Skip to main content

Who has the best AI wins the games.

 Who has the best AI wins the games. 


The term artificial intelligence or AI means computer or computer program. That can select the route for solving the problem. Artificial intelligence might have two or three routes that it can use in certain situations. In the simplest model, the AI has a mission to put the rain cover over some machines if there is a rainy day. 

So the AI can simply ask the operator is there raining? If there is rain the AI can put the cover over machines. And if there is no rain that system can leave the machines without protection. In a little bit more complicated model the AI can select from two rain cover. The other uses a warming system- And another does not use them. 

The AI can have a model that if the temperature is below zero. It selects the warmed cover. And if it's over zero.  The AI selects a cover without a heater. That process can be automatized by connecting the computer with the thermometer. The data about the temperature can be taken automatically from the thermometer. This is a simplified version of the AI. 

The AI is always the best in cases where the system operates in limited areas. And process only certain types of data. That kind of system uses precise logic. And solutions are programmed inside the system accurately by programmers. But then we can think of the situation that the AI must solve problems in a large or changing environment. 


The protection against old-fashion computer viruses is quite easy. 


The first computer programs were BAT:s the command lines that drove certain computer programs automatically. The normal virus was the BAT that activated some computer program like "format". In those cases, the name of the "format" was simply changed. The solution against that kind of viruses was simple. The "format" program must always warn what it is going to do. And then the modern computers must protect to deny the use of the old "format" programs. 

The AI can search malicious code from the computers. This is the thing where AI is the best. The AI searches things like commands that purpose is to delete files from the system or open routes to the firewall. Normally destructive viruses simply tried to delete command files. 

Or they have just automatized the use of some disk management programs. That is used as an example to erase the partition of the disks. The defense against that type of viruses can simply make. by denying echo the del-command and also the automatization of fdisk.com can be denied. That thing was enough against the old-time viruses. But the modern programming tools are making it possible to create more complicated code than ever before. 


The race between advanced virus defense against advanced computer viruses. 


That kind of AI can operate as a firewall or antivirus program. The AI should find the virus code from the trillions of bits of data. The form of computer viruses is always changing. And the AI should know what type of code it should be looking for. The modern viruses code of malicious software is hidden in the regular program code. 

The thing that makes things like films very popular platforms for delivering viruses is simple. The malicious code is between the images of the film. And there is somewhere the computer program that collects the malicious code together. 

The modern virus scanner must find the virus code. That is is slipping in the system in many forms. The virus code might be between the TCP-IP packages. But the problem is that the virus code is not between every package. And in the most modern viruses, the virus code can use uncertain geometry. That means the number of TCP/IP packages between virus codes is chancing. 

Modern data viruses are slipped into the target system by using multiple files as the carrier. The system bases the idea that there is a collector. The computer program is not malicious itself. The purpose of that part of the code is to collect the data of the viruses together. The thing is the advanced virus scanners and firewalls should detect malicious code. And if the code can pass those barriers. 

That means the hackers have very advanced tools for making the program code. But making that kind of software requires also other things than just good tools. That thing requires time and skills but also a test environment where hackers tested those viruses. That their code can pass the virus scanners and firewalls. Also, hackers must use customized programming tools that don't cause alarms. When they are making their code. Network-based applications are the tools that make alarm if somebody tries to create the malicious code. 

Comments

Popular posts from this blog

Antimatter motor

Antimatter motor Antimatter would be an effective fuel for interstellar spacecraft Antimatter would be the most effective power source in the world. It will be the most suitable motor for interstellar spacecraft, but the problem is that thing is very reactive. And actually one of the biggest problems with this kind of motor is that the gram of antimatter would turn the entire planet to the molecular nebula. So this kind of motor can produce only outside of our solar system. Producing antimatter would need large particle accelerators, and that kind of systems might look like giant donuts, what is floating on the space. There are two ways to create the antimatter motor, one is to store the anti-ions in the magnetic bottle, where the pushing magnetic field will keep those ions away from the wall of the bottle, and then the antimatter would conduct to the water or some other particle. The huge explosion or annihilation reaction would send the rocket to a very high speed. The antimatt...

Could this be the thing, that some people don't want you to know about zombies?

Could this be the thing, that some people don't want you to know about zombies? The simplest way to control zombies, which are made by using tetrodotoxin, which is called "zombie poison" is to use the automatic dispenser, which is normally used in diabetes treatment. In this case, the dispenser would be loaded by using tetrodotoxin. If the level of this poison is right, the person would be totally under the control of other people. And if the system cannot detect this poison there is a possibility to make the laboratory experiment when the staff will follow the decrease of the tetrodotoxin, and then the system can use a simple clock, which will inject poison to the body of a victim after a certain time. This would be an effective tool in the hands of military and counter-terror operators. Those zombies can be captured enemy operators, who will send back, and then they just kill their ex-partners. By using genetically engineered bacteria could be possible to create t...

The cyborg lichen can be one of the most exotic visions of what the high-tech civilization might look like.

.     The cyborg lichen can be one of the most exotic visions of what the high-tech civilization might look like. Above is the image of the nano-submarine. There is introduced an idea, that this kind of system would equip with living neurons, which makes it like some kind of artificial bug or mosquito. The idea is that the robot can take the nutrient by using the robot tube, which acts like a proboscis. The neurons can get nutrients and the rest of the machine can use small fuel cells or the energy to that system can deliver by using the radio waves. Futurologists are thinking about the ideas, what the hybridization of the neurons and machine would look like? Could the hyper-technical civilization look like the group of midget submarines? Those submarines might take nutrients for the neurons, what is living in them. The purpose of the midget submarines, which might be size less than a couple of millimeters would maximize the survivability of the neurons. One of the most intere...