Posts

WANT TO MAKE YOU OWN CHATBOT ?THEN THIS ARTICLE IS FOR YOU!!

Image
PREREQUISTE Anyone can make a chatbot technical/non-technical person. IBM watson do not need any programming background. First thing that you need to do to make a chatbot on IBM WATSON is to make an account on it . Just google IBM watson chatbot and you will be provided with the necessary information and links. IBM Watson The moment you make an account on IBM WATSON it has numerous information for you to on how to  make a chatbot such as read the documentation,watch the training videos, watson blog  , etc . That is why i have decided not to  explain the whole process but i will be giving you the overview of a chatbot and after reading the article it would become so much easy for you to make a chat bot. After logging into your account you will see  the dashboard . Just click on the catalog and choose Watson then you will be headed in the main page of building with IBM Watson. Click on the box of build a chatbot.  Now first you need to  open your  watson assistant and name it MyFirstAssi

Can I make my own custom search engine from scratch?

Image
T he title is quite intriguing but interesting. As a student of computer science I had always thought how a search engine works, it knows about a newly commissioned web resource, whether a website is up or down, why a website takes time to show-up in search results? There are many questions, but the only answer is search engine. This is first article in series of search engine which will cover the basics, modules of search engine, development of the modules with code and results, integrating the modules with one framework. We all use search engine daily like ok Google when cab is going to arrive, when is my birthday? Alexa will it rain today? Search engines like Google and duckduckgo do same things, but ideologically different. So lets get down to basics of search engines and get our hands dirty with coding a basic search engine. Basics Search engines are a complex piece of code which does so many things like searching for the answer to the question user had asked, calculating which w

Artificial Intelligence

Image
Artificial Intelligence or AI is the feature which provides the ability to a digital computer to think and mimic like the conscious human brain. It is the most developing field in today's world. Many research work are done in this field. It is the future technology which will change the complete life. Branches of Artificial Intelligence Machine Learning Deep Learning Neural Networks Robotics Natural Language Processing Machine Learning Machine learning is a method of data analysis that automates analytical model building. It is a branch of artificial intelligence based on the idea that systems can learn from data, identify patterns and make decisions with minimal human intervention. It makes the computer to learn from the given data. It is one of the most interesting technology to learn. Machine learning is actively getting used nowadays, maybe in more places than one would expect. Machine Learning is of following types depending upon the data available: Supervised Learning: In th

Firewall [A Beginner’s Guide]

Image
  Introduction Every year many cyber attacks happen to our IT infrastructure by hacker’s. These people have one motto that is to turn down the system, ask for ransom, sabotage the image of an organization and many more. This is our responsibility to keep ourselves ready for any such incidence and keep our country safe from any such activity. Therefore, to keep our younger generation abreast with the technological advancements so I had started this initiative. In this article, I will discuss about the basics of firewall and in subsequent articles I will discuss about implementation of firewall and use of its different features.  A firewall is a first line of defence from outsiders in a network. They can be both software and hardware. This software helps our network from any danger which might sabotage our system. Technically, it is a protective system that secures a network by filtering incoming and outgoing traffic. We can do this by defining custom rules in firewall.  There are majorl

NumPy

Image
NumPy is a python library which allows us to efficiently use the memory. It is mainly work on the n-dimensional array. To work on any data science NumPy is the initial step. It is also very helpful for Machine Learning. Why NumPy It manages the memory efficiently. It works on the n-dimensional array. It uses the algorithms written in C that make it fast and completed in nanoseconds rather than the seconds. Provides number of function which is very useful in the programs. Installing NumPy To install NumPy we will use powercell, Open Powercell Type the code "pip install NumPy" and press the enter. Your installation will be started. How to use You can use any text editor like Jupyter, colab, etc for programing. To use the NumPy in the program we need to import it by using the code: import numpy as np here, we are defining the numpy as np to ensure the we don't need to type the numpy again and again. Getting Started with Array 1-dimensional array Defining the array is very ea

The Tor Browser

  With time everyone wants CIA i.e., confidentiality, integrity, and availability of their data. But while using a browser like Chrome, Mozilla Firefox, etc it is easy to get knowledge about your activity on the internet for example which site you had visited, online post and messages, etc. The Tor Browser is going to be the proper solution to keep up the privacy of your data. What is Tor Browser? Tor is a Freely distributed Application Software, which enables us to surf the Internet anonymously, making it easy to guard our identity online. It's open-source which is safe and reliable.  Also known as “Onion Router” because of its working mechanism written in C programming language. Can be downloaded on Mac, Linux, Window and mobile devices too. How does it work? Tor  runs on the concept of  Onion routing . In onion processing, layers are built into each other just like other onion layers. It uses identical servers, consecutive TCP / IP codes, and also the same encryption algorithms

BLUE EYE TECHNOLOGY

  INTRODUCTION OF BLUE EYE TECHNOLOGY: The blue eyes technology works on artificial intelligence and aims to give human abilities of the computer. It aims to give human power possibilities to a computer so that systems can naturally interact with human beings directly. This technology is used to simplify by providing user-friendly facilities. This helps to reduce the gap between humans and computers. REQUIREMENT OF BLUE EYE TECHNOLOGY:- To avoid and reduce human errors like: *Tiredness –huge load of work *Mental illness-typical body imbalance *emotional outcomes- the outrage of emotions like fear and anger *brain unconsciousness The Blue-eye is the mouse that senses the psychological attributes which are correlated to emotions using a correlation model by simply touching the mouse, the computer will be able to determine a person’s emotional state.