Friday, November 21, 2008

Innovation: Aritificial Intelligence


Artificial Intelligence

It is the branch of computer science concerned with making computers behave like humans.Artificial intelligence includes.
Games playing: Programming computers to play games such as chess and checkers.
Expert systems : Programming computers to make decisions in real-life situations (for example,some expert systems help doctors diagnose diseases based on symptoms).
Natural Language : Programming computers to understand natural human languages
Neural Networks : Systems that simulate intelligence by attempting to reproduce the types of physical connections that occur in animal brains.
Robotics :Programming computers to see and hear and react to other sensory stimuli.

Example: Voice recognition and natural-language processing.


There are several programming languages that are known as Artificial Intelligence(AI) languages because they are used almost exclusively for AI applications. The two most common are LISP and Prolog.


ASIMO uses sensors and intelligent algorithms

to avoid obstacles and navigate stairs.

At first robots were used impersonally, in factories where they helped build automobiles, for instance. Then they were used in offices to deliver mail, or to show visitors around museums, or in homes as vacuum cleaners. Apart from this, AI must be utilized to understand human feelings , human appearance and we should be able to treat them just like us since, they will be able to make decisions and interpret them.

Robotics

The field of computer science and engineering concerned with creating robots, devices that can move and react to sensory input. Robotics is one branch ofartificial intelligence.

Robots are now widely used in factories to perform high-precision jobs such as welding and riveting. They are also used in special situations that would be dangerous for humans -- for example, in cleaning toxic wastes or defusing bombs.

Although great advances have been made in the field of robotics during the last decade, robots are still not very useful in everyday life, as they are too clumsy to perform ordinary household chores.

The term robotics was introduced by writer Isaac Asimov. In his science fiction book I, Robot,published in 1950, he presented three laws of robotics:

1. A robot may not injure a human being, or, through inaction, allow a human being to come to harm.

2. A robot must obey the orders given it by human beings except where such orders would conflict with the First Law.

3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.

Questions

Q. How is AI research done?

A. AI research has both theoretical and experimental sides. The experimental side has both basic and applied aspects.

There are two main lines of research. One is biological, based on the idea that since humans are intelligent, AI should study humans and imitate their psychology or physiology. The other is phenomenal, based on studying and formalizing common sense facts about the world and the problems that the world presents to the achievement of goals. The two approaches interact to some extent, and both should eventually succeed. It is a race, but both racers seem to be walking.

Q. What are the relations between AI and philosophy?

A. AI has many relations with philosophy, especially modern analytic philosophy. Both study mind, and both study common sense. The best reference is [Tho03].

Q. How are AI and logic programming related?

A. At the very least, logic programming provides useful programming languages (mainly Prolog).

Beyond that, sometimes a theory useful in AI can be expressed as a collection of Horn clauses, and goal to be achieved can be expressed as that of finding values of variables satisfying an expression. The problem can sometimes be solved by running the Prolog program consisting of and .

There are two possible obstacles to regarding AI as logic programming. First, Horn theories do not exhaust first order logic. Second, the Prolog program expressing the theory may be extremely inefficient. More elaborate control than just executing the program that expresses the theory is often needed. Map coloring provides examples.

Q. What should I study before or while learning AI?

A. Study mathematics, especially mathematical logic. The more you learn about sciences, e.g. physics or biology, the better. For the biological approaches to AI, study psychology and the physiology of the nervous system. Learn some programming languages--at least C, Lisp and Prolog. It is also a good idea to learn one basic machine language. Jobs are likely to depend on knowing the languages currently in fashion. In the late 1990s, these include C++ and Java.

Q. What is a good textbook on AI?

A. Artificial Intelligence by Stuart Russell and Peter Norvig, Prentice Hall is the most commonly used textbbook in 1997. The general views expressed there do not exactly correspond to those of this essay. Artificial Intelligence: A New Synthesis by Nils Nilsson, Morgan Kaufman, may be easier to read. Some people prefer Computational Intelligence by David Poole, Alan Mackworth and Randy Goebel, Oxford, 1998.

Q. What organizations and publications are concerned with AI?

A. The American Association for Artificial Intelligence (AAAI), the European Coordinating Committee for Artificial Intelligence (ECCAI) and the Society for Artificial Intelligence and Simulation of Behavior (AISB) are scientific societies concerned with AI research. The Association for Computing Machinery (ACM) has a special interest group on artificial intelligence SIGART.

Applications...

The potential applications of Artificial Intelligence are abundant. They stretch from the military for autonomous control and target identification, to the entertainment industry for computer games and robotic pets. Lets also not forget big establishments dealing with huge amounts of information such as hospitals, banks and insurances, who can use AI to predict customer behaviour and detect trends.As you may expect, the business of Artificial Intelligence is becoming one of the major driving forces for research. With an ever growing market to satisfy, there's plenty of room for more personel. So if you know what you're doing, there's plenty of money to be made from interested big companies!


Thursday, November 20, 2008

Innovation: Security Tools

Computer security is a branch of technology known as information security as applied to computers. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy.

Security Tools: These are programs which facilitate security for computers by checking and monitoring incoming/ outgoing network traffic and data. Today, anything transferred as data through network or any other media can be harmful unless they are checked by security tools. Security tools can also help in securing remote logons. Some of the commonly used security tools are:

SSH: A secure way to access remote computers.

SSH (Secure Shell) is the now ubiquitous program for logging into or executing commands on a remote machine. It provides secure encrypted communications between two untrusted hosts over an insecure network, replacing the hideously insecure telnet/rlogin/rsh alternatives. Most UNIX users run the open source OpenSSH server and client. Windows users often prefer the free PuTTY client, which is also available for many mobile devices.Dozens of other free and proprietary clients exist. 

Firewalls: A firewall is a hardware or software solution that controls connectivity between one part of a network and another part, also Firewall can scan incoming/outgoing port requests and IP Address requests based on the configuration done.

Example: Zone Alarm PRO Firewall

Antivirus: It is a software which can scan all incoming and outgoing data from the System and they should be regularly updated so that they can deal with latest threats. Some anti-viruses have built in firewalls, which can secure the system.

Example: MacAfe ,Norton, N32 etc.,

  Security Innovation focuses on the most difficult problems of IT security - those at the application layer. Exploitability of applications due to poor design has reached epidemic levels and perimeter/network defenses are not enough to protect your business. 

  •   Use of biometric devices and neural networks.
  •   Increased ciphering-
  •   Improving Antivirus techniques.

 

Innovation: System Virtualization


System Virtualization:

  Virtualization refers to the use of software to allow system hardware to run multiple instances of different operating systems concurrently, allowing you to run different applications requiring different operating systems on one computer system. The operating systems do not interfere with each other or the various applications. Not to be confused with operating system-level virtualization, which is a type of server virtualization.

Operating system-level virtualization is commonly used in virtual hosting environments, where it is useful for securely allocating finite hardware resources amongst a large number of mutually-distrusting users. It is also used, to a lesser extent, for consolidating server hardware by moving services on separate hosts into containers on the one server.

In simple words,Virtualization of a system is One single system made to virtualize multiple systems and users with  multiple operating systems. ex: Having an FTP server,SMTP server,DHCP simulated on different systems as one system.

Softwares: VMware,Microsoft Virtual PC.

Innovation and System Virtualization: In virtualization if there is an overload or monitoring to be done or if main system goes wrong,the entire Virtualized environment will be collapsed. But to become a self-healing system a system has to know that there are issues which can have an impact on its availability. This can only be done by monitoring the health of the system.

Developing self monitoring/healing load balancing and regular backups,and interexchangeability of data between systems.

Innovation: Information Integrity


Information Integrity
Information Integrity is the trust worthiness and dependability of information. More specifically, it is the accuracy, consistency and reliability of the information content, processes and systems.

A majority of companies today are totally dependent on their information assets, in most cases stored, processed and communicated within information systems in digital format. These information systems are enabled by modern information and communication technologies.

  It is very important that Information must not be disclosed.In Systems This can be done by proper ciphering,Encrypting,Archiving.Various techniques used should meet the requirements to maintain integrity of information.

 Information integrity policies are traditionally enforced by access control mechanisms that prevent unauthorized users from modify- ing data. However, access control does not provide end-to-end assurance of integrity. For that reason, integrity guarantees in the form of non interference assertions have been proposed. Despite the appeals of such information-flow based approaches to integrity, that solution is also un-satisfactory because it leads to a weaker notion of integrity than needed in practice. 

The information flows in the form of Centralised , Decentralised way of networking of systems.

Integrity to mean that data is:

precise

accurate

unmodified

consistent

modified only in acceptable ways

modified only by authorized people

modified only by authorized processes

meaningful and correct

Innovation in Information Integrity:

Being loyal to the people(in case of advertisements) can improve integrity.Providing a better satisfaction to customer thus increasing integrity.Making information simple and precise can be innovations to information integrity.