Friday 28 April 2017

Controlling a Robot is Now as Simple as Point and Click

Robot
Robots are on the rise: They ride, fly, swim or run on two or more legs. They work in the factory, are used in war and in disaster areas. Soon they will have conquered the household: they keep the apartment clean, serve the party guests, or maintain the grandparents. Even the toy will lead a life of its own. Each and every day the field of Robotics are getting more and more advanced.

Recently, a group of tech guys in Georgia Institute of Technology has found a new interface to Controlling Robot in just a point and click. The outmoded edge for tenuously functioning robots works just well for roboticists. They use a computer to autonomously switch six degrees, whirling three simulated rings and regulating arrows to get the robot into location to snatch items or execute an exact job.

This new interface seems to be cumbrous and erroneous for the older people or the people who are technically not advanced try to govern the assistive personal robots.

It is much modest, more well-organized and doesn’t involve major training period. The manipulator just points and clicks on a thing, then selects a clench. And the rest of work is done by the Robot itself.

It is said by Sonia Chernova, Catherine M. and James E. Allchin Early-Career Assistant Professor in the school of interactive computing that as an alternative of successions of rotations, lowering and hovering arrows, amending the grasp and fathoming the exact depth of field, they have abridged the procedure in just couple of clicks.

Her college students had found that the point & click mode ensued in suggestively littler errors, permitting accomplices to achieve tasks more hurriedly and consistently than using the outmoded method.

The outmoded ring-and-arrow-system is a split screen process. The chief screen shows the robot and the scene it plays; the next one is 3-D, collaborating view where the operator regulates the cybernetic gripper and communicates with the robot precisely what to do. This process makes no use of scene info, providing operators a thoroughgoing level of control and suppleness. However this choice and the magnitude of the terminal can develop an affliction and upsurge the number of booboos.

Controlling Robot by the means of point-and-click set-up doesn’t take account of 3-D representing. It only affords the camera interpretation, ensuing in a humbler edge for the user. Later a person snaps on an area of an element, the robot’s acuity system examines the objective’s 3-D apparent geometry to regulate where the gripper ought to be placed. It’s analogous to what we ensure once we place our fingers in the accurate positions to grip something. The computer formerly proposes a limited grasps. The user agrees, placing the robot to work.

In addition it considers the geometrical shapes, with creating conventions about minor sections where the camera cannot perceive, for example the backside of a flask. To do this work, they are influencing the robot’s aptitude to do the similar thing to make it conceivable to merely communicate the robot which thing we would like to be selected.


Wednesday 26 April 2017

Biased Bots: Human Prejudices Sneak into Artificial Intelligence Systems

Bot

Biased robots are here with human prejudices seeping their AI

Most of the AI experts believed that the artificial intelligence will offer objectively rational and logical thinking for the robots and systems in future. But a new study has is showing a darker path for AI wherein the machines are acting reflection so human and the AI is prejudiced with the human notions.

It has been found when the common machine learning programs are trained online with the ordinary human language then they are likely to acquire the cultural biases and this can get embedded right into the patterns of their wording. The ranges of these biases are quite erratic from the preference to certain lower to having some objectionable view about the race or gender.

Security experts has stated that it is extremely critical and necessary to address the rise of biases in the machine learning at the earliest as it can seriously impact their reasoning and decision making in future. In upcoming days we will be turning to the computers for processing a number of things ranging from the natural language translation for communication to making online text searches as well as image categorization.
Fair and just

Arvind Narayanan, an assistant professor of computer science at the Center for Information Technology (CITP) at Princeton has stated that the artificial intelligence should remain impartial to the human prejudices in order to offer better result and judgment making skills. He asserted that fairness and bias present in the machine learning has to be taken seriously as our modern will depend on it in near future.

We might soon be finding ourselves in the center of such situation wherein modern artificial intelligence system will be frontrunner is perpetuating the historical patterns of bias within the system without even us realizing it. If such events comes in the future then it will be completely socially unacceptable and we will still remain good old times rather than moving forward.

An objectionable example of bias seeping into AI

Just a few years ago in 2004, a study was conducted by Marianne Bertrand from the University of Chicago and Senhil Mullainatahan from Harward University. These economists conducted a test wherein they sent out about 5000 identical resumes to over 1300 job advertisements.

They only change the name of the applicants’ names which happened to be either the traditional European American or the African American and the results they received were astonishing. It was found that the European American candidates are 50 percent more likely to get an interview than the African American candidates. Another Princeton study has shown that the set o African American comes more unpleasant associations than the European American sets when it is run through automated system run by the artificial intelligence based systems.

Therefore it has become a necessity to distance the AI from the biases and prevent the cultural stereotypes from further perpetuation into the mathematics based instruction of the machine learning programs. It should be taken as the task of the coders to ensure that machines in future reflect the better angles of the human nature.

Metal as Fuel? These Canadian Scientists are Working to Make it Happen

Can we turn metal into fuel? Canadian scientists are just doing it.

The fuel as we known petroleum and gas will be over in next two decades and we have very little time come up with an alternative. So as per the mainstream technology news some of the Canadian scientists have found of turning the metal into fuel for vehicles in near future.

The researchers from the McGill University have been aggressively studying the combustion capabilities of the metal that also for over a decade. An experiment conducted by them last week in the space has helped in bringing a new twist to their hope of turning metal into fuel.

How this study has helped the scientists?

The technology news has affirmed that the reason behind conducting the experiment in space has the scientists in understanding the way practices react in weightlessness state. Using metal as a fuel is still a farfetched and unusual concept which seems to be an exclusive matter of science fiction but still it can be turned into reality. One of the researchers present in team named Andre Higgins has been studying and working on the concept of turning metal into fuel over two decades.

Collectively they had found that turning metal in powder can help in creating fuel which can be fed to the burner. This fuel will be highly efficient and it will help in releasing more energy and heat per litre of iron power than what is achieved today with a liter of gas.

Quite interestingly the residue in form of iron oxide can again be collected using a vacuum to act as the fuel again. Higgins proudly states this theory as the closed loop system which has higher efficiency than the bio fuel as well as the modern day fuels used in the vehicles.

Saving the planet with green fuel

Metal fuel will not be a ‘green’ fuel and the threat to the Mother Nature and global climate changes will be aggravated if we bring the metal fuel in daily usage. Technology news further shed light onto how researchers will be employing a noble way of recycling the metal fuel with closed-loop system.

These researchers have studied the metal fuels for over a decade which has helped in understanding how it can be brought into fruition for the benefit not the smaller vehicles like cars but also the large vehicles like ships and trains.

A state like Canada which has abundant of metals will certainly see the economic benefits of the shipping metal fuel to other countries. Countries suffering from acute air pollution like China will benefit from the truly closed loop system of the metal fuel.

The biggest benefit of the metal fuel is that it works in closed system wherein the materials will go around and around without causing any harm to the environment. Technology news also brought a revelation that metal fuels isn’t a new thing as NASA has already been using about 16 percent Aluminum powder for its space shuttle’s rocket boosters for quite some time.

Simple Ways to Safeguard Your Computer from Hackers and Malware

1
credit: online tech tips
There are hackers out there lurking around searching for unsecured computers and smartphones to hack into. If you’re not careful, you could become their next victim. Nowhere is safe, not at restaurants, hotels or even your home. However, if you take the proper precautions, you can decrease the chances of a hacker breaking into your computer. The way hackers are able to access your devices is through the internet, so this is where you need to begin setting up walls. Here’s what you can do today to improve the security of your home devices.

Install a Firewall

Most computers come with trial versions that offer firewall security, but once this expires, you’re on your own. There are two types of firewalls you can use to protect your computer – one that comes in the form of software and the other that comes in the form of hardware. Both act similarly, but are used for different reasons. When you install a firewall, you’re creating a first line of defense for your computer. This barrier stops unauthorized programs from the web, keeping them from opening up on your computer. Make sure your firewall is always on, whether you’re at home or staying at the Hilton.

Set Up Antivirus Software

Another way to boost the security of your computer is to install antivirus software. This also stops unauthorized software and codes from operating on your computer system. This includes viruses, trojans, keyloggers and other intrusive software that are designed to steal, delete and corrupt your files, or even spy on you. Antivirus software offers real-time protection from these threats.

Install Anti-Spyware Software

Spyware is everywhere and it’s used for both innocent and harmful purposes (depending on the user). The purpose of spyware is to collect data from you that is then redirected to a third party. This information can be used for advertising purposes by companies or for sinister purposes of a hacker. Like antivirus software, this can hep to protect your system from these intrusions in real time.

Always Use Complex Passwords

The passwords you create for your emails, social media, financial institutions and computer log-in should be secure and complex. No one should be able to guess it, so never use your name, birthday or those of your closest family members. This is the first thing hackers will try. As a rule of thumb, your passwords should be at least 8 letters long, contain a number, a special symbol and an uppercase letter. The more complex your password, the more difficult it will be for hackers to figure it out. Make sure you don’t share it with anyone or write it down on documents that can be stolen from your computer files.

Check Your Browser Security Settings

Make sure the browser you’re using while surfing the web is secure. Look at the security and privacy settings to see how it’s set up. Make the necessary changes to make it more secure. This is important since a lot of websites now track what you’re doing on the web (for advertising purposes).

9 Easy Things You Can Do to Stay Safe on Your Android Phone

Android Phone
Android mobile phone: If it falls down it goes broken, if it is stolen, all data are lost. It does not have to be. We provide you with valuable tips that make your smartphone safe. Smartphones now accompany us everywhere, know almost everything about us and organize our days. Reason enough to secure its smartphone comprehensively. We trust our smartphones that contains all our data, and often forget to take the Android Security measures if in case it gets into the wrong hands. For this reason, you should pay particular attention to good safety precautions for your smartphone.

There are cases where practically every hope is in vain. This includes a fall of the smartphone from heights or a theft by a professional. But in all other cases, you can do very much to make your smartphone safer. Just follow our tips!

Theft protection

If the smartphone is stolen or lost, then you will feel less like you have lost your wallet. Therefore, we advise all smartphone users to install and activate the anti-theft protection. Such a possibility is provided by most anti-malware solutions, which we also present in this Android user edition. If you only want to use the anti-theft protection, we recommend the application Cerberus anti-theft of the developer LSDROID. It brings a lot of possibilities and can be controlled via SMS or via a web front end.

Save important data

Connect the mobile phone to the PC, start the app and back up data. But which data is really valuable to you? Contacts, SMS messages and the photos… There are solutions for automatic backup. You secure the contacts via your GMail account. We recommend this even if you are not actively using GMail.

To save the photos, you create a Google+ account and activate the instant upload via WLAN. If you are photographing relatively little, then you must definitely activate the upload in original size. This gives you "only" 5 GB of storage space, but your photos are kept in the original (and you can later purchase additional storage, if desired). If Google+ is really only a backup, select the default size in the settings for the Instant Upload of Google+ under Store Size. This allows you to back up as many photos as you want in the Google Cloud, but with a maximum of 3 megapixels. All photos remain private and you do not need to actively use Google+ for this service.

PIN code or pattern

Even if it is cumbersome to unlock your own smartphone again and again with a PIN code, password or pattern: make the effort! This is the only way to avoid theft or loss of the data on your smartphone. To set the display lock, enter the settings and select Security -> Display lock. If you choose a pattern, avoid obvious such as Z or N and set a reciprocal motion. This prevents someone from recognizing the pattern due to streaks on the touchscreen. Also make sure that the Make visible checkbox is not set. So you see at most a wrong pattern, but never the right one.

Viewing angle protection film

The best password or the best unlocking pattern will not be useful if someone is watching you unlock the Android device. The fact that someone looks over your shoulder can prevent you in most cases, but what about side looks? Here is a viewing angle protection film, also called privacy filter. Once mounted on the display, you can practically no longer see what happens on the touchscreen from the side.

Protective covers

Admittedly, many protective covers do not look great, but most of them protect your smartphone from glass breakage when the smartphone falls from the breast to the ground. Make sure that the bumper is made of a soft material and provides an additional edge around the display so that it will get ground contact on impact, not the touch screen.

Two-way authentication

Do you use simple passwords or do you often log on to other computers on Google? Then you should use two-step verification from Google. To do so, log in to your Google Account and then set up the confirmation. In the simplest case, you will get an SMS on your mobile phone, but there is also an offline application for Android Security, which generates the necessary codes for the login. This does not make your mobile phone safer, but it will protect your Google account. The details explain our free article on the website

Protection in WLAN hotspots

Do you like surfing at McDonald's, Starbucks, or other hotspots with many unknown users? Then you should be aware that it is easy with every rooted Android smartphone and the appropriate apps to "hijack" even HTTPS encrypted connections and thus intercept login data and passwords. The App DroidSheep Guard by Andreas Koch protects you against this danger. The app notices, if someone tries to divert the network traffic over its own device and switches in such a case automatically the WLAN from. As the only app on Google Play, it performs this task reliably, free of charge and without ads.

Safe mode

You have the feeling that something is wrong with your smartphone, you may have installed a malicious app, or someone fiddled with your smartphone? Then restart it in safe mode. To do this, hold down the power button on the touch screen until a dialog box appears to select Safe Mode. Your Android device then only offers the apps to the start, which were packaged by the manufacturer on the mobile phone. So you have time to check the installed apps and delete malicious software. The mode is also an excellent way to find a good deal. If the running time is much better in safe mode, then one of the additionally installed apps must be responsible for the high battery consumption. Safe mode will automatically stop when you restart the smartphone.

Install anti-malware software

Even if there are currently no really bad apps on Google Play, there are enough dangerous apps in Google Store that you will not be able to install. To be protected against such and other malware, you should install anti-malware software. For a basic protection the free version is sufficient for most providers. For Android users, AVG AntiVirus Mobile Security PRO is available free of charge in this edition for one year.

Encrypt the storage

Since Android 4.0, there is the possibility to encrypt the complete smartphone. The file system is fragmented in such a way that it can only be re-assembled with a password or PIN code. This feature provides high data protection when the phone is switched off. In operation, the encryption is nothing to remember, all files are normally available. Since the process takes about an hour, you must first fully charge the mobile phone and leave it on the charger until the encryption is finished. You can find the setting under Security -> Phone Encrypt. Here you also define whether the mobile phone is to query the PIN code of the SIM card at startup.