algorithmia
: R interface to the Algorithmia API
The following functions are implemented:
algo_api_key
: Get or set ALGORITHMIA_API_KEY valuealgo_call
: Call an Algorithmia algorithmalgo_client
: Initialize a new Algorithmia API client callalgo_dir_exists
: Test if a directory existsalgo_dir_list
: List a directory accessible by the Algorithmia servicealgo_download_file
: Read a file from a URI accessible by the Algorithmia service & write to diskalgo_file_exists
: Test if a file existsalgo_options
: Set options for an algorithm callalgo_pipe
: Execute an Algorithmia algorithm callalgo_read_file
: Read a file from a URI accessible by the Algorithmia service
- Finish file & dir functions
- Wrap things with
purrr::safely()
- Craft something elegant for
output=void
option - Test with more gnarly endpoints (somewhat done)
- Finish documentation (nearly done)
devtools::install_github("hrbrmstr/algorithmia")
library(algorithmia)
# current verison
packageVersion("algorithmia")
## [1] '0.1.0'
library(algorithmia)
library(testthat)
library(magrittr)
library(dplyr)
date()
## [1] "Sat Jul 23 18:32:40 2016"
algo_client() %>%
algo_call("demo", "Hello", "0.1.1") %>%
algo_options(30) %>%
algo_pipe("there", "text")
## [1] "Hello there"
# Have to provide some assistance to `httr` if the input is not a named list
# and the content type is set to "json"
algo_client() %>%
algo_call("demo", "Hello", "0.1.1") %>%
algo_options(30) %>%
algo_pipe('"there"', "json")
## [1] "Hello \"there\""
algo_client() %>%
algo_dir_exists("s3://public-r-data/")
## [1] TRUE
algo_client() %>%
algo_dir_list("s3://public-r-data/")
## Files:
##
## ghcran.Rdata 2888226 2016-07-21T00:09:58.000Z
## ghcran.json 1809154 2016-07-21T00:10:00.000Z
algo_client() %>%
algo_file_exists("s3://public-r-data/ghcran.json")
## [1] TRUE
algo_client() %>%
algo_read_file("s3://public-r-data/ghcran.json", fmt="parsed") -> cran
str(cran[[1]])
## List of 20
## $ Package : chr "abbyyR"
## $ Title : chr "Access to Abbyy Optical Character Recognition (OCR) API"
## $ Version : chr "0.5.0"
## $ Author : chr "Gaurav Sood [aut, cre]"
## $ Maintainer : chr "Gaurav Sood <gsood07@gmail.com>"
## $ Description : chr "Get text from images of text using Abbyy Cloud Optical Character\nRecognition (OCR) API. Easily OCR images, barcodes, forms, do"| __truncated__
## $ License : chr "MIT + file LICENSE"
## $ Depends : chr "R (>= 3.2.0)"
## $ Suggests : chr "testthat, rmarkdown, knitr (>= 1.11)"
## $ NeedsCompilation: chr "no"
## $ Packaged : chr "2016-06-20 13:01:38 UTC; gsood"
## $ Repository : chr "CRAN"
## $ Date/Publication: chr "2016-06-20 17:32:00"
## $ Authors@R : chr "person(\"Gaurav\", \"Sood\", email = \"gsood07@gmail.com\", role = c(\"aut\", \"cre\"))"
## $ URL : chr "http://github.com/soodoku/abbyyR"
## $ BugReports : chr "http://github.com/soodoku/abbyyR/issues"
## $ LazyData : chr "true"
## $ VignetteBuilder : chr "knitr"
## $ Imports : chr "httr, XML, curl, readr, progress"
## $ RoxygenNote : chr "5.0.1"
txt <- "A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party is still required to prevent double-spending. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work. The longest chain not only serves as proof of the sequence of events witnessed, but proof that it came from the largest pool of CPU power. As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers. The network itself requires minimal structure. Messages are broadcast on a best effort basis, and nodes can leave and rejoin the network at will, accepting the longest proof-of-work chain as proof of what happened while they were gone."
algo_client() %>%
algo_call("nlp", "Summarizer", "0.1.3") %>%
algo_pipe(txt, "text")
## [1] "A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. We propose a solution to the double-spending problem using a peer-to-peer network. The network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof-of-work."
URL <- 'rud.is/b/2016/07/12/slaying-cidr-orcs-with-triebeard-a-k-a-fast-trie-based-ipv4-in-cidr-lookups-in-r/'
algo_client() %>%
algo_call("util", "Html2Text", "0.1.4") %>%
algo_pipe(URL, "text")
## [1] "Email Address The insanely productive elf-lord, @quominus put together a small package () that exposes an API for radix/prefix tries at both the R and Rcpp levels. I know he had some personal needs for this and we both kinda need these to augment some functions in our package. Despite having both a vignette and function-level examples, I thought it might be good to show a real-world use of the package (at least in the cyber real world): fast determination of which autonomous system an IPv4 address is in (if it’s in one at all). I’m not going to delve to deep into routing (you can find a good primer here and one that puts routing in the context of radix tries here) but there exists, essentially, abbreviated tables of which IP addresses belong to a particular network. These tables are in routers on your local networks and across the internet. Groups of these networks (on the internet) are composed into those autonomous systems I mentioned earlier and these tables are used to get the packets that make up the cat videos you watch routed to you as efficiently as possible. When dealing with cybersecurity data science, it’s often useful to know which autonomous system an IP address belongs in. The world is indeed full of peril and in it there are many dark places. It’s a dangerous business, going out on the internet and we sometimes find it possible to identify unusually malicious autonomous systems by looking up suspicious IP addresses en masse. These mappings look something like this: Each CIDR has a start and end IP address which can ultimately be converted to integers. Now, one could just sequentially compare start and end ranges to see which CIDR an IP address belongs in, but there are (as of the day of this post) CIDRs to compare against, which—in the worst case—would mean having to traverse through the entire list to find the match (or discover there is no match). There are some trivial ways to slightly optimize this, but the search times could still be fairly long, especially when you’re trying to match a billion IPv4 addresses to ASNs. By storing the CIDR mask (the number of bits of the leading IP address specified after the ) in binary form (strings of 1’s and 0’s) as keys for the trie, we get much faster lookups (only a few comparisons at worst-case vs 647,563). I made an initial, naïve, mostly straight R, implementation as a precursor to a more low-level implementation in Rcpp in our package and to illustrate this use of the package. One thing we’ll need is a function to convert an IPv4 address (in long integer form) into a binary character string. We could do this with base R, but it’ll be super-slow and it doesn’t take much effort to create it with an Rcpp inline function: We take a vector from R and use some C++ standard library functions to convert them to bits. I vectorized this in C++ for speed (which is just a fancy way to say I used a loop). In this case, our short cut will not make for a long delay. Now, we’ll need a CIDR file. There are historical ones avaialble, and I use one that I generated the day of this post (and, referenced in the code block below). You can use to make new ones daily (relegating mindless, automated, menial data retrieval tasks to the python goblins, like one should). You can save off that to an R data file to pull in later (but it’s pretty fast to regenerate). Now, we create the trie, using the prefix we calculated and a value we’ll piece together for this example: Yep, that’s it. If you ran this yourself, it should have taken less than 2s on most modern systems to create the nigh 700,000 element trie. Now, we’ll generate a million random IP addresses and look them up: On most modern systems, that should have taken less than 3s. The values are not busted lookups. Many IP networks are assigned but not accessible (see this for more info). You can validate this with on your own, too). The trie structure for these CIDRs takes up approximately 9MB of RAM, a small price to pay for speedy lookups (and, memory really is not what the heart desires, anyway). Hopefully the package will help you speed up your own lookups and stay-tuned for a new version of with some new and enhanced functions. Pingback: Slaying CIDR Orcs with Triebeard (a.k.a. fast trie-based ‘IPv4-in-CIDR’ lookups in R) – sec.uno Pingback: Slaying CIDR Orcs with Triebeard (a.k.a. fast trie-based ‘IPv4-in-CIDR’ lookups in R) – Mubashir Qasim"
bits <- list("This is a test of what this is. Hopefully this is going to work well as a test.", 2, 5, FALSE, TRUE)
out <- algo_client() %>%
algo_call("WebPredict", "GetNGramFrequencies", "0.1.1") %>%
algo_pipe(bits, "json")
bind_rows(out$result)
## # A tibble: 5 x 2
## ngram frequency
## <chr> <int>
## 1 this is 2
## 2 a test 2
## 3 to work 1
## 4 is going 1
## 5 well as 1
algo_client() %>%
algo_call("TimeSeries", "TimeSeriesSummary", "0.1.2") %>%
algo_pipe(list(uniformData=as.double(USAccDeaths)), "json")
## $max
## [1] 11317
##
## $var
## [1] 917290.1
##
## $geometricMean
## [1] 8737.949
##
## $populationVariance
## [1] 904549.9
##
## $slope
## [1] -8.428404
##
## $kurtosis
## [1] -0.1335658
##
## $min
## [1] 6892
##
## $correlation
## [1] -0.1841743
##
## $intercept
## [1] 9088
##
## $mean
## [1] 8788.792
##
## $rmse
## [1] 934.8088
##
## $skewness
## [1] 0.3504949
##
## $standardDeviation
## [1] 957.7526
# matches the `base::svd()` example
hilbert <- function(n) { i <- 1:n; 1 / outer(i - 1, i, "+") }
X <- hilbert(9)[, 1:6]
algo_client() %>%
algo_call("joannetang", "SVD", "0.1.0") %>%
algo_pipe(X, "json") -> svd_out
matrix(unlist(svd_out$result$U), ncol=6, byrow=TRUE)
## [,1] [,2] [,3] [,4] [,5] [,6]
## [1,] 0.7244920 -0.6266306 0.2732317 -0.08577864 0.001069589 0.005814147
## [2,] 0.4281539 0.1299407 -0.6422804 0.55210058 0.009784970 -0.070549876
## [3,] 0.3121935 0.2805368 -0.3365161 -0.30970809 -0.157559047 0.263213373
## [4,] 0.2479045 0.3142639 -0.0695403 -0.46737750 0.239747180 -0.504737630
## [5,] 0.2063934 0.3141224 0.1068881 -0.29303908 0.412668175 0.392215278
## [6,] 0.1771639 0.3025948 0.2209075 -0.06413692 -0.485546189 0.241951929
## [7,] 0.1553568 0.2875511 0.2937597 0.10549724 -0.585210418 -0.244318766
## [8,] 0.1384165 0.2720500 0.3384293 0.28031300 0.290907623 -0.486032867
## [9,] 0.1248757 0.2570089 0.3656324 0.44019956 0.290604446 0.403304338