Computer Science – Kailasha Foundation https://kailashafoundation.org Fun & Learn Portal Tue, 30 Apr 2019 08:18:16 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.1 The Elements of AI (Artificial Intelligence) – Part II https://kailashafoundation.org/2018/07/28/ai-artificial-intelligence-2/ https://kailashafoundation.org/2018/07/28/ai-artificial-intelligence-2/#respond Sat, 28 Jul 2018 05:30:23 +0000 https://kailashafoundation.org/?p=24604 Read Previous Part Here What is AI and what is not AI? Not an easy question!!!! We can see almost anything from statistics and business analytics to manually encoded if-then rules called AI. Why is this so? Why is the public perception of AI so nebulous? We will look into this article. Reason 1 – […]

The post The Elements of AI (Artificial Intelligence) – Part II appeared first on Kailasha Foundation.

]]>
Read Previous Part Here

What is AI and what is not AI?

Not an easy question!!!!

We can see almost anything from statistics and business analytics to manually encoded if-then rules called AI.

Why is this so?

Why is the public perception of AI so nebulous?

We will look into this article.

  1. Reason 1 – No officially agreed definition

Even AI researchers have no exact definition of AI. There is an old (geeky) joke that AI is defined as “cool things that computer can’t do.”

Irony: AI can never make any progress – as soon as we find a way to do something cool with a computer, it stops being an AI problem.

Fifty years ago, for instance, an automatic method for search and planning were considered to belong to the domain of AI. Nowadays such methods are taught to every computer science student.

Similarly, certain methods for processing uncertain information are becoming so well understood that they are likely to be moved from AI to statistics or probability very soon.

  1. Reason 2 – the legacy of science fiction

The confusion about the meaning of AI is made worse by the visions of AI present in various literary and cinematic works of science fiction. Sci-fi stories often feature friendly humanoid servants but can sometimes start to wonder if they can become human.

Another class of humanoid beings in sci-fi espouse sinister motives and turn against masters.

Often the robothood of such creatures is only a thin veneer on top of a very humanlike agent as sci-fi needs to be relatable by human readers.

  1. Reason 3 – What seems easy is actually hard!!!

Another source of difficulty in understanding AI is that it is hard to know which tasks easy and which ones are hard. E.g.  Look around and pick up an object in your hand, then think about what you did:

  • Used your eyes to scan surroundings
  • Figures out where are some suitable objects for picking up.
  • Chose one of them and plan a trajectory for your hand to reach that one, then moved your hand by contracting various muscles in sequence.
  • Managed to squeeze the object with just the right amount of force to keep it between your fingers.

It can be hard to appreciate how complicated all this is but sometimes it becomes visible when something goes wrong:

The object you pick up is much heavier or lighter than you expected.

Someone else opens a door as you are reaching for the handle and then you can find yourself seriously out of balance.

Usually, this kind of tasks feel effortless but that feeling belies million of years of evolution and several years of childhood practice.

While easy for us grasping objects but for a robot, it is extremely hard and it is an area of active study.

…And What seems hard is actually easy

By contrast, the task of playing chess and solving mathematical can seem to be very difficult but it has turned out that such tasks are well suited to computers, which can follow simple rules and compute many alternative move sequences at a rate of billions of computations per second.

Similarly, while in depth mastery of mathematics requires (what seems like) human intuition and ingenuity, many (but not all) exercises of a typical high level or college course can be solved by applying a calculator and simple set of rules.

So, the more useful definition for AI could be

An attempt at a more useful definition would be to list properties that are characteristics to AI, in this case, is autonomy and adaptivity.

 

Key Terminology

Autonomy – The ability to perform tasks in complex environments without constant guidance by the user.

Adaptivity – the ability to improve performance by learning from experiences.

 

Words can be misleading

While defining and talking about AI we have to be cautious as many of the words that we use can be misleading. Common examples are learning, understanding and intelligence.

For e.g. we may say that a system is intelligent perhaps because it delivers accurate navigation instructions or detects the sign of melanoma in photographs of skin lesions but actually the word “intelligent” suggests that the system is capable of performing any tasks that an intelligent person would be able to perform such as going to grocery store and cooking dinner, washing and folding laundry and so on.

Likewise, when we say that a computer vision system understands images because it is able to segment an image into distinct objects such as other cars, pedestrians, buildings, the road and so on. The word “understand” easily suggests that the system also understand that even if a person is wearing a t-shirt that has printed a photo of a road printed on it and it is not okay to drive on that road (and over the person).

In both of the above cases, we’d be wrong.

Note:

Watch out for ‘suitcase word’

Marvin Minsky, a cognitive scientist and one of the greatest pioneers in AI, coined the term “suitcase word” for the terms that carry a whole bunch of different meanings that came along even if we intend only one of them. Using such terms increase the risk of misinterpretations such as shown in the examples above.

 

Intelligence is not a single dimension like temperature.

We can compare different temperatures and tell which one is higher and which one is lower.

We even have a tendency to think that it is possible to rank people with respect to their intelligence using IQ.

However, in the context of AI, it is obvious that different AI systems cannot be compared on a single axis of dimension in terms of their intelligence.

Is a chess playing algorithm more intelligent than a spam filter, or is a music recommendation system is more intelligent than a self-driving car? These questions make no sense.

This is because AI is narrow, being able to solve one problem tells us nothing about the ability to solve another different problem.

 

Why you can say “a pinch of AI” but not “an AI”?

The classification into AI vs non-AI is not a clear yes-no dichotomy. While some methods are clearly AI and other are clearly not AI, there are methods that involve a pinch of AI, like a pinch of salt. Thus it would sometimes be more appropriate to talk about the “AI ness (as in happiness or awesomeness) rather than something is AI or not.

Note: AI is not a countable noun.

When discussing AI, we would like to discourage the use of AI as a countable noun: one AI, two AI and so on. AI is a scientific discipline like mathematics and biology. This means that AI is a collection of concepts, problems and methods for solving them.

Because AI is a discipline, you should not say “an AI” just like we don’t say “a biology”. This point should also be quite clear when you try saying something like “we need more artificial intelligences” that just sounds wrong, doesn’t it? (It does to us.)

 

The use of AI as a countable noun is of course not a big deal if what is being said otherwise makes sense but if you’d like to talk like a pro, avoid saying “an AI” and instead say “an AI method”.

 

 

Kailasha Foundation – Bringing Solutions To You

Follow us on FacebookTwitterInstagramLinkedIn for regular updates.

<<<CLICK HERE TO ASK ANY DOUBTS>>>

The post The Elements of AI (Artificial Intelligence) – Part II appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2018/07/28/ai-artificial-intelligence-2/feed/ 0
The elements of AI (Artificial Intelligence) https://kailashafoundation.org/2018/07/25/ai-artificial-intelligence/ https://kailashafoundation.org/2018/07/25/ai-artificial-intelligence/#comments Wed, 25 Jul 2018 05:30:30 +0000 https://kailashafoundation.org/?p=24405 What is AI? Artificial intelligence (AI) can be better understood by its application. With the help of knowing the area where we can use AI, we can better understand what artificial intelligence is. Application of Artificial intelligence Self-driving cars They require a combination of AI techniques of many kinds: Search and planning – To find […]

The post The elements of AI (Artificial Intelligence) appeared first on Kailasha Foundation.

]]>
What is AI?

Artificial intelligence (AI) can be better understood by its application. With the help of knowing the area where we can use AI, we can better understand what artificial intelligence is.

Application of Artificial intelligence

  1. Self-driving cars

They require a combination of AI techniques of many kinds:

  • Search and planning – To find the most convenient route between origin and destination.
  • Computer Vision – to identify the obstacles
  • Decision making under uncertainty – To cop up with the complex and dynamic environment

The same technology is also used in other autonomous systems such as

  • Delivery robots
  • Flying drones
  • Autonomous ships

Implications

  • Road safety will eventually improve as the reliability of the system surpasses human level.
  • The efficiency of logistics chains when moving goods will improve.
  • Humans move into a supervisory role, keeping an eye on what is going on while machined take care of driving.

There may be more implications that we have not enough thought about yet.

  1. Content Recommendation

A lot of information that we encounter is personalized, for e.g. Facebook, Twitter, Instagram and other social media contents, Online advertisements, Music recommendation on Spotily, movie recommendation on Netflix, HBO, and other streaming services, online publisher such as newspapers, broadcasting company websites as well as search engines such as Google also personalize the content they offer.

The algorithm that determines the content that we see over the internet is based on AI.

Implications

  • While many companies don’t want to reveal the details of their algorithms, being aware of the basic principles helps us understand the potential implications. These involve so called filter bubbles, echo chambers, troll factories, fake news, new forms of propaganda etc.
  1. Image and video processing

Face recognition is already a commodity used in many customer, business and government applications such as

  • Organizing our photos according to people
  • Automatic tagging on social media
  • Passport control

Similar techniques can be used to recognize other cars and obstacles around an autonomous car, to estimate the wild life populations.

AI can also be used to generate or alter the visual content.

Examples:

  • Style Transfer – To adapt our personal photos to look like they were painted etc.
  • Computer generated characters in motion pictures such as Avatar, The Lord of the Rings, and Pixar animations (where the animated characters replicate the gestures made by real human actors.)

Implications:

  • When such techniques advanced and become more widely available, it will be easy to create natural looking fake videos of events that will be impossible to distinguish from real footage.

What is AI and what is not AI?

Not an easy question!!!!

We can see almost anything from statistics and business analytics to manually encoded in if-then rules called AI.

Why is this so?

Why is the public perception of AI so nebulous?

We will look into the next article.

Kailasha Foundation – Bringing Solutions To You

Follow us on FacebookTwitterInstagramLinkedIn for regular updates.

<<<CLICK HERE TO ASK ANY DOUBTS>>>

The post The elements of AI (Artificial Intelligence) appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2018/07/25/ai-artificial-intelligence/feed/ 1
SEO Hacks – Search Engine Optimization https://kailashafoundation.org/2017/11/20/seo-hacks/ https://kailashafoundation.org/2017/11/20/seo-hacks/#respond Mon, 20 Nov 2017 05:30:19 +0000 https://kailashafoundation.org/?p=11089 Digital marketing has become a necessity for web or any present running business. SEO and SEM go hand in hand, but a good SEO planning, alone can achieve great results. SEO Hack techniques and tools can help further more and more. Here, in this article, we will be discussing the possible and easy ways to […]

The post SEO Hacks – Search Engine Optimization appeared first on Kailasha Foundation.

]]>
Digital marketing has become a necessity for web or any present running business. SEO and SEM go hand in hand, but a good SEO planning, alone can achieve great results. SEO Hack techniques and tools can help further more and more. Here, in this article, we will be discussing the possible and easy ways to achieve successful SEO with the help of a few hacks.

 

SEO hacks can be achieved only if one knows what is SEO and how does it works. Keep in mind that when we are discussing about the hacks, we are only stating the most efficient, effective and easy ways to achieve SEO targets, it’s not the whole SEO process. Let’s understand the term SEO a little-

SEO stands for Search Engine Optimization. The name is itself a definition. It means optimizing search engine i.e. making the search engine read your website and bring it to the end user in the search results.

SEO hacks are basically using the SEO tricks in such a way that makes it all the way easier to convert audience or traffic. Let’s know how and what are they. The spider of google crawls through the websites and looks for the queries and image tags related to the search and displays the most appropriate results to the end user.

 

Let’s discuss why Search Engine Optimization is important and then we’ll talk about the hacks to it.

 

There are a lot many reasons that planning SEO is an important part of marketing, a few are stated below:

 

  1. 93% of traffic is converted by Search Engine.

SEO hacks

  1. SEO leads convert 14.6% more traffic than that of only 1.7% for outbound leads ( pamphlets, print ads etc)

 

  1. 60% of clicks are converted through top three websites in search engine results.

SEO hacks

  1. 50% of queries are either 4 words or longer.

Once we have discussed the importance of search engine optimization, we are moving forward to the possible SEO hacks:

 

  1. USE FREE SEO TOOLS:

We should understand that we don’t have to spend money for SEO tools. While working on SEO, even SEO experts ignore the value of available free SEO tools on the web. The thinking that, free is not worth using is not always correct. The SEO tools available are one of the best tools in the market. To state a few:

 

Google Analytics: https://analytics.google.com/analytics/web/provision/?authuser=0#provision/SignUp/

SEO hacks

It states the website’s status and is used to keep a track on the landing pages and search queries being performed in SERPs. It simply shows the keywords used for the search which helps in monitoring the website’s status and the choice of words that should be used.

Google AdWords: https://adwords.google.com/home/

SEO hacks

It is a platform for advertising your website or campaign which works on a per click basis and is a thorough keyword planner which is known as, Google AdWord Keyword Planner. Though it is not considered as a free tool, most of us are not aware of the fact that if we ask for the free package, Google gives it for free for a period of three months. If it is not a lifetime commitment, at least we can know if it’s working for us or not, before spending any money on it.

 

Google Webmaster Tools: https://www.google.com/webmasters/#?modal_active=none

SEO hacks

You can track your site’s search performance with the help of Google Search Console and monitoring URL errors. It has a lot more functions that can be enjoyed.

There are much more off Google free tools that can be used like SEO Analyzer tool, Yoast, SEMRush etc.

 

  1. DON’T USE HUGE IMAGES:

An image brings the audience to the website, but huge size images can drive away audience within a few seconds. The stats show that

  • If the website takes 2 seconds to load, conversions fall by 50%.
  • Further, for every extra second, 12% fall in conversion takes place.

Huge images should be avoided.

 

  1. STAY AWAY FROM THE 404 ERROR/ BROKEN LINKS:

The site not found the error is the most unworthy setback and is very irritating to the target audience. After investing their time, they are not at all willing to see a 404 error page. So make sure, there are no broken links on your website.

 

  1. ENABLE COMMENTS INFLOW:

Why to play old school if we can easily be modern and user-friendly?

Let the audience involve and put in their inputs as much as you can so that it will make a two-way communication that will help you enhance your quality and satisfy them as well. It makes the website user-friendly. If people are able to share their opinion and can communicate their thoughts easily, they prefer that platform more. This is one of the main reasons that social media is so popular.

 

  1. MAKE SOCIAL HUBS AND FORUMS YOUR PLATFORM TO KEYWORD RESEARCH:

Keep an eye on the related social media pages and forums and make a list of frequently used words to come up with trending words related to your business and use them as your keywords.

This hack will make you learn the words most used, as per your requirement. Make it a regular activity.

 

  1. USE INFOGRAPHICS

An Infographic holds the audience the most as a visual data is always more compelling and a quality medium of communication. It includes Data, Graphics and complex information and is presented in a creative manner. It holds complex and lengthy information in a simple visual form.

animation

This is one of my infographics on myths and facts about animation.

 

  1. COPY YOUR HIGH RANKED COMPETITORS:

All you have to do is copy your high ranked competitors as we all are aware of, ‘Good artists create, great artists steal’, a widely known saying.

Combining both what you know and how your competitors work could come out to be a highly developed website.

Many tools are available for the same, few of them could be – similarpages.com, similarweb.com and many more.

 

  1. USE ENGAGING AND EVERGREEN CONTENT:

Keep your content precise and to the point so that it won’t take much time of the audience and convey the message at the same time. But don’t lose your accuracy in making it short.

The less time they’ll have to invest, the more reliable source you’ll become.

CONCLUSION:

There could be endless hacks, here we have stated a few. Try and learn more about it by experiencing it, that way things will be way easier.

Use as many hacks as you can because Search Engines never demotivate effective SEO techniques.

Don’t be dependent on these hacks, SEO might sound an easy topic, but takes a lot of efforts once you start working.

Replicate the success of high ranked websites by working more and more on it.

Good Luck!

 

Kailasha Foundation – Bringing Solutions To You

Follow us on Facebook, Twitter, Instagram, LinkedIn for regular updates.

The post SEO Hacks – Search Engine Optimization appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2017/11/20/seo-hacks/feed/ 0
Artificial Intelligence – Worst Thing to Humanity???? https://kailashafoundation.org/2017/08/12/artificial-intelligence/ https://kailashafoundation.org/2017/08/12/artificial-intelligence/#respond Sat, 12 Aug 2017 16:30:11 +0000 http://kailashafoundation.org/?p=4846 It was 19th October 2016 and the occasion was the opening ceremony of the Leverhulme Centre for Future of Intelligence in the United Kingdom when one of the greatest scientist of this decade, Professor Stephen Hawking warned the generation that the artificial intelligence will be “either the best, or the worst thing, ever to happen […]

The post Artificial Intelligence – Worst Thing to Humanity???? appeared first on Kailasha Foundation.

]]>
It was 19th October 2016 and the occasion was the opening ceremony of the Leverhulme Centre for Future of Intelligence in the United Kingdom when one of the greatest scientist of this decade, Professor Stephen Hawking warned the generation that the artificial intelligence will be “either the best, or the worst thing, ever to happen to humanity”. While addressing the guest, he acclaimed “Artificial Intelligence could lead to the destruction of humanity. It would take off on its own and re-design itself at an ever increasing rate. Humans, who are limited by slow biological evolution, couldn’t compete, and would be superseded.” Other Scientists and tech luminaries, including Elon Musk, Bill Gates, and Steve Wozniak have also warned that AI could lead to tragic unforeseen consequences. But none of us took it seriously then. Last week, a news float in global tech media about Facebook shutting down its AI system.

artificial intelligence

The chatbots robots which were designed by Facebook at various operational levels started speaking in their own language defying the codes provided. According to a report published in Tech Times, the social media giant had to pull the plug on the AI system that its researchers were working on “because things got out of hand”. “The AI did not start shutting down computers worldwide or something of the sort, but it stopped using English and started using a language that it created,” the report further noted.

Let us know in details about this complete story. Earlier this year, Facebook deployed various AI enabled chatbots to automate the various process. These AI system was working on the fundamentals of machine learning. They were self-learning system which understands the situation, check the records, converse with another system, solve the problem and learn from mistakes. A complete human independent system. Initially, these AI agents nicknamed Bob and Alice, were originally communicating in English, when they swapped to what initially appeared to be gibberish but later (in June) Facebook AI Research Lab (FAIR) found that while they were busy trying to improve chatbots, the “dialogue agents” were creating their own language. They were still doing conversation with other systems, still solving the issues but that gone completely out of the context from the human being. Objectives were still being served but for researchers, it was a complete black box for researchers. They were not able to get any idea about the complete workflow. This led Facebook researchers to shut down the AI systems and then force them to speak to each other only in English. Soon, the chatbots began to deviate from the scripted norms and started communicating in an entirely new language which they created without human input. Using machine learning algorithms, the “dialogue agents” were left to converse freely in an attempt to strengthen their conversational skills.

artificial intelligence

“After learning to negotiate, the bots relied on machine learning and advanced strategies in an attempt to improve the outcome of these negotiations,” the report said. “Over time, the bots became quite skilled at it and even began feigning interest in one item in order to ‘sacrifice’ it at a later stage in the negotiation as a faux compromise,” it added.

 

Interestingly, this incident took place just days after a verbal spat between Facebook CEO and Musk who exchanged harsh words over a debate on the future of Artificial Intelligence. For the last 5 years, the tech world realized that Machine learning and artificial intelligence have phenomenal potential to simplify, accelerate, and improve many aspects of our lives. Computers can ingest and process massive quantities of data and extract patterns and useful information at a rate exponentially faster than humans, and that potential is being explored and developed around the world. But everything has a limit. If there is no limit then it can turn dangerous.

 

Facebook’s experiment isn’t the only victim of smart intelligence technique. This isn’t the first time that AI has started to act with a mind of its own. In 2016, the search engine Google revealed that the AI which they use for its Translate tool had created its own language, which it would translate things into and then out of. Google Translate used neural networks — a computer system that is modeled on the human brain — to translate between some of its popular languages, and also between language pairs for which it has not been specifically trained. It was in this way that people started to believe Google Translate had effectively established its own language to assist in translation. But the company was somehow happy with that development and allowed it to continue. Another study at OpenAI found that artificial intelligence could be encouraged to create a language, making itself more efficient and better at communicating as it did so. In 2017, an AI security robot ‘drowned itself’ in a water fountain. The robot, stationed in a Washington D.C shopping center met its end in June and sparked a Twitter storm featuring predictions detailing doomsday and suicidal robots. Whether this is true or not, the Terminator 3: Rise of the Machines film sure put forward a solid argument for robots that could be smarter than humans. In the meantime, it’s nice to know that AI can be switched off with the pull of a plug.

 

Kailasha Foundation – Bringing Solutions To You

Follow us on Facebook, Twitter, Instagram, LinkedIn for regular updates.

 

SOURCE:

  1. http://www.techtimes.com/articles/212124/20170730/facebook-ai-invents-language-that-humans-cant-understand-system-shut-down-before-it-evolves-into-skynet.htm
  2. http://www.millenniumpost.in/big-stories/facebook-shuts-ai-system-after-bots-create-own-language-255224

 

The post Artificial Intelligence – Worst Thing to Humanity???? appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2017/08/12/artificial-intelligence/feed/ 0
SSC CGL GENERAL INTELLIGENCE: OSI LAYERS- DEVICES & PROTOCOLS (LECTURE 3) https://kailashafoundation.org/2017/06/25/osi/ https://kailashafoundation.org/2017/06/25/osi/#respond Sun, 25 Jun 2017 05:30:32 +0000 http://kailashafoundation.org/?p=3248 OSI MODEL Developed by International Standards Organization (ISO) Divides network communication into seven layers. Layers 1-4 are considered the lower layers, and mostly concern themselves with moving data around. Layers 5-7, the upper layers, contain application-level data.  Control is passed from one layer to the next, starting at the application layer in one station, and proceeding […]

The post SSC CGL GENERAL INTELLIGENCE: OSI LAYERS- DEVICES & PROTOCOLS (LECTURE 3) appeared first on Kailasha Foundation.

]]>
OSI MODEL

  • Developed by International Standards Organization (ISO)
  • Divides network communication into seven layers.
  • Layers 1-4 are considered the lower layers, and mostly concern themselves with moving data around.
  • Layers 5-7, the upper layers, contain application-level data. 
  • Control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.

 Also Read,
IMPORTANT ABBREVIATIONS FOR COMPETITIVE EXAMINATIONS

7 LAYERS OF OSI MODEL

  • Physical (Layer 1)                                    |———- Logical Link Layer
  • Data Link (Layer 2)—Sublayers——-
  • Network (Layer 3)                                   |———- Media Access Control
  • Transport (Layer 4)—- TCP (Connection Oriented) & UDP (Connection Less)
  • Session (Layer 5)
  • Presentation (Layer 6)
  • Application (Layer 7)

 OSI LAYERS

Now, Let us discuss each layer.

PHYSICAL LAYER: Provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects.

DATA LINK LAYER: Furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control, and frame synchronization.

NETWORK LAYER: Provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing, forwarding, addressing, internetworking, error handling, congestion control, and packet sequencing are functions of this layer.

TRANSPORT LAYER: Provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.

SESSION LAYER: Establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination.

PRESENTATION LAYER: Provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa.

APPLICATION LAYER: Supports application and end-user processes. Provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely at the application level. Tiered application architectures are part of this layer.

Also Read,
NETWORK SECURITY AND HACKING

IEEE 802 STANDARD PROTOCOL-

802.1 – LAN/ MAN Bridging
802.2 – Logical Link Control
802.3 – Ethernet
802.4 – Token Bus
802.5 – Token Ring
802.6 – MAN
802.7 – Broadband LAN
802.8 – Fiber Optics
802.9 – Integrated LAN Services
802.10- Interoperable LAN Security
802.11 – WiFi
802.12- Demand Priority
802.13- Not used
802.14- Cable Modems
802.15 – Wireless Personal Area Networks
802.15.1 – Bluetooth
802.16 – Wireless MAN
802.22 – Wireless Regional Area Network

Also Read,
COMPUTER NETWORK & TYPES (LECTURE 1)

DEVICES & PROTOCOLS IN EACH LAYER

Physical (Layer 1): Ethernet, FDDI, USB, REPEATER, HUB, B8ZS, V.35, V.24, RJ45, RS232, and ATM
Data Link (Layer 2): SWITCH, BRIDGE, NIC, LAN CARD, PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.
Network (Layer 3): AppleTalk DDP, IP, IPX.
Transport (Layer 4): SPX, TCP, UDP.
Session (Layer 5): NFS, NetBios names, RPC, SQL
Presentation (Layer 6): SYNTAX, Encryption, File Formats, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
Application (Layer 7): SOFTWARE, EMAIL, SERVICE, DNS, DHCP, WWW browsers, NFS, SMTP, Telnet, HTTP, FTP 

NOTE: Gateway is the only device which works on all the 7 layers.

Also Read,
NETWORK TOPOLOGY & NETWORKING DEVICES (LECTURE 2)

Students, please learn them before exams. We will be covering another important topic in next article. Stay Updated with Kailasha Foundation. You can also tell us if you want us to cover any specific topics or subjects.

SOURCE: Based on Self-Knowledge
IMAGE SOURCE: Google 

Kailasha Foundation – Bringing Solutions To You

Follow us on Facebook, Twitter, Instagram, LinkedIn for regular updates.

The post SSC CGL GENERAL INTELLIGENCE: OSI LAYERS- DEVICES & PROTOCOLS (LECTURE 3) appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2017/06/25/osi/feed/ 0
SSC CGL GENERAL INTELLIGENCE: NETWORK TOPOLOGY & NETWORKING DEVICES (LECTURE 2) https://kailashafoundation.org/2017/06/24/network-topology/ https://kailashafoundation.org/2017/06/24/network-topology/#respond Sat, 24 Jun 2017 05:30:32 +0000 http://kailashafoundation.org/?p=3247 NETWORK TOPOLOGY The geometric arrangement of a computer system. Each computer system in a topology is known as a node. Also Read, IMPORTANT ABBREVIATIONS FOR COMPETITIVE EXAMINATIONS TYPES OF NETWORK TOPOLOGY Bus Topology: Single line to which all nodes are connected and the nodes connect only to this bus. Mesh Topology: At least two nodes with two […]

The post SSC CGL GENERAL INTELLIGENCE: NETWORK TOPOLOGY & NETWORKING DEVICES (LECTURE 2) appeared first on Kailasha Foundation.

]]>
NETWORK TOPOLOGY

The geometric arrangement of a computer system. Each computer system in a topology is known as a node.

Also Read,
IMPORTANT ABBREVIATIONS FOR COMPETITIVE EXAMINATIONS

TYPES OF NETWORK TOPOLOGY

network6

Bus Topology: Single line to which all nodes are connected and the nodes connect only to this bus.
Mesh Topology: At least two nodes with two or more paths between them.
Ring Topology: Every node has exactly two branches connected to it. The ring is broken and cannot work if one of the nodes on the ring fails.
Star Topology: The peripheral nodes are connected to a central node, which rebroadcasts all transmissions received from any peripheral node to all peripheral nodes on the network, including the originating node.
Tree Topology: Nodes’ are arranged as a tree. The function of the central node in this topology may be distributed.

Also Read,
NETWORK SECURITY AND HACKING

 

NETWORKING DEVICES

  • Network Interface Card (NIC)– Physical connection between networking cables and computer’s internal bus is provided by NIC Card
    network8
  • Repeater- Electronic device that amplifies the signal it receives. It receives a signal and retransmits it at a higher level or higher power so that the signal can cover longer distances.
    network9
  • Hubs- Forwards the data packets to all of its ports connected to.
  • Bridges– Connects two sub-networks as a part of the same network.
  • Switch– filtering and forwarding of data packets.
  • Router– Connects two sub-networks as a part of the same network
    network10
  • Gateway– Entrance between two network
  • Ethernet– LAN Technology which strikes a good balance between speed & cost.
  • MoDem- Modulates and demodulates the signal between the digital data of a computer and the analog signal of a telephone line.
  • Fibre Distributed Data Interface (FDDI)- Form of network configuration which uses ring topology of multimedia

Also Read,
COMPUTER NETWORK & TYPES (LECTURE 1)

NETWORKING LAYERS

  • OSI (OPEN SYSTEM INTERCONNECTION)
  • TCP/IP (Transmission Control Protocol/Internet Protocol)

 

Students, please learn them before exams. We will be covering another important topic in next article. Stay Updated with Kailasha Foundation. You can also tell us if you want us to cover any specific topics or subjects.

SOURCE: Based on Self-Knowledge
IMAGE SOURCE: Google 

Kailasha Foundation – Bringing Solutions To You

Follow us on Facebook, Twitter, Instagram, LinkedIn for regular updates.

The post SSC CGL GENERAL INTELLIGENCE: NETWORK TOPOLOGY & NETWORKING DEVICES (LECTURE 2) appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2017/06/24/network-topology/feed/ 0
SSC CGL GENERAL SCIENCE: COMPUTER NETWORK & TYPES (LECTURE 1) https://kailashafoundation.org/2017/06/23/computer-network/ https://kailashafoundation.org/2017/06/23/computer-network/#respond Fri, 23 Jun 2017 05:30:57 +0000 http://kailashafoundation.org/?p=3235 Dear students, computer knowledge is a must in today’s world. There is a separate section of the computer knowledge in all competitive examinations like banking, railway, SSC-CGL and other Government Jobs examinations. These examinations are mostly for graduates and they expect some standard knowledge of computer and not those limited to definitions of program, instruction […]

The post SSC CGL GENERAL SCIENCE: COMPUTER NETWORK & TYPES (LECTURE 1) appeared first on Kailasha Foundation.

]]>
Dear students, computer knowledge is a must in today’s world. There is a separate section of the computer knowledge in all competitive examinations like banking, railway, SSC-CGL and other Government Jobs examinations. These examinations are mostly for graduates and they expect some standard knowledge of computer and not those limited to definitions of program, instruction & output devices. Questions are asked from topics like networking, database, operating system, memory device etc. You don’t need to go in depth or need to cover the syllabus of B.Tech (CSE) to crack these examinations. In this article, we will cover the most important topic for these competitive examinations i.e. Computer Network & Networking Layers. We can assure, after going through this you will be able to answer any question within a fraction of seconds.

This is also very beneficial for B.Tech graduates for placement point of view because recruiters always test the basic concepts of the candidate. You will not find anywhere on the internet explained simpler than this.

                                                     network1

COMPUTER NETWORK

Connections or arrangements of two or more computers for transfers of data.

Also Read,
IMPORTANT ABBREVIATIONS FOR COMPETITIVE EXAMINATIONS

DATA TRANSFER MODES

  • Simplex- Transfer in one direction (Radio)
  • Half Duplex- Transfer in both direction but not simultaneously (Talkback radio)
  • Full Duplex- Simultaneous transfer in both direction (Mobile & Telephone)

network2

ELEMENTS OF COMPUTER NETWORK

  • Data Source– From where data is originated
  • Sender (or transmitter)– Convert data to signals
  • Receiver– Convert received signals to data
  • Destination– Where data has to be received
  • Node– Device with independent communication ability & unique network address
  • Protocol– Rules & Conventions from communication method between network devices
  • Transmission system– Transmitted the signals (after data being converted into signals)

 

CASTING
Methods of message delivery

network5

TYPES OF CASTING

  • Unicast- One device sends message to another device (network address)
  • Broadcast- One device sends message to ALL other devices
  • Multicast- One device sends message to CERTAIN GROUP of devices on network

 Also Read,
NETWORK SECURITY AND HACKING

TYPES OF COMPUTER NETWORK

network4

  • Local Area Network (LAN) – connects network devices over a relatively short distance
  • Wide Area Network (WAN) – geographically dispersed collection of LANs
  • Metropolitan Area Network (MAN) – data network designed or spread over a town or city.
  • Storage Area Network (SAN)
  • System Area Network (SAN)
  • Server Area Network (SAN)
  • Small Area Network (SAN)
  • Personal Area Network (PAN)
  • Desk Area Network (DAN)
  • Controller Area Network (CAN)
  • Cluster Area Network (CAN)

 

TYPES OF WAN

  • Public Networks
  • Public Switched Telephone Networks (PSTN)
  • Public Service Digital Network (PSDN)

 

INTEGRATED SERVICES DIGITAL NETWORK (ISDN)
Combine both circuit & packet switching

 

PRIVATE NETWORK
Provides services at various locations using private or leased circuits

 

Students, please learn them before exams. We will be covering another important topic in next article. Stay Updated with Kailasha Foundation. You can also tell us if you want us to cover any specific topics or subjects.

SOURCE: Based on Self-Knowledge
IMAGE SOURCE: Google 

Kailasha Foundation – Bringing Solutions To You

Follow us on Facebook, Twitter, Instagram, LinkedIn for regular updates.

The post SSC CGL GENERAL SCIENCE: COMPUTER NETWORK & TYPES (LECTURE 1) appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2017/06/23/computer-network/feed/ 0
GOOGLE LENS: Next Generation of SmArTpHoNe-CaMeRa https://kailashafoundation.org/2017/05/23/google-lens-just-smartphones-camera-ai-powered-visual-search-tool/ https://kailashafoundation.org/2017/05/23/google-lens-just-smartphones-camera-ai-powered-visual-search-tool/#respond Tue, 23 May 2017 14:30:12 +0000 http://kailashafoundation.org/?p=2334 When you hear a song that you don’t know, there’s a good chance you might launch apps such as Shazam or SoundHound to try lyrics and identify it from the search result. So what about objects? What if you saw a beautiful pendant or attractive lady’s purse at some party and you really liked it […]

The post GOOGLE LENS: Next Generation of SmArTpHoNe-CaMeRa appeared first on Kailasha Foundation.

]]>
When you hear a song that you don’t know, there’s a good chance you might launch apps such as Shazam or SoundHound to try lyrics and identify it from the search result. So what about objects? What if you saw a beautiful pendant or attractive lady’s purse at some party and you really liked it for your beloved but didn’t know where to buy it? What to do next? Nothing to worry. Google is here for you with another revolutionary technology “ Google Lens ”.

Google Lens is going to work using AI technologies to identify objects in the world around you and project actionable information and about those objects onto your screen. This technology will turn your smartphone’s camera into a tool to analyze and act on the world around you in an instant. This tech is reportedly being integrated into both Google Assistant and Google Photos, but just like the object recognition feature, we have no idea when exactly it’s going to be added or how it’ll work when it does.

“We’re at an inflection point with vision,” said Google CEO Sundar Pichai, at the Google’s developer conference. Google Lens (“GOOG”) is a feature of the company’s voice assistant, Google Assistant. Google Assistant is available on Android phones and iPhones as well as the company’s home automation device, Google Home. It can respond to questions about the weather and traffic, and can also connect to things like personal calendars and Gmail accounts. Pichai said that Lens will also be integrated into Google’s popular mobile photo sharing app, Google Photos, which has 500 million active users. Google Lens lets consumers take an image that is shown through the camera of a phone, and the app should understand what it is looking at and provide information based on the image. Users can also use point the camera at a restaurant and it will give users reviews of the restaurant.

“This is about computers understanding images,” Pichai added. During a demo at Google’s I/O developer conference, CEO Sundar Pichai showed how it could be used to take the pain out of connecting to Wi-Fi. Simply point your smartphone’s camera at the label on the back of a Wi-Fi router, and Google Lens will scan the password and connect automatically. There are all sorts of other snazzy tricks, too. It can identify restaurants so you can make a booking by simply holding your phone up to its shop front, and it can identify objects as you take pictures of them – like a species of flower. It’s the culmination of years of artificial intelligence development in their Californian HQ and huge amounts of servers which are busy crunching lots of data every hour of the day. Pichai said: “When we started working on search, we wanted to do it at scale. “That’s why we designed our data centers from the ground up and put a lot of effort into them. “Now that we’re evolving for this machine learning and AI world, we’re building what we think of as AI-first data centers.”

It was also announced on stage by CEO Sundar Pichai that we’re currently on the inflection point in terms of image technology. Facebook also laid immense emphasis on the same, turning our smartphone cameras into robust tools for augmented our reality. But instead of augmenting stickers or cartoons into the real world, Google has decided to bring its search capabilities right into the camera.

SOURCE:

  1. https://techcrunch.com/2017/05/17/google-lens-will-let-smartphone-cameras-understand-what-they-see-and-take-action/
  2. http://fortune.com/2017/05/17/google-lens/

Kailasha Foundation – Bringing Solutions To You

Follow us on Facebook, Twitter, Instagram, LinkedIn for regular updates.

The post GOOGLE LENS: Next Generation of SmArTpHoNe-CaMeRa appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2017/05/23/google-lens-just-smartphones-camera-ai-powered-visual-search-tool/feed/ 0
Follow these steps if you don’t WannaCry https://kailashafoundation.org/2017/05/18/follow-steps-dont-wannacry/ https://kailashafoundation.org/2017/05/18/follow-steps-dont-wannacry/#respond Thu, 18 May 2017 05:30:00 +0000 http://kailashafoundation.org/?p=2154 What is WannaCry? WannaCry is a type of virus that infect computers, and then prevent the user from accessing the operating system, or encrypts all the data stored on the computer. In order to decrypt the files and regain access, WannaCry demands that $300 in bitcoins be paid to an anonymous account. This amount increased […]

The post Follow these steps if you don’t WannaCry appeared first on Kailasha Foundation.

]]>
What is WannaCry?

WannaCry is a type of virus that infect computers, and then prevent the user from accessing the operating system, or encrypts all the data stored on the computer. In order to decrypt the files and regain access, WannaCry demands that $300 in bitcoins be paid to an anonymous account. This amount increased as same as that of Bank Interest. After 3 days, the $300 ransom increases to $600. After 7 days without payment, the computer’s contents are deleted.

Effects in India

The Reserve Bank of India has asked all banks to put in place a software update at ATMs to protect their systems from a malware that has attacked payment systems across the world. There is a total of 2.25 lakh ATMs in the country of which 60% run on the outdated Windows XP version operating system, as per the report by Reserve Bank of India. Microsoft said that it has released a special update of the software. However, ATM operators have denied. They say that the principal motive of this ransomware was only to lock important information in networks and stop customer access to them. In a separate malware attack last year, 3.2 lakh debit card were compromised in the country. According to reports Automated Teller Machines (ATMs) are highly vulnerable to such malware attacks as they presently run on old version of Microsoft’s Windows operating system, making a software security patch update a necessary exercise.

wannacry

Who is at risk?

WannaCry ransomware is targeting three versions of Windows in particular:

  • Windows 8
  • Windows XP
  • Windows Server 2003

~WannaCry Ransomware Guidelines to stay safe~

  • Use anti-virus and Always make have the last update.
  • Make sure your windows have the last update close the gap.
  • Be careful to click on harmful links in your emails.
  • Be wary of visiting unsafe or unreliable sites.
  • Never click on a link that you do not trust on a web page or access to Facebook or messaging applications such as Whatsapp and other applications.
  • If you receive a message from your friend with a link, ask him before opening the link to confirm, (infected machines send random messages with links).
  • Keep your files backed up regularly and periodically.
  • Be aware of fraudulent e-mail messages that use names similar to popular services such as PayPal instead of PayPal or use popular service names without commas or excessive characters.

Wanna Cry Ransomware Guidelines~

  •  Make a recovery disk!
  • If your computer gets infected take it off of your network immediately!

Report it, this helps log the progression of the ransomware

 What should I do if I’m at risk?

Once you’ve reminded yourself how to compute responsibly, it’s time to ensure you’ve downloaded and installed the latest security patches available for Windows 8, Windows XP, or Windows Server 2003. Here are the links you’ll need:

Microsoft’s related security bulletin is right here, but you probably don’t even need to bother reading it. Just update. Now.

Is there anything else I can do?

You should download and install a good ransomware blocker. check out Avast, Malwarebytes Anti-Ransomware, and Cybereason Ransom free.

~What if I’m already infected?~

Sadly, your only options are to pay the ransom or to try Bleeping Computer’s guide to removing WannaCry from your system, though we cannot confirm at this time whether or not it works.

SOURCE:

http://timesofindia.indiatimes.com/business/india-business/follow-cert-in-instructions-on-wannacry-attack-rbi-to-banks/articleshow/58682875.cms

 
 Kailasha Foundation - Bringing Solutions To You

Follow us on Facebook, Twitter, Instagram, LinkedIn for regular updates.

The post Follow these steps if you don’t WannaCry appeared first on Kailasha Foundation.

]]>
https://kailashafoundation.org/2017/05/18/follow-steps-dont-wannacry/feed/ 0
BIG DATA FOR BIG IMPACT- WORLD’S TELECOMMUNICATION DAY https://kailashafoundation.org/2017/05/17/big-data-for-big-impact-worlds-telecommunication-day/ Wed, 17 May 2017 05:30:55 +0000 http://kailashafoundation.org/?p=2143 It is 17th May, World Telecommunication and Information Society Day. The objective of World Telecommunication and Information Society Day (WTISD) is to help raise awareness of the possibilities that the use of the Internet and other information and communication technologies (ICT) can bring to societies and economies, as well as of ways to bridge the digital divide. […]

The post BIG DATA FOR BIG IMPACT- WORLD’S TELECOMMUNICATION DAY appeared first on Kailasha Foundation.

]]>
It is 17th May, World Telecommunication and Information Society Day. The objective of World Telecommunication and Information Society Day (WTISD) is to help raise awareness of the possibilities that the use of the Internet and other information and communication technologies (ICT) can bring to societies and economies, as well as of ways to bridge the digital divide.

17 May marks the anniversary of the signing of the first International Telegraph Convention and the creation of the International Telecommunication Union.
World telecommunication and information society day

Image Source – Internet

The main goal of World Telecommunications Day (WTD) is to highlight the importance of communication and how information travels across the world. It also aims to increase awareness of how crucial communication is in our lives, and stimulate the development of technologies in the field. The World Telecommunications Day is in tight connections with the International Telegraph Union (ITU), the committee formed in 1865 to support the emerging communication methods of the time. ITU was present throughout all the great breakthroughs in communication – the invention of the telephone in 1876, the launch of the first satellite in 1957 and, ultimately, the birth of the Internet in the 60s. Even though The International Telegraph Union has since changed its name to International Telecommunications Union, it still remains the most important entity in the field of communications, thus remaining in the spotlight at World Telecommunications Day. This day was first celebrated in 1969.

The theme for World Telecommunication and Information Society Day 2017 (WTISD-17), "Big Data for Big Impact".

The theme for World Telecommunication and Information Society Day 2017 (WTISD-17), “Big Data for Big Impact,” focuses on the power of Big Data for development and aims to explore how to turn imperfect, complex, often unstructured data into actionable information in a development context. The insight brought on by advanced analysis can strongly complement the evidence-based nature of decision-making that can be leveraged at national, regional and international levels to drive success towards attaining all 17 of the United Nations’ Sustainable Development Goals (SDGs) for 2030. The theme for WTISD-17 is in line with ITU’s work highlighting the technological developments that have facilitated the emergence of Big Data, developing standards related to Big Data and identifying sources and uses of Big Data, including use of Big Data technologies for developing and monitoring improvements in information societies.

 

big data for big impact

Image Source – Internet

What is BIG DATA?

Big Data is a broad term for data sets so large or complex that they are difficult to process using traditional data processing applications. Challenges include analysis, capture, curation, search, sharing, storage, transfer, visualisation, and information privacy. Every day, we create 2.5 quintillion bytes of data – so much, that 90% of data in the world today has been created in the last two years alone. When data sets get so big that they cannot be analysed by traditional data processing application tools, it becomes known as ‘Big Data’. “Companies in all industries will strive to collect, interpret, and capitalize on vast amounts of new data. ‘Big data’ will be harnessed to understand consumers, improve healthcare, and cut firms’ energy bills.”

The big data revolution is not just a story of Silicon Valley. It represents a major shift in the way business is done globally. Developing nations with fewer deeply entrenched legacy systems to overhaul can take advantage of this moment. Data and analytics could provide an injection of transparency and efficiency that spurs commerce, builds more inclusive economies, and makes government services more effective. The age of analytics is already beginning to unleash creative destruction—and that may open the door for young, tech-savvy companies from anywhere in the world to propel themselves into the ranks of the new global giants.

SOURCES:

https://www.daysoftheyear.com/days/world-telecommunications-day/
https://en.wikipedia.org/wiki/Big_data
http://www.livemint.com/Opinion/QtWoDuIfVAkk4n4jRbjwFP/The-big-impact-from-big-data.html

 
 Kailasha Foundation - Bringing Solutions To You

Follow us on Facebook, Twitter, Instagram, LinkedIn for regular updates.

The post BIG DATA FOR BIG IMPACT- WORLD’S TELECOMMUNICATION DAY appeared first on Kailasha Foundation.

]]>