THIS POST IS CONTINUED FROM PART 1 BELOW--
https://ajitvadakayil.blogspot.com/2019/08/what-artificial-intelligence-cannot-do.html
Jaffa orange is the “the symbol of the Zionist enterprise and the state of Israel “, for Palestinians it symbolizes the loss of their homeland and its destruction.
This is a true incident.
Some homeless Palestinian boys used to play soccer by the side of a Jaffa orange farm in Israel..
One day the ball went inside the farm - enclosed by barbed wire.
Two boys went inside ( by tunneling under the barbed wire” and retrieved the ball.. They stole some oranges to be shared by the kids playing..
The very next day a huge board came up on al 4 corners of the orange farm
ONE ORANGE HAS BEEN POISONED WITH CYANIDE
All Jews who saw this clever tactic went GA GA.. Media/ Police and even judges praised the deterrent. These damn vermins Arab boys cannot steal any more.
A week later the board was amended by an unknown force. It was an inserstion of the word MORE between words ONE and ORANGE.
ONE “MORE” ORANGE HAS BEEN POISONED WITH CYANIDE
Needless to say, the whole farm produce has to be destroyed.
The Jew who thought he was damn clever had to eat crow.
IT IS A PIECE OF CAKE TO POISON DATA WHICH IS ABSORBED BY ARTIFICIAL INTELLIGENCE..
WARS CAN BE WON FROM BEHIND A DESK..
WARS CAN BE WON FROM BEHIND A DESK..
CHINAs CURRENT ECONOMIC GROWTH IS JUST 3.9 % -- NOT 6.2 % AS IS BEING PROJECTED..
CHINAs GROWTH WILL CONTINUE FALLING.. SOE CHICKENS HAVE COME HOME TO ROOTS..
INDIA IS CURRENTLY THIS PLANETs FASTEST GROWING ECONOMY AT 10.1 %
THE BEGGAR WESTERN NATIONS ARE FEEDING FAKE DATA TO ARTIFICIAL INTELLIGENCE SYSTEMS TO SHOW THAT THEIR ECONOMIES ARE NOT IN RECESSION AND IS SMELLING OF ROSES....
ARTIFICIAL INTELLIGENCE ALGORITHMS WERE USED BY THE JEWISH DEEP STATE TO CRASH THE FINANCIAL MARKETS IN 2008.
THE 2008 FINANCIAL CRISIS BROUGHT THE WORLD TO ITS KNEES.
DEEP STATE CAN DO IT AGAIN—IT IS A PIECE OF CAKE IF YOU KNOW HOW TO POISON DATA. IN 2008 HARDLY ANYBODY KNEW ABOUT ARTIFICIAL INTELLIGENCE METHODS ..
DATA POISONING OCCURS WHEN AN ADVERSARY MODIFIES OR MANIPULATES PART OF THE DATASET UPON WHICH A MODEL WILL BE TRAINED, VALIDATED, AND TESTED. BY ALTERING A SELECTED SUBSET OF TRAINING INPUTS, A POISONING ATTACK CAN INDUCE A TRAINED AI SYSTEM INTO CURATED MISCLASSIFICATION,
TARGETED DATA POISONING IS WHEN AN ADVERSARY INTRODUCES A ‘BACKDOOR’ INTO THE INFECTED MODEL WHEREBY THE TRAINED SYSTEM FUNCTIONS NORMALLY UNTIL IT PROCESSES MALICIOUSLY SELECTED INPUTS THAT TRIGGER ERROR OR FAILURE.
WHEN DATA IS DELIBERATELY MANIPULATED TO DECEIVE FOR BETTER OR FOR WORSE– IT POSES A GREAT RISK TO INTEGRITY OF A SYSTEM WE HAVE GROWN TO TRUST
THE RISK IS AMPLIFIED BY THE CONVERGENCE OF AI WITH OTHER TECHNOLOGIES: DATA-POISONING CAN INFECT COUNTRY-WIDE GENOMICS DATABASES, AND POTENTIALLY WEAPONIZE BIOLOGICAL RESEARCH, NUCLEAR FACILITIES, MANUFACTURING SUPPLY CHAINS, FINANCIAL TRADING STRATEGIES AND POLITICAL DISCOURSE. UNFORTUNATELY, MOST OF THESE FIELDS ARE GOVERNED IN SILOS, WITHOUT A GOOD UNDERSTANDING OF HOW NEW TECHNOLOGIES MIGHT, THROUGH CONVERGENCE, CREATE SYSTEM-WIDE RISKS AT A GLOBAL LEVEL.
DATA POISONINGCAN HAPPEN WHEN AN ATTACKER MODIFIES THE MACHINE LEARNING PROCESS BY PLACING INACCURATE DATA INTO A DATASET, MAKING THE OUTPUTS LESS ACCURATE. THE GOAL OF THIS TYPE OF ATTACK IS TO COMPROMISE THE MACHINE LEARNING PROCESS AND TO MINIMIZE THE ALGORITHM’S USEFULNESS.
ADVERSARIAL MACHINE LEARNING ATTACKS CAN BE CLASSIFIED AS EITHER MISCLASSIFICATION INPUTS OR DATA POISONING. MISCLASSIFICATION INPUTS ARE THE MORE COMMON VARIANT, WHERE ATTACKERS HIDE MALICIOUS CONTENT IN THE FILTERS OF A MACHINE LEARNING ALGORITHM. THE GOAL OF THIS ATTACK IS FOR THE SYSTEM TO MISCLASSIFY A SPECIFIC DATASET. BACKDOOR TROJAN ATTACKS CAN BE USED TO DO THIS AFTER A SYSTEMS DEPLOYMENT.
THERE ARE TWO MAIN TYPES OF ATTACKS THAT RELY ON ADVERSARIAL DATA: POISONING ATTACKS, IN WHICH THE ATTACKER PROVIDES INPUT SAMPLES THAT SHIFT THE DECISION BOUNDARY IN HIS FAVOR, AND EVASION ATTACKS, IN WHICH AN ATTACKER CAUSES THE MODEL TO MISCLASSIFY A SAMPLE.
THE MOST COMMON TYPE OF DATA POISONING ATTACK IS MODEL SKEWING, WHICH RESULTS IN THE CLASSIFIER CATEGORIZING BAD INPUTS AS GOOD ONES. THE ATTACKER POLLUTES TRAINING DATA IN SUCH A WAY THAT THE BOUNDARY BETWEEN WHAT THE CLASSIFIER CATEGORIZES AS GOOD DATA, AND WHAT THE CLASSIFIER CATEGORIZES AS BAD, SHIFTS IN HIS FAVOR
POISONING ATTACKS WORK BY FEEDING DATA POINTS INTO THESE SYSTEMS THAT SLOWLY SHIFT THE ‘CENTER OF MASS’ OVER TIME. THIS PROCESS IS OFTEN REFERRED TO AS A BOILING FROG STRATEGY. POISONED DATA POINTS INTRODUCED BY THE ATTACKER BECOME PART OF PERIODIC RETRAINING DATA, AND EVENTUALLY LEAD TO FALSE POSITIVES AND FALSE NEGATIVES, BOTH OF WHICH RENDER THE SYSTEM UNUSABLE.
CYBERCRIMINALS USE REVERSE ENGINEERING TO EXTRACT A REPLICA OF THE AI MODEL AND CARRY OUT THESE ATTACKS WHICH OFTEN GO UNNOTICED FOR A LONG PERIOD. THEREFORE, AI MODELS CAN BE SKEWED USING SOPHISTICATED TECHNOLOGIES TO PRODUCE A TARGETED RESULT.
CONTINUED TO 2--
.CHINAs GROWTH WILL CONTINUE FALLING.. SOE CHICKENS HAVE COME HOME TO ROOTS..
INDIA IS CURRENTLY THIS PLANETs FASTEST GROWING ECONOMY AT 10.1 %
THE BEGGAR WESTERN NATIONS ARE FEEDING FAKE DATA TO ARTIFICIAL INTELLIGENCE SYSTEMS TO SHOW THAT THEIR ECONOMIES ARE NOT IN RECESSION AND IS SMELLING OF ROSES....
ARTIFICIAL INTELLIGENCE ALGORITHMS WERE USED BY THE JEWISH DEEP STATE TO CRASH THE FINANCIAL MARKETS IN 2008.
THE 2008 FINANCIAL CRISIS BROUGHT THE WORLD TO ITS KNEES.
DEEP STATE CAN DO IT AGAIN—IT IS A PIECE OF CAKE IF YOU KNOW HOW TO POISON DATA. IN 2008 HARDLY ANYBODY KNEW ABOUT ARTIFICIAL INTELLIGENCE METHODS ..
DATA POISONING OCCURS WHEN AN ADVERSARY MODIFIES OR MANIPULATES PART OF THE DATASET UPON WHICH A MODEL WILL BE TRAINED, VALIDATED, AND TESTED. BY ALTERING A SELECTED SUBSET OF TRAINING INPUTS, A POISONING ATTACK CAN INDUCE A TRAINED AI SYSTEM INTO CURATED MISCLASSIFICATION,
TARGETED DATA POISONING IS WHEN AN ADVERSARY INTRODUCES A ‘BACKDOOR’ INTO THE INFECTED MODEL WHEREBY THE TRAINED SYSTEM FUNCTIONS NORMALLY UNTIL IT PROCESSES MALICIOUSLY SELECTED INPUTS THAT TRIGGER ERROR OR FAILURE.
WHEN DATA IS DELIBERATELY MANIPULATED TO DECEIVE FOR BETTER OR FOR WORSE– IT POSES A GREAT RISK TO INTEGRITY OF A SYSTEM WE HAVE GROWN TO TRUST
IT IS BETTER THAT THE WORD KNOWS THAT SUCH A THING IS POSSIBLE.. DATA-POISONING IS A NEW AND EXTREMELY POWERFUL TOOL FOR THOSE WHO WISH TO SOW DECEPTION AND MISTRUST IN OUR SYSTEMS—AND IT IS SO SIMPLE TO DO IT, BUT HARD TO DETECT
THE RISK IS AMPLIFIED BY THE CONVERGENCE OF AI WITH OTHER TECHNOLOGIES: DATA-POISONING CAN INFECT COUNTRY-WIDE GENOMICS DATABASES, AND POTENTIALLY WEAPONIZE BIOLOGICAL RESEARCH, NUCLEAR FACILITIES, MANUFACTURING SUPPLY CHAINS, FINANCIAL TRADING STRATEGIES AND POLITICAL DISCOURSE. UNFORTUNATELY, MOST OF THESE FIELDS ARE GOVERNED IN SILOS, WITHOUT A GOOD UNDERSTANDING OF HOW NEW TECHNOLOGIES MIGHT, THROUGH CONVERGENCE, CREATE SYSTEM-WIDE RISKS AT A GLOBAL LEVEL.
DATA POISONINGCAN HAPPEN WHEN AN ATTACKER MODIFIES THE MACHINE LEARNING PROCESS BY PLACING INACCURATE DATA INTO A DATASET, MAKING THE OUTPUTS LESS ACCURATE. THE GOAL OF THIS TYPE OF ATTACK IS TO COMPROMISE THE MACHINE LEARNING PROCESS AND TO MINIMIZE THE ALGORITHM’S USEFULNESS.
ADVERSARIAL MACHINE LEARNING ATTACKS CAN BE CLASSIFIED AS EITHER MISCLASSIFICATION INPUTS OR DATA POISONING. MISCLASSIFICATION INPUTS ARE THE MORE COMMON VARIANT, WHERE ATTACKERS HIDE MALICIOUS CONTENT IN THE FILTERS OF A MACHINE LEARNING ALGORITHM. THE GOAL OF THIS ATTACK IS FOR THE SYSTEM TO MISCLASSIFY A SPECIFIC DATASET. BACKDOOR TROJAN ATTACKS CAN BE USED TO DO THIS AFTER A SYSTEMS DEPLOYMENT.
THERE ARE TWO MAIN TYPES OF ATTACKS THAT RELY ON ADVERSARIAL DATA: POISONING ATTACKS, IN WHICH THE ATTACKER PROVIDES INPUT SAMPLES THAT SHIFT THE DECISION BOUNDARY IN HIS FAVOR, AND EVASION ATTACKS, IN WHICH AN ATTACKER CAUSES THE MODEL TO MISCLASSIFY A SAMPLE.
THE MOST COMMON TYPE OF DATA POISONING ATTACK IS MODEL SKEWING, WHICH RESULTS IN THE CLASSIFIER CATEGORIZING BAD INPUTS AS GOOD ONES. THE ATTACKER POLLUTES TRAINING DATA IN SUCH A WAY THAT THE BOUNDARY BETWEEN WHAT THE CLASSIFIER CATEGORIZES AS GOOD DATA, AND WHAT THE CLASSIFIER CATEGORIZES AS BAD, SHIFTS IN HIS FAVOR
POISONING ATTACKS WORK BY FEEDING DATA POINTS INTO THESE SYSTEMS THAT SLOWLY SHIFT THE ‘CENTER OF MASS’ OVER TIME. THIS PROCESS IS OFTEN REFERRED TO AS A BOILING FROG STRATEGY. POISONED DATA POINTS INTRODUCED BY THE ATTACKER BECOME PART OF PERIODIC RETRAINING DATA, AND EVENTUALLY LEAD TO FALSE POSITIVES AND FALSE NEGATIVES, BOTH OF WHICH RENDER THE SYSTEM UNUSABLE.
CYBERCRIMINALS USE REVERSE ENGINEERING TO EXTRACT A REPLICA OF THE AI MODEL AND CARRY OUT THESE ATTACKS WHICH OFTEN GO UNNOTICED FOR A LONG PERIOD. THEREFORE, AI MODELS CAN BE SKEWED USING SOPHISTICATED TECHNOLOGIES TO PRODUCE A TARGETED RESULT.
CONTINUED TO 2--
Data science is a multi-disciplinary field that uses scientific methods, processes, algorithms and systems to extract knowledge and insights from structured and unstructured data.
It is a blend of various tools, algorithms, and machine learning principles with the goal to discover hidden patterns from the raw data. .
A Data Scientist will look at the data from many angles, sometimes angles not known earlier. Data science is the study of data.
Computer data is information processed or stored by a computer. This information may be in the form of text documents, images, audio clips, software programs, or other types of data.
Data is distinct pieces of information, usually formatted in a special way. An example of data is an email. Data are plain facts. The word "data" is plural for "datum."
When data are processed, organized, structured or presented in a given context so as to make them useful, they are called Information.
Data themselves are fairly useless, but when these data are interpreted and processed to determine its true meaning, they becomes useful and can be named as Information.
Information is data that has been processed in such a way as to be meaningful to the person who receives it. it is any thing that is communicated. Data is the raw material that can be processed by any computing machine. Data can be represented in the form of numbers and words which can be stored in computer's language
To successfully evaluate big data sets, data scientists use a variety of tools from fields including computer science, predictive analytics, statistics, and artificial intelligence.
Data science is the same concept as data mining and big data-- use the most powerful hardware, the most powerful programming systems, and the most efficient algorithms to solve problems.
"Big data" is a field that treats ways to analyze, systematically extract information from, or otherwise deal with data sets that are too large or complex to be dealt with by traditional data-processing application software.
Data with many cases (rows) offer greater statistical power, while data with higher complexity (more attributes or columns) may lead to a higher false discovery rate.
Big data challenges include capturing data, data storage, data analysis, search, sharing, transfer, visualization, querying, updating, information privacy and data source. Big data was originally associated with three key concepts: volume, variety, and velocity.
When we handle big data, we may not sample but simply observe and track what happens. Therefore, big data often includes data with sizes that exceed the capacity of traditional usual software to process within an acceptable time and value.
Current usage of the term big data tends to refer to the use of predictive analytics, user behavior analytics, or certain other advanced data analytics methods that extract value from data, and seldom to a particular size of data set
I will be more elaborate about Data mining.
Data mining is one of the newer methods that market research companies are employing, but it serves as a foundation for both artificial intelligence and machine learning. ... It is a method for framing various hypotheses.
This data mining method helps to classify data in different classes.
The data mining technique in mined data is used by the AI systems for creating solutions. Data mining serves as a foundation for artificial intelligence. Data mining is a part of programming codes with information and data necessary for AI systems.
Machine learning is a type of data mining technique. Both Data Mining and Machine learning are areas which have been inspired by each other, though they have many things in common, yet they have different ends.
Data mining is performed by humans on certain data sets with the aim to find out interesting patterns between the items in a data set. Data mining uses techniques developed by machine learning for predicting the outcome.
Data mining is a technique of examining a large pre-existing database and extracting new information from that database, which is easy to understand.
Data mining is performed by humans on certain data sets with the aim to find out interesting patterns between the items in a data set. Data mining uses techniques developed by machine learning for predicting the outcome.
Machine Learning is the ability of a computer to learn from mined datasets.
TO BE CONTINUED-
CAPT AJIT VADAKAYIL
..
SOMEBODY ASKED ME
CAPTAIN, WHAT IS THE DIFFERENCE BETWEEN DATA SCIENCE, DATA MINING AND BIG DATA..
I WILL SOON POST ON AI PART 2 - MY NEXT POST
https://ajitvadakayil.blogspot.com/2019/08/what-artificial-intelligence-cannot-do.html
WATCH HOW DEEP STATE TOOLS GOOGLE/ TWITTER/ FACEBOOK ETC HAVE SCREWED YOU..
https://www.youtube.com/watch?v=hvMKFTBMmJM
https://www.youtube.com/watch?v=ucRWyGKBVzo
WHEN JACK DORSEY BANS YOUR TWITTER ACCOUNT AND ASKS FOR YOU MOBILE NUMBER-- HE WANTS TO TRACK YOU ( GOOGLE MAPS ) AND SPY ON YOU..
PRISM IS A CODE NAME FOR A PROGRAM UNDER WHICH THE UNITED STATES NATIONAL SECURITY AGENCY (NSA) COLLECTS INTERNET COMMUNICATIONS FROM VARIOUS U.S. INTERNET COMPANIES PRISM BEGAN IN 2007 IN THE WAKE OF THE PASSAGE OF THE PROTECT AMERICA ACT UNDER THE BUSH ADMINISTRATION
EDWARD SNOWDEN BLEW THE WHISTLE.. PUTIN GAVE HIM ASYLUM, OR HE WOULD HAVE BEEN ASSASSINATED UNDER ORDERS OF THE US PRESIDENT
capt ajit vadakayil
..