Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

Saturday, January 21, 2023

The future of robots might be more interesting than we ever imagine.



Emotional robots can act as nurses. But they can be the next-generation tools for intelligence and law enforcement. The official name for the robot that looks like a human is an android. We could call the human-looking robots "virtual humans". 

Virtual emotions are making robots feel like a human. And the human-like robot can make many things that are impossible for humans. 

The physical robot can act as an external body for its controllers. And in that case, the robot has the same IQ level as its controller. There is the possibility that the robot is hybrid-controlled. In routine missions robot uses autopilot. 

But in special cases, like in a new mission environment. The controller will make the robot for the first time make its mission. The robot records that mission and then it can make the job independently. 

But the AI-controlled robots can use virtual workspaces for making the first-time routine. The problem with physical robots is that they can be dangerous in the wrong hands. The physical, human-looking robot can same weapons as humans. 

And that makes them a little bit dangerous because criminals can make remote-controlled bank robberies by using that kind of system. When we are thinking of things like cleaner robots. Those systems can have the "shadow protocol" that makes them transmit data to third parties. 

Robots, especially AI-controlled robots that can show virtual emotions are incredible machines. Those robots are created for nursery work, but also intelligence, law enforcement, and other security agencies can be interested in human-looking robots with individual nature.  

The robot can have virtual emotions and virtual characters. In those virtual emotional systems, each robot has a different individual style for discussion with people. Different variables can make the robot look angry, sad, or something like that. Every single robot can have different variables that can make it speak louder. 

But when we are thinking about physical robots we are facing one thing. The robot is the physical tool for the AI. And things, like 5G networks allows robot body to connect themselves with computer centers. The robot can have access to the Chat GPT-style artificial intelligence. That makes it able to speak with people. 

Each robot can have different details in its programming. And that thing makes them feel like an individual. 

The robot can feel very realistic. But the fact is that the robot is only the physical part of highly advanced artificial intelligence. When we are thinking about robots, they might look and feel like real humans. But the fact is that they are machines. Those human-looking robots can play chess with real people if they have access chess program. 


https://shorttextsofoldscholars.blogspot.com/


Sunday, April 24, 2022

There are over 40 billion cores in the new Chinese binary supercomputer.



The binary supercomputers might look like being history. But ultra-powerful binary computers are needed to operate between humans and quantum computers. The problem with quantum computers is that they cannot yet communicate straight with regular keyboards.

So quantum computers require binary computers as a medium between the operator and quantum computers. The purpose of the binary computer is to code the commands for the quantum systems. 

 Those binary computers are making it possible to input and output data in and out of the quantum computers. Binary computers are needed to make settings for quantum systems and handle the communication between the quantum computer and keyboards and screens. 

Quantum computers are coming more powerful and lightweight than ever before. The size of quantum computers is turning smaller. And that means they might become part of the warships and especially the ASAT systems. The problem with quantum computers is still the error handling. confirmation of the process is very hard. 

But when the problems of the quantum computers are solved. And the borders of their cooperation between binary computers are lost. That thing makes many well-known systems more powerful than ever before. 



https://www.tomshardware.com/news/chinese-supercomputer-40-million-cores-exascale


https://artificialintelligenceandindividuals.blogspot.com/

Monday, March 21, 2022

Why do bigger neural networks do things better?




Before we go to think about what the large neural system can mean. We should determine what a neural network can mean? 


The neural network can be physical or it can be virtual. The virtual neural network can be a group of databases that involves some actions. 


 A large neural network can mean three things. And all of them can make something for the system. 


1) A large number of servers can make neural networks powerful. Human brains are a good example of how effective neural networks can be if there are hundreds of billions of data handling units. In human brains, neurons are the data-handling tools. 


In some futuristic visions, a nano-size microprocessor can be put at the layer of neurons. And then that system can interact with neurons. Nanotechnology can make it possible to make hybrid systems where organic brains are interconnected with nanotechnical computers. The computer can get the orders from the EEG of those neurons. 


2) Large area where the network can collect data can make it effective. That kind of system can use to collect data from radio- and optical telescopes. 


And machine learning makes it possible to search exoplanets from other solar systems. But the similar systems can use to observe satellites and give warnings about missile strikes and other kinds of things. 

 

3) Large physical and geological areas where the servers are located provide effective protection against electricity distribution errors and nuclear attacks. Neural networks in large areas are the penultimate thing that determines the neural networks of a large area.


4) The final thing that might determine large neural networks is the skills. A large database number can use as the determinator for a large neural network. The problem with large neural networks is how to determine neural networks? 


Neural networks are not necessarily learning systems. They might be systems that can collect data from sensors. And if some parameters are filled they can select an action from the library. The learning AI can observe the brightness of some stars and if there are changes the system can report possible planets around that star. 

The fact is that the larger neural networks have a bigger data handling capacity than smaller neural networks. There are more data handling units in larger neural networks. And a large number of data handling units allow large data handling capacity. 

The thing is the large geological area of the physical neural network. Allows those systems can collect data from a larger area. If the neural network operates in a large geological area that minimizes the effect of errors in the power supply. 

Also, the large geological area is used in the missile warning networks. The missile warning systems are collecting data from large areas. And they are operating in large areas. That structure eliminates the effect of things like EMP pulses and nuclear strikes against the network and application servers.


https://www.quantamagazine.org/computer-scientists-prove-why-bigger-neural-networks-do-better-20220210/


Image) https://www.quantamagazine.org/computer-scientists-prove-why-bigger-neural-networks-do-better-20220210/


https://thoughtsaboutsuperpositions.blogspot.com/

Tuesday, December 28, 2021

The new nanotechnology needs miniaturized microelectronics.

  

 The new nanotechnology needs miniaturized microelectronics. 




The bottleneck in the interaction with nanomachines and quantum computers is the interface. Computer keyboards and screens are using binary systems. And that means the development of binary systems is also continuing. Artificial intelligence is the best tool for controlling nanomachine swarms. 

But those systems require powerful computers. And another thing is that the nanomachines are also required internal and well-protected computers. Screens and keyboards are needed to send commands to nanomachines through the quantum system. 

Development of the new quantum systems is not enough. If we want to use quantum computers things like screens and keyboards are the bottleneck for interaction between quantum computers and humans. When we are developing new quantum systems we must load information to the quantum systems. And for that kind of duties is needed to develop more and more powerful binary computers. 


The quantum systems are large-size and if we want to use them to control things like nanomachines. We must realize that the nanomachine can use WiFi to communicate with the quantum systems. But the data that the nanomachine sends and receives must decode to the quantum system. 


The quantum computer can interact with nanorobots by using the internet. But the problem is that those systems use so different architecture that there must be decoders and coders between nanomachine and quantum systems. Also if we are thinking of things like submarines that can swim in our blood vessels those systems require control software and so small computers that they are fitting in the small body. 

Intelligent technology means that the system requires less energy in the physical mechanics. But otherwise, if we want to make the intelligent parts in microchips. Controlling that kind of system requires more powerful computers inside the machine than the dummy technology. But the problem is that the power source of those systems must be extremely small. 

Or electricity must transfer to those miniaturized systems by using radio waves. The antenna would induct that energy into the systems of the miniature robots. But the problem with miniaturized computers can overheat. 

Another version is to use the miniaturized quantum-radio system. Which is using superpositioned sand entangled particles to control the "radios" that are used to aim the submarine or some other nanorobot. 

The superpositioned and entangled particles are also protecting data from turbulence. If there are some unpredicted errors the nanomachine loses its accuracy. Those nanomachines are the next-generation tools for the surgeon and they can open vessels in the human body. 

When the quantum entanglement hits to receiver it inducts power into it. The use of quantum entanglement guarantees high accuracy in data transportation. Also, energy is always at the right level. If the energy level is too high, that means the nanocomputer will overheat. 



https://newatlas.com/physics/new-distance-record-quantum-entanglement-light-matter/


https://scitechdaily.com/fundamental-discovery-used-to-turn-nanotube-into-tiny-transistor-25000x-smaller-than-width-of-a-human-hair/


https://scitechdaily.com/revolutionary-new-intelligent-transistor-developed/


https://en.wikipedia.org/wiki/Nanosubmarine


Image:http://news.bbc.co.uk/2/hi/science/nature/2135779.stm


https://networkedinternet.blogspot.com/


Sunday, August 5, 2018

Terminators and Skynet are here



Picture I
https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

Terminators and Skynet are not the fantasy anymore. Modern military technology allows making so horrifying weapons, that they would not believe as true. One of the most modern military systems is intelligent mines. what choose their targets. In those mines is the smart component, what is communicating with other systems, and in the real life that means, that own tanks and military personnel can drive or walk over those mines, and the smart component would read the RFID-sensors from their boots or vehicles. This means that own operators would not explode the mines, and that makes them very dangerous.


But when the enemy comes the piezo-electric components feel the pressure but they would not see the recognition sensor, and that allows to explore the mine. Same time the small computer, what is in the mines would send the information of the detonation to the command center, what will send drone or reconnaissance aircraft to check the situation. But when we are talking about the terminators and other military automation, we must realize that also the new human-shaped robots can be used in the combat area from the very long distance.


The satellite control allows that the command team can control the action of those robots from another side from the Earth. That high-class automation is allowing that those robots can operate very independently, and they can be supported by aircraft, what is modified to flying computer centers. Those next-generation command aircraft would be manned, but they can also be used by using remote-desktops and another kind of things, what the modern technology allows to use.


These systems can communicate with robots by using radios or Lasers, what is more, difficult to jam than radio waves.  The man-shaped robots can use the same systems as humans. So they can work on the same missions with humans. In this case, the man-shaped robots can fly aircraft, drive vehicles or operate as the infantryman. And if the aircraft would shoot down the robot can be re-program to operate as the infantry soldier, what would cause terrible situations in the back of enemy lines.


They can also break into the enemy command center and open the fire. This is what makes those units so dangerous. They cannot tell, who have given those orders because their memories could be cleaned. And of course, they can have internal bombs, what detonates them after the mission. This is the modern military technology, what is very effective against any enemy in the world. But this technology can also be misused in some dirty missions, but there is one very big difference between robots and humans. Robots can be destroyed by using computer viruses, and also electromagnetic weapons like ADS (Active Denial System)  would be very effective against computers and communication systems, what plays the vital role in the robot-operations.

Picture I

https://cdn.radiofrance.fr/s3/cruiser-production/2018/01/bf8fdfb6-dbae-4800-b383-5edddb6c9b63/738_010_a7a17150_485.jpg

Wednesday, July 18, 2018

Where would you put the artificial intelligence, what can threaten all the World, if that would be released?

Illustrial photo (RTG of ALSEP)
http://large.stanford.edu/courses/2012/ph241/kumar1/images/f2big.jpg
https://kirjabloggaus.blogspot.com/

Kimmo Huosionmaa

The supercomputers of tomorrow might be not bigger than the RTG of ALSEP, what is for the illustration purpose on the top of the test. People are afraid of the artificial intelligence, and that very understandable. We are all afraid of new things. And the artificial intelligence, that would be more intelligent than human is the very frightening thing.  But if this machine can create new things it would be the threat for many people, who have thought that nothing can threaten their position.


That is a very good question because many people would not even believe, that what kind of artificial intelligence could be the threat for the human race. The computer, what is imitating the human brains is very easy to produce in theory. There would be needed two microchips. Another is working as the Neuron, and another one plays the mirror neuron. That system could possible the spontaneous thinking process.


But there will be another one way to make the computer, what can think creatively.  Here we are thinking about the bio-processors. The supercomputers, what uses the living neurons for making the thoughts. The neuro-computers, what those bio-computers can be might be extremely small size, and the computer itself is actually the superconducting magnet, that would be installed around the cylinder, what is filled with the neurons.


That kind of computer can also give information on those cells by using magnet fields. The systems bases in the method, that the neurons, what take from bugs can be observed by using MEG ( Magnetoencephalography). That technology would allow communicating with those neurons by using magnet fields. And those cells must be feed by giving them sugars. If we would make that kind of computer, that system could be extremely dangerous. The most effective computer, that people can imagine, is the bio- or neurocomputer, that is connected to the quantum computer. That would give it the superior way to calculate and think without limits.


If it would connect to the Internet, the results could be devastating, if that system hacks some missile computers. The system, that is used could contain two tanks, where the neurons are. One tank is for the neuron, and another tank is for mirror neuron. That kind of machine would be used in the extreme long logic thinking. But the reason for that is very dangerous, the system must locate to the moon or somewhere where it could be controlled in a safe position. The results if that kind of computer would be making something unpredictable would be very dramatic. That is the reason, why the access to that kind of system must be limited. And if the computer would go unstable, that would cause the reason for eliminating that machine.

Tuesday, June 19, 2018

The thoughts about "WikiLeaks"



http://metsantarinoita.blogspot.com/p/the-thoughts-about-wikileaks-kimmo.html

Kimmo Huosionmaa

The thing what might seem nothing may have more meaning, what you ever imagine, and this is the very good way to think when we are going to make little information leak from the NSA. We might want to use some well-known homepage for that action, and why don't we choose the "Wikileaks for that thing, where we would release 2000 pages top secret material to those servers.  The question, what becomes important in this case, is who pays Assange's phone bill?


Of course, there seem to be many servers around the world, what would support that kind of actions, and the next thing, what might be interesting is, who pays the electric bill of those departments, where those servers would stay? Those questions are things, what is very important when we are making the data leaks to the Internet. Also, when seeing that Mr. Assange is traveling very much, we might want to know about who pays for those tickets?


In the real life there are many ways to screw up on the Internet, and one is to make data leaks without thinking those questions because in the worst cases, those servers can be actually "honeypots", what tracks the persons and their IP-addresses from the Internet, and there is one thing, what makes me believe that at least one part of this network is meant for use as the "honeypots", and it is, that none of those servers are isolated from the Internet. This kind of network, of course, should be attractive for the persons, who want to share secret or confidential information across the Internet.


And the technology, what is used in that kind of devices is very nasty. That server could sometimes track the deliverer of that information in seconds, but there is the very big possibility, that this server would deliver a different kind of information for the computers, what is used by leaking the data. Sometimes those "honeypots" would start to round the data, what is meant for the deliverer of the data thru them, and that allows making the illusion, that those data, what the deliverer have sent actually seen in there.


"Honeypots" are trap servers, what mission is to track the hackers, and some of them are copying the IP-address of those computers, but some of those servers can also track the place of the computer, and take the control of those devices cameras and audio-system. They can also connect the computer viruses to the material, what is delivered from that system, and that might collapse the computers, what is downloading the material, and those viruses can be connected to the PDF-documents. Some of them might open the back gate to the system, and the honeypot can now track all data, what is delivered to that computer. In this case, the tracking software would set every data package, what is delivered from that computer the tracking cookie, what would guide the data packages thru the tracking server.


Then somebody starts to leak the information to the Internet, would the "honeypot-server" just set the little cookie in that internet connection. This cookie would set the stable IP-virtual server in that system. And even if the user of the computer uses dynamic-IP, what means that the IP-address of the system changes every time when it would put on, would there still be stable IP in somewhere at the net, and when this computer would put in the net, would the data start to surround thru the "honeypot".  The meaning of this operation would be provocative other leakers to put their information to that server, what would help to track those persons.

Saturday, June 9, 2018

Have you been in this situation, where all choices would be wrong?



Picture I
http://kimmontaidearvioita.blogspot.com/p/have-you-been-in-this-situation-where.html

Kimmo Huosionmaa

Have you ever been in the situation, that your boss would give you the offer, that something, what has been done would be let be, and if you would be silent, you would keep your job? Probably that would seem like the wise choice, but your situation is very bad because your boss would probably kick you off anyway, and the secrecy contract would only protect that person.


The reason for making the bad contracts is that the boss or other offenders would offer something, what is not out of question in that situation. But how can we recognize the form, what makes bad contracts with the workers? The first alarm that the culture in the firm is very bad is that the interviewer asks, what are your family relationships. Those things have nothing to do with the working, and sometimes that question is actually for collecting the information, what can be guessed from the spouses.


That thing might seem very interesting, but sometimes those companies want to ask about the mental situation about those workers. And that information would be used to taking the property from that person. The information is actually the property and in sometimes the persons, who are fishing the information uses the mental disorders to get the passwords to that targeted person's personal files like diaries, and the excuse for that might be, that this person would write too much.


And there is the risk about suicide. When we are thinking about that kind of reasons and chances for getting the information about bank accounts and other confidential things, the information would be meant for the honeypot. The term means the information, what seems like very intelligent and qualified, but the files are pure grab.


When we are looking at the Internet, we might notice, that there are been many writings about Chinese hackers, who would be got the information about top secret files of the United States military forces. Those files could be also hoaxed, what has the purpose to uncover the officers or other personnel, who leaks those informative files to the net.


The same methodology would be used in the other organizations. There is always data, what can help to locate the leaker in the seconds. And some of those files consisted the data, what is also faked. If somebody steals the drawings of the warship from the server of the military forces, that would mean that those vessels are totally unsuitable in the military usage, or they can be dangerous for the users.


Some of the stolen papers would involve the viruses, and those data viruses can sometimes collect themselves together for very complicated software, what can steal information from the network, and in the real war situation that software can destroy entire network from the information when the user of that virus would send the activation code. The idea of that STEALTH-virus is the same as T-1000 from the "Terminator movie".


Those small bits of code can form very large and complicated software when they are connecting together. In this case, the program bits is the control code, what helps them to find the right place in the structure.  And in the wildest dreams that computer virus, what bases the artificial intelligence can take the control of the strategic nuclear missiles, and shoot them to own cities.

Picture I

https://news-cdn.softpedia.com/images/news2/Important-Scottish-Newspaper-Leaks-Private-Data-2.jpg

New self-assembly nanotubes turn the impossible possible.

 New self-assembly nanotubes turn the impossible possible.  "The crystal structure of a carbon bilayer. The purple outer layer and blue...