Posts

Showing posts with the label Article

WANT TO MAKE YOU OWN CHATBOT ?THEN THIS ARTICLE IS FOR YOU!!

Image
PREREQUISTE Anyone can make a chatbot technical/non-technical person. IBM watson do not need any programming background. First thing that you need to do to make a chatbot on IBM WATSON is to make an account on it . Just google IBM watson chatbot and you will be provided with the necessary information and links. IBM Watson The moment you make an account on IBM WATSON it has numerous information for you to on how to  make a chatbot such as read the documentation,watch the training videos, watson blog  , etc . That is why i have decided not to  explain the whole process but i will be giving you the overview of a chatbot and after reading the article it would become so much easy for you to make a chat bot. After logging into your account you will see  the dashboard . Just click on the catalog and choose Watson then you will be headed in the main page of building with IBM Watson. Click on the box of build a chatbot.  Now first you need to  open your  watson assistant and name it MyFirstAssi

Can I make my own custom search engine from scratch?

Image
T he title is quite intriguing but interesting. As a student of computer science I had always thought how a search engine works, it knows about a newly commissioned web resource, whether a website is up or down, why a website takes time to show-up in search results? There are many questions, but the only answer is search engine. This is first article in series of search engine which will cover the basics, modules of search engine, development of the modules with code and results, integrating the modules with one framework. We all use search engine daily like ok Google when cab is going to arrive, when is my birthday? Alexa will it rain today? Search engines like Google and duckduckgo do same things, but ideologically different. So lets get down to basics of search engines and get our hands dirty with coding a basic search engine. Basics Search engines are a complex piece of code which does so many things like searching for the answer to the question user had asked, calculating which w

Artificial Intelligence

Image
Artificial Intelligence or AI is the feature which provides the ability to a digital computer to think and mimic like the conscious human brain. It is the most developing field in today's world. Many research work are done in this field. It is the future technology which will change the complete life. Branches of Artificial Intelligence Machine Learning Deep Learning Neural Networks Robotics Natural Language Processing Machine Learning Machine learning is a method of data analysis that automates analytical model building. It is a branch of artificial intelligence based on the idea that systems can learn from data, identify patterns and make decisions with minimal human intervention. It makes the computer to learn from the given data. It is one of the most interesting technology to learn. Machine learning is actively getting used nowadays, maybe in more places than one would expect. Machine Learning is of following types depending upon the data available: Supervised Learning: In th

Firewall [A Beginner’s Guide]

Image
  Introduction Every year many cyber attacks happen to our IT infrastructure by hacker’s. These people have one motto that is to turn down the system, ask for ransom, sabotage the image of an organization and many more. This is our responsibility to keep ourselves ready for any such incidence and keep our country safe from any such activity. Therefore, to keep our younger generation abreast with the technological advancements so I had started this initiative. In this article, I will discuss about the basics of firewall and in subsequent articles I will discuss about implementation of firewall and use of its different features.  A firewall is a first line of defence from outsiders in a network. They can be both software and hardware. This software helps our network from any danger which might sabotage our system. Technically, it is a protective system that secures a network by filtering incoming and outgoing traffic. We can do this by defining custom rules in firewall.  There are majorl

NumPy

Image
NumPy is a python library which allows us to efficiently use the memory. It is mainly work on the n-dimensional array. To work on any data science NumPy is the initial step. It is also very helpful for Machine Learning. Why NumPy It manages the memory efficiently. It works on the n-dimensional array. It uses the algorithms written in C that make it fast and completed in nanoseconds rather than the seconds. Provides number of function which is very useful in the programs. Installing NumPy To install NumPy we will use powercell, Open Powercell Type the code "pip install NumPy" and press the enter. Your installation will be started. How to use You can use any text editor like Jupyter, colab, etc for programing. To use the NumPy in the program we need to import it by using the code: import numpy as np here, we are defining the numpy as np to ensure the we don't need to type the numpy again and again. Getting Started with Array 1-dimensional array Defining the array is very ea

APPROACH TOWARDS CLUSTER COMPUTING

Image
  Cluster computing is the software or tool which is used to presenting  the latest research and technology in computer systems and networks.   It is a single logical unit that are linked through LAN. It provides faster processing speed larger speed larger storage capacity and better data integrity. It need good data integrity in cost.  It presents research and applications in parallel processing Disadvantages Of Cluster Computing Difficult to organize a large number of computers. poor performance in case of non –parallelizable applications. It increases power consumption. Advantages Of Cluster Clustering It enables data recovery in the event of disaster in data processing Need Of Cluster Computing Clustering is used to explore data.it is used to find natural groupings.  It is used for data -preprocessing . it finds cluster of data that are similar in sense to one another.  It is also used to segment the data which is also previously defined. PRIYANSHI VASHISTHA (2019-2023) Computer Sc

COMPUTER VISION

Image
  Computer vision is one of the main technologies in the world that enables the digital world to the physical world. It enables self-driving cars to make sense of the physical world. It plays  very important role in facial applications to see the real identity of people’s face. It has nuanced applications. It is an in disciplinary scientific field so it gains high level understanding. Use of Computer Vision Computer vision begins with the acquisition of images. It is the use of information presents I visual images. Using a computer to analyze images also called machine vision. It is an integralpartof artificial intelligence. It is not only one technology but after combined with others it creates intelligence. Computer vision describes the process of using digital images and videos to gain stronger insights from users. Information from data sources is extracted automatically and understands. Goal of Computer Vision The goal of computer vision is to understand the content of digital imag

SPOOFING

Image
  Spoofing means to provide false information about your idea gain unauthorized identity to gain unauthorized access to others computer systems. In a spoofing attack one person or program successfully pretends as another falsifying data thereby gaining as illegal advantage. IP spoofing are the most popular spoofing attacks. The objective of IP spoofing is to make the data look as if it has come from trusted host as it. Spoofing is always done with an intention. Types of Spoofing IP Spoofing:  It do not provide mechanisms for authenticating the source or destination of a message ad they are thus vulnerable to spoofing attacks to verify the identify the sending or receiving post.  Content spoofing: It includes the caller’s number and sometimes  Caller ID spoofing:  It includes the caller’s name and caller’s number., it allows to hack the caller’s id information. E-mail spoofing: The sender information shown in emails. It is commonly used by spammers to hide the origin information   Concl

VPN NETWORKING

Image
  VPN is an online privacy and creating a private network from a public internet connection. When the internet was first designed the packets(chunk of data) as really possible. It creates the virtual tunnel through which data travels from one computer to another over the network. Due to this an attacker gets the way to use the client to relay attack through the VPN tunnel. VPN fingerprinting. username enumeration vulnerabilities offline password cracking lack of account lockout offline password cracking Insecure Storage of Authentication Credentials by VPN Clients storing the username unencrypted in a file or registry storing the password in a scrambled form storing the permission s credentials. Types of VPN PPTP: This is the most commonly and widely used VPN protocol SITE TO SITE VPN: This is similar to PPTP but there is no dedicated line for transmission for  this.it worked with hardware and software based firewall devices. L2TP: It provides not only data confidentiality but also

ROBOTICS

Image
Robotics is the intersection of science and technology. It is an interdisciplinary field of computer science. It is not easy to define what robots are and it is not easy to categorize them. Each robot has its own feature .we can classify robots into 15 types. Some of them are fully explained here.’ The main era of robotic research and development was mid the 20th century, primarily within an industrial environment where repetitive movements and lifting of heavy objects… Joseph F.  Engel Berger and George Devol developed the first industrially used robots in 1961. 1. Aerospace: This is a category in which all sorts of flying robots come. Like smart bird robotic seagull and the raven surveillance drone .but these robots can operate only in space such as mars, rovers, and NASA’s Robonut. 2. Consumer: These types of robots you can buy and can use just for fun too. Examples of these types of robots are robot dog Aibo, Roomba vacuum, AI powers robot assistants, and these have also come in