, the two values Q parameterized by θ. Instead of calculating the loss as just the difference between the target Q value and the predicted Q value, we use the MSE method as the loss function. Remember that we have our experiences stored in the replay buffer. In addition, we have a small part of our randomized sample. We then train the network and try to minimize the MSE. We can then translate our loss function as follows:  We have seen that the target value is simply the sum of the rewards and the maximum Q value reduced to the next action-state pair. Consider the case where state s is the terminal state. If s is the last step in an episode, then we cannot calculate the Q value, since we have no action to take in the terminal state. In this case, the target value will become our reward. Therefore, our loss function will look like:  We have trained our network by minimizing the loss function. However, we have seen that it is also possible to minimize the loss function by finding the optimal parameter θ. To do this, we can use the gradient descent method and find the optimal parameter θ (how can we reduce the MSE with the gradient descent?). ### Correlation between stages: Another problem with our Q-learning model concerns its training procedure. By default, it is based on a method that does not respect the i.i.d principle. The Bellman equation gives us values of Q (s, a) in direct relation to Q (s ’, a’) (we speak of bootstrapping). The concern being that between s and s, only one step has passed. This makes s and s very similar, too similar in fact. This makes their differentiation very difficult for the neural networks. So when we optimize our neural network parameters, to achieve a Q (s, a) value close to the desired result, we can quickly alter the value of Q (s ’, a’) with each iteration. This will make our training very unstable. We have an error propagation which can completely destroy our approximation of Q (s, a). There is a trick to solve this problem. We can build a new network playing the role of the target. With this, we create a copy of our network that we will use for Q (s ’, a’) in the Bellman equation. This network is synchronized with the main network. We regularly and periodically synchronize the two networks. At every N step with N that will become one of DQN's hyperparameters, often between 1k and 10k. ### The target network to the rescue Despite the steps already taken, we continue to have a little problem with our loss function. We know that the target value is the sum of the rewards plus the reduced maximum Q value at the next state-action pair. We calculate this Q value on the target and we predict the Q value using the same parameter θ. Now we have a problem since the target and predicted value both depend on the same parameter, in this case θ. This can cause instabilities when using the MSE and the networks will learn in a bad manner. It also causes a lot of discrepancy in training. How can we avoid this? It is possible to freeze the target value for a time and calculate only the predicted value. To do this, we introduce another neural network called target network to calculate the Q value of the next state-action pair. The parameter of the target network is denoted θ '. Therefore, our main Q network will calculate the predicted Q values and learn the optimal θ parameter using the gradient descent method. The target network will be put on standby for a while in order to, after a period, resume operation and update the parameter θ ' by simply copying the parameter θ from the main network. We start to freeze the target network and so on. In this case, our loss function becomes:  The Q value of the next action state is calculated by the target network with the parameter θ 'and the predicted Q value is calculated by the main network with the parameter θ. If we go back to our simplified notation, we get:  ## The Markov property applied to Deep Q Learning Our DQ-learning method uses the formalism of the Markovian decision process. Which in principle specifies that the model obeys the Markov properties: According to this, the observations of the environment are all distributed in an optimal way. That is, each observation allows us to distinguish the entirety of the states. By analyzing a single image from a video game, we cannot retrieve all of the information. For example, the speed or direction of an object will not be known. This invalidates the Markov properties. Therefore, our system, in the case of video games, is relegated to the rank of Partial Markovian or MDPS or POMDPS decision process. We speak of POMDPS when we have a model with a Markovian decision process that does not respect the Markov properties. This method appears very regularly in a real context, such as in card games where the opponent's hand is unknown. There is a way to turn a POMDPS into an MDP. ## Results After introducing so much new information and technical mathematical concepts, let us go back to the key elements for the DQN model. First, we update the general lattice parameter θ with a random value. We have learned that the target network is a simple copy of the general network. Then we update the parameter θ ' by copying the parameter θ. We also update D, our replay buffer. Now for each step in an episode we add the state of the environment in our network, and we get its outputs corresponding to the Q values for all possible actions in the state. Then we choose the action, which has the maximum Q value. If we only select the stock with the highest Q value, then we don't explore other new stocks. To avoid this, we select our stocks by adding the ϵ-greedy policy. We select our random action with an epsilon probability and with the probability ϵ-1, we select the best action with the maximum Q value. Since we update our lattice parameter θ with a random value, the action we select by taking the maximum Q value will not necessarily be the optimal action. But that's okay, we're just improving the selected action. We then go to the next state and get the reward. If the action is good then we will receive a positive reward, otherwise, it will be negative. We store this information in replay buffer D. Then, in a random manner, we create a sample of K of transitions coming from the replay buffer for which we have previously calculated the loss parameter. Our loss function is given by:  During the first iterations, the loss will be very high since our parameter θ of the network is configured randomly. To minimize the loss, we calculate the gradients of the losses and we improve our network parameter θ by following the principle of the gradient descent. We do not change the target network parameter θ' at each step. We freeze the parameter θ' for several steps and then we inject the value of θ into θ'. We repeat this process for several episodes to approximate the optimal Q value. Once the optimal Q value is found, we extract the optimal policy. The DQN process is certainly a process requiring an assimilation of all the steps that make up the method, it remains one of the most popular and effective reinforcement learning techniques. You will find it regularly in different variations during your research. Let see more : https://01codex.com/ |
| json metadata | {"tags":["mathematics","computer","science","machinelearning"],"image":["http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.39.59.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.49.16.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.52.04.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.55.13.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.55.53.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.56.38.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.57.19.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.59.32.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-15.00.53.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-15.07.19.png"],"links":["https://01codex.com/"],"app":"steemit/0.2","format":"markdown"} |
| Transaction Info | Block #54418993/Trx 59a0c555eb55a5b8309104e8086e8cab35c018c0 |
View Raw JSON Data
{
"trx_id": "59a0c555eb55a5b8309104e8086e8cab35c018c0",
"block": 54418993,
"trx_in_block": 9,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-07T10:21:48",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "ai",
"author": "maxime01codex",
"permlink": "understand-the-deep-q-learning-method-an-usefull-technic-for-ai",
"title": "Understand The deep Q learning method : an usefull technic for AI",
"body": "# Understand The deep Q learning method : an usefull technic for AI\n\n## Foreword\n\nOne of the most popular models in the deep reinforcement-learning sub-branch is the algorithm called Deep Q Network or DQN. Understanding this method is extremely important. It is the basis of many deep reinforcement-learning algorithms. The DQN model was first proposed by researchers at Google DeepMind in 2013 in a paper called Playing Atari with Deep Reinforcement Learning. In it, they described the DQN architecture and explained why this method was so effective especially for Atari games.\n\nIn this period, it is no exaggeration to say that the DQN method appeared in a good time. Indeed, other methods based on the Q function had made it possible to advance in the field of reinforcement learning. However, researchers remained at an impasse. At the same time, the tabular Q-learning method was on the rise and had solved some problems regarding the accumulation of states in reinforcement problems. Despite everything, it was not very effective in the context of observation of large ensembles. Therefore, from there to evoking a solution for the resolution of video games, it was inconceivable. The complexity was too great for them. Having to read all of the pixels and their states was inconceivable. The algorithms would have had too many states to consider. Tests have shown that the available reinforcement methods did not even come close to a satisfactory solution.\n\nEspecially since in some environments the number of observations is almost endless. Quickly, it was necessary to decide on the ranges of parameters to be taken into account to distinguish the crucial states from those that are not relevant. For a video game, a single pixel will not make a difference in a game. It is therefore possible to create a larger assembly as part of the image as a state. However, even so, it is necessary to be able to distinguish areas of the screen where the action is relevant to the sequence of events. One solution in this case has been to provide both a state and an action mapped into a single value. In machine learning, we talk about a regression problem. There are several concrete ways to represent and train this type of representation.\n\nHere we will describe one of them. Because of its efficiency and its ease in spreading over different problems, the Deep Q Network has become essential for reinforcement learning.\n\n## The genesis of DQN\n\nRemember that the goal of reinforcement learning as a whole is to find the optimal policy that will give us the maximum return. In order to calculate this policy, we first start by calculating the emblematic function of the DQN method, the Q function.\n\nRecall that the function Q is the function of value and state. It indicates the value of a state-action pair. Its use allows us to use the result obtained by the agent starting from a state s and executing the action “a” following a policy π.\n\nIn the case of the DQN method, we have to calculate the set of state-action values with the Q function. However, in some cases it can be extremely long and complicated to calculate the Q-value of each action-state pair. Instead of calculating Q values iteratively, we can use one of the many approximation functions. Here in the context of the DQN, it will be with a neural network that we will do. In this way, we can then parameterize our function Q with a parameter theta and calculate the Q value with parameter theta. We just feed the state of our environment into a neural network and it will return the Q value of all possible actions from that state. Once the Q values are found, we can select the best action like the one with the maximum Q value. Since we are using a neural network to approximate the Q values, the neural network is called the Q network. Since most of the time we are dealing with a deep neural network to approximate the Q value, then our deep neural network is called a deep Q network or DQN. Now you know all about the genesis of DQN. However, at this point, many questions remain unanswered. Let us try to take it one step further.\n\n## The interactions with the environment\n\nBefore going into details about the DQN method, it is important to review the agent's interactions with its environment. We know that for the agent it is necessary to interact with the environment in order to receive rewards but also data for training. We can act randomly as is done in some cases. But in the context of a video game, for example, is it really relevant? What is the probability of winning in this scenario? It's very rare. So it will take several games before you achieve enough success. An alternative would be to use our approximate Q function as a source of behavior. We find the principle mentioned in the context of the iterative value method.\n\nIf our representation of Q is good, then the experience we get from acting on the environment will show us that the agent's data is valid for training. In a low-quality approximation, we detect it by experience. The concern here is that our agent can get caught up in bad deeds without trying to behave differently. We return to our dilemma of exploitation - exploration. It is important to give the agent the opportunity to explore the environment and build a series of transitions and actions with various outputs. Even though we should not let it act in just any manner, we are above all looking for efficiency. For example, it would be silly to reproduce actions whose sequence has already been presented and did not yield any interesting data.\n\nResearch has shown that an initially randomized system, when the approximation cannot be used, is very often an interesting alternative since it provides a basis that offers sufficient and varied interactions with the environment. Eventually, as our training system progresses, the randomized behavior becomes ineffective and we can model our approximation Q and choose what action to take. This one proposing with our training, a more serious approximation.\nA method that applies this proposition very well is the ϵ-greedy method. It will simply alternate between a random phenomenon and the policies of Q by using the hyper parameter ϵ. By varying ϵ, we choose the part of randomness in our actions. We start in practice with ϵ = 1.0, to gradually end around a value varying between 0.05 or 0.02 depending on the case. This method helps both to explore the environment at the start of the experiment, but also to maintain a good policy afterwards by switching to the Q function. There are other solutions to deal with the subject of exploration and exploitation. However, that will not be our subject here.\n\n## How to train a network in deep Q Learning ?\n\nThis is a question we can legitimately ask ourselves. Truthfully speaking, the good training of the network provides the quality of the results of the algorithm. So let us see the researchers' proposal on this subject.\n\nRecall that we run our algorithm with the network parameter θ. Its initial value is random in order to be able to start approaching the optimal Q function. Since we are in the phase of initializing the function, the result will never be optimal. We are therefore going to train the network over several iterations. We try by this principle to find the optimal parameter θ. Once the optimal parameter θ has been found, we will have the optimal Q function. Then we can extract the optimal policy from the optimal Q function.\n\nOne of the most popular solutions to find optimal θ and Q is the use of a deep neural network. We find this approach especially in the context of representation associated with images on the screen.\n\n### The training data:\n\nThe basis of Q-learning is borrowed from the supervised machine learning model. Indeed, we are trying to work with a complex nonlinear function, in our case Q with a neural network. To do this we have to calculate targets for the function using the Bellman equation to claim to have a supervised learning problem at hand. This is a good idea, but to use an optimization SGD (the little name behind this technique), our training data must be independent and identically distributed (I.I.D principle).\n\nIn our case, our data does not agree with this principle. To remedy this, we can use a buffer in which we record our past experiences and our training samples. This collection will replace the latest experiments. We are talking about the replay buffer technique. We use this buffer called replay buffer to collect the agent's experience. The replay buffer will simply serve as a collection of experiences that we set aside to use for training. From there, based on that experience, we train our network.\n\n### Replay buffer :\n\nThis tuple in our replay buffer, also called in French, experience buffer. We usually denote it with D. This information transition is what is trivially called the agent experience. The idea of using a buffer to store user experience is interesting since we train our DQN with the experience we sampled in the buffer.\n\nIn this way, we collect the agent's transition information during several episodes and we save it in the replay buffer. Transition information is stored in a stack (our replay buffer) where the newly entered data will be added to the bottom of the stack. However, this method has a disadvantage. In fact, we are going to store the experiences here one by one. From experience to experience, these will often be similar. To avoid this, we can integrate some random transition into the replay buffer before training the network.\n\nRemember that the replay buffer has a storage limit, and can therefore only keep a certain number of agent experiences. When this is filled, the new entries overwrite the old ones. The replay buffer is generally constructed like the structure of a queue. That is, so that the first entries are the first exits. Therefore, each addition after the full battery will eliminate the oldest experience and make room for the new one. At the same time, this allows the sample replay buffer to be improved. The further we go in training, the better the experiences tend to be.\n\n### Using the loss function, a great ally:\n\nIn our DQN method, we want to predict the values of Q. Now, these are continuous values. This will add complexity to the prediction. To overcome this, we use in DQN a regression task. The most popular method is the mean squared error, also noted MSE. It will come to play the role of loss function during the regression. The principle of the MSE can be translated as the squared average of the difference between the target value and the predicted value, we note that as follows:\n\n\n\nWhere y plays the role of target value, y \" of the predicted value and K the number of training samples.\n\nOur goal is to train our network and try to minimize the MSE between the target Q value and the predicted Q value as much as possible. Obviously, the goal is to get the optimal Q value, which also comes down to minimizing error. Since the difference between the target Q value and the current Q value tends towards 0 as one approaches the optimal Q value. We use the Bellman equation for this. You will find an article covering the concept of this equation here. We know that the optimal Q value can be obtained using the Bellman Optimal equation:\n\n\n\nWhere R (s, a, s ’) represents the immediate reward r, obtained by performing an action in state s leading to state s’. It is therefore possible to replace R (s, a, s ’) simply by r.\n\nIn our equation, we can also remove the expected factor E. Indeed, we will approximate this factor by taking a sample of K transitions from the replay buffer and recovering an average value. Thus according to the optimal Bellman equation, the optimal value Q is the sum of the rewards to which we add the maximum value Q reduced to the next action-state pair:\n\n\n\nWe can also define our loss as the difference between the target value (the optimal Q value) and the predicted value (the Q value predicted by DQN). The loss function will then be expressed:\n\n\n\nBy substituting the above equation for the previous one, we get this simplified formula:\n\n\n\nWe calculated the predicted Q-value using the network parameter θ. Now let's see how to calculate the target value. We have seen that it is the sum of the rewards to which we add the maximum Q value reduced to the next action-state pair.\n\nSimilar to the predicted Q-value, we can calculate the Q-value of the next action-state pair by using the same network parameter, θ. Indeed, notice in our equation that we have, the two values Q parameterized by θ.\n\nInstead of calculating the loss as just the difference between the target Q value and the predicted Q value, we use the MSE method as the loss function. Remember that we have our experiences stored in the replay buffer. In addition, we have a small part of our randomized sample. We then train the network and try to minimize the MSE. We can then translate our loss function as follows:\n\n\n\nWe have seen that the target value is simply the sum of the rewards and the maximum Q value reduced to the next action-state pair. Consider the case where state s is the terminal state. If s is the last step in an episode, then we cannot calculate the Q value, since we have no action to take in the terminal state. In this case, the target value will become our reward. Therefore, our loss function will look like:\n\n\n\nWe have trained our network by minimizing the loss function. However, we have seen that it is also possible to minimize the loss function by finding the optimal parameter θ. To do this, we can use the gradient descent method and find the optimal parameter θ (how can we reduce the MSE with the gradient descent?).\n\n\n### Correlation between stages:\n\nAnother problem with our Q-learning model concerns its training procedure. By default, it is based on a method that does not respect the i.i.d principle. The Bellman equation gives us values of Q (s, a) in direct relation to Q (s ’, a’) (we speak of bootstrapping). The concern being that between s and s, only one step has passed. This makes s and s very similar, too similar in fact. This makes their differentiation very difficult for the neural networks. So when we optimize our neural network parameters, to achieve a Q (s, a) value close to the desired result, we can quickly alter the value of Q (s ’, a’) with each iteration. This will make our training very unstable. We have an error propagation which can completely destroy our approximation of Q (s, a).\n\nThere is a trick to solve this problem. We can build a new network playing the role of the target. With this, we create a copy of our network that we will use for Q (s ’, a’) in the Bellman equation. This network is synchronized with the main network. We regularly and periodically synchronize the two networks. At every N step with N that will become one of DQN's hyperparameters, often between 1k and 10k.\n\n### The target network to the rescue\n\nDespite the steps already taken, we continue to have a little problem with our loss function. We know that the target value is the sum of the rewards plus the reduced maximum Q value at the next state-action pair. We calculate this Q value on the target and we predict the Q value using the same parameter θ. Now we have a problem since the target and predicted value both depend on the same parameter, in this case θ. This can cause instabilities when using the MSE and the networks will learn in a bad manner. It also causes a lot of discrepancy in training.\n\nHow can we avoid this? It is possible to freeze the target value for a time and calculate only the predicted value. To do this, we introduce another neural network called target network to calculate the Q value of the next state-action pair. The parameter of the target network is denoted θ '. Therefore, our main Q network will calculate the predicted Q values and learn the optimal θ parameter using the gradient descent method. The target network will be put on standby for a while in order to, after a period, resume operation and update the parameter θ ' by simply copying the parameter θ from the main network. We start to freeze the target network and so on. In this case, our loss function becomes:\n\n\n\nThe Q value of the next action state is calculated by the target network with the parameter θ 'and the predicted Q value is calculated by the main network with the parameter θ. If we go back to our simplified notation, we get:\n\n\n\n## The Markov property applied to Deep Q Learning\n\nOur DQ-learning method uses the formalism of the Markovian decision process. Which in principle specifies that the model obeys the Markov properties: According to this, the observations of the environment are all distributed in an optimal way. That is, each observation allows us to distinguish the entirety of the states. By analyzing a single image from a video game, we cannot retrieve all of the information. For example, the speed or direction of an object will not be known. This invalidates the Markov properties. Therefore, our system, in the case of video games, is relegated to the rank of Partial Markovian or MDPS or POMDPS decision process. We speak of POMDPS when we have a model with a Markovian decision process that does not respect the Markov properties. This method appears very regularly in a real context, such as in card games where the opponent's hand is unknown. There is a way to turn a POMDPS into an MDP.\n\n## Results\n\nAfter introducing so much new information and technical mathematical concepts, let us go back to the key elements for the DQN model.\n\nFirst, we update the general lattice parameter θ with a random value. We have learned that the target network is a simple copy of the general network. Then we update the parameter θ ' by copying the parameter θ. We also update D, our replay buffer.\n\nNow for each step in an episode we add the state of the environment in our network, and we get its outputs corresponding to the Q values for all possible actions in the state. Then we choose the action, which has the maximum Q value.\n\nIf we only select the stock with the highest Q value, then we don't explore other new stocks. To avoid this, we select our stocks by adding the ϵ-greedy policy. We select our random action with an epsilon probability and with the probability ϵ-1, we select the best action with the maximum Q value.\n\nSince we update our lattice parameter θ with a random value, the action we select by taking the maximum Q value will not necessarily be the optimal action. But that's okay, we're just improving the selected action. We then go to the next state and get the reward. If the action is good then we will receive a positive reward, otherwise, it will be negative. We store this information in replay buffer D.\n\nThen, in a random manner, we create a sample of K of transitions coming from the replay buffer for which we have previously calculated the loss parameter. Our loss function is given by:\n\n\n\nDuring the first iterations, the loss will be very high since our parameter θ of the network is configured randomly. To minimize the loss, we calculate the gradients of the losses and we improve our network parameter θ by following the principle of the gradient descent.\n\nWe do not change the target network parameter θ' at each step. We freeze the parameter θ' for several steps and then we inject the value of θ into θ'. We repeat this process for several episodes to approximate the optimal Q value. Once the optimal Q value is found, we extract the optimal policy.\n\nThe DQN process is certainly a process requiring an assimilation of all the steps that make up the method, it remains one of the most popular and effective reinforcement learning techniques. You will find it regularly in different variations during your research.\n\nLet see more : https://01codex.com/",
"json_metadata": "{\"tags\":[\"mathematics\",\"computer\",\"science\",\"machinelearning\"],\"image\":[\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.39.59.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.49.16.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.52.04.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.55.13.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.55.53.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.56.38.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.57.19.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.59.32.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-15.00.53.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-15.07.19.png\"],\"links\":[\"https://01codex.com/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
}
]
}maxime01codexpublished a new post: improve-cybersecurity-structure-with-framework-nist-1-12021/06/07 10:20:51
maxime01codexpublished a new post: improve-cybersecurity-structure-with-framework-nist-1-1
2021/06/07 10:20:51
| parent author | |
| parent permlink | cybersecurity |
| author | maxime01codex |
| permlink | improve-cybersecurity-structure-with-framework-nist-1-1 |
| title | Improve Cybersecurity structure with Framework NIST 1.1 |
| body |  To be able to implement the various actions necessary for the security of a company, the National Institute of Standards and Technology (NIST) has developed a framework dedicated entirely to cybersecurity. Since this is an open-source and independent tool, it can serve as a basis for any organization wishing to validate its cybersecurity needs. ## Genesis of the NIST project Since 1901, the NIST lab has worked regularly with the government of the United States of America to analyze and propose solutions in the area of industrial competitiveness. This was created to counterbalance the great advance of Germany and the United Kingdom at the beginning of the 20th century in the fields of economy and industry. With its great expertise in the field of physical and economic measurement, during the emergence of new technologies, NIST has been the ideal candidate to address issues related to computer security. The lab's cybersecurity program is based on the institution's fundamentals and promotes innovation, research and the study of US competitiveness. The subject of data and the relationship with the outside world is a crucial subject for the government of the United States. As a result, NIST's research focuses on topics such as cyberattacks, new technologies, defense methodologies and data preservation. The laboratory is very often called upon for the creation of standards and to establish rules of defense for the industry. Collaborations with the main industrial players in the country are also the responsibility of the laboratory, in order to train strategic sectors on the subject of cybersecurity. ## A place in the conspiracy With such a broad area of expertise, the US Federal Laboratory very often assists the US government on sensitive issues. Following the attack on the two World Trade Center towers, the laboratory was approached to analyze the possible causes of the collapse of the Twin Towers. Using a computer simulation, bringing together an enormous amount of data, the laboratory's responsibility was to determine the multi-factorial cause. The collapse is believed to be partly due to the fragility of the load-bearing columns, following the damage caused by the impact. In any case, this is what the computer simulation revealed after analyzing the scenarios. After this short anecdote, let's come back to the subject of the NIST framework and its importance in the analysis of a defense strategy. ## How does the NIST framework work?  The NIST 1.1 Framework is made up of five so-called fundamental functions for online security. These functions are: * Identify * Protect * Detect * Reply * Restructure These five pillars will encompass the main processes to be put in place to secure an organization using digital technologies. Each of these points is divided into sub-categories, themselves grouping together tasks to be performed. There are also specific sub-categories offering methods of integrating solutions to common situations. Obviously each part is accompanied by reference documents and case studies. The Framework also offers an implementation hierarchy with levels providing companies with a way to situate their skills and actions in relation to the NIST standard. Finally, the profile section will offer an overview, bringing a long-term approach. The projection on a wider horizon, favors the application of the new habits to have within a company. ## An interesting database To go further, the laboratory's website offers a fairly large database dealing with the different areas around cybersecurity. This database, dating back more than 20 years, has the advantage of bearing witness to technological advances and the associated risks since the beginning of the 21st century. It’s a real gold mine for any cybersecurity enthusiast. The topics offered are broad and encompass: * Encryption * Access control * Risk management * Artificial intelligence * Blockchains * Hardware * Servers * … ## Why use the NIST Framework? There are different reasons to look into the NIST Framework 1.1. Its use will allow among other things: * Understanding the risks associated with new technologies * Prevent and prepare for potential threats * Raise awareness of all stakeholders in an organization on the safety aspect * Validate the security of the tools put in place by a company or an individual The platform offers free of charge the knowledge and tools necessary to implement an effective strategy against computer threats. ## Reminder The purpose of the NIST 1.1 framework is only to present a list of recommendations and to prevent risks associated with computer technologies. Compliance with the advice provided by the institution is the responsibility of the company via a critical self-assessment of its structure. Therefore, its use should be indicative and guide a process of raising awareness and improving cybersecurity. see more : https://01codex.com |
| json metadata | {"tags":["programming","nist","security","framework"],"image":["http://01codex.com/wp-content/uploads/2021/06/NIST.jpeg","http://01codex.com/wp-content/uploads/2021/06/CSF.png"],"links":["https://01codex.com"],"app":"steemit/0.2","format":"markdown"} |
| Transaction Info | Block #54418974/Trx 64d21b423afbbe7cdadbe3681fb00123d8e99db5 |
View Raw JSON Data
{
"trx_id": "64d21b423afbbe7cdadbe3681fb00123d8e99db5",
"block": 54418974,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-07T10:20:51",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "cybersecurity",
"author": "maxime01codex",
"permlink": "improve-cybersecurity-structure-with-framework-nist-1-1",
"title": "Improve Cybersecurity structure with Framework NIST 1.1",
"body": "\n\n\nTo be able to implement the various actions necessary for the security of a company, the National Institute of Standards and Technology (NIST) has developed a framework dedicated entirely to cybersecurity. Since this is an open-source and independent tool, it can serve as a basis for any organization wishing to validate its cybersecurity needs.\n\n## Genesis of the NIST project\n\nSince 1901, the NIST lab has worked regularly with the government of the United States of America to analyze and propose solutions in the area of industrial competitiveness. This was created to counterbalance the great advance of Germany and the United Kingdom at the beginning of the 20th century in the fields of economy and industry.\n\nWith its great expertise in the field of physical and economic measurement, during the emergence of new technologies, NIST has been the ideal candidate to address issues related to computer security.\n\nThe lab's cybersecurity program is based on the institution's fundamentals and promotes innovation, research and the study of US competitiveness.\n\nThe subject of data and the relationship with the outside world is a crucial subject for the government of the United States. As a result, NIST's research focuses on topics such as cyberattacks, new technologies, defense methodologies and data preservation. The laboratory is very often called upon for the creation of standards and to establish rules of defense for the industry. Collaborations with the main industrial players in the country are also the responsibility of the laboratory, in order to train strategic sectors on the subject of cybersecurity.\n\n\n## A place in the conspiracy\n\nWith such a broad area of expertise, the US Federal Laboratory very often assists the US government on sensitive issues. Following the attack on the two World Trade Center towers, the laboratory was approached to analyze the possible causes of the collapse of the Twin Towers.\n\nUsing a computer simulation, bringing together an enormous amount of data, the laboratory's responsibility was to determine the multi-factorial cause. The collapse is believed to be partly due to the fragility of the load-bearing columns, following the damage caused by the impact.\n\nIn any case, this is what the computer simulation revealed after analyzing the scenarios. After this short anecdote, let's come back to the subject of the NIST framework and its importance in the analysis of a defense strategy.\n\n## How does the NIST framework work?\n\n\n\nThe NIST 1.1 Framework is made up of five so-called fundamental functions for online security. These functions are:\n\n* Identify\n* Protect\n* Detect\n* Reply\n* Restructure\n\nThese five pillars will encompass the main processes to be put in place to secure an organization using digital technologies. Each of these points is divided into sub-categories, themselves grouping together tasks to be performed.\n\nThere are also specific sub-categories offering methods of integrating solutions to common situations. Obviously each part is accompanied by reference documents and case studies.\n\nThe Framework also offers an implementation hierarchy with levels providing companies with a way to situate their skills and actions in relation to the NIST standard.\n\nFinally, the profile section will offer an overview, bringing a long-term approach. The projection on a wider horizon, favors the application of the new habits to have within a company.\n\n## An interesting database\n\nTo go further, the laboratory's website offers a fairly large database dealing with the different areas around cybersecurity. This database, dating back more than 20 years, has the advantage of bearing witness to technological advances and the associated risks since the beginning of the 21st century. It’s a real gold mine for any cybersecurity enthusiast.\n\nThe topics offered are broad and encompass:\n\n* Encryption\n* Access control\n* Risk management\n* Artificial intelligence\n* Blockchains\n* Hardware\n* Servers\n* …\n\n## Why use the NIST Framework?\n\nThere are different reasons to look into the NIST Framework 1.1. Its use will allow among other things:\n\n* Understanding the risks associated with new technologies\n* Prevent and prepare for potential threats\n* Raise awareness of all stakeholders in an organization on the safety aspect\n* Validate the security of the tools put in place by a company or an individual\n\nThe platform offers free of charge the knowledge and tools necessary to implement an effective strategy against computer threats.\n\n## Reminder\n\nThe purpose of the NIST 1.1 framework is only to present a list of recommendations and to prevent risks associated with computer technologies. Compliance with the advice provided by the institution is the responsibility of the company via a critical self-assessment of its structure. Therefore, its use should be indicative and guide a process of raising awareness and improving cybersecurity.\n\nsee more : https://01codex.com",
"json_metadata": "{\"tags\":[\"programming\",\"nist\",\"security\",\"framework\"],\"image\":[\"http://01codex.com/wp-content/uploads/2021/06/NIST.jpeg\",\"http://01codex.com/wp-content/uploads/2021/06/CSF.png\"],\"links\":[\"https://01codex.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
}
]
}maxime01codexpublished a new post: will-we-experience-a-computer-virus-pandemic2021/06/07 10:00:33
maxime01codexpublished a new post: will-we-experience-a-computer-virus-pandemic
2021/06/07 10:00:33
| parent author | |
| parent permlink | covid |
| author | maxime01codex |
| permlink | will-we-experience-a-computer-virus-pandemic |
| title | Will we experience a computer virus pandemic? |
| body |  With the COVID-19 crisis, digital uses have experienced a dizzying increase. Its growth has, so to speak, increase exponentially. With the rise in connections to web services and the need to be able to access the Internet to weather the shock, we have seen an increase in computer viruses and cyber attacks. Whether on the corporate or personal side, everyone was a potential target for hackers during this time of crisis. With no curfew for cyber attacks, the government website cybermalveillance.gouv.fr noted a 400% increase in phishing attempts during the first week of containment. With hindsight, even if the COVID period is still relevant, it is interesting to do prospective work on the similarities between COVID crisis management and cybersecurity risks. Here is a list of different reasons why it seems that the Covid-19 crisis can teach us more about the dangers posed by our large-scale digital use. ## 1- The covid-19 pandemic, a golden opportunity for cyber attacks The newspaper of the net questioned the presence of a "digital pandemic" in a publication in 2020 in parallel with the health crisis. The surge in online stocks spawned by the lockdown has been a boon for many malicious agents. First and foremost, the most frequent phishing attacks. They have the advantage of not needing any technical skills. A great threat for Internet users whose untargeted attack is made possible by many spamming software. Although phishing attacks are commonplace, they were most noticeable during containment. At the same time, more present but also more visible for the ultra-connected Internet users on the networks. This is where the term digital pandemic comes into its own. Indeed, like the scourge that is Covid-19, phishing attempts have proliferated on the internet, harming several victims already in bad shape by the health situation. The exponential increase in cyber attacks is reminiscent of the increase in Covid19 cases that took place during the year 2020. Reminding us, everyone, of the need to use digital hygiene on the web. ## 2- A multifactorial cause difficult to detect For a long time, the cause of Covid-19 has been a source of debate and controversy. Each bringing their theory to the now public sphere of digital media. Looking back, it would seem that the origin, but also the spread of the virus is actually caused by a positive feedback from many co-occurring factors. The same is true when an individual sees their accounts and hardware infected with a computer virus. It is often difficult to return to the source of the evil, so scrupulous are the pirates that remove the leads. Also, digital security decreased in such a measure that users will leave flaws to appear during navigation. It is therefore difficult to know what is the source of the problem when it occurs. ## 3- Solutions to reduce the spread and risks With the increase in malware, spyware and whatnot, resorting to what might be called "barrier gestures" is the best solution. They allow us to prevent any penetration or theft of personal data. The irremediable advice on hygiene during the Covid-19 crisis is reminiscent of online safety rules, which we keep repeating all day long. It is without context the accumulation of healthy and preventive practices that are the main defenses of individuals in the face of digital crime. For once, these tedious little practices, but effective in reducing risks, have always been presented by professionals, to best help Internet users. However, we can see it even more in the digital world, it is sometimes difficult to force a hand when it comes to potential risks. ## 4- a threat not always taken seriously Indeed, during the health crisis, we had the right to many debacles about the gravity of the situation and the dangerousness of the threat. Every day, a protest emerged on various social networks, advocating a rather low mortality curve or mild symptoms. Everyone has their own opinion on how to deal with the crisis. What we are seeing, however, is that the perceived seriousness of a threat diminishes so much when it is not tangible and diffused. Unfortunately, what better place than the virtual digital world and the great discretion of malicious hackers, to create an atmosphere of calm before the storm. This is a very interesting point to raise, the denial of danger is still very much online. Internet users do not feel affected by the main threats that surround them. Yet it is by a factor of 4 that the number of cyber attacks increased during the year 2020, which raises questions about the future. ## 5- A generational division on the stakes The implementation of barrier gestures and the feeling of gravity linked to covid-19 was a source of discord between the different age groups. If fear has invaded our seniors, a legitimate response since they are the main ones affected by severe cases of the disease, young people have taken the recommendations a little less seriously. At least, this is a finding that many facts have highlighted. In an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost freedoms, misunderstanding and many other factors have gradually established bad habits. In an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost of freedoms, misunderstanding and many other factors have gradually established bad habits. Just like during the Covid-19 crisis, mistakes and non-compliance with the basic rules are the result of various factors. The generational aspect brings various reasons, which makes awareness raising more difficult for the vulgarizers. ## 6 - Asymptomatic user accounts If we look back at the feeling linked to the contamination, some Covid-19 patients did not have any noticeable symptoms during their infectious period. This did not make crisis management easier, as even in good faith, some individuals were able to spread the strain of the virus to others. We find this situation identical with the escalating levels during a targeted assault where access is given little by little without us knowing that it has been compromised. Some digitally infected individuals are not even aware that their tools and software are infected. Subsequently, they will unwittingly transmit the contamination. Faced with this possibility, which is not without precedent, it is all the more important to be aware of this possibility and to maintain rigor when using it on the internet. ## 7- The basic emotion of online attacks The scams that took place during the Covid-19 crisis are countless and have particularly targeted vulnerable people. Despite the abject nature of attacking the most sensitive people, it is a well-known fact that scams and attacks are mainly aimed at them. Emotion plays a fundamental role in many online extortion strategies. Whether it's phishing, which is based only on the stress of lies, or ransomware strategies. The more the pirate captures the emotions of his target, the closer his success. Even if the education and popularization work on the subject has reduced panic phenomena following blackmailing online, this method of emotional hacking is still very present among hackers. Taking the time to educate yourself and rationalize the situation is the only response to such attacks. ## 8- A question of individual freedom Finally, we cannot end without talking about the freedom and security dilemma. The Covid-19 crisis, especially among critics of measures taken by government institutions, has often highlighted a true philosophical subject, that of freedom. To what extent must my individual freedom be withdrawn from the common goods? This is a rhetorical question that comes up in any situation where security is required. As a result, cybersecurity is just as impacted. In fact, to a lesser extent, the measures advocated by the defenders of a secure internet, block out the original vision of a libertarian internet without constraints. Do I really have to put aside certain freedoms, such as posting certain content on social networks, for the sole reason that they could possibly compromise me in the future? This choice is still up to everyone, even if in many cases it can be like playing with fire. Finally, looking at these eight examples, we see that there are many similarities between the health crisis and digital issues, which are tending to accelerate. This topic should be put on the front of the table for many experts. It makes it possible to carry out prospecting work on the basis of our experience in 2020. The benefits that could be brought to the fight against cybercrime are still diffuse. However, the management of communication and the integration of barrier gestures have been, overall, a success from which we can try to follow our example. What do you think ? |
| json metadata | {"tags":["cybersecurity","hacker","security","computer"],"image":["http://01codex.com/wp-content/uploads/2021/06/cdc-w9KEokhajKw-unsplash.jpg"],"app":"steemit/0.2","format":"markdown"} |
| Transaction Info | Block #54418571/Trx eab0185d8ff7c68ddc8110486d252676e296a432 |
View Raw JSON Data
{
"trx_id": "eab0185d8ff7c68ddc8110486d252676e296a432",
"block": 54418571,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-07T10:00:33",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "covid",
"author": "maxime01codex",
"permlink": "will-we-experience-a-computer-virus-pandemic",
"title": "Will we experience a computer virus pandemic?",
"body": "\n\nWith the COVID-19 crisis, digital uses have experienced a dizzying increase. Its growth has, so to speak, increase exponentially. With the rise in connections to web services and the need to be able to access the Internet to weather the shock, we have seen an increase in computer viruses and cyber attacks. Whether on the corporate or personal side, everyone was a potential target for hackers during this time of crisis. With no curfew for cyber attacks, the government website cybermalveillance.gouv.fr noted a 400% increase in phishing attempts during the first week of containment.\n\nWith hindsight, even if the COVID period is still relevant, it is interesting to do prospective work on the similarities between COVID crisis management and cybersecurity risks. Here is a list of different reasons why it seems that the Covid-19 crisis can teach us more about the dangers posed by our large-scale digital use.\n\n## 1- The covid-19 pandemic, a golden opportunity for cyber attacks\n\nThe newspaper of the net questioned the presence of a \"digital pandemic\" in a publication in 2020 in parallel with the health crisis. The surge in online stocks spawned by the lockdown has been a boon for many malicious agents. First and foremost, the most frequent phishing attacks. They have the advantage of not needing any technical skills. A great threat for Internet users whose untargeted attack is made possible by many spamming software.\n\nAlthough phishing attacks are commonplace, they were most noticeable during containment. At the same time, more present but also more visible for the ultra-connected Internet users on the networks. This is where the term digital pandemic comes into its own. Indeed, like the scourge that is Covid-19, phishing attempts have proliferated on the internet, harming several victims already in bad shape by the health situation.\n\nThe exponential increase in cyber attacks is reminiscent of the increase in Covid19 cases that took place during the year 2020. Reminding us, everyone, of the need to use digital hygiene on the web.\n\n## 2- A multifactorial cause difficult to detect\n\nFor a long time, the cause of Covid-19 has been a source of debate and controversy. Each bringing their theory to the now public sphere of digital media. Looking back, it would seem that the origin, but also the spread of the virus is actually caused by a positive feedback from many co-occurring factors.\n\nThe same is true when an individual sees their accounts and hardware infected with a computer virus. It is often difficult to return to the source of the evil, so scrupulous are the pirates that remove the leads. Also, digital security decreased in such a measure that users will leave flaws to appear during navigation. It is therefore difficult to know what is the source of the problem when it occurs.\n\n## 3- Solutions to reduce the spread and risks\n\nWith the increase in malware, spyware and whatnot, resorting to what might be called \"barrier gestures\" is the best solution. They allow us to prevent any penetration or theft of personal data. The irremediable advice on hygiene during the Covid-19 crisis is reminiscent of online safety rules, which we keep repeating all day long.\n\nIt is without context the accumulation of healthy and preventive practices that are the main defenses of individuals in the face of digital crime. For once, these tedious little practices, but effective in reducing risks, have always been presented by professionals, to best help Internet users. However, we can see it even more in the digital world, it is sometimes difficult to force a hand when it comes to potential risks.\n\n## 4- a threat not always taken seriously\n\nIndeed, during the health crisis, we had the right to many debacles about the gravity of the situation and the dangerousness of the threat. Every day, a protest emerged on various social networks, advocating a rather low mortality curve or mild symptoms. Everyone has their own opinion on how to deal with the crisis. What we are seeing, however, is that the perceived seriousness of a threat diminishes so much when it is not tangible and diffused.\n\nUnfortunately, what better place than the virtual digital world and the great discretion of malicious hackers, to create an atmosphere of calm before the storm. This is a very interesting point to raise, the denial of danger is still very much online. Internet users do not feel affected by the main threats that surround them. Yet it is by a factor of 4 that the number of cyber attacks increased during the year 2020, which raises questions about the future.\n\n## 5- A generational division on the stakes\n\nThe implementation of barrier gestures and the feeling of gravity linked to covid-19 was a source of discord between the different age groups. If fear has invaded our seniors, a legitimate response since they are the main ones affected by severe cases of the disease, young people have taken the recommendations a little less seriously. At least, this is a finding that many facts have highlighted.\n\nIn an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost freedoms, misunderstanding and many other factors have gradually established bad habits.\n\nIn an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost of freedoms, misunderstanding and many other factors have gradually established bad habits.\n\nJust like during the Covid-19 crisis, mistakes and non-compliance with the basic rules are the result of various factors. The generational aspect brings various reasons, which makes awareness raising more difficult for the vulgarizers.\n\n## 6 - Asymptomatic user accounts\n\nIf we look back at the feeling linked to the contamination, some Covid-19 patients did not have any noticeable symptoms during their infectious period. This did not make crisis management easier, as even in good faith, some individuals were able to spread the strain of the virus to others.\n\nWe find this situation identical with the escalating levels during a targeted assault where access is given little by little without us knowing that it has been compromised. Some digitally infected individuals are not even aware that their tools and software are infected. Subsequently, they will unwittingly transmit the contamination. Faced with this possibility, which is not without precedent, it is all the more important to be aware of this possibility and to maintain rigor when using it on the internet.\n\n## 7- The basic emotion of online attacks\n\nThe scams that took place during the Covid-19 crisis are countless and have particularly targeted vulnerable people. Despite the abject nature of attacking the most sensitive people, it is a well-known fact that scams and attacks are mainly aimed at them.\n\nEmotion plays a fundamental role in many online extortion strategies. Whether it's phishing, which is based only on the stress of lies, or ransomware strategies. The more the pirate captures the emotions of his target, the closer his success. Even if the education and popularization work on the subject has reduced panic phenomena following blackmailing online, this method of emotional hacking is still very present among hackers. Taking the time to educate yourself and rationalize the situation is the only response to such attacks.\n\n## 8- A question of individual freedom\n\nFinally, we cannot end without talking about the freedom and security dilemma. The Covid-19 crisis, especially among critics of measures taken by government institutions, has often highlighted a true philosophical subject, that of freedom. To what extent must my individual freedom be withdrawn from the common goods? This is a rhetorical question that comes up in any situation where security is required. As a result, cybersecurity is just as impacted.\n\nIn fact, to a lesser extent, the measures advocated by the defenders of a secure internet, block out the original vision of a libertarian internet without constraints. Do I really have to put aside certain freedoms, such as posting certain content on social networks, for the sole reason that they could possibly compromise me in the future? This choice is still up to everyone, even if in many cases it can be like playing with fire.\n\nFinally, looking at these eight examples, we see that there are many similarities between the health crisis and digital issues, which are tending to accelerate. This topic should be put on the front of the table for many experts. It makes it possible to carry out prospecting work on the basis of our experience in 2020. The benefits that could be brought to the fight against cybercrime are still diffuse. However, the management of communication and the integration of barrier gestures have been, overall, a success from which we can try to follow our example. What do you think ?",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"hacker\",\"security\",\"computer\"],\"image\":[\"http://01codex.com/wp-content/uploads/2021/06/cdc-w9KEokhajKw-unsplash.jpg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
}
]
}maxime01codexpublished a new post: will-we-experience-a-computer-virus-pandemic2021/06/07 09:55:00
maxime01codexpublished a new post: will-we-experience-a-computer-virus-pandemic
2021/06/07 09:55:00
| parent author | |
| parent permlink | covid |
| author | maxime01codex |
| permlink | will-we-experience-a-computer-virus-pandemic |
| title | Will we experience a computer virus pandemic? |
| body |  With the COVID-19 crisis, digital uses have experienced a dizzying increase. Its growth has, so to speak, increase exponentially. With the rise in connections to web services and the need to be able to access the Internet to weather the shock, we have seen an increase in computer viruses and cyber attacks. Whether on the corporate or personal side, everyone was a potential target for hackers during this time of crisis. With no curfew for cyber attacks, the government website cybermalveillance.gouv.fr noted a 400% increase in phishing attempts during the first week of containment. With hindsight, even if the COVID period is still relevant, it is interesting to do prospective work on the similarities between COVID crisis management and cybersecurity risks. Here is a list of different reasons why it seems that the Covid-19 crisis can teach us more about the dangers posed by our large-scale digital use. ## 1- The covid-19 pandemic, a golden opportunity for cyber attacks The newspaper of the net questioned the presence of a "digital pandemic" in a publication in 2020 in parallel with the health crisis. The surge in online stocks spawned by the lockdown has been a boon for many malicious agents. First and foremost, the most frequent phishing attacks. They have the advantage of not needing any technical skills. A great threat for Internet users whose untargeted attack is made possible by many spamming software. Although phishing attacks are commonplace, they were most noticeable during containment. At the same time, more present but also more visible for the ultra-connected Internet users on the networks. This is where the term digital pandemic comes into its own. Indeed, like the scourge that is Covid-19, phishing attempts have proliferated on the internet, harming several victims already in bad shape by the health situation. The exponential increase in cyber attacks is reminiscent of the increase in Covid19 cases that took place during the year 2020. Reminding us, everyone, of the need to use digital hygiene on the web. ## 2- A multifactorial cause difficult to detect For a long time, the cause of Covid-19 has been a source of debate and controversy. Each bringing their theory to the now public sphere of digital media. Looking back, it would seem that the origin, but also the spread of the virus is actually caused by a positive feedback from many co-occurring factors. The same is true when an individual sees their accounts and hardware infected with a computer virus. It is often difficult to return to the source of the evil, so scrupulous are the pirates that remove the leads. Also, digital security decreased in such a measure that users will leave flaws to appear during navigation. It is therefore difficult to know what is the source of the problem when it occurs. ## 3- Solutions to reduce the spread and risks With the increase in malware, spyware and whatnot, resorting to what might be called "barrier gestures" is the best solution. They allow us to prevent any penetration or theft of personal data. The irremediable advice on hygiene during the Covid-19 crisis is reminiscent of online safety rules, which we keep repeating all day long. It is without context the accumulation of healthy and preventive practices that are the main defenses of individuals in the face of digital crime. For once, these tedious little practices, but effective in reducing risks, have always been presented by professionals, to best help Internet users. However, we can see it even more in the digital world, it is sometimes difficult to force a hand when it comes to potential risks. ## 4- a threat not always taken seriously Indeed, during the health crisis, we had the right to many debacles about the gravity of the situation and the dangerousness of the threat. Every day, a protest emerged on various social networks, advocating a rather low mortality curve or mild symptoms. Everyone has their own opinion on how to deal with the crisis. What we are seeing, however, is that the perceived seriousness of a threat diminishes so much when it is not tangible and diffused. Unfortunately, what better place than the virtual digital world and the great discretion of malicious hackers, to create an atmosphere of calm before the storm. This is a very interesting point to raise, the denial of danger is still very much online. Internet users do not feel affected by the main threats that surround them. Yet it is by a factor of 4 that the number of cyber attacks increased during the year 2020, which raises questions about the future. ## 5- A generational division on the stakes The implementation of barrier gestures and the feeling of gravity linked to covid-19 was a source of discord between the different age groups. If fear has invaded our seniors, a legitimate response since they are the main ones affected by severe cases of the disease, young people have taken the recommendations a little less seriously. At least, this is a finding that many facts have highlighted. In an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost freedoms, misunderstanding and many other factors have gradually established bad habits. In an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost of freedoms, misunderstanding and many other factors have gradually established bad habits. Just like during the Covid-19 crisis, mistakes and non-compliance with the basic rules are the result of various factors. The generational aspect brings various reasons, which makes awareness raising more difficult for the vulgarizers. ## 6 - Asymptomatic user accounts If we look back at the feeling linked to the contamination, some Covid-19 patients did not have any noticeable symptoms during their infectious period. This did not make crisis management easier, as even in good faith, some individuals were able to spread the strain of the virus to others. We find this situation identical with the escalating levels during a targeted assault where access is given little by little without us knowing that it has been compromised. Some digitally infected individuals are not even aware that their tools and software are infected. Subsequently, they will unwittingly transmit the contamination. Faced with this possibility, which is not without precedent, it is all the more important to be aware of this possibility and to maintain rigor when using it on the internet. ## 7- The basic emotion of online attacks The scams that took place during the Covid-19 crisis are countless and have particularly targeted vulnerable people. Despite the abject nature of attacking the most sensitive people, it is a well-known fact that scams and attacks are mainly aimed at them. Emotion plays a fundamental role in many online extortion strategies. Whether it's phishing, which is based only on the stress of lies, or ransomware strategies. The more the pirate captures the emotions of his target, the closer his success. Even if the education and popularization work on the subject has reduced panic phenomena following blackmailing online, this method of emotional hacking is still very present among hackers. Taking the time to educate yourself and rationalize the situation is the only response to such attacks. ## 8- A question of individual freedom Finally, we cannot end without talking about the freedom and security dilemma. The Covid-19 crisis, especially among critics of measures taken by government institutions, has often highlighted a true philosophical subject, that of freedom. To what extent must my individual freedom be withdrawn from the common goods? This is a rhetorical question that comes up in any situation where security is required. As a result, cybersecurity is just as impacted. In fact, to a lesser extent, the measures advocated by the defenders of a secure internet, block out the original vision of a libertarian internet without constraints. Do I really have to put aside certain freedoms, such as posting certain content on social networks, for the sole reason that they could possibly compromise me in the future? This choice is still up to everyone, even if in many cases it can be like playing with fire. Finally, looking at these eight examples, we see that there are many similarities between the health crisis and digital issues, which are tending to accelerate. This topic should be put on the front of the table for many experts. It makes it possible to carry out prospecting work on the basis of our experience in 2020. The benefits that could be brought to the fight against cybercrime are still diffuse. However, the management of communication and the integration of barrier gestures have been, overall, a success from which we can try to follow our example. What do you think ? |
| json metadata | {"tags":["cybersecurity","virus","informatic","computer"],"image":["http://01codex.com/wp-content/uploads/2021/06/cdc-w9KEokhajKw-unsplash.jpg"],"app":"steemit/0.2","format":"markdown"} |
| Transaction Info | Block #54418460/Trx d756a3c65565989241e4910633de4bbba383ef7a |
View Raw JSON Data
{
"trx_id": "d756a3c65565989241e4910633de4bbba383ef7a",
"block": 54418460,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-07T09:55:00",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "covid",
"author": "maxime01codex",
"permlink": "will-we-experience-a-computer-virus-pandemic",
"title": "Will we experience a computer virus pandemic?",
"body": "\n\nWith the COVID-19 crisis, digital uses have experienced a dizzying increase. Its growth has, so to speak, increase exponentially. With the rise in connections to web services and the need to be able to access the Internet to weather the shock, we have seen an increase in computer viruses and cyber attacks. Whether on the corporate or personal side, everyone was a potential target for hackers during this time of crisis. With no curfew for cyber attacks, the government website cybermalveillance.gouv.fr noted a 400% increase in phishing attempts during the first week of containment.\n\nWith hindsight, even if the COVID period is still relevant, it is interesting to do prospective work on the similarities between COVID crisis management and cybersecurity risks. Here is a list of different reasons why it seems that the Covid-19 crisis can teach us more about the dangers posed by our large-scale digital use.\n\n## 1- The covid-19 pandemic, a golden opportunity for cyber attacks\n\nThe newspaper of the net questioned the presence of a \"digital pandemic\" in a publication in 2020 in parallel with the health crisis. The surge in online stocks spawned by the lockdown has been a boon for many malicious agents. First and foremost, the most frequent phishing attacks. They have the advantage of not needing any technical skills. A great threat for Internet users whose untargeted attack is made possible by many spamming software.\n\nAlthough phishing attacks are commonplace, they were most noticeable during containment. At the same time, more present but also more visible for the ultra-connected Internet users on the networks. This is where the term digital pandemic comes into its own. Indeed, like the scourge that is Covid-19, phishing attempts have proliferated on the internet, harming several victims already in bad shape by the health situation.\n\nThe exponential increase in cyber attacks is reminiscent of the increase in Covid19 cases that took place during the year 2020. Reminding us, everyone, of the need to use digital hygiene on the web.\n\n## 2- A multifactorial cause difficult to detect\n\nFor a long time, the cause of Covid-19 has been a source of debate and controversy. Each bringing their theory to the now public sphere of digital media. Looking back, it would seem that the origin, but also the spread of the virus is actually caused by a positive feedback from many co-occurring factors.\n\nThe same is true when an individual sees their accounts and hardware infected with a computer virus. It is often difficult to return to the source of the evil, so scrupulous are the pirates that remove the leads. Also, digital security decreased in such a measure that users will leave flaws to appear during navigation. It is therefore difficult to know what is the source of the problem when it occurs.\n\n## 3- Solutions to reduce the spread and risks\n\nWith the increase in malware, spyware and whatnot, resorting to what might be called \"barrier gestures\" is the best solution. They allow us to prevent any penetration or theft of personal data. The irremediable advice on hygiene during the Covid-19 crisis is reminiscent of online safety rules, which we keep repeating all day long.\n\nIt is without context the accumulation of healthy and preventive practices that are the main defenses of individuals in the face of digital crime. For once, these tedious little practices, but effective in reducing risks, have always been presented by professionals, to best help Internet users. However, we can see it even more in the digital world, it is sometimes difficult to force a hand when it comes to potential risks.\n\n## 4- a threat not always taken seriously\n\nIndeed, during the health crisis, we had the right to many debacles about the gravity of the situation and the dangerousness of the threat. Every day, a protest emerged on various social networks, advocating a rather low mortality curve or mild symptoms. Everyone has their own opinion on how to deal with the crisis. What we are seeing, however, is that the perceived seriousness of a threat diminishes so much when it is not tangible and diffused.\n\nUnfortunately, what better place than the virtual digital world and the great discretion of malicious hackers, to create an atmosphere of calm before the storm. This is a very interesting point to raise, the denial of danger is still very much online. Internet users do not feel affected by the main threats that surround them. Yet it is by a factor of 4 that the number of cyber attacks increased during the year 2020, which raises questions about the future.\n\n## 5- A generational division on the stakes\n\nThe implementation of barrier gestures and the feeling of gravity linked to covid-19 was a source of discord between the different age groups. If fear has invaded our seniors, a legitimate response since they are the main ones affected by severe cases of the disease, young people have taken the recommendations a little less seriously. At least, this is a finding that many facts have highlighted.\n\nIn an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost freedoms, misunderstanding and many other factors have gradually established bad habits.\n\nIn an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost of freedoms, misunderstanding and many other factors have gradually established bad habits.\n\nJust like during the Covid-19 crisis, mistakes and non-compliance with the basic rules are the result of various factors. The generational aspect brings various reasons, which makes awareness raising more difficult for the vulgarizers.\n\n## 6 - Asymptomatic user accounts\n\nIf we look back at the feeling linked to the contamination, some Covid-19 patients did not have any noticeable symptoms during their infectious period. This did not make crisis management easier, as even in good faith, some individuals were able to spread the strain of the virus to others.\n\nWe find this situation identical with the escalating levels during a targeted assault where access is given little by little without us knowing that it has been compromised. Some digitally infected individuals are not even aware that their tools and software are infected. Subsequently, they will unwittingly transmit the contamination. Faced with this possibility, which is not without precedent, it is all the more important to be aware of this possibility and to maintain rigor when using it on the internet.\n\n## 7- The basic emotion of online attacks\n\nThe scams that took place during the Covid-19 crisis are countless and have particularly targeted vulnerable people. Despite the abject nature of attacking the most sensitive people, it is a well-known fact that scams and attacks are mainly aimed at them.\n\nEmotion plays a fundamental role in many online extortion strategies. Whether it's phishing, which is based only on the stress of lies, or ransomware strategies. The more the pirate captures the emotions of his target, the closer his success. Even if the education and popularization work on the subject has reduced panic phenomena following blackmailing online, this method of emotional hacking is still very present among hackers. Taking the time to educate yourself and rationalize the situation is the only response to such attacks.\n\n## 8- A question of individual freedom\n\nFinally, we cannot end without talking about the freedom and security dilemma. The Covid-19 crisis, especially among critics of measures taken by government institutions, has often highlighted a true philosophical subject, that of freedom. To what extent must my individual freedom be withdrawn from the common goods? This is a rhetorical question that comes up in any situation where security is required. As a result, cybersecurity is just as impacted.\n\nIn fact, to a lesser extent, the measures advocated by the defenders of a secure internet, block out the original vision of a libertarian internet without constraints. Do I really have to put aside certain freedoms, such as posting certain content on social networks, for the sole reason that they could possibly compromise me in the future? This choice is still up to everyone, even if in many cases it can be like playing with fire.\n\nFinally, looking at these eight examples, we see that there are many similarities between the health crisis and digital issues, which are tending to accelerate. This topic should be put on the front of the table for many experts. It makes it possible to carry out prospecting work on the basis of our experience in 2020. The benefits that could be brought to the fight against cybercrime are still diffuse. However, the management of communication and the integration of barrier gestures have been, overall, a success from which we can try to follow our example. What do you think ?",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"virus\",\"informatic\",\"computer\"],\"image\":[\"http://01codex.com/wp-content/uploads/2021/06/cdc-w9KEokhajKw-unsplash.jpg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
}
]
}trusciflagged (-100.00%) @maxime01codex / will-we-experience-a-computer-virus-pandemic2021/06/07 05:38:30
trusciflagged (-100.00%) @maxime01codex / will-we-experience-a-computer-virus-pandemic
2021/06/07 05:38:30
| voter | trusci |
| author | maxime01codex |
| permlink | will-we-experience-a-computer-virus-pandemic |
| weight | -10000 (-100.00%) |
| Transaction Info | Block #54413367/Trx a8ca51c1ab28b81602b4572eead4bc5355741656 |
View Raw JSON Data
{
"trx_id": "a8ca51c1ab28b81602b4572eead4bc5355741656",
"block": 54413367,
"trx_in_block": 11,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-07T05:38:30",
"op": [
"vote",
{
"voter": "trusci",
"author": "maxime01codex",
"permlink": "will-we-experience-a-computer-virus-pandemic",
"weight": -10000
}
]
}arjun77upvoted (100.00%) @maxime01codex / will-we-experience-a-computer-virus-pandemic2021/06/05 18:55:12
arjun77upvoted (100.00%) @maxime01codex / will-we-experience-a-computer-virus-pandemic
2021/06/05 18:55:12
| voter | arjun77 |
| author | maxime01codex |
| permlink | will-we-experience-a-computer-virus-pandemic |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54372017/Trx 332616c9019390b826475921b2781b9fc94948ea |
View Raw JSON Data
{
"trx_id": "332616c9019390b826475921b2781b9fc94948ea",
"block": 54372017,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-05T18:55:12",
"op": [
"vote",
{
"voter": "arjun77",
"author": "maxime01codex",
"permlink": "will-we-experience-a-computer-virus-pandemic",
"weight": 10000
}
]
}maxime01codexpublished a new post: will-we-experience-a-computer-virus-pandemic2021/06/05 18:47:03
maxime01codexpublished a new post: will-we-experience-a-computer-virus-pandemic
2021/06/05 18:47:03
| parent author | |
| parent permlink | covid |
| author | maxime01codex |
| permlink | will-we-experience-a-computer-virus-pandemic |
| title | Will we experience a computer virus pandemic? |
| body |  With the COVID-19 crisis, digital uses have experienced a dizzying increase. Its growth has, so to speak, increase exponentially. With the rise in connections to web services and the need to be able to access the Internet to weather the shock, we have seen an increase in computer viruses and cyber attacks. Whether on the corporate or personal side, everyone was a potential target for hackers during this time of crisis. With no curfew for cyber attacks, the government website cybermalveillance.gouv.fr noted a 400% increase in phishing attempts during the first week of containment. With hindsight, even if the COVID period is still relevant, it is interesting to do prospective work on the similarities between COVID crisis management and cybersecurity risks. Here is a list of different reasons why it seems that the Covid-19 crisis can teach us more about the dangers posed by our large-scale digital use. ## 1- The covid-19 pandemic, a golden opportunity for cyber attacks The newspaper of the net questioned the presence of a "digital pandemic" in a publication in 2020 in parallel with the health crisis. The surge in online stocks spawned by the lockdown has been a boon for many malicious agents. First and foremost, the most frequent phishing attacks. They have the advantage of not needing any technical skills. A great threat for Internet users whose untargeted attack is made possible by many spamming software. Although phishing attacks are commonplace, they were most noticeable during containment. At the same time, more present but also more visible for the ultra-connected Internet users on the networks. This is where the term digital pandemic comes into its own. Indeed, like the scourge that is Covid-19, phishing attempts have proliferated on the internet, harming several victims already in bad shape by the health situation. The exponential increase in cyber attacks is reminiscent of the increase in Covid19 cases that took place during the year 2020. Reminding us, everyone, of the need to use digital hygiene on the web. ## 2- A multifactorial cause difficult to detect For a long time, the cause of Covid-19 has been a source of debate and controversy. Each bringing their theory to the now public sphere of digital media. Looking back, it would seem that the origin, but also the spread of the virus is actually caused by a positive feedback from many co-occurring factors. The same is true when an individual sees their accounts and hardware infected with a computer virus. It is often difficult to return to the source of the evil, so scrupulous are the pirates that remove the leads. Also, digital security decreased in such a measure that users will leave flaws to appear during navigation. It is therefore difficult to know what is the source of the problem when it occurs. ## 3- Solutions to reduce the spread and risks With the increase in malware, spyware and whatnot, resorting to what might be called "barrier gestures" is the best solution. They allow us to prevent any penetration or theft of personal data. The irremediable advice on hygiene during the Covid-19 crisis is reminiscent of online safety rules, which we keep repeating all day long. It is without context the accumulation of healthy and preventive practices that are the main defenses of individuals in the face of digital crime. For once, these tedious little practices, but effective in reducing risks, have always been presented by professionals, to best help Internet users. However, we can see it even more in the digital world, it is sometimes difficult to force a hand when it comes to potential risks. ## 4- a threat not always taken seriously Indeed, during the health crisis, we had the right to many debacles about the gravity of the situation and the dangerousness of the threat. Every day, a protest emerged on various social networks, advocating a rather low mortality curve or mild symptoms. Everyone has their own opinion on how to deal with the crisis. What we are seeing, however, is that the perceived seriousness of a threat diminishes so much when it is not tangible and diffused. Unfortunately, what better place than the virtual digital world and the great discretion of malicious hackers, to create an atmosphere of calm before the storm. This is a very interesting point to raise, the denial of danger is still very much online. Internet users do not feel affected by the main threats that surround them. Yet it is by a factor of 4 that the number of cyber attacks increased during the year 2020, which raises questions about the future. ## 5- A generational division on the stakes The implementation of barrier gestures and the feeling of gravity linked to covid-19 was a source of discord between the different age groups. If fear has invaded our seniors, a legitimate response since they are the main ones affected by severe cases of the disease, young people have taken the recommendations a little less seriously. At least, this is a finding that many facts have highlighted. In an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost freedoms, misunderstanding and many other factors have gradually established bad habits. In an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost of freedoms, misunderstanding and many other factors have gradually established bad habits. Just like during the Covid-19 crisis, mistakes and non-compliance with the basic rules are the result of various factors. The generational aspect brings various reasons, which makes awareness raising more difficult for the vulgarizers. ## 6 - Asymptomatic user accounts If we look back at the feeling linked to the contamination, some Covid-19 patients did not have any noticeable symptoms during their infectious period. This did not make crisis management easier, as even in good faith, some individuals were able to spread the strain of the virus to others. We find this situation identical with the escalating levels during a targeted assault where access is given little by little without us knowing that it has been compromised. Some digitally infected individuals are not even aware that their tools and software are infected. Subsequently, they will unwittingly transmit the contamination. Faced with this possibility, which is not without precedent, it is all the more important to be aware of this possibility and to maintain rigor when using it on the internet. ## 7- The basic emotion of online attacks The scams that took place during the Covid-19 crisis are countless and have particularly targeted vulnerable people. Despite the abject nature of attacking the most sensitive people, it is a well-known fact that scams and attacks are mainly aimed at them. Emotion plays a fundamental role in many online extortion strategies. Whether it's phishing, which is based only on the stress of lies, or ransomware strategies. The more the pirate captures the emotions of his target, the closer his success. Even if the education and popularization work on the subject has reduced panic phenomena following blackmailing online, this method of emotional hacking is still very present among hackers. Taking the time to educate yourself and rationalize the situation is the only response to such attacks. ## 8- A question of individual freedom Finally, we cannot end without talking about the freedom and security dilemma. The Covid-19 crisis, especially among critics of measures taken by government institutions, has often highlighted a true philosophical subject, that of freedom. To what extent must my individual freedom be withdrawn from the common goods? This is a rhetorical question that comes up in any situation where security is required. As a result, cybersecurity is just as impacted. In fact, to a lesser extent, the measures advocated by the defenders of a secure internet, block out the original vision of a libertarian internet without constraints. Do I really have to put aside certain freedoms, such as posting certain content on social networks, for the sole reason that they could possibly compromise me in the future? This choice is still up to everyone, even if in many cases it can be like playing with fire. Finally, looking at these eight examples, we see that there are many similarities between the health crisis and digital issues, which are tending to accelerate. This topic should be put on the front of the table for many experts. It makes it possible to carry out prospecting work on the basis of our experience in 2020. The benefits that could be brought to the fight against cybercrime are still diffuse. However, the management of communication and the integration of barrier gestures have been, overall, a success from which we can try to follow our example. What do you think ? |
| json metadata | {"tags":["covid","cybersecurity"],"image":["http://01codex.com/wp-content/uploads/2021/06/cdc-w9KEokhajKw-unsplash.jpg"],"app":"steemit/0.2","format":"markdown"} |
| Transaction Info | Block #54371855/Trx 1381e492cb5795c748128716ea4159b45b803b08 |
View Raw JSON Data
{
"trx_id": "1381e492cb5795c748128716ea4159b45b803b08",
"block": 54371855,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-05T18:47:03",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "covid",
"author": "maxime01codex",
"permlink": "will-we-experience-a-computer-virus-pandemic",
"title": "Will we experience a computer virus pandemic?",
"body": "\n\nWith the COVID-19 crisis, digital uses have experienced a dizzying increase. Its growth has, so to speak, increase exponentially. With the rise in connections to web services and the need to be able to access the Internet to weather the shock, we have seen an increase in computer viruses and cyber attacks. Whether on the corporate or personal side, everyone was a potential target for hackers during this time of crisis. With no curfew for cyber attacks, the government website cybermalveillance.gouv.fr noted a 400% increase in phishing attempts during the first week of containment.\n\nWith hindsight, even if the COVID period is still relevant, it is interesting to do prospective work on the similarities between COVID crisis management and cybersecurity risks. Here is a list of different reasons why it seems that the Covid-19 crisis can teach us more about the dangers posed by our large-scale digital use.\n\n## 1- The covid-19 pandemic, a golden opportunity for cyber attacks\n\nThe newspaper of the net questioned the presence of a \"digital pandemic\" in a publication in 2020 in parallel with the health crisis. The surge in online stocks spawned by the lockdown has been a boon for many malicious agents. First and foremost, the most frequent phishing attacks. They have the advantage of not needing any technical skills. A great threat for Internet users whose untargeted attack is made possible by many spamming software.\n\nAlthough phishing attacks are commonplace, they were most noticeable during containment. At the same time, more present but also more visible for the ultra-connected Internet users on the networks. This is where the term digital pandemic comes into its own. Indeed, like the scourge that is Covid-19, phishing attempts have proliferated on the internet, harming several victims already in bad shape by the health situation.\n\nThe exponential increase in cyber attacks is reminiscent of the increase in Covid19 cases that took place during the year 2020. Reminding us, everyone, of the need to use digital hygiene on the web.\n\n## 2- A multifactorial cause difficult to detect\n\nFor a long time, the cause of Covid-19 has been a source of debate and controversy. Each bringing their theory to the now public sphere of digital media. Looking back, it would seem that the origin, but also the spread of the virus is actually caused by a positive feedback from many co-occurring factors.\n\nThe same is true when an individual sees their accounts and hardware infected with a computer virus. It is often difficult to return to the source of the evil, so scrupulous are the pirates that remove the leads. Also, digital security decreased in such a measure that users will leave flaws to appear during navigation. It is therefore difficult to know what is the source of the problem when it occurs.\n\n## 3- Solutions to reduce the spread and risks\n\nWith the increase in malware, spyware and whatnot, resorting to what might be called \"barrier gestures\" is the best solution. They allow us to prevent any penetration or theft of personal data. The irremediable advice on hygiene during the Covid-19 crisis is reminiscent of online safety rules, which we keep repeating all day long.\n\nIt is without context the accumulation of healthy and preventive practices that are the main defenses of individuals in the face of digital crime. For once, these tedious little practices, but effective in reducing risks, have always been presented by professionals, to best help Internet users. However, we can see it even more in the digital world, it is sometimes difficult to force a hand when it comes to potential risks.\n\n## 4- a threat not always taken seriously\n\nIndeed, during the health crisis, we had the right to many debacles about the gravity of the situation and the dangerousness of the threat. Every day, a protest emerged on various social networks, advocating a rather low mortality curve or mild symptoms. Everyone has their own opinion on how to deal with the crisis. What we are seeing, however, is that the perceived seriousness of a threat diminishes so much when it is not tangible and diffused.\n\nUnfortunately, what better place than the virtual digital world and the great discretion of malicious hackers, to create an atmosphere of calm before the storm. This is a very interesting point to raise, the denial of danger is still very much online. Internet users do not feel affected by the main threats that surround them. Yet it is by a factor of 4 that the number of cyber attacks increased during the year 2020, which raises questions about the future.\n\n## 5- A generational division on the stakes\n\nThe implementation of barrier gestures and the feeling of gravity linked to covid-19 was a source of discord between the different age groups. If fear has invaded our seniors, a legitimate response since they are the main ones affected by severe cases of the disease, young people have taken the recommendations a little less seriously. At least, this is a finding that many facts have highlighted.\n\nIn an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost freedoms, misunderstanding and many other factors have gradually established bad habits.\n\nIn an equivocal way, the online presence and the respect of the rules concerning cybersecurity, have more or less impact according to the generations. The carelessness and somewhat candid appearance of young people shows a lack of consideration about online safety. On the senior side, it is the shortcomings in learning digital tools that are the cause of some deficiencies in online security measures. There are various reasons why the advice for preserving its digital security is not followed. Social pressure, habituation to lost of freedoms, misunderstanding and many other factors have gradually established bad habits.\n\nJust like during the Covid-19 crisis, mistakes and non-compliance with the basic rules are the result of various factors. The generational aspect brings various reasons, which makes awareness raising more difficult for the vulgarizers.\n\n## 6 - Asymptomatic user accounts\n\nIf we look back at the feeling linked to the contamination, some Covid-19 patients did not have any noticeable symptoms during their infectious period. This did not make crisis management easier, as even in good faith, some individuals were able to spread the strain of the virus to others.\n\nWe find this situation identical with the escalating levels during a targeted assault where access is given little by little without us knowing that it has been compromised. Some digitally infected individuals are not even aware that their tools and software are infected. Subsequently, they will unwittingly transmit the contamination. Faced with this possibility, which is not without precedent, it is all the more important to be aware of this possibility and to maintain rigor when using it on the internet.\n\n## 7- The basic emotion of online attacks\n\nThe scams that took place during the Covid-19 crisis are countless and have particularly targeted vulnerable people. Despite the abject nature of attacking the most sensitive people, it is a well-known fact that scams and attacks are mainly aimed at them.\n\nEmotion plays a fundamental role in many online extortion strategies. Whether it's phishing, which is based only on the stress of lies, or ransomware strategies. The more the pirate captures the emotions of his target, the closer his success. Even if the education and popularization work on the subject has reduced panic phenomena following blackmailing online, this method of emotional hacking is still very present among hackers. Taking the time to educate yourself and rationalize the situation is the only response to such attacks.\n\n## 8- A question of individual freedom\n\nFinally, we cannot end without talking about the freedom and security dilemma. The Covid-19 crisis, especially among critics of measures taken by government institutions, has often highlighted a true philosophical subject, that of freedom. To what extent must my individual freedom be withdrawn from the common goods? This is a rhetorical question that comes up in any situation where security is required. As a result, cybersecurity is just as impacted.\n\nIn fact, to a lesser extent, the measures advocated by the defenders of a secure internet, block out the original vision of a libertarian internet without constraints. Do I really have to put aside certain freedoms, such as posting certain content on social networks, for the sole reason that they could possibly compromise me in the future? This choice is still up to everyone, even if in many cases it can be like playing with fire.\n\nFinally, looking at these eight examples, we see that there are many similarities between the health crisis and digital issues, which are tending to accelerate. This topic should be put on the front of the table for many experts. It makes it possible to carry out prospecting work on the basis of our experience in 2020. The benefits that could be brought to the fight against cybercrime are still diffuse. However, the management of communication and the integration of barrier gestures have been, overall, a success from which we can try to follow our example. What do you think ?",
"json_metadata": "{\"tags\":[\"covid\",\"cybersecurity\"],\"image\":[\"http://01codex.com/wp-content/uploads/2021/06/cdc-w9KEokhajKw-unsplash.jpg\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
}
]
}2021/06/05 08:13:21
2021/06/05 08:13:21
| voter | maxime01codex |
| author | dobartim |
| permlink | success-is-just-a-mileage-of-your-shoes-steem-is-a-rocket-that-takes-us-to-dream-destination |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54359276/Trx fffea596b05fbd5848121139920612ff29bfaee2 |
View Raw JSON Data
{
"trx_id": "fffea596b05fbd5848121139920612ff29bfaee2",
"block": 54359276,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-05T08:13:21",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "dobartim",
"permlink": "success-is-just-a-mileage-of-your-shoes-steem-is-a-rocket-that-takes-us-to-dream-destination",
"weight": 10000
}
]
}2021/06/04 19:00:45
2021/06/04 19:00:45
| voter | maxime01codex |
| author | dulhara19 |
| permlink | social-engineering-or-humans-are-the-biggest-vulnerable-part-in-the-society |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54343540/Trx 0e87b92f817ee848de0211c530b1abb6b8bfd6d3 |
View Raw JSON Data
{
"trx_id": "0e87b92f817ee848de0211c530b1abb6b8bfd6d3",
"block": 54343540,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-04T19:00:45",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "dulhara19",
"permlink": "social-engineering-or-humans-are-the-biggest-vulnerable-part-in-the-society",
"weight": 10000
}
]
}maxime01codexpublished a new post: improve-cybersecurity-structure-with-framework-nist-1-12021/06/04 19:00:12
maxime01codexpublished a new post: improve-cybersecurity-structure-with-framework-nist-1-1
2021/06/04 19:00:12
| parent author | |
| parent permlink | cybersecurity |
| author | maxime01codex |
| permlink | improve-cybersecurity-structure-with-framework-nist-1-1 |
| title | Improve Cybersecurity structure with Framework NIST 1.1 |
| body |  To be able to implement the various actions necessary for the security of a company, the National Institute of Standards and Technology (NIST) has developed a framework dedicated entirely to cybersecurity. Since this is an open-source and independent tool, it can serve as a basis for any organization wishing to validate its cybersecurity needs. ## Genesis of the NIST project Since 1901, the NIST lab has worked regularly with the government of the United States of America to analyze and propose solutions in the area of industrial competitiveness. This was created to counterbalance the great advance of Germany and the United Kingdom at the beginning of the 20th century in the fields of economy and industry. With its great expertise in the field of physical and economic measurement, during the emergence of new technologies, NIST has been the ideal candidate to address issues related to computer security. The lab's cybersecurity program is based on the institution's fundamentals and promotes innovation, research and the study of US competitiveness. The subject of data and the relationship with the outside world is a crucial subject for the government of the United States. As a result, NIST's research focuses on topics such as cyberattacks, new technologies, defense methodologies and data preservation. The laboratory is very often called upon for the creation of standards and to establish rules of defense for the industry. Collaborations with the main industrial players in the country are also the responsibility of the laboratory, in order to train strategic sectors on the subject of cybersecurity. ## A place in the conspiracy With such a broad area of expertise, the US Federal Laboratory very often assists the US government on sensitive issues. Following the attack on the two World Trade Center towers, the laboratory was approached to analyze the possible causes of the collapse of the Twin Towers. Using a computer simulation, bringing together an enormous amount of data, the laboratory's responsibility was to determine the multi-factorial cause. The collapse is believed to be partly due to the fragility of the load-bearing columns, following the damage caused by the impact. In any case, this is what the computer simulation revealed after analyzing the scenarios. After this short anecdote, let's come back to the subject of the NIST framework and its importance in the analysis of a defense strategy. ## How does the NIST framework work?  The NIST 1.1 Framework is made up of five so-called fundamental functions for online security. These functions are: * Identify * Protect * Detect * Reply * Restructure These five pillars will encompass the main processes to be put in place to secure an organization using digital technologies. Each of these points is divided into sub-categories, themselves grouping together tasks to be performed. There are also specific sub-categories offering methods of integrating solutions to common situations. Obviously each part is accompanied by reference documents and case studies. The Framework also offers an implementation hierarchy with levels providing companies with a way to situate their skills and actions in relation to the NIST standard. Finally, the profile section will offer an overview, bringing a long-term approach. The projection on a wider horizon, favors the application of the new habits to have within a company. ## An interesting database To go further, the laboratory's website offers a fairly large database dealing with the different areas around cybersecurity. This database, dating back more than 20 years, has the advantage of bearing witness to technological advances and the associated risks since the beginning of the 21st century. It’s a real gold mine for any cybersecurity enthusiast. The topics offered are broad and encompass: * Encryption * Access control * Risk management * Artificial intelligence * Blockchains * Hardware * Servers * … ## Why use the NIST Framework? There are different reasons to look into the NIST Framework 1.1. Its use will allow among other things: * Understanding the risks associated with new technologies * Prevent and prepare for potential threats * Raise awareness of all stakeholders in an organization on the safety aspect * Validate the security of the tools put in place by a company or an individual The platform offers free of charge the knowledge and tools necessary to implement an effective strategy against computer threats. ## Reminder The purpose of the NIST 1.1 framework is only to present a list of recommendations and to prevent risks associated with computer technologies. Compliance with the advice provided by the institution is the responsibility of the company via a critical self-assessment of its structure. Therefore, its use should be indicative and guide a process of raising awareness and improving cybersecurity. see more : https://01codex.com |
| json metadata | {"tags":["cybersecurity","framework","nist"],"image":["http://01codex.com/wp-content/uploads/2021/06/NIST.jpeg","http://01codex.com/wp-content/uploads/2021/06/CSF.png"],"links":["https://01codex.com"],"app":"steemit/0.2","format":"markdown"} |
| Transaction Info | Block #54343529/Trx f0984aeb846e8c9066367ecb8d75dce569e812f1 |
View Raw JSON Data
{
"trx_id": "f0984aeb846e8c9066367ecb8d75dce569e812f1",
"block": 54343529,
"trx_in_block": 16,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-04T19:00:12",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "cybersecurity",
"author": "maxime01codex",
"permlink": "improve-cybersecurity-structure-with-framework-nist-1-1",
"title": "Improve Cybersecurity structure with Framework NIST 1.1",
"body": "\n\n\nTo be able to implement the various actions necessary for the security of a company, the National Institute of Standards and Technology (NIST) has developed a framework dedicated entirely to cybersecurity. Since this is an open-source and independent tool, it can serve as a basis for any organization wishing to validate its cybersecurity needs.\n\n## Genesis of the NIST project\n\nSince 1901, the NIST lab has worked regularly with the government of the United States of America to analyze and propose solutions in the area of industrial competitiveness. This was created to counterbalance the great advance of Germany and the United Kingdom at the beginning of the 20th century in the fields of economy and industry.\n\nWith its great expertise in the field of physical and economic measurement, during the emergence of new technologies, NIST has been the ideal candidate to address issues related to computer security.\n\nThe lab's cybersecurity program is based on the institution's fundamentals and promotes innovation, research and the study of US competitiveness.\n\nThe subject of data and the relationship with the outside world is a crucial subject for the government of the United States. As a result, NIST's research focuses on topics such as cyberattacks, new technologies, defense methodologies and data preservation. The laboratory is very often called upon for the creation of standards and to establish rules of defense for the industry. Collaborations with the main industrial players in the country are also the responsibility of the laboratory, in order to train strategic sectors on the subject of cybersecurity.\n\n\n## A place in the conspiracy\n\nWith such a broad area of expertise, the US Federal Laboratory very often assists the US government on sensitive issues. Following the attack on the two World Trade Center towers, the laboratory was approached to analyze the possible causes of the collapse of the Twin Towers.\n\nUsing a computer simulation, bringing together an enormous amount of data, the laboratory's responsibility was to determine the multi-factorial cause. The collapse is believed to be partly due to the fragility of the load-bearing columns, following the damage caused by the impact.\n\nIn any case, this is what the computer simulation revealed after analyzing the scenarios. After this short anecdote, let's come back to the subject of the NIST framework and its importance in the analysis of a defense strategy.\n\n## How does the NIST framework work?\n\n\n\nThe NIST 1.1 Framework is made up of five so-called fundamental functions for online security. These functions are:\n\n* Identify\n* Protect\n* Detect\n* Reply\n* Restructure\n\nThese five pillars will encompass the main processes to be put in place to secure an organization using digital technologies. Each of these points is divided into sub-categories, themselves grouping together tasks to be performed.\n\nThere are also specific sub-categories offering methods of integrating solutions to common situations. Obviously each part is accompanied by reference documents and case studies.\n\nThe Framework also offers an implementation hierarchy with levels providing companies with a way to situate their skills and actions in relation to the NIST standard.\n\nFinally, the profile section will offer an overview, bringing a long-term approach. The projection on a wider horizon, favors the application of the new habits to have within a company.\n\n## An interesting database\n\nTo go further, the laboratory's website offers a fairly large database dealing with the different areas around cybersecurity. This database, dating back more than 20 years, has the advantage of bearing witness to technological advances and the associated risks since the beginning of the 21st century. It’s a real gold mine for any cybersecurity enthusiast.\n\nThe topics offered are broad and encompass:\n\n* Encryption\n* Access control\n* Risk management\n* Artificial intelligence\n* Blockchains\n* Hardware\n* Servers\n* …\n\n## Why use the NIST Framework?\n\nThere are different reasons to look into the NIST Framework 1.1. Its use will allow among other things:\n\n* Understanding the risks associated with new technologies\n* Prevent and prepare for potential threats\n* Raise awareness of all stakeholders in an organization on the safety aspect\n* Validate the security of the tools put in place by a company or an individual\n\nThe platform offers free of charge the knowledge and tools necessary to implement an effective strategy against computer threats.\n\n## Reminder\n\nThe purpose of the NIST 1.1 framework is only to present a list of recommendations and to prevent risks associated with computer technologies. Compliance with the advice provided by the institution is the responsibility of the company via a critical self-assessment of its structure. Therefore, its use should be indicative and guide a process of raising awareness and improving cybersecurity.\n\nsee more : https://01codex.com",
"json_metadata": "{\"tags\":[\"cybersecurity\",\"framework\",\"nist\"],\"image\":[\"http://01codex.com/wp-content/uploads/2021/06/NIST.jpeg\",\"http://01codex.com/wp-content/uploads/2021/06/CSF.png\"],\"links\":[\"https://01codex.com\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
}
]
}maxime01codexupvoted (100.00%) @claudio83 / crypto-salaries-the-future-of-the-financial-system2021/06/03 14:02:57
maxime01codexupvoted (100.00%) @claudio83 / crypto-salaries-the-future-of-the-financial-system
2021/06/03 14:02:57
| voter | maxime01codex |
| author | claudio83 |
| permlink | crypto-salaries-the-future-of-the-financial-system |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54309039/Trx 1bfcd72213c55d0541b9c75d43068b1d83744584 |
View Raw JSON Data
{
"trx_id": "1bfcd72213c55d0541b9c75d43068b1d83744584",
"block": 54309039,
"trx_in_block": 14,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-03T14:02:57",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "claudio83",
"permlink": "crypto-salaries-the-future-of-the-financial-system",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @claudio83 / crypto-salaries-the-future-of-the-financial-system2021/06/03 13:54:54
maxime01codexupvoted (100.00%) @claudio83 / crypto-salaries-the-future-of-the-financial-system
2021/06/03 13:54:54
| voter | maxime01codex |
| author | claudio83 |
| permlink | crypto-salaries-the-future-of-the-financial-system |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54308878/Trx a36778b0cf86ceae703528794419f3b6b1cf31d9 |
View Raw JSON Data
{
"trx_id": "a36778b0cf86ceae703528794419f3b6b1cf31d9",
"block": 54308878,
"trx_in_block": 14,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-03T13:54:54",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "claudio83",
"permlink": "crypto-salaries-the-future-of-the-financial-system",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @claudio83 / crypto-salaries-the-future-of-the-financial-system2021/06/03 13:54:42
maxime01codexupvoted (100.00%) @claudio83 / crypto-salaries-the-future-of-the-financial-system
2021/06/03 13:54:42
| voter | maxime01codex |
| author | claudio83 |
| permlink | crypto-salaries-the-future-of-the-financial-system |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54308874/Trx 2fc14e1ff4201fa6961e844a94175bd9eed3b557 |
View Raw JSON Data
{
"trx_id": "2fc14e1ff4201fa6961e844a94175bd9eed3b557",
"block": 54308874,
"trx_in_block": 12,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-03T13:54:42",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "claudio83",
"permlink": "crypto-salaries-the-future-of-the-financial-system",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @claudio83 / crypto-salaries-the-future-of-the-financial-system2021/06/03 13:54:30
maxime01codexupvoted (100.00%) @claudio83 / crypto-salaries-the-future-of-the-financial-system
2021/06/03 13:54:30
| voter | maxime01codex |
| author | claudio83 |
| permlink | crypto-salaries-the-future-of-the-financial-system |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54308870/Trx 809031b0ec7a1fe617307440d8f41d41355456e3 |
View Raw JSON Data
{
"trx_id": "809031b0ec7a1fe617307440d8f41d41355456e3",
"block": 54308870,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-03T13:54:30",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "claudio83",
"permlink": "crypto-salaries-the-future-of-the-financial-system",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @krikblock / resemble-ai-combine-gpt-3-with-custom-high-quality-ai-voices2021/06/03 13:53:15
maxime01codexupvoted (100.00%) @krikblock / resemble-ai-combine-gpt-3-with-custom-high-quality-ai-voices
2021/06/03 13:53:15
| voter | maxime01codex |
| author | krikblock |
| permlink | resemble-ai-combine-gpt-3-with-custom-high-quality-ai-voices |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54308845/Trx 4832d66622c1a1eba3b9d0bce364cfaf7dfda137 |
View Raw JSON Data
{
"trx_id": "4832d66622c1a1eba3b9d0bce364cfaf7dfda137",
"block": 54308845,
"trx_in_block": 2,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-03T13:53:15",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "krikblock",
"permlink": "resemble-ai-combine-gpt-3-with-custom-high-quality-ai-voices",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @chart-trading / btc-prices-fall-in-the-morning2021/06/02 11:57:45
maxime01codexupvoted (100.00%) @chart-trading / btc-prices-fall-in-the-morning
2021/06/02 11:57:45
| voter | maxime01codex |
| author | chart-trading |
| permlink | btc-prices-fall-in-the-morning |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54277971/Trx 8576d31385bfea141226d01c055e8b305028c498 |
View Raw JSON Data
{
"trx_id": "8576d31385bfea141226d01c055e8b305028c498",
"block": 54277971,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-02T11:57:45",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "chart-trading",
"permlink": "btc-prices-fall-in-the-morning",
"weight": 10000
}
]
}maxime01codexreplied to @marjik / qu12zt2021/06/01 14:59:54
maxime01codexreplied to @marjik / qu12zt
2021/06/01 14:59:54
| parent author | marjik |
| parent permlink | learn-python-beginning-to-advanced |
| author | maxime01codex |
| permlink | qu12zt |
| title | |
| body | Very nice idea, nothing better than practice to learn. If someone need reference for learning coding, i really appreciate this : http://packt.com/. They have a lot of nice book about python. |
| json metadata | {"links":["http://packt.com/"],"app":"steemit/0.2"} |
| Transaction Info | Block #54253006/Trx 4f5ae353727c0b952bb4c9a05ee158819a073062 |
View Raw JSON Data
{
"trx_id": "4f5ae353727c0b952bb4c9a05ee158819a073062",
"block": 54253006,
"trx_in_block": 5,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T14:59:54",
"op": [
"comment",
{
"parent_author": "marjik",
"parent_permlink": "learn-python-beginning-to-advanced",
"author": "maxime01codex",
"permlink": "qu12zt",
"title": "",
"body": "Very nice idea, nothing better than practice to learn. If someone need reference for learning coding, i really appreciate this : http://packt.com/. They have a lot of nice book about python.",
"json_metadata": "{\"links\":[\"http://packt.com/\"],\"app\":\"steemit/0.2\"}"
}
]
}maxime01codexupvoted (100.00%) @marjik / learn-python-beginning-to-advanced2021/06/01 14:57:24
maxime01codexupvoted (100.00%) @marjik / learn-python-beginning-to-advanced
2021/06/01 14:57:24
| voter | maxime01codex |
| author | marjik |
| permlink | learn-python-beginning-to-advanced |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54252957/Trx 08e36d9c45ee766a62fd7304b078f49ffabc26ab |
View Raw JSON Data
{
"trx_id": "08e36d9c45ee766a62fd7304b078f49ffabc26ab",
"block": 54252957,
"trx_in_block": 12,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T14:57:24",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "marjik",
"permlink": "learn-python-beginning-to-advanced",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @proteen / opportunities-for-growth-and-development2021/06/01 13:57:36
maxime01codexupvoted (100.00%) @proteen / opportunities-for-growth-and-development
2021/06/01 13:57:36
| voter | maxime01codex |
| author | proteen |
| permlink | opportunities-for-growth-and-development |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54251767/Trx e1ef6a24941b4d2022393f548b5a71578f9d29f3 |
View Raw JSON Data
{
"trx_id": "e1ef6a24941b4d2022393f548b5a71578f9d29f3",
"block": 54251767,
"trx_in_block": 8,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T13:57:36",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "proteen",
"permlink": "opportunities-for-growth-and-development",
"weight": 10000
}
]
}maxime01codexreplied to @lyriqq-unfazed / qu0zqa2021/06/01 13:49:21
maxime01codexreplied to @lyriqq-unfazed / qu0zqa
2021/06/01 13:49:21
| parent author | lyriqq-unfazed |
| parent permlink | 78jwgl-the-best-artificial-intelligence-and-machine-learning-books-in-2021 |
| author | maxime01codex |
| permlink | qu0zqa |
| title | |
| body | If someone search a great library for computer science, AI, coding and so on. I really appreciate it : https://www.packtpub.com/ |
| json metadata | {"links":["https://www.packtpub.com/"],"app":"steemit/0.2"} |
| Transaction Info | Block #54251603/Trx 10d002e1e58dabbf1542816696a9bf6c406fa1fb |
View Raw JSON Data
{
"trx_id": "10d002e1e58dabbf1542816696a9bf6c406fa1fb",
"block": 54251603,
"trx_in_block": 17,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T13:49:21",
"op": [
"comment",
{
"parent_author": "lyriqq-unfazed",
"parent_permlink": "78jwgl-the-best-artificial-intelligence-and-machine-learning-books-in-2021",
"author": "maxime01codex",
"permlink": "qu0zqa",
"title": "",
"body": "If someone search a great library for computer science, AI, coding and so on. I really appreciate it : https://www.packtpub.com/",
"json_metadata": "{\"links\":[\"https://www.packtpub.com/\"],\"app\":\"steemit/0.2\"}"
}
]
}2021/06/01 13:48:18
2021/06/01 13:48:18
| voter | maxime01codex |
| author | lyriqq-unfazed |
| permlink | 78jwgl-the-best-artificial-intelligence-and-machine-learning-books-in-2021 |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54251582/Trx 66d4ed59975ed39ae01ea311dfc61c48e500cf49 |
View Raw JSON Data
{
"trx_id": "66d4ed59975ed39ae01ea311dfc61c48e500cf49",
"block": 54251582,
"trx_in_block": 8,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T13:48:18",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "lyriqq-unfazed",
"permlink": "78jwgl-the-best-artificial-intelligence-and-machine-learning-books-in-2021",
"weight": 10000
}
]
}maxime01codexcustom json: community2021/06/01 11:36:48
maxime01codexcustom json: community
2021/06/01 11:36:48
| required auths | [] |
| required posting auths | ["maxime01codex"] |
| id | community |
| json | ["subscribe",{"community":"hive-194349"}] |
| Transaction Info | Block #54248972/Trx f663e4a2c6bd0cc6691a569650f5cfe5638c13b9 |
View Raw JSON Data
{
"trx_id": "f663e4a2c6bd0cc6691a569650f5cfe5638c13b9",
"block": 54248972,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T11:36:48",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"maxime01codex"
],
"id": "community",
"json": "[\"subscribe\",{\"community\":\"hive-194349\"}]"
}
]
}maxime01codexupvoted (100.00%) @dobartim / steem-is-a-great-place-to-receive-airdrops2021/06/01 11:35:15
maxime01codexupvoted (100.00%) @dobartim / steem-is-a-great-place-to-receive-airdrops
2021/06/01 11:35:15
| voter | maxime01codex |
| author | dobartim |
| permlink | steem-is-a-great-place-to-receive-airdrops |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54248941/Trx 825d1e6fa2e058d86108c7eec1927bb83b835366 |
View Raw JSON Data
{
"trx_id": "825d1e6fa2e058d86108c7eec1927bb83b835366",
"block": 54248941,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T11:35:15",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "dobartim",
"permlink": "steem-is-a-great-place-to-receive-airdrops",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @milakz / contest-the-best-workshop-1st-week-prize-50-steem2021/06/01 06:32:54
maxime01codexupvoted (100.00%) @milakz / contest-the-best-workshop-1st-week-prize-50-steem
2021/06/01 06:32:54
| voter | maxime01codex |
| author | milakz |
| permlink | contest-the-best-workshop-1st-week-prize-50-steem |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54242942/Trx 2211d858cf3055461df7b05abbe87ff411d47796 |
View Raw JSON Data
{
"trx_id": "2211d858cf3055461df7b05abbe87ff411d47796",
"block": 54242942,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T06:32:54",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "milakz",
"permlink": "contest-the-best-workshop-1st-week-prize-50-steem",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @kralizec / miniaturized-quantum-entanglement-in-orbit2021/06/01 05:46:57
maxime01codexupvoted (100.00%) @kralizec / miniaturized-quantum-entanglement-in-orbit
2021/06/01 05:46:57
| voter | maxime01codex |
| author | kralizec |
| permlink | miniaturized-quantum-entanglement-in-orbit |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54242028/Trx bbddb559022f10fe8e4dddba51b4598155e9a3ee |
View Raw JSON Data
{
"trx_id": "bbddb559022f10fe8e4dddba51b4598155e9a3ee",
"block": 54242028,
"trx_in_block": 7,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-06-01T05:46:57",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "kralizec",
"permlink": "miniaturized-quantum-entanglement-in-orbit",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @irawandedy / steem-investing-and-power-up-news-40-power-up-accounts2021/05/31 20:23:03
maxime01codexupvoted (100.00%) @irawandedy / steem-investing-and-power-up-news-40-power-up-accounts
2021/05/31 20:23:03
| voter | maxime01codex |
| author | irawandedy |
| permlink | steem-investing-and-power-up-news-40-power-up-accounts |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54230839/Trx 715907a20dd87477fa613a245ac640cb68913637 |
View Raw JSON Data
{
"trx_id": "715907a20dd87477fa613a245ac640cb68913637",
"block": 54230839,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-31T20:23:03",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "irawandedy",
"permlink": "steem-investing-and-power-up-news-40-power-up-accounts",
"weight": 10000
}
]
}georgiodueflagged (-100.00%) @maxime01codex / understand-the-deep-q-learning-method-an-usefull-technic-for-ai2021/05/31 12:03:21
georgiodueflagged (-100.00%) @maxime01codex / understand-the-deep-q-learning-method-an-usefull-technic-for-ai
2021/05/31 12:03:21
| voter | georgiodue |
| author | maxime01codex |
| permlink | understand-the-deep-q-learning-method-an-usefull-technic-for-ai |
| weight | -10000 (-100.00%) |
| Transaction Info | Block #54220915/Trx f719616f5f530a49ec35ae8970361c1f86fed214 |
View Raw JSON Data
{
"trx_id": "f719616f5f530a49ec35ae8970361c1f86fed214",
"block": 54220915,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-31T12:03:21",
"op": [
"vote",
{
"voter": "georgiodue",
"author": "maxime01codex",
"permlink": "understand-the-deep-q-learning-method-an-usefull-technic-for-ai",
"weight": -10000
}
]
}maxime01codexreplied to @healthrepublic / qtyvb02021/05/31 10:18:36
maxime01codexreplied to @healthrepublic / qtyvb0
2021/05/31 10:18:36
| parent author | healthrepublic |
| parent permlink | aloe-queen-of-the-herbs |
| author | maxime01codex |
| permlink | qtyvb0 |
| title | |
| body | Do you know lemon balm ? I really like that too ! |
| json metadata | {"app":"steemit/0.2"} |
| Transaction Info | Block #54218835/Trx 25e2e256739c7e84654dc95314360ece651bd610 |
View Raw JSON Data
{
"trx_id": "25e2e256739c7e84654dc95314360ece651bd610",
"block": 54218835,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-31T10:18:36",
"op": [
"comment",
{
"parent_author": "healthrepublic",
"parent_permlink": "aloe-queen-of-the-herbs",
"author": "maxime01codex",
"permlink": "qtyvb0",
"title": "",
"body": "Do you know lemon balm ? I really like that too !",
"json_metadata": "{\"app\":\"steemit/0.2\"}"
}
]
}maxime01codexupvoted (100.00%) @healthrepublic / aloe-queen-of-the-herbs2021/05/31 10:17:27
maxime01codexupvoted (100.00%) @healthrepublic / aloe-queen-of-the-herbs
2021/05/31 10:17:27
| voter | maxime01codex |
| author | healthrepublic |
| permlink | aloe-queen-of-the-herbs |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54218812/Trx 2674d1ee603f9c13fc9dec54dbbd4075861723f7 |
View Raw JSON Data
{
"trx_id": "2674d1ee603f9c13fc9dec54dbbd4075861723f7",
"block": 54218812,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-31T10:17:27",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "healthrepublic",
"permlink": "aloe-queen-of-the-herbs",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @kralizec / elon-musk-neuralink-will-stream-music-into-your-brain2021/05/31 09:46:39
maxime01codexupvoted (100.00%) @kralizec / elon-musk-neuralink-will-stream-music-into-your-brain
2021/05/31 09:46:39
| voter | maxime01codex |
| author | kralizec |
| permlink | elon-musk-neuralink-will-stream-music-into-your-brain |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54218201/Trx 37b5ef55b78b1d988d7e400f71119b91851806fe |
View Raw JSON Data
{
"trx_id": "37b5ef55b78b1d988d7e400f71119b91851806fe",
"block": 54218201,
"trx_in_block": 7,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-31T09:46:39",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "kralizec",
"permlink": "elon-musk-neuralink-will-stream-music-into-your-brain",
"weight": 10000
}
]
}maxime01codexflagged (-100.00%) @kralizec / elon-musk-neuralink-will-stream-music-into-your-brain2021/05/31 09:46:33
maxime01codexflagged (-100.00%) @kralizec / elon-musk-neuralink-will-stream-music-into-your-brain
2021/05/31 09:46:33
| voter | maxime01codex |
| author | kralizec |
| permlink | elon-musk-neuralink-will-stream-music-into-your-brain |
| weight | -10000 (-100.00%) |
| Transaction Info | Block #54218199/Trx 9e0d521feaa67f4acf9a85f5957ae5aa53b9d2ff |
View Raw JSON Data
{
"trx_id": "9e0d521feaa67f4acf9a85f5957ae5aa53b9d2ff",
"block": 54218199,
"trx_in_block": 1,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-31T09:46:33",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "kralizec",
"permlink": "elon-musk-neuralink-will-stream-music-into-your-brain",
"weight": -10000
}
]
}maxime01codexupvoted (100.00%) @steemitblog / steemit-crypto-academy-weekly-update-16-may-31st-20212021/05/31 09:44:45
maxime01codexupvoted (100.00%) @steemitblog / steemit-crypto-academy-weekly-update-16-may-31st-2021
2021/05/31 09:44:45
| voter | maxime01codex |
| author | steemitblog |
| permlink | steemit-crypto-academy-weekly-update-16-may-31st-2021 |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54218163/Trx e9507c6c608b0b8a46bd67e7f4c1d9e2152f17e0 |
View Raw JSON Data
{
"trx_id": "e9507c6c608b0b8a46bd67e7f4c1d9e2152f17e0",
"block": 54218163,
"trx_in_block": 6,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-31T09:44:45",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "steemitblog",
"permlink": "steemit-crypto-academy-weekly-update-16-may-31st-2021",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @belkisa758 / qtxifr2021/05/31 05:08:06
maxime01codexupvoted (100.00%) @belkisa758 / qtxifr
2021/05/31 05:08:06
| voter | maxime01codex |
| author | belkisa758 |
| permlink | qtxifr |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54212670/Trx af3cb13734f7d238c02ed744f0d4fd06ab550586 |
View Raw JSON Data
{
"trx_id": "af3cb13734f7d238c02ed744f0d4fd06ab550586",
"block": 54212670,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-31T05:08:06",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "belkisa758",
"permlink": "qtxifr",
"weight": 10000
}
]
}maxime01codexcustom json: notify2021/05/30 16:11:54
maxime01codexcustom json: notify
2021/05/30 16:11:54
| required auths | [] |
| required posting auths | ["maxime01codex"] |
| id | notify |
| json | ["setLastRead",{"date":"2021-05-30T16:11:54"}] |
| Transaction Info | Block #54197260/Trx 4ee74150f8a4774d3be95323e65bf467d72fc614 |
View Raw JSON Data
{
"trx_id": "4ee74150f8a4774d3be95323e65bf467d72fc614",
"block": 54197260,
"trx_in_block": 9,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T16:11:54",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"maxime01codex"
],
"id": "notify",
"json": "[\"setLastRead\",{\"date\":\"2021-05-30T16:11:54\"}]"
}
]
}2021/05/30 15:24:00
2021/05/30 15:24:00
| voter | maxime01codex |
| author | thegreens |
| permlink | the-biodiversity-challenge-or-a-contest-to-commemorate-the-international-day-for-biological-diversity |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54196308/Trx 22b4962ebdffee84f24845d00b39fdfabed53c73 |
View Raw JSON Data
{
"trx_id": "22b4962ebdffee84f24845d00b39fdfabed53c73",
"block": 54196308,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T15:24:00",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "thegreens",
"permlink": "the-biodiversity-challenge-or-a-contest-to-commemorate-the-international-day-for-biological-diversity",
"weight": 10000
}
]
}inertiaupvoted (100.00%) @maxime01codex / understand-the-deep-q-learning-method-an-usefull-technic-for-ai2021/05/30 13:40:36
inertiaupvoted (100.00%) @maxime01codex / understand-the-deep-q-learning-method-an-usefull-technic-for-ai
2021/05/30 13:40:36
| voter | inertia |
| author | maxime01codex |
| permlink | understand-the-deep-q-learning-method-an-usefull-technic-for-ai |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54194254/Trx 1869549ff12baa28fa2e180d8320f6b6aa98da66 |
View Raw JSON Data
{
"trx_id": "1869549ff12baa28fa2e180d8320f6b6aa98da66",
"block": 54194254,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T13:40:36",
"op": [
"vote",
{
"voter": "inertia",
"author": "maxime01codex",
"permlink": "understand-the-deep-q-learning-method-an-usefull-technic-for-ai",
"weight": 10000
}
]
}maxime01codexupvoted (100.00%) @illyab / 15-ai-the-deepfakes-of-sound-short-essay2021/05/30 13:15:45
maxime01codexupvoted (100.00%) @illyab / 15-ai-the-deepfakes-of-sound-short-essay
2021/05/30 13:15:45
| voter | maxime01codex |
| author | illyab |
| permlink | 15-ai-the-deepfakes-of-sound-short-essay |
| weight | 10000 (100.00%) |
| Transaction Info | Block #54193759/Trx 56635193c3e017d5fe768fdae02946c0dc77ab34 |
View Raw JSON Data
{
"trx_id": "56635193c3e017d5fe768fdae02946c0dc77ab34",
"block": 54193759,
"trx_in_block": 7,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T13:15:45",
"op": [
"vote",
{
"voter": "maxime01codex",
"author": "illyab",
"permlink": "15-ai-the-deepfakes-of-sound-short-essay",
"weight": 10000
}
]
}2021/05/30 13:10:45
2021/05/30 13:10:45
| voter | steem.history |
| author | maxime01codex |
| permlink | understand-the-deep-q-learning-method-an-usefull-technic-for-ai |
| weight | 500 (5.00%) |
| Transaction Info | Block #54193660/Trx f7bcda99a3bd11864d40dedf82c7518b126baa8b |
View Raw JSON Data
{
"trx_id": "f7bcda99a3bd11864d40dedf82c7518b126baa8b",
"block": 54193660,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T13:10:45",
"op": [
"vote",
{
"voter": "steem.history",
"author": "maxime01codex",
"permlink": "understand-the-deep-q-learning-method-an-usefull-technic-for-ai",
"weight": 500
}
]
}2021/05/30 13:10:42
2021/05/30 13:10:42
| parent author | maxime01codex |
| parent permlink | understand-the-deep-q-learning-method-an-usefull-technic-for-ai |
| author | steem.history |
| permlink | re-maxime01codex-understand-the-deep-q-learning-method-an-usefull-technic-for-ai-20210530t131042852z |
| title | Test |
| body | Hello welcome to Steemit world! I'm @steem.history, who is steem witness. This is a recommended post for you.[Newcomers Guide](https://steemitdev.com/guide/@steemitblog/steemit-a-guide-for-newcomers) and [The Complete Steemit Etiquette Guide (Revision 2.0)](https://steemit.com/steem/@steem.history/the-complete-steemit-etiquette-guide-revision-20-homage-1598425779) and, recommended community [Newcomers Community](https://steemit.com/trending/hive-172186) I wish you luck to your steemit activities.<center> https://cdn.steemitimages.com/DQmXHwdcNs5VPcBft1iSosPdHLpBNBfjuG84g3ffWhMw5JQ/image.png <sub>(The bots avatar has been created using https://robohash.org/)</sub> @steem.history ### My witness activity - [My aspiration for STEEM witness](https://steemit.com/hive-185836/@steem.history/my-aspiration-for-steem-witness-1601280729) - Provides information on Steem. [Reference](https://steemit.com/trending/hive-130095) - Supporting the Steem project. [SPUD4STEEM project](https://steemit.com/trending/spud4steem) - Supporting the community. [Newcomers Community](https://steemit.com/trending/hive-172186),[Steem Sri Lanka](https://steemit.com/trending/hive-133716) ,[WORLD OF XPILAR](https://steemit.com/trending/hive-185836) ### My featured posts - [The Complete Steemit Etiquette Guide (Revision 2.0) -Homage](https://steemit.com/steem/@steem.history/the-complete-steemit-etiquette-guide-revision-20-homage-1598425779) [](https://steemlogin.com/sign/account-witness-vote?witness=steem.history&approve=1) <sub>please click it!</sub>  <sub>(Go to https://steemit.com/~witnesses and type fbslo at the bottom of the page)</sub> </center> |
| json metadata | {"tsgs":["test"]} |
| Transaction Info | Block #54193659/Trx eed4ea83ddde871a4fe0c46c00143ec33586be1e |
View Raw JSON Data
{
"trx_id": "eed4ea83ddde871a4fe0c46c00143ec33586be1e",
"block": 54193659,
"trx_in_block": 12,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T13:10:42",
"op": [
"comment",
{
"parent_author": "maxime01codex",
"parent_permlink": "understand-the-deep-q-learning-method-an-usefull-technic-for-ai",
"author": "steem.history",
"permlink": "re-maxime01codex-understand-the-deep-q-learning-method-an-usefull-technic-for-ai-20210530t131042852z",
"title": "Test",
"body": "Hello welcome to Steemit world! \n I'm @steem.history, who is steem witness. \n This is a recommended post for you.[Newcomers Guide](https://steemitdev.com/guide/@steemitblog/steemit-a-guide-for-newcomers) and [The Complete Steemit Etiquette Guide (Revision 2.0)](https://steemit.com/steem/@steem.history/the-complete-steemit-etiquette-guide-revision-20-homage-1598425779) and, recommended community [Newcomers Community](https://steemit.com/trending/hive-172186) \n I wish you luck to your steemit activities.<center> \n \n \n https://cdn.steemitimages.com/DQmXHwdcNs5VPcBft1iSosPdHLpBNBfjuG84g3ffWhMw5JQ/image.png \n <sub>(The bots avatar has been created using https://robohash.org/)</sub> \n @steem.history \n \n ### My witness activity \n - [My aspiration for STEEM witness](https://steemit.com/hive-185836/@steem.history/my-aspiration-for-steem-witness-1601280729) \n - Provides information on Steem. \n [Reference](https://steemit.com/trending/hive-130095) \n - Supporting the Steem project. \n [SPUD4STEEM project](https://steemit.com/trending/spud4steem) \n - Supporting the community. \n [Newcomers Community](https://steemit.com/trending/hive-172186),[Steem Sri Lanka](https://steemit.com/trending/hive-133716) ,[WORLD OF XPILAR](https://steemit.com/trending/hive-185836) \n \n ### My featured posts \n - [The Complete Steemit Etiquette Guide (Revision 2.0) -Homage](https://steemit.com/steem/@steem.history/the-complete-steemit-etiquette-guide-revision-20-homage-1598425779) \n \n [](https://steemlogin.com/sign/account-witness-vote?witness=steem.history&approve=1) \n <sub>please click it!</sub> \n \n  \n <sub>(Go to https://steemit.com/~witnesses and type fbslo at the bottom of the page)</sub> \n \n </center>",
"json_metadata": "{\"tsgs\":[\"test\"]}"
}
]
}maxime01codexpublished a new post: understand-the-deep-q-learning-method-an-usefull-technic-for-ai2021/05/30 13:10:36
maxime01codexpublished a new post: understand-the-deep-q-learning-method-an-usefull-technic-for-ai
2021/05/30 13:10:36
| parent author | |
| parent permlink | ai |
| author | maxime01codex |
| permlink | understand-the-deep-q-learning-method-an-usefull-technic-for-ai |
| title | Understand The deep Q learning method : an usefull technic for AI |
| body | # Understand The deep Q learning method : an usefull technic for AI ## Foreword One of the most popular models in the deep reinforcement-learning sub-branch is the algorithm called Deep Q Network or DQN. Understanding this method is extremely important. It is the basis of many deep reinforcement-learning algorithms. The DQN model was first proposed by researchers at Google DeepMind in 2013 in a paper called Playing Atari with Deep Reinforcement Learning. In it, they described the DQN architecture and explained why this method was so effective especially for Atari games. In this period, it is no exaggeration to say that the DQN method appeared in a good time. Indeed, other methods based on the Q function had made it possible to advance in the field of reinforcement learning. However, researchers remained at an impasse. At the same time, the tabular Q-learning method was on the rise and had solved some problems regarding the accumulation of states in reinforcement problems. Despite everything, it was not very effective in the context of observation of large ensembles. Therefore, from there to evoking a solution for the resolution of video games, it was inconceivable. The complexity was too great for them. Having to read all of the pixels and their states was inconceivable. The algorithms would have had too many states to consider. Tests have shown that the available reinforcement methods did not even come close to a satisfactory solution. Especially since in some environments the number of observations is almost endless. Quickly, it was necessary to decide on the ranges of parameters to be taken into account to distinguish the crucial states from those that are not relevant. For a video game, a single pixel will not make a difference in a game. It is therefore possible to create a larger assembly as part of the image as a state. However, even so, it is necessary to be able to distinguish areas of the screen where the action is relevant to the sequence of events. One solution in this case has been to provide both a state and an action mapped into a single value. In machine learning, we talk about a regression problem. There are several concrete ways to represent and train this type of representation. Here we will describe one of them. Because of its efficiency and its ease in spreading over different problems, the Deep Q Network has become essential for reinforcement learning. ## The genesis of DQN Remember that the goal of reinforcement learning as a whole is to find the optimal policy that will give us the maximum return. In order to calculate this policy, we first start by calculating the emblematic function of the DQN method, the Q function. Recall that the function Q is the function of value and state. It indicates the value of a state-action pair. Its use allows us to use the result obtained by the agent starting from a state s and executing the action “a” following a policy π. In the case of the DQN method, we have to calculate the set of state-action values with the Q function. However, in some cases it can be extremely long and complicated to calculate the Q-value of each action-state pair. Instead of calculating Q values iteratively, we can use one of the many approximation functions. Here in the context of the DQN, it will be with a neural network that we will do. In this way, we can then parameterize our function Q with a parameter theta and calculate the Q value with parameter theta. We just feed the state of our environment into a neural network and it will return the Q value of all possible actions from that state. Once the Q values are found, we can select the best action like the one with the maximum Q value. Since we are using a neural network to approximate the Q values, the neural network is called the Q network. Since most of the time we are dealing with a deep neural network to approximate the Q value, then our deep neural network is called a deep Q network or DQN. Now you know all about the genesis of DQN. However, at this point, many questions remain unanswered. Let us try to take it one step further. ## The interactions with the environment Before going into details about the DQN method, it is important to review the agent's interactions with its environment. We know that for the agent it is necessary to interact with the environment in order to receive rewards but also data for training. We can act randomly as is done in some cases. But in the context of a video game, for example, is it really relevant? What is the probability of winning in this scenario? It's very rare. So it will take several games before you achieve enough success. An alternative would be to use our approximate Q function as a source of behavior. We find the principle mentioned in the context of the iterative value method. If our representation of Q is good, then the experience we get from acting on the environment will show us that the agent's data is valid for training. In a low-quality approximation, we detect it by experience. The concern here is that our agent can get caught up in bad deeds without trying to behave differently. We return to our dilemma of exploitation - exploration. It is important to give the agent the opportunity to explore the environment and build a series of transitions and actions with various outputs. Even though we should not let it act in just any manner, we are above all looking for efficiency. For example, it would be silly to reproduce actions whose sequence has already been presented and did not yield any interesting data. Research has shown that an initially randomized system, when the approximation cannot be used, is very often an interesting alternative since it provides a basis that offers sufficient and varied interactions with the environment. Eventually, as our training system progresses, the randomized behavior becomes ineffective and we can model our approximation Q and choose what action to take. This one proposing with our training, a more serious approximation. A method that applies this proposition very well is the ϵ-greedy method. It will simply alternate between a random phenomenon and the policies of Q by using the hyper parameter ϵ. By varying ϵ, we choose the part of randomness in our actions. We start in practice with ϵ = 1.0, to gradually end around a value varying between 0.05 or 0.02 depending on the case. This method helps both to explore the environment at the start of the experiment, but also to maintain a good policy afterwards by switching to the Q function. There are other solutions to deal with the subject of exploration and exploitation. However, that will not be our subject here. ## How to train a network in deep Q Learning ? This is a question we can legitimately ask ourselves. Truthfully speaking, the good training of the network provides the quality of the results of the algorithm. So let us see the researchers' proposal on this subject. Recall that we run our algorithm with the network parameter θ. Its initial value is random in order to be able to start approaching the optimal Q function. Since we are in the phase of initializing the function, the result will never be optimal. We are therefore going to train the network over several iterations. We try by this principle to find the optimal parameter θ. Once the optimal parameter θ has been found, we will have the optimal Q function. Then we can extract the optimal policy from the optimal Q function. One of the most popular solutions to find optimal θ and Q is the use of a deep neural network. We find this approach especially in the context of representation associated with images on the screen. ### The training data: The basis of Q-learning is borrowed from the supervised machine learning model. Indeed, we are trying to work with a complex nonlinear function, in our case Q with a neural network. To do this we have to calculate targets for the function using the Bellman equation to claim to have a supervised learning problem at hand. This is a good idea, but to use an optimization SGD (the little name behind this technique), our training data must be independent and identically distributed (I.I.D principle). In our case, our data does not agree with this principle. To remedy this, we can use a buffer in which we record our past experiences and our training samples. This collection will replace the latest experiments. We are talking about the replay buffer technique. We use this buffer called replay buffer to collect the agent's experience. The replay buffer will simply serve as a collection of experiences that we set aside to use for training. From there, based on that experience, we train our network. ### Replay buffer : This tuple in our replay buffer, also called in French, experience buffer. We usually denote it with D. This information transition is what is trivially called the agent experience. The idea of using a buffer to store user experience is interesting since we train our DQN with the experience we sampled in the buffer. In this way, we collect the agent's transition information during several episodes and we save it in the replay buffer. Transition information is stored in a stack (our replay buffer) where the newly entered data will be added to the bottom of the stack. However, this method has a disadvantage. In fact, we are going to store the experiences here one by one. From experience to experience, these will often be similar. To avoid this, we can integrate some random transition into the replay buffer before training the network. Remember that the replay buffer has a storage limit, and can therefore only keep a certain number of agent experiences. When this is filled, the new entries overwrite the old ones. The replay buffer is generally constructed like the structure of a queue. That is, so that the first entries are the first exits. Therefore, each addition after the full battery will eliminate the oldest experience and make room for the new one. At the same time, this allows the sample replay buffer to be improved. The further we go in training, the better the experiences tend to be. ### Using the loss function, a great ally: In our DQN method, we want to predict the values of Q. Now, these are continuous values. This will add complexity to the prediction. To overcome this, we use in DQN a regression task. The most popular method is the mean squared error, also noted MSE. It will come to play the role of loss function during the regression. The principle of the MSE can be translated as the squared average of the difference between the target value and the predicted value, we note that as follows:  Where y plays the role of target value, y " of the predicted value and K the number of training samples. Our goal is to train our network and try to minimize the MSE between the target Q value and the predicted Q value as much as possible. Obviously, the goal is to get the optimal Q value, which also comes down to minimizing error. Since the difference between the target Q value and the current Q value tends towards 0 as one approaches the optimal Q value. We use the Bellman equation for this. You will find an article covering the concept of this equation here. We know that the optimal Q value can be obtained using the Bellman Optimal equation:  Where R (s, a, s ’) represents the immediate reward r, obtained by performing an action in state s leading to state s’. It is therefore possible to replace R (s, a, s ’) simply by r. In our equation, we can also remove the expected factor E. Indeed, we will approximate this factor by taking a sample of K transitions from the replay buffer and recovering an average value. Thus according to the optimal Bellman equation, the optimal value Q is the sum of the rewards to which we add the maximum value Q reduced to the next action-state pair:  We can also define our loss as the difference between the target value (the optimal Q value) and the predicted value (the Q value predicted by DQN). The loss function will then be expressed:  By substituting the above equation for the previous one, we get this simplified formula:  We calculated the predicted Q-value using the network parameter θ. Now let's see how to calculate the target value. We have seen that it is the sum of the rewards to which we add the maximum Q value reduced to the next action-state pair. Similar to the predicted Q-value, we can calculate the Q-value of the next action-state pair by using the same network parameter, θ. Indeed, notice in our equation that we have, the two values Q parameterized by θ. Instead of calculating the loss as just the difference between the target Q value and the predicted Q value, we use the MSE method as the loss function. Remember that we have our experiences stored in the replay buffer. In addition, we have a small part of our randomized sample. We then train the network and try to minimize the MSE. We can then translate our loss function as follows:  We have seen that the target value is simply the sum of the rewards and the maximum Q value reduced to the next action-state pair. Consider the case where state s is the terminal state. If s is the last step in an episode, then we cannot calculate the Q value, since we have no action to take in the terminal state. In this case, the target value will become our reward. Therefore, our loss function will look like:  We have trained our network by minimizing the loss function. However, we have seen that it is also possible to minimize the loss function by finding the optimal parameter θ. To do this, we can use the gradient descent method and find the optimal parameter θ (how can we reduce the MSE with the gradient descent?). ### Correlation between stages: Another problem with our Q-learning model concerns its training procedure. By default, it is based on a method that does not respect the i.i.d principle. The Bellman equation gives us values of Q (s, a) in direct relation to Q (s ’, a’) (we speak of bootstrapping). The concern being that between s and s, only one step has passed. This makes s and s very similar, too similar in fact. This makes their differentiation very difficult for the neural networks. So when we optimize our neural network parameters, to achieve a Q (s, a) value close to the desired result, we can quickly alter the value of Q (s ’, a’) with each iteration. This will make our training very unstable. We have an error propagation which can completely destroy our approximation of Q (s, a). There is a trick to solve this problem. We can build a new network playing the role of the target. With this, we create a copy of our network that we will use for Q (s ’, a’) in the Bellman equation. This network is synchronized with the main network. We regularly and periodically synchronize the two networks. At every N step with N that will become one of DQN's hyperparameters, often between 1k and 10k. ### The target network to the rescue Despite the steps already taken, we continue to have a little problem with our loss function. We know that the target value is the sum of the rewards plus the reduced maximum Q value at the next state-action pair. We calculate this Q value on the target and we predict the Q value using the same parameter θ. Now we have a problem since the target and predicted value both depend on the same parameter, in this case θ. This can cause instabilities when using the MSE and the networks will learn in a bad manner. It also causes a lot of discrepancy in training. How can we avoid this? It is possible to freeze the target value for a time and calculate only the predicted value. To do this, we introduce another neural network called target network to calculate the Q value of the next state-action pair. The parameter of the target network is denoted θ '. Therefore, our main Q network will calculate the predicted Q values and learn the optimal θ parameter using the gradient descent method. The target network will be put on standby for a while in order to, after a period, resume operation and update the parameter θ ' by simply copying the parameter θ from the main network. We start to freeze the target network and so on. In this case, our loss function becomes:  The Q value of the next action state is calculated by the target network with the parameter θ 'and the predicted Q value is calculated by the main network with the parameter θ. If we go back to our simplified notation, we get:  ## The Markov property applied to Deep Q Learning Our DQ-learning method uses the formalism of the Markovian decision process. Which in principle specifies that the model obeys the Markov properties: According to this, the observations of the environment are all distributed in an optimal way. That is, each observation allows us to distinguish the entirety of the states. By analyzing a single image from a video game, we cannot retrieve all of the information. For example, the speed or direction of an object will not be known. This invalidates the Markov properties. Therefore, our system, in the case of video games, is relegated to the rank of Partial Markovian or MDPS or POMDPS decision process. We speak of POMDPS when we have a model with a Markovian decision process that does not respect the Markov properties. This method appears very regularly in a real context, such as in card games where the opponent's hand is unknown. There is a way to turn a POMDPS into an MDP. ## Results After introducing so much new information and technical mathematical concepts, let us go back to the key elements for the DQN model. First, we update the general lattice parameter θ with a random value. We have learned that the target network is a simple copy of the general network. Then we update the parameter θ ' by copying the parameter θ. We also update D, our replay buffer. Now for each step in an episode we add the state of the environment in our network, and we get its outputs corresponding to the Q values for all possible actions in the state. Then we choose the action, which has the maximum Q value. If we only select the stock with the highest Q value, then we don't explore other new stocks. To avoid this, we select our stocks by adding the ϵ-greedy policy. We select our random action with an epsilon probability and with the probability ϵ-1, we select the best action with the maximum Q value. Since we update our lattice parameter θ with a random value, the action we select by taking the maximum Q value will not necessarily be the optimal action. But that's okay, we're just improving the selected action. We then go to the next state and get the reward. If the action is good then we will receive a positive reward, otherwise, it will be negative. We store this information in replay buffer D. Then, in a random manner, we create a sample of K of transitions coming from the replay buffer for which we have previously calculated the loss parameter. Our loss function is given by:  During the first iterations, the loss will be very high since our parameter θ of the network is configured randomly. To minimize the loss, we calculate the gradients of the losses and we improve our network parameter θ by following the principle of the gradient descent. We do not change the target network parameter θ' at each step. We freeze the parameter θ' for several steps and then we inject the value of θ into θ'. We repeat this process for several episodes to approximate the optimal Q value. Once the optimal Q value is found, we extract the optimal policy. The DQN process is certainly a process requiring an assimilation of all the steps that make up the method, it remains one of the most popular and effective reinforcement learning techniques. You will find it regularly in different variations during your research. Let see more : https://01codex.com/ |
| json metadata | {"tags":["ai","machine","learning","mathematics","computer","science","bigdata"],"image":["http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.39.59.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.49.16.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.52.04.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.55.13.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.55.53.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.56.38.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.57.19.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.59.32.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-15.00.53.png","http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-15.07.19.png"],"links":["https://01codex.com/"],"app":"steemit/0.2","format":"markdown"} |
| Transaction Info | Block #54193657/Trx 3fa838b26de5ccc8e098e00af2cb0c10e71eab3c |
View Raw JSON Data
{
"trx_id": "3fa838b26de5ccc8e098e00af2cb0c10e71eab3c",
"block": 54193657,
"trx_in_block": 17,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T13:10:36",
"op": [
"comment",
{
"parent_author": "",
"parent_permlink": "ai",
"author": "maxime01codex",
"permlink": "understand-the-deep-q-learning-method-an-usefull-technic-for-ai",
"title": "Understand The deep Q learning method : an usefull technic for AI",
"body": "# Understand The deep Q learning method : an usefull technic for AI\n\n## Foreword\n\nOne of the most popular models in the deep reinforcement-learning sub-branch is the algorithm called Deep Q Network or DQN. Understanding this method is extremely important. It is the basis of many deep reinforcement-learning algorithms. The DQN model was first proposed by researchers at Google DeepMind in 2013 in a paper called Playing Atari with Deep Reinforcement Learning. In it, they described the DQN architecture and explained why this method was so effective especially for Atari games.\n\nIn this period, it is no exaggeration to say that the DQN method appeared in a good time. Indeed, other methods based on the Q function had made it possible to advance in the field of reinforcement learning. However, researchers remained at an impasse. At the same time, the tabular Q-learning method was on the rise and had solved some problems regarding the accumulation of states in reinforcement problems. Despite everything, it was not very effective in the context of observation of large ensembles. Therefore, from there to evoking a solution for the resolution of video games, it was inconceivable. The complexity was too great for them. Having to read all of the pixels and their states was inconceivable. The algorithms would have had too many states to consider. Tests have shown that the available reinforcement methods did not even come close to a satisfactory solution.\n\nEspecially since in some environments the number of observations is almost endless. Quickly, it was necessary to decide on the ranges of parameters to be taken into account to distinguish the crucial states from those that are not relevant. For a video game, a single pixel will not make a difference in a game. It is therefore possible to create a larger assembly as part of the image as a state. However, even so, it is necessary to be able to distinguish areas of the screen where the action is relevant to the sequence of events. One solution in this case has been to provide both a state and an action mapped into a single value. In machine learning, we talk about a regression problem. There are several concrete ways to represent and train this type of representation.\n\nHere we will describe one of them. Because of its efficiency and its ease in spreading over different problems, the Deep Q Network has become essential for reinforcement learning.\n\n## The genesis of DQN\n\nRemember that the goal of reinforcement learning as a whole is to find the optimal policy that will give us the maximum return. In order to calculate this policy, we first start by calculating the emblematic function of the DQN method, the Q function.\n\nRecall that the function Q is the function of value and state. It indicates the value of a state-action pair. Its use allows us to use the result obtained by the agent starting from a state s and executing the action “a” following a policy π.\n\nIn the case of the DQN method, we have to calculate the set of state-action values with the Q function. However, in some cases it can be extremely long and complicated to calculate the Q-value of each action-state pair. Instead of calculating Q values iteratively, we can use one of the many approximation functions. Here in the context of the DQN, it will be with a neural network that we will do. In this way, we can then parameterize our function Q with a parameter theta and calculate the Q value with parameter theta. We just feed the state of our environment into a neural network and it will return the Q value of all possible actions from that state. Once the Q values are found, we can select the best action like the one with the maximum Q value. Since we are using a neural network to approximate the Q values, the neural network is called the Q network. Since most of the time we are dealing with a deep neural network to approximate the Q value, then our deep neural network is called a deep Q network or DQN. Now you know all about the genesis of DQN. However, at this point, many questions remain unanswered. Let us try to take it one step further.\n\n## The interactions with the environment\n\nBefore going into details about the DQN method, it is important to review the agent's interactions with its environment. We know that for the agent it is necessary to interact with the environment in order to receive rewards but also data for training. We can act randomly as is done in some cases. But in the context of a video game, for example, is it really relevant? What is the probability of winning in this scenario? It's very rare. So it will take several games before you achieve enough success. An alternative would be to use our approximate Q function as a source of behavior. We find the principle mentioned in the context of the iterative value method.\n\nIf our representation of Q is good, then the experience we get from acting on the environment will show us that the agent's data is valid for training. In a low-quality approximation, we detect it by experience. The concern here is that our agent can get caught up in bad deeds without trying to behave differently. We return to our dilemma of exploitation - exploration. It is important to give the agent the opportunity to explore the environment and build a series of transitions and actions with various outputs. Even though we should not let it act in just any manner, we are above all looking for efficiency. For example, it would be silly to reproduce actions whose sequence has already been presented and did not yield any interesting data.\n\nResearch has shown that an initially randomized system, when the approximation cannot be used, is very often an interesting alternative since it provides a basis that offers sufficient and varied interactions with the environment. Eventually, as our training system progresses, the randomized behavior becomes ineffective and we can model our approximation Q and choose what action to take. This one proposing with our training, a more serious approximation.\nA method that applies this proposition very well is the ϵ-greedy method. It will simply alternate between a random phenomenon and the policies of Q by using the hyper parameter ϵ. By varying ϵ, we choose the part of randomness in our actions. We start in practice with ϵ = 1.0, to gradually end around a value varying between 0.05 or 0.02 depending on the case. This method helps both to explore the environment at the start of the experiment, but also to maintain a good policy afterwards by switching to the Q function. There are other solutions to deal with the subject of exploration and exploitation. However, that will not be our subject here.\n\n## How to train a network in deep Q Learning ?\n\nThis is a question we can legitimately ask ourselves. Truthfully speaking, the good training of the network provides the quality of the results of the algorithm. So let us see the researchers' proposal on this subject.\n\nRecall that we run our algorithm with the network parameter θ. Its initial value is random in order to be able to start approaching the optimal Q function. Since we are in the phase of initializing the function, the result will never be optimal. We are therefore going to train the network over several iterations. We try by this principle to find the optimal parameter θ. Once the optimal parameter θ has been found, we will have the optimal Q function. Then we can extract the optimal policy from the optimal Q function.\n\nOne of the most popular solutions to find optimal θ and Q is the use of a deep neural network. We find this approach especially in the context of representation associated with images on the screen.\n\n### The training data:\n\nThe basis of Q-learning is borrowed from the supervised machine learning model. Indeed, we are trying to work with a complex nonlinear function, in our case Q with a neural network. To do this we have to calculate targets for the function using the Bellman equation to claim to have a supervised learning problem at hand. This is a good idea, but to use an optimization SGD (the little name behind this technique), our training data must be independent and identically distributed (I.I.D principle).\n\nIn our case, our data does not agree with this principle. To remedy this, we can use a buffer in which we record our past experiences and our training samples. This collection will replace the latest experiments. We are talking about the replay buffer technique. We use this buffer called replay buffer to collect the agent's experience. The replay buffer will simply serve as a collection of experiences that we set aside to use for training. From there, based on that experience, we train our network.\n\n### Replay buffer :\n\nThis tuple in our replay buffer, also called in French, experience buffer. We usually denote it with D. This information transition is what is trivially called the agent experience. The idea of using a buffer to store user experience is interesting since we train our DQN with the experience we sampled in the buffer.\n\nIn this way, we collect the agent's transition information during several episodes and we save it in the replay buffer. Transition information is stored in a stack (our replay buffer) where the newly entered data will be added to the bottom of the stack. However, this method has a disadvantage. In fact, we are going to store the experiences here one by one. From experience to experience, these will often be similar. To avoid this, we can integrate some random transition into the replay buffer before training the network.\n\nRemember that the replay buffer has a storage limit, and can therefore only keep a certain number of agent experiences. When this is filled, the new entries overwrite the old ones. The replay buffer is generally constructed like the structure of a queue. That is, so that the first entries are the first exits. Therefore, each addition after the full battery will eliminate the oldest experience and make room for the new one. At the same time, this allows the sample replay buffer to be improved. The further we go in training, the better the experiences tend to be.\n\n### Using the loss function, a great ally:\n\nIn our DQN method, we want to predict the values of Q. Now, these are continuous values. This will add complexity to the prediction. To overcome this, we use in DQN a regression task. The most popular method is the mean squared error, also noted MSE. It will come to play the role of loss function during the regression. The principle of the MSE can be translated as the squared average of the difference between the target value and the predicted value, we note that as follows:\n\n\n\nWhere y plays the role of target value, y \" of the predicted value and K the number of training samples.\n\nOur goal is to train our network and try to minimize the MSE between the target Q value and the predicted Q value as much as possible. Obviously, the goal is to get the optimal Q value, which also comes down to minimizing error. Since the difference between the target Q value and the current Q value tends towards 0 as one approaches the optimal Q value. We use the Bellman equation for this. You will find an article covering the concept of this equation here. We know that the optimal Q value can be obtained using the Bellman Optimal equation:\n\n\n\nWhere R (s, a, s ’) represents the immediate reward r, obtained by performing an action in state s leading to state s’. It is therefore possible to replace R (s, a, s ’) simply by r.\n\nIn our equation, we can also remove the expected factor E. Indeed, we will approximate this factor by taking a sample of K transitions from the replay buffer and recovering an average value. Thus according to the optimal Bellman equation, the optimal value Q is the sum of the rewards to which we add the maximum value Q reduced to the next action-state pair:\n\n\n\nWe can also define our loss as the difference between the target value (the optimal Q value) and the predicted value (the Q value predicted by DQN). The loss function will then be expressed:\n\n\n\nBy substituting the above equation for the previous one, we get this simplified formula:\n\n\n\nWe calculated the predicted Q-value using the network parameter θ. Now let's see how to calculate the target value. We have seen that it is the sum of the rewards to which we add the maximum Q value reduced to the next action-state pair.\n\nSimilar to the predicted Q-value, we can calculate the Q-value of the next action-state pair by using the same network parameter, θ. Indeed, notice in our equation that we have, the two values Q parameterized by θ.\n\nInstead of calculating the loss as just the difference between the target Q value and the predicted Q value, we use the MSE method as the loss function. Remember that we have our experiences stored in the replay buffer. In addition, we have a small part of our randomized sample. We then train the network and try to minimize the MSE. We can then translate our loss function as follows:\n\n\n\nWe have seen that the target value is simply the sum of the rewards and the maximum Q value reduced to the next action-state pair. Consider the case where state s is the terminal state. If s is the last step in an episode, then we cannot calculate the Q value, since we have no action to take in the terminal state. In this case, the target value will become our reward. Therefore, our loss function will look like:\n\n\n\nWe have trained our network by minimizing the loss function. However, we have seen that it is also possible to minimize the loss function by finding the optimal parameter θ. To do this, we can use the gradient descent method and find the optimal parameter θ (how can we reduce the MSE with the gradient descent?).\n\n\n### Correlation between stages:\n\nAnother problem with our Q-learning model concerns its training procedure. By default, it is based on a method that does not respect the i.i.d principle. The Bellman equation gives us values of Q (s, a) in direct relation to Q (s ’, a’) (we speak of bootstrapping). The concern being that between s and s, only one step has passed. This makes s and s very similar, too similar in fact. This makes their differentiation very difficult for the neural networks. So when we optimize our neural network parameters, to achieve a Q (s, a) value close to the desired result, we can quickly alter the value of Q (s ’, a’) with each iteration. This will make our training very unstable. We have an error propagation which can completely destroy our approximation of Q (s, a).\n\nThere is a trick to solve this problem. We can build a new network playing the role of the target. With this, we create a copy of our network that we will use for Q (s ’, a’) in the Bellman equation. This network is synchronized with the main network. We regularly and periodically synchronize the two networks. At every N step with N that will become one of DQN's hyperparameters, often between 1k and 10k.\n\n### The target network to the rescue\n\nDespite the steps already taken, we continue to have a little problem with our loss function. We know that the target value is the sum of the rewards plus the reduced maximum Q value at the next state-action pair. We calculate this Q value on the target and we predict the Q value using the same parameter θ. Now we have a problem since the target and predicted value both depend on the same parameter, in this case θ. This can cause instabilities when using the MSE and the networks will learn in a bad manner. It also causes a lot of discrepancy in training.\n\nHow can we avoid this? It is possible to freeze the target value for a time and calculate only the predicted value. To do this, we introduce another neural network called target network to calculate the Q value of the next state-action pair. The parameter of the target network is denoted θ '. Therefore, our main Q network will calculate the predicted Q values and learn the optimal θ parameter using the gradient descent method. The target network will be put on standby for a while in order to, after a period, resume operation and update the parameter θ ' by simply copying the parameter θ from the main network. We start to freeze the target network and so on. In this case, our loss function becomes:\n\n\n\nThe Q value of the next action state is calculated by the target network with the parameter θ 'and the predicted Q value is calculated by the main network with the parameter θ. If we go back to our simplified notation, we get:\n\n\n\n## The Markov property applied to Deep Q Learning\n\nOur DQ-learning method uses the formalism of the Markovian decision process. Which in principle specifies that the model obeys the Markov properties: According to this, the observations of the environment are all distributed in an optimal way. That is, each observation allows us to distinguish the entirety of the states. By analyzing a single image from a video game, we cannot retrieve all of the information. For example, the speed or direction of an object will not be known. This invalidates the Markov properties. Therefore, our system, in the case of video games, is relegated to the rank of Partial Markovian or MDPS or POMDPS decision process. We speak of POMDPS when we have a model with a Markovian decision process that does not respect the Markov properties. This method appears very regularly in a real context, such as in card games where the opponent's hand is unknown. There is a way to turn a POMDPS into an MDP.\n\n## Results\n\nAfter introducing so much new information and technical mathematical concepts, let us go back to the key elements for the DQN model.\n\nFirst, we update the general lattice parameter θ with a random value. We have learned that the target network is a simple copy of the general network. Then we update the parameter θ ' by copying the parameter θ. We also update D, our replay buffer.\n\nNow for each step in an episode we add the state of the environment in our network, and we get its outputs corresponding to the Q values for all possible actions in the state. Then we choose the action, which has the maximum Q value.\n\nIf we only select the stock with the highest Q value, then we don't explore other new stocks. To avoid this, we select our stocks by adding the ϵ-greedy policy. We select our random action with an epsilon probability and with the probability ϵ-1, we select the best action with the maximum Q value.\n\nSince we update our lattice parameter θ with a random value, the action we select by taking the maximum Q value will not necessarily be the optimal action. But that's okay, we're just improving the selected action. We then go to the next state and get the reward. If the action is good then we will receive a positive reward, otherwise, it will be negative. We store this information in replay buffer D.\n\nThen, in a random manner, we create a sample of K of transitions coming from the replay buffer for which we have previously calculated the loss parameter. Our loss function is given by:\n\n\n\nDuring the first iterations, the loss will be very high since our parameter θ of the network is configured randomly. To minimize the loss, we calculate the gradients of the losses and we improve our network parameter θ by following the principle of the gradient descent.\n\nWe do not change the target network parameter θ' at each step. We freeze the parameter θ' for several steps and then we inject the value of θ into θ'. We repeat this process for several episodes to approximate the optimal Q value. Once the optimal Q value is found, we extract the optimal policy.\n\nThe DQN process is certainly a process requiring an assimilation of all the steps that make up the method, it remains one of the most popular and effective reinforcement learning techniques. You will find it regularly in different variations during your research.\n\nLet see more : https://01codex.com/",
"json_metadata": "{\"tags\":[\"ai\",\"machine\",\"learning\",\"mathematics\",\"computer\",\"science\",\"bigdata\"],\"image\":[\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.39.59.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.49.16.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.52.04.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.55.13.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.55.53.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.56.38.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.57.19.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-14.59.32.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-15.00.53.png\",\"http://01codex.com/wp-content/uploads/2021/05/Capture-decran-2021-05-30-a-15.07.19.png\"],\"links\":[\"https://01codex.com/\"],\"app\":\"steemit/0.2\",\"format\":\"markdown\"}"
}
]
}maxime01codexcustom json: community2021/05/30 08:57:06
maxime01codexcustom json: community
2021/05/30 08:57:06
| required auths | [] |
| required posting auths | ["maxime01codex"] |
| id | community |
| json | ["subscribe",{"community":"hive-174578"}] |
| Transaction Info | Block #54188625/Trx 6dc8b726af92b47014df1e900c1f35761cb849cb |
View Raw JSON Data
{
"trx_id": "6dc8b726af92b47014df1e900c1f35761cb849cb",
"block": 54188625,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T08:57:06",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"maxime01codex"
],
"id": "community",
"json": "[\"subscribe\",{\"community\":\"hive-174578\"}]"
}
]
}maxime01codexcustom json: community2021/05/30 08:56:51
maxime01codexcustom json: community
2021/05/30 08:56:51
| required auths | [] |
| required posting auths | ["maxime01codex"] |
| id | community |
| json | ["subscribe",{"community":"hive-111825"}] |
| Transaction Info | Block #54188620/Trx 82ae4096d41f5d7bd43e165826d0cd6cbe9d9453 |
View Raw JSON Data
{
"trx_id": "82ae4096d41f5d7bd43e165826d0cd6cbe9d9453",
"block": 54188620,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T08:56:51",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"maxime01codex"
],
"id": "community",
"json": "[\"subscribe\",{\"community\":\"hive-111825\"}]"
}
]
}maxime01codexcustom json: community2021/05/30 08:56:09
maxime01codexcustom json: community
2021/05/30 08:56:09
| required auths | [] |
| required posting auths | ["maxime01codex"] |
| id | community |
| json | ["subscribe",{"community":"hive-163521"}] |
| Transaction Info | Block #54188606/Trx d259606cdae83dc35af4d46580928c96317c4d0b |
View Raw JSON Data
{
"trx_id": "d259606cdae83dc35af4d46580928c96317c4d0b",
"block": 54188606,
"trx_in_block": 3,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T08:56:09",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"maxime01codex"
],
"id": "community",
"json": "[\"subscribe\",{\"community\":\"hive-163521\"}]"
}
]
}maxime01codexcustom json: community2021/05/30 08:55:21
maxime01codexcustom json: community
2021/05/30 08:55:21
| required auths | [] |
| required posting auths | ["maxime01codex"] |
| id | community |
| json | ["subscribe",{"community":"hive-152587"}] |
| Transaction Info | Block #54188590/Trx 101d2c5276eaeb5528bf6d14fd6767bb70e3d032 |
View Raw JSON Data
{
"trx_id": "101d2c5276eaeb5528bf6d14fd6767bb70e3d032",
"block": 54188590,
"trx_in_block": 0,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T08:55:21",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"maxime01codex"
],
"id": "community",
"json": "[\"subscribe\",{\"community\":\"hive-152587\"}]"
}
]
}maxime01codexcustom json: community2021/05/30 08:54:39
maxime01codexcustom json: community
2021/05/30 08:54:39
| required auths | [] |
| required posting auths | ["maxime01codex"] |
| id | community |
| json | ["subscribe",{"community":"hive-175254"}] |
| Transaction Info | Block #54188576/Trx b1e4a4de2fda5608cac15d07f388a2f1645b5ff6 |
View Raw JSON Data
{
"trx_id": "b1e4a4de2fda5608cac15d07f388a2f1645b5ff6",
"block": 54188576,
"trx_in_block": 9,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T08:54:39",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"maxime01codex"
],
"id": "community",
"json": "[\"subscribe\",{\"community\":\"hive-175254\"}]"
}
]
}maxime01codexcustom json: community2021/05/30 08:54:27
maxime01codexcustom json: community
2021/05/30 08:54:27
| required auths | [] |
| required posting auths | ["maxime01codex"] |
| id | community |
| json | ["subscribe",{"community":"hive-184365"}] |
| Transaction Info | Block #54188573/Trx 640c1a9ef0be1fc4b39a77ce1f67fca17f80527e |
View Raw JSON Data
{
"trx_id": "640c1a9ef0be1fc4b39a77ce1f67fca17f80527e",
"block": 54188573,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-30T08:54:27",
"op": [
"custom_json",
{
"required_auths": [],
"required_posting_auths": [
"maxime01codex"
],
"id": "community",
"json": "[\"subscribe\",{\"community\":\"hive-184365\"}]"
}
]
}steemdelegated 17.289 SP to @maxime01codex2021/05/29 19:57:42
steemdelegated 17.289 SP to @maxime01codex
2021/05/29 19:57:42
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 28152.675294 VESTS |
| Transaction Info | Block #54173151/Trx 4f644fada189096737c4385042d1798f898812d7 |
View Raw JSON Data
{
"trx_id": "4f644fada189096737c4385042d1798f898812d7",
"block": 54173151,
"trx_in_block": 4,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-29T19:57:42",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "28152.675294 VESTS"
}
]
}executive-boardsent 0.001 STEEM to @maxime01codex- "❗ Hello maxime01codex, welcome to the STEEM ecosystem. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow t..."2021/05/29 19:26:27
executive-boardsent 0.001 STEEM to @maxime01codex- "❗ Hello maxime01codex, welcome to the STEEM ecosystem. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow t..."
2021/05/29 19:26:27
| from | executive-board |
| to | maxime01codex |
| amount | 0.001 STEEM |
| memo | ❗ Hello maxime01codex, welcome to the STEEM ecosystem. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow the instructions. THE 1000X BOOSTER KEY is already waiting for you over there too. 😉 Warm regards, The Executive Board. |
| Transaction Info | Block #54172531/Trx db3a7c11410bca2ddec9034b04d760ece4d08387 |
View Raw JSON Data
{
"trx_id": "db3a7c11410bca2ddec9034b04d760ece4d08387",
"block": 54172531,
"trx_in_block": 22,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-29T19:26:27",
"op": [
"transfer",
{
"from": "executive-board",
"to": "maxime01codex",
"amount": "0.001 STEEM",
"memo": "❗ Hello maxime01codex, welcome to the STEEM ecosystem. The Executive Board is publishing insider infos at https://discord.gg/KyBbmhh on how you will be earning the most coins. It's easy, just follow the instructions. THE 1000X BOOSTER KEY is already waiting for you over there too. 😉 Warm regards, The Executive Board."
}
]
}steemdelegated 18.607 SP to @maxime01codex2021/05/29 19:24:57
steemdelegated 18.607 SP to @maxime01codex
2021/05/29 19:24:57
| delegator | steem |
| delegatee | maxime01codex |
| vesting shares | 30300.000000 VESTS |
| Transaction Info | Block #54172501/Trx 27f281b6503cc5556bcac0fc6e4dc375855d1004 |
View Raw JSON Data
{
"trx_id": "27f281b6503cc5556bcac0fc6e4dc375855d1004",
"block": 54172501,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-29T19:24:57",
"op": [
"delegate_vesting_shares",
{
"delegator": "steem",
"delegatee": "maxime01codex",
"vesting_shares": "30300.000000 VESTS"
}
]
}steemcreated a new account: @maxime01codex2021/05/29 19:24:57
steemcreated a new account: @maxime01codex
2021/05/29 19:24:57
| creator | steem |
| new account name | maxime01codex |
| owner | {"weight_threshold":1,"account_auths":[],"key_auths":[["STM7Fz6CW9hq6x9TFuhuJE4FqBLg2fZnsdptmg1q5MG7FRZecDQAH",1]]} |
| active | {"weight_threshold":1,"account_auths":[],"key_auths":[["STM5GA5P5kTv84G9tJxApqQAvERQK1F273J5mnTRe9ZjzSEF1BeAL",1]]} |
| posting | {"weight_threshold":1,"account_auths":[],"key_auths":[["STM5krArJkr1pyWZDaDxPzQRS5DEEK1whk9XuoEJ3NH9oRA2dPUtj",1]]} |
| memo key | STM7dNy3SstP2SdJJMnFX3ugTmCX3FeapreuTdBNDLyJmjTRNPJW4 |
| json metadata | {} |
| extensions | [] |
| Transaction Info | Block #54172501/Trx 27f281b6503cc5556bcac0fc6e4dc375855d1004 |
View Raw JSON Data
{
"trx_id": "27f281b6503cc5556bcac0fc6e4dc375855d1004",
"block": 54172501,
"trx_in_block": 10,
"op_in_trx": 0,
"virtual_op": 0,
"timestamp": "2021-05-29T19:24:57",
"op": [
"create_claimed_account",
{
"creator": "steem",
"new_account_name": "maxime01codex",
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM7Fz6CW9hq6x9TFuhuJE4FqBLg2fZnsdptmg1q5MG7FRZecDQAH",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5GA5P5kTv84G9tJxApqQAvERQK1F273J5mnTRe9ZjzSEF1BeAL",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5krArJkr1pyWZDaDxPzQRS5DEEK1whk9XuoEJ3NH9oRA2dPUtj",
1
]
]
},
"memo_key": "STM7dNy3SstP2SdJJMnFX3ugTmCX3FeapreuTdBNDLyJmjTRNPJW4",
"json_metadata": "{}",
"extensions": []
}
]
}Manabar
Voting Power100.00%
Downvote Power100.00%
Resource Credits100.00%
Reputation Progress0.00%
{
"voting_manabar": {
"current_mana": "5472996220",
"last_update_time": 1769186427
},
"downvote_manabar": {
"current_mana": 1368249055,
"last_update_time": 1769186427
},
"rc_account": {
"account": "maxime01codex",
"rc_manabar": {
"current_mana": "11267758577",
"last_update_time": 1769186427
},
"max_rc_creation_adjustment": {
"amount": "5630543160",
"precision": 6,
"nai": "@@000000037"
},
"max_rc": "11103539380"
}
}Account Metadata
| POSTING JSON METADATA | |
| None | |
| JSON METADATA | |
| None |
{
"posting_json_metadata": {},
"json_metadata": {}
}Auth Keys
Owner
Single Signature
Public Keys
STM7Fz6CW9hq6x9TFuhuJE4FqBLg2fZnsdptmg1q5MG7FRZecDQAH1/1
Active
Single Signature
Public Keys
STM5GA5P5kTv84G9tJxApqQAvERQK1F273J5mnTRe9ZjzSEF1BeAL1/1
Posting
Single Signature
Public Keys
STM5krArJkr1pyWZDaDxPzQRS5DEEK1whk9XuoEJ3NH9oRA2dPUtj1/1
Memo
STM7dNy3SstP2SdJJMnFX3ugTmCX3FeapreuTdBNDLyJmjTRNPJW4
{
"owner": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM7Fz6CW9hq6x9TFuhuJE4FqBLg2fZnsdptmg1q5MG7FRZecDQAH",
1
]
]
},
"active": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5GA5P5kTv84G9tJxApqQAvERQK1F273J5mnTRe9ZjzSEF1BeAL",
1
]
]
},
"posting": {
"weight_threshold": 1,
"account_auths": [],
"key_auths": [
[
"STM5krArJkr1pyWZDaDxPzQRS5DEEK1whk9XuoEJ3NH9oRA2dPUtj",
1
]
]
},
"memo": "STM7dNy3SstP2SdJJMnFX3ugTmCX3FeapreuTdBNDLyJmjTRNPJW4"
}Witness Votes
0 / 30
No active witness votes.
[]