Monday, January 16, 2023

The Chat GPT can be more than we ever thought.






The Chat GPT artificial intelligence is the next-generation tool for programming. Same way as the Chat GPT creates the homepage by connecting sources. It can create things like computer programs and websites for programmers. All websites, like web stores, are acting the same way. 

And that's why AI is the ultimate tool for programming. Maybe in the future, the person who wants to create a program just writes a description of the program for the AI. That description can involve the drawings of the user interface. Then the AI will collect the needed code from its database or the network. 

In the simplest version of the AI-based programming interface, the programmer just writes a description, of what the program must do. And then the AI searches the list of needed libraries and other things. In more complicated versions that might come soon, the AI can collect data from the open network or the libraries of some programming tool. 

The system needs only information about what the certain library does. The AI can interconnect Web-based data and the programming tools like Dev-C++ or some JAVA editor. 

There is the user interface and the program tower that is driving data to databases. Those program towers and databases are all similar. So the Chat GPT can make an individual-looking web service simply by modifying the program tower to fit the user interface. 

That program tower is written using some common programming language like Java or C++. In programming, books are enlisted codes for those kinds of tools. So by using a modified twain- or some other scanner program the users of the automatic encoding system can simply scan those codes from the books. And then drive them to the programming editor. 

So the programmer must just make the description for the user interface, and then the program will make the job. So in the future, the creator of web stores and other kinds of things must just draw the user interface. And then take a picture of it. Then the AI would modify the program tower fit to that user interface. 

There are stories. Russian hackers are trying to use Chat GPT for making viruses. And that's why AI- developers must be careful. In the wrong hands, those kinds of systems are dangerous. The programming model of Chat GPT is behind payments. But maybe there is soon free programming editors that are connecting programming and artificial intelligence. 


https://shorttextsofoldscholars.blogspot.com/


Tuesday, January 10, 2023

New research claims that Russian Twitter campaigns in 2016 didn't change voting behavior.




The Russian trolling campaigns have one problem. Makers of those campaigns believe in the authority and selfish ideology. So those campaigns are telling ideology, that is against the values of most Western people. Or those values against the ideology of Western social media users. Another thing that decreases the effectiveness of Russian trolling campaigns is that people know more about Russian and Russian internal affairs than in the past.  

The third thing that is is decreasing the effect of Russian troll campaigns is that people afraid that somebody will target them for cheating and trolls. If people are afraid to join those groups where propaganda- or information operations happen. Delivered information would not reach their targets.

We know that many people are afraid of trolls and other kinds of things. And we are all faced with cheating and trolling. The Russian trolls are operating under the control of the Russian government. And they sometimes use very bad language and terms like "bitch" about their targets. So, those words might seem funny, but they belong to some child's mouth. 

The thing is that criticizing Russian trolls is prohibited in Russia. The Russian government also uses trolls in the internal political area. If somebody doesn't believe Putin. And shows loyalty to the Russian government, that thing causes a very bad situation for a person who dares to talk against the government. The person who doesn't support the Russian government and the Ukraine war is automatically a Western agent. 

The difference between Western and Russian culture is that Western people are more critical than Russian people. The key element in Russian ideology is that "government's leaders are wise men, who are above the society". That is why nobody should review those people. The role of regular citizens is just to obey their leaders. If somebody is against their leaders that means discrimination, and that happens immediately. 

https://scitechdaily.com/russian-twitter-campaigns-during-the-2016-presidential-race-didnt-change-voting-behavior/

https://shorttextsofoldscholars.blogspot.com/

Friday, January 6, 2023

Revolutionary AI system learns by using text, video, and audio.



The new AI system can connect information, that it gets from text, video, and audio. This new AI-based system can connect itself with multiple systems more effectively, than ever before. And that thing makes the system very effective. 

At this point, we must realize one thing. The AI itself is a platform-free application. So the system can use things like robot bodies and surveillance cameras as the physical tool that increases its operational environment. If learning AI works with the robot. Their AI can operate as a visible control system. 

Or it can operate backward and send information to the central system. That central system interconnects data that it collects from the network, robots, and other things. That allows the system can collect multipurpose data matrix. That it connects data from multiple data-handling tools. 

Machine learning means the ability to connect memory blocks. Same way, when the human brain connects neurons to virtual neurons, the learning machine connects databases to new entirety. And that is one of the biggest advances in data sciences. 

But without data is no databases. And without databases is no learning. The problem is how to input data into databases. The answer is that the system can use cameras and microphones to get information. Those cameras and microphones can be installed in the robot's body. 

If the AI uses robots as the medium it's even more flexible than pure network-based solutions. The idea is that AI can operate as a hybrid application. In those models, the AI solution is a combination of software- and hardware-based solutions. 

Complicated algorithms require powerful computers and effective internet connections. For learning machines information is the material. That is used for making new solutions. Learning machines can make virtual solutions or physical solutions. 

There is the possibility that the AI makes virtual models like CAD images of the work. And if the engineer accepts it, the system will transfer it to industrial robots and 3D printers that make a physical product. 


https://scitechdaily.com/revolutionary-ai-system-learns-concepts-shared-across-video-audio-and-text/


https://shorttextsofoldscholars.blogspot.com/

Thursday, January 5, 2023

Drones are deadly weapons.

 



The Ukrainian war shows how effective tool drone is. The Russian air defense could destroy all Beyraktar drones. But before that, the Bayraktars terminated lots of Russian equipment and men. So the efficiency of those drones is good. 

Another name for loitering ammunition or kamikaze drones is cruise missiles. The problem is that almost anybody can make the kamikaze drone at home. Basically kamikaze drone is an RC airplane that carries explosives. 

There are also anti-tank versions of those loitering ammunition. Those versions are just artillery recon drones or target drones equipped with suitable warheads. 

And even if Russian air defense destroyed them.  Those drones played a big role at the beginning of the war. Today we see how effective cheap Iranian drones are against fixed Ukrainian targets.

Lucky for Ukraine, Shahed-136 drones are very primitive. They can fly by using fixed routes. And they don't even change altitudes. 

Shahed-136 cannot make any escape and evasion movements. So when that drone is located. It's quite easy to shoot down. 

And even if Ukrainian air defense shoots most of those slow drones. A couple of them are reaching targets. This is the key element in drone operation, lots of cheap drones can send at the same time, against multiple targets. The maximum speed of those drones is about 150 km/h. Even if those drones are easy to reach by using a car or combat helicopter. And they are easy to destroy. 

A large number of those loitering ammunition guarantees that some of them reach the target. Drones are like all other aircraft. They are hard to see but easy to destroy if the ammunition hits them. The new anti-aircraft missiles are effective against drones. But the problem is that they must see drones before they can be used. 



The price of effective missiles like Patriot is 3 million per shot. Their target price is less than 3000 dollars. The number of lost drones in missions in 2020 was 24. And it increased. But then. The high command can accept the loss of 24 drones because no friendly crews were dangered. 

The low price of the GPS systems means that the cheap mobile telephone can modify the brain of those drones. And GPS/GLONASS guarantees high enough accuracy that those drones can destroy or damage oil refineries, power plants, transformer substations, factories, and other large structures. 

The small drones that Ukrainians use against Russian infantry and armored vehicles are also very effective. Those drones are just little modified versions of drones that people can buy from supermarkets. 

Those drones are equipped with systems that can drop hand grenades at enemy positions. Sometimes those hand grenades slipped into tanks from the open hatches. And that destroyed those tanks. If those small-size drones are equipped with thermobaric hand grenades the lethal radius of those bombs is 30 meters. 

The Ukrainian military also used pocket-size killer drones that can take off individual shooters. In the wrong hands, those pocket-size drones can cause a big risk to national security. They can leave in position. And then those drones can attack their targets. The small miniature drones can control by using satellite data transmission. And those drones are giving ICBM missiles the ability to kill individual people from the streets. 

The killer drones and loitering ammunition can have similar target recognition and attack capacity as Javelin missiles. There are multiple different drone variants in use. Some drones are equipped with similar radiation-homing equipment with HARM (High-Speed Anti-Radiation Missiles). This makes them effective against radio transmitters. That kind of drone can destroy any radio source. 



The thing that makes drones dangerous is advancing technology. When we think that a 60 € mobile telephone can give drones the same accuracy that made in the 1990s by using equipment that cost millions of Euros, we must concern about the future. The reason for that is. All models that we made against drones are old fashion. 

Image recognition systems are giving drones pinpoint accuracy. And the first supersonic drones are in use. AI-controlled weapons are under development. And the fact is that the fear that Russia or China will be first is making other nations create new terminator weapons. If those international contracts limit that development, we are in big trouble. 

International contracts limit many things like the development of nuclear, biological, and chemical weapons. But those weapons are under development. 

International laws prohibit things like extortion. But somehow, those cases happen quite often. Drones are big ammo over the battlefield. If we think, that some country loses 24 tanks in the mission, that is not the end of the tank. In the case of war, we must realize that somebody doesn't care about contracts. 


https://www.aljazeera.com/news/2022/10/17/what-are-kamikaze-drones-and-how-did-they-get-to-ukraine

https://www.flightglobal.com/military-uavs/record-number-of-uav-shoot-downs-prompt-new-usaf-tactics-and-countermeasure-pod/138908.article

https://news.sky.com/story/ukraine-war-what-are-iranian-kamikaze-drones-and-will-the-us-send-the-deadly-mq-9-reaper-12737283


https://www.telegraph.co.uk/global-health/terror-and-security/drone-assassins-micro-killing-machine/


https://en.wikipedia.org/wiki/AeroVironment_Switchblade

https://yle.fi/a/74-20011489


https://shorttextsofoldscholars.blogspot.com/

Wednesday, January 4, 2023

The problem with quantum computing is: how to transmit information over long distances in a qubit.




"In a recent study, researchers achieved high-visibility quantum interference between two independent semiconductor quantum dots, a crucial development towards scalable quantum networks". (ScitechDaily.com/Dawn of Solid-State Quantum Networks – The Holy Grail of Quantum Information Sciences)

The limit of binary networks is that they are slow for quantum computers. If quantum computers connect to quantum networks. That makes it possible to connect them to one entirety. 

Quantum networks allow quantum computers to communicate without bottlenecks. And that will be the next revolution in the world of quantum computing. 

The ability to transmit the information as a qubit over long distances would be the next step in quantum networks. The quantum networks will be faster and more secure networks than regular binary networks. There is a possibility that the spectrum is the key to those networks. 

When we think about the spectrum we must remember that each spectrum's color is an independent radiation wavelength. So the information can deliver from the qubit to the different color lasers. And that allows researchers to make the photon-based qubit, where certain color or wavelength is the certain state of the qubit. 

A long-distance quantum network is also possible to create by using multi-band radios. In that version, data is shared to different frequencies. And then send it to the receiver. This kind of system can make a faster and more secure network. When we are thinking about the quantum revolution we must realize a couple of things. The next-generation network should be easy to use, but the same time very secure.  The quantum system is not yet common. 

But technology is advancing. When quantum computers are turning more common, their prices will get lower. The problem with quantum computers is that they can keep their quantum entanglements only in a couple of seconds. Then the energy level quantum entanglement will turn to the same. And that breaks the entirety. 

The requirement for information travel in quantum entanglement is that another side is at the lower level. When the energy level in that structure turns stable, it breaks the superposition. When this thing happens the quantum computer must re-adjust. For that is required high-power binary computers are. In that process the system superposition and entangled two elementary particles. The speed of that process depends on the computer system's ability to control the quantum systems. 


https://scitechdaily.com/dawn-of-solid-state-quantum-networks-the-holy-grail-of-quantum-information-sciences/


https://shorttextsofoldscholars.blogspot.com/

Tuesday, January 3, 2023

The new integrated data security requires hardware and software-based solutions.




New nanotechnology makes it possible to hack computers, even if they are off the internet. The cyborg bug or small robot can carry a microchip to the microcircuit. And then, the system can put that microchip on the wire or microprocessor. 

The microchip can record and transmit information to the relay station that resends to the satellites or the internet. Even if that microchip doesn't have powerful data transmitters, the system can use a chain of miniature relay stations that transmit data to the drone or a fixed station that can be a cell phone that communicates with those microchips by using BlueTooth. 

Those microchips can also transmit electromagnetic impulses to wires. And they can use to deliver computer viruses or spyware to polluted computers. 

If we think of the traditional locking system. The AI can easily make copies of the physical keys. The AI-based camera just photographs the keys, and then it can measure the length of the key. The system can also use sonar or laser scanners. And then, it can transmit that data to the CAM (Computer-Aided Manufacturing) system. 

That system can involve a 3D printer and machine tools. There is the possibility that the attackers have laser systems that they can use to finish the job. Modern burglaries can work for governments. And in that case, they can have high-tech support systems. 

The fact is that the wrong microchips can cause a very bad situation. There is a possibility that those microchips are equipped with logic bombs. In that case, those systems can deliver computer viruses to the system. Or they can transmit information that flows through them to a third party.  

And even if those microchips don't carry malicious code to the targeted system. They can cause very big risks. If hostile forces know the resonance frequency of those microchips. They can use acoustic weapons to make physical damage to microchips. That causes oscillation and breaks the core of the microchip. 

The data security of tomorrow must base the solutions that are hard to break. When we think about things like electronic locks there is the possibility that in the future, cell phones with biometric recognition systems can use to open electronic locks. 

But when the telephone communicates with locks it must use a very fast algorithm. The recognition algorithm can be unique. And that makes it easy to track the device. That code is used for authorized access in physical or software-based systems. 

The burst of code, hidden in empty code makes it difficult to steal the key. When the telephone starts transmitting it sends an "empty code". Then the key code is hidden in that message. The next-generation systems are not just denying access. It stores the unauthorized keys in memory, and that defender can find out where the attacker stole the code. 


https://scitechdaily.com/the-security-system-of-the-future-electronic-devices-could-use-logic-locks-to-fend-off-malicious-attacks/


https://shorttextsofoldscholars.blogspot.com/

Computer researchers published a new algorithm that revolutionizes web management.

The new database structures require new and powerful tools to manage databases in non-centralized solutions. The new data structures can be ...