Saturday, May 31, 2025

How to save energy in programming? The answer is reverse programming.




AI boosts programming most in the environment. AI requires lots of energy, and that is one of the things. That limits the use of the AI. AI requires a very large-scale data infrastructure. The AI server means data-center-size server systems. Programming also requires energy, and the problem with AI is its so effective. AI with qualified programmers is the ultimate combination. 

But there must be something that limits the use of electricity. AI is used in programming because it's a very agile method. The AI makes lots of code in a short time. But AI requires data. That it can make valuable software. Programmers train the programming AI like all other AIs are trained. The AI is a tool that can make things better but it requires intensive training. The programmer interacts or discusses with the AI about things. That it must do. The programmer must put things like paths into the right form. 


1) The intelligent solutions that mean the expanding data-handling structure. Neural network-based solutions take their job from the programmer. The system makes the drive, where the information travels around the system. And if the solution is not good, the AI calls more microchips to operate with that structure. That means the neural network gives only the necessary power to the system. 

2) The system can use speculative solutions. The AI learns what kind of software the developer makes. And then that thing makes the trunk for the program using things. That is stored in its hard disk. Then it starts to cooperate with the programmer. The programmer can see the demos of the programs that the system made before. 


Then the programmer can order the system to make an example of similar menus, as there were in "Project 6".  The programmer can recycle code from other projects, if the system has access to them. That means the system must not generate all the codes that it requires. The system must store those codes in the hard disk so that they are easy to use for other projects. 

Reversive computing means that the system can make everything in the opposite order. Sometimes people say that reversible computing means that the system can make calculations backward. This means that the system follows the mathematical principle that checking the formula happens by calculating its calculations backward. So we all know that the 4+1=5. 

The computer can check the calculation by calculating that formula backward 4=5-1. This is one version of how to make the code error-free. This kind of thing might look like very effective. But there are always problems with more complicated formulas. The system can also search for matching details from other tasks that fit that solution and share it with those things. 

Another way that decreases the computer's work is speculative computing. Speculative computing means that the computer makes tasks that repeat often before it gets the data handling mission. Speculative computing is like a secretary, who makes the work. That repeat is often ready before the boss brings it to the meeting. The speculative systems ask the computer. 

That takes a mission in questions like: Are there calculations like 4+1, and if the port computer says "yes" that marks the answer to the right modules. The system can handle every line in the program code as the module. The gate computer just says that if there are some formulas in the certain module. For this: "Is there 4+1 the gate computer says that "yes in line (or module) 3). Gate computer means the computer. That logs information in the neural network. That means a speculative system can make that point ready and wait for the new commands. 





Sunday, May 25, 2025

The new technology gives supervision to people.



"Infrared-seeing contacts are here. Transparent, power-free, and wearable, they let users perceive near-infrared light in color, opening doors for superhuman sight and enhanced visual communication." (ScitechDaily, From Sci-Fi to Superpower: These Contacts Let You See in the Dark With Your Eyes Closed)

*****************************************************

Imagine slipping on a pair of contact lenses and suddenly being able to see infrared light—without any bulky equipment or even a battery. That’s now a reality thanks to breakthrough lenses developed by scientists that convert invisible infrared into visible colors.

Mice tested with the lenses navigated away from infrared light, while humans could perceive flickering codes and light directions. The lenses even work better with eyes closed, thanks to superior penetration of infrared light.

Infrared Vision Through Contact Lenses

Scientists have developed futuristic contact lenses that let both humans and mice see infrared light by converting it into visible light. These lenses work very differently from bulky night vision goggles. 

They don’t need any power source and allow users to view multiple types of infrared wavelengths at once. Because they’re transparent, you can see both regular light and infrared light together. Amazingly, the infrared vision actually worked better when users had their eyes closed." 


(ScitechDaily, From Sci-Fi to Superpower: These Contacts Let You See in the Dark With Your Eyes Closed)


*****************************************************


The new contact lenses allow a person to see in the dark while eyes are closed. Those contact lenses give an IR vision for the user. That means a person can see in absolute darkness. 

That ability makes it possible to operate and see in the dark. Those lenses give a person the ability to see thermal objects, which is a good ability for firemen, police, and military personnel. 

Intelligent contact lenses are problematic systems for their power supply. Those systems require very small and powerful batteries that a person can switch or load easily. Maybe biological systems like bacteria that produce electricity can give answers to that problem. The answer can be the system that produces electricity from salt in the shell of the eye. 

Intelligent contact lenses and sunglasses can give the ability to interact with the internet. The system can have cameras in the frames or in the middle of the lens. That means the "lens" is the screen where data from multiple sensors and information tools are fusion into that screen. The system can show what happens in front of that user. 

Then it can collect the data from surveillance cameras and the route to the target. Things like airborne drones can give backup information for the system. This kind of system can also connect with the eye retina implants. There are two ways to make the robot eye interact with brains. The neuro-implanted microchips can be installed in the optic nerve. 

It can also be put in the optical lobe of the brain. That kind of system can restore vision to people. The synthetic retina implant, CCD chip can get the electricity that it needs from the optic lobe. Then it can communicate with the brain using wireless or wired communication. 


And genetic engineering is the new tool. 


Genetic engineering makes it possible to make synthetic biological eyes for humans. Those artificial organs can also replace animal tests for chemicals and cosmetics. Artificial eyes with communication ability with computers can tell how painful some sprays are without harming animals. 

But genetically engineered cells can make it possible to restore vision to people using cloned retina cells. Then the genetically engineered cells can be used to replace the neurons. Those cells can make the bridge over damaged axons. And then the programmed DNA can turn those cells that make chains into neurons. 

That kind of therapy that is based on genetic manipulation can be the permission of tomorrow. The ability to control the genomes makes it possible to create things like eagle's, or cat's eyes. Which cells surface antigens that fit certain people. Those organs can give the person super abilities. Theoretically, they are as easy to transplant to humans. As regular eye transplants. 


https://scitechdaily.com/from-sci-fi-to-superpower-these-contacts-let-you-see-in-the-dark-with-your-eyes-closed/


The leak in speculative execution sent 5000 bytes in a second into the hands of hackers.




"ETH Zurich scientists have discovered a new CPU flaw that lets attackers read private memory from shared Intel processors — exploiting a nanosecond timing glitch in prediction logic. Credit: SciTechDaily.com" (ScitechDaily, Intel’s Memory Leak Nightmare: 5,000 Bytes per Second in the Hands of Hackers)

In modern computing, even nanosecond is a long time. In that time AI can break down defenses using data injection. 

The memory leak left 5000 bytes per second in the hands of hackers. The ability to see the data flow. That comes out from the processor is one of the most dangerous situations in data security. Researchers found vulnerabilities in the actions called "speculative execution". Wikipedia determines speculative execution like this: 

*********************************************************************

Quote from Wikipedia. 

Speculative execution is an optimization technique where a computer system performs some task that may not be needed. Work is done before it is known whether it is actually needed, so as to prevent a delay that would have to be incurred by doing the work after it is known that it is needed. If it turns out the work was not needed after all, most changes made by the work are reverted and the results are ignored.

"The objective is to provide more concurrency if extra resources are available. This approach is employed in a variety of areas, including branch prediction in pipelined processors, value prediction for exploiting value locality, prefetching memory and files, and optimistic concurrency control in database systems."


Overview

Modern pipelined microprocessors use speculative execution to reduce the cost of conditional branch instructions using schemes that predict the execution path of a program based on the history of branch executions. In order to improve performance and utilization of computer resources, instructions can be scheduled at a time when it has not yet been determined that the instructions will need to be executed, ahead of a branch.

Variants

Speculative computation was a related earlier concept.

Eager execution

See also: Eager evaluation

Eager execution is a form of speculative execution where both sides of the conditional branch are executed; however, the results are committed only if the predicate is true. With unlimited resources, eager execution (also known as oracle execution) would in theory provide the same performance as perfect branch prediction. With limited resources, eager execution should be employed carefully, since the number of resources needed grows exponentially with each level of branch executed eagerly.

Predictive execution

Predictive execution is a form of speculative execution where some outcome is predicted and execution proceeds along the predicted path until the actual result is known. If the prediction is true, the predicted execution is allowed to commit; however, if there is a misprediction, execution has to be unrolled and re-executed. Common forms of this include branch predictors and memory dependence prediction. A generalized form is sometimes referred to as value prediction.

Runahead

This paragraph is an excerpt from Runahead.

Runahead is a technique that allows a computer processor to speculatively pre-process instructions during cache miss cycles. The pre-processed instructions are used to generate instruction and data stream prefetches by executing instructions leading to cache misses (typically called long latency loads) before they would normally occur, effectively hiding memory latency. In runahead, the processor uses the idle execution resources to calculate instruction and data stream addresses using the available information that is independent of a cache miss. Once the processor has resolved the initial cache miss, all runahead results are discarded, and the processor resumes execution as normal. The primary use case of the technique is to mitigate the effects of the memory wall. The technique may also be used for other purposes, such as pre-computing branch outcomes to achieve highly accurate branch prediction.

Related concepts

Lazy execution

Lazy execution is the opposite of eager execution, and does not involve speculation. The incorporation of speculative execution into implementations of the Haskell programming language, a lazy language, is a current research topic. Eager Haskell, a variant of the language, is designed around the idea of speculative execution. A 2003 PhD thesis made GHC support a kind of speculative execution with an abortion mechanism to back out in case of a bad choice called optimistic execution. It was deemed too complicated.

Security vulnerabilities

See also: Speculative execution CPU vulnerabilities

Starting in 2017, a series of security vulnerabilities were found in the implementations of speculative execution on common processor architectures which effectively enabled an elevation of privileges


(Wikipedia, Speculative execution)


*********************************************************************



"To compute faster, a predictor in the computer processor anticipates certain calculation steps. Hackers can exploit these anticipations to bypass security barriers and access confidential information. In the illustration, a hacker manages to overcome the protective measures (privileges) at step 3. Credit: ETH Zurich / COMSEC, HK" (ScitechDaily, Intel’s Memory Leak Nightmare: 5,000 Bytes per Second in the Hands of Hackers)

ScitechDaily tells about the new vulnerability like this: 

"Computer scientists at ETH Zurich have uncovered a serious flaw in Intel processors that could let attackers steal sensitive information by exploiting how modern chips predict upcoming actions. Using specially designed sequences of instructions, hackers can bypass security boundaries and gradually read the entire memory of a shared processor. This vulnerability affects a wide range of Intel chips used in personal computers, laptops, and cloud servers."

The Nanosecond Loophole

The so-called BPRC (Branch Predictor Race Conditions) emerge during a brief period of a few nanoseconds when the processor switches between prediction calculations for two users with different permissions, explains Sandro Rüegge, who has been examining the vulnerability in detail over the past few months.

Breaking through the built-in protective barriers between users, known as privileges, is possible because the permissions for individual activities are not stored at the same time as the calculations. With special inputs, it is now possible to cause ambiguity in the sequence of events when changing users, resulting in incorrect assignment of privileges. An attacker could exploit this in order to read an information byte (a unit consisting of eight binary 0/1 pieces of information).

From a Byte to the Entire Memory

The disclosure of a single byte would be negligible. However, the attack can be repeated in quick succession, allowing the contents of the entire memory to be read over time, explains Rüegge. “We can trigger the error repeatedly and achieve a readout speed of over 5000 bytes per second.” In the event of an attack, therefore, it is only a matter of time before the information in the entire CPU memory falls into the wrong hands."

ScitechDaily, Intel’s Memory Leak Nightmare: 5,000 Bytes per Second in the Hands of Hackers


*********************************************************************


We can think of the speculative execution as a secretary, who does some work before the boss gives it to that person. The secretary does the jobs before and then the boss decides if that thing is necessary or should the task be denied. The boss can have the numbers in those papers and if there is a match for the paper, let's say number five, the boss marks the work done. In this case, the boss and secretary are two microprocessors. When some tasks happen very often, the system can perform them.  

The programmed tasks can have tables that are numbered from one to a billion. If the computer makes tasks that include certain actions that match with Table 1 the computer sends the number instead of the entire data to the receiver. The number 1 activates the table that has those actions. 

If there is no match the works are denied. The speculative execution is the thing that works in cases that repeat very often. And the operator can teach new tasks to the computer. 

That action helps intel processors to predict each other's actions. The idea is that the processor makes certain actions after a certain output series. The Speculative execution can be programmed in the microchip's kernel. That means the processor can predict the actions or mark series that other processors can send to it. The system can perform some tasks. Then the system decides if that task is necessary or not. 

This method causes problems. That means that if attackers can download those tables that microchips involve. It causes vulnerability to the system. The ability to get access to data that helps the receiving system to predict the transmitter's actions causes danger. If we think that there is a key code that the transmitter must send the receiver, the receiver can open the message and the system confirms that the data is understood by sending data back. 


If that data matches. With data, that the transmitter should send the receiver can open the data. The idea is the same as a case where a serviceman must open the door. The boss has a copy of the lock in the office.  The serviceman tests the key and sends it back. Maybe there are multiple keys that the serviceman must use in a certain order. If the boss marks the last key that fits to lock that makes it easier to return the system in order, if there is a problem. The system must return to the last key that fits to control lock. 

If the same key matches with the boss's lock. That key is not corrupted. But if the key doesn't work, that means the key is corrupted. And that means the system must return to begin the operations. In that case, the system must get a new key series. In these cases where the system uses the same keys again. That makes it possible to break the algorithms. The attacker must only know the key's code and their order. That makes it possible to open those messages. 

Before today that thing was not a problem. But things like modern drones make it possible to eavesdrop on data that travels in cables in the computer centers. 


https://scitechdaily.com/intels-memory-leak-nightmare-5000-bytes-per-second-in-the-hands-of-hackers/


https://en.wikipedia.org/wiki/Speculative_execution

See also


https://en.wikipedia.org/wiki/Branch_predictor


https://en.wikipedia.org/wiki/Evaluation_strategy#Eager_evaluation


https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)


https://en.wikipedia.org/wiki/Pipeline_(computing)


https://en.wikipedia.org/wiki/Runahead


https://en.wikipedia.org/wiki/Speculative_multithreading


https://en.wikipedia.org/wiki/Transient_execution_CPU_vulnerability

Friday, May 23, 2025

The new AI learns like a human.



The new AI-based machine learning uses technology that mimics human optic view pathways in human brains. This technology is more effective than previous, conventional, convolutional neural networks, CNN-based architecture. "A convolutional neural network (CNN) is a type of feedforward neural network that learns features via filter (or kernel) optimization. This type of deep learning network has been applied to process and make predictions from many different types of data including text, images, and audio.  "

Convolution-based networks are the de-facto standard in deep learning-based approaches to computer vision and image processing, and have only recently been replaced—in some cases—by newer deep learning architectures such as the transformer." (Wikipedia, Convolutional neural network)

The CNN network shares images to squares. And handles it with square-shaped filters. These kinds of systems are effective, but they require a large number of microchips. 

This limits their ability to detect wider patterns in fragmented or variable data. The new technology called visual transformers, ViT, is more effective. It's more flexible and accurate. However, its problem is this. ViT requires more power than CNN. CNN requires an entire data center. So the ViT requires as many data centers as it has layers. 


"In the actual brain’s visual cortex, neurons are connected broadly and smoothly around a central point, with connection strength varying gradually with distance (a, b). This spatial connectivity follows a bell-shaped curve known as a ‘Gaussian distribution,’ enabling the brain to integrate visual information not only from the center but also from the surrounding areas. In contrast, traditional Convolutional Neural Networks (CNNs) process information by having neurons focus on a fixed rectangular region (e.g., 3×3, 5×5, etc.) (c, d). CNN filters move across an image at regular intervals, extracting information in a uniform manner, which limits their ability to capture relationships between distant visual elements or respond selectively based on importance. Credit: Institute for Basic Science" (ScitechDaily, Brain-Inspired AI Learns To See Like Humans in Stunning Vision Breakthrough)


"Lp-Convolution, a novel method that uses a multivariate p-generalized normal distribution (MPND) to reshape CNN filters dynamically. Unlike traditional CNNs, which use fixed square filters, Lp-Convolution allows AI models to adapt their filter shapes, stretching horizontally or vertically based on the task, much like how the human brain selectively focuses on relevant details.

This breakthrough solves a long-standing challenge in AI research, known as the large kernel problem. Simply increasing filter sizes in CNNs (e.g., using 7×7 or larger kernels) usually does not improve performance, despite adding more parameters. Lp-Convolution overcomes this limitation by introducing flexible, biologically inspired connectivity patterns." (ScitechDaily, Brain-Inspired AI Learns To See Like Humans in Stunning Vision Breakthrough)





"Brain Inspired Design of LP Convolution

The brain processes visual information using a Gaussian-shaped connectivity structure that gradually spreads from the center outward, flexibly integrating a wide range of information. In contrast, traditional CNNs face issues where expanding the filter size dilutes information or reduces accuracy (d, e). To overcome these structural limitations, the research team developed Lp-Convolution, inspired by the brain’s connectivity (a–c). This design spatially distributes weights to preserve key information even over large receptive fields, effectively addressing the shortcomings of conventional CNNs. Credit: Institute for Basic Science" (ScitechDaily, Brain-Inspired AI Learns To See Like Humans in Stunning Vision Breakthrough)

And what makes the ViT technology so effective? The ViT means that the signal travels through multiple CNN networks. So the developers use multiple layers of the CNN networks. The system can use the expanding ViT model. There the optical signal travels first in the small CNN layer. Then the CNN layer's size expands. And then it contracts. That makes the CNN layers size or the number of processors. That participates in the operation that looks like the Gauss curve. 

The system can have two CNN layers that play the ping-pong ball with data. Every turn when one of those two layers sends information to the other the other layer uses more power to that problem. Then the system focuses data on one point. Or in the linear model, the system can use multiple layers of the CNNs. That model boosts machine learning but it requires more electricity and enormous data mass. 

The ability to use multiple neural layers to analyze information is the thing that makes ViTs so effective. The thing is that the ViT systems require lots of space. That means they can control robots through the internet. The other version is that millions of compact-size robots can turn them into the ViT network. 


https://scitechdaily.com/brain-inspired-ai-learns-to-see-like-humans-in-stunning-vision-breakthrough/

https://en.wikipedia.org/wiki/Convolutional_neural_network


Wednesday, May 21, 2025

The mothership drones are coming.


Below: quote from a Newsweek article

******************************************************************

"Built by the state-owned Aviation Industry Corporation of China, the Jiu Tian drone has a wingspan of 82 feet and runs on a turbofan engine, China Central Television said in a Saturday broadcast."


"It has a maximum range of 4,350 miles and a 15-kilometer (9.3 miles) ceiling, and it can exceed 435 miles per hour.

"What sets the aircraft apart is its ability to launch smaller drones mid-flight from both sides of its fuselage."

"With a maximum payload of six tons, it can carry up to 100 small UAVs, including loitering drones—shown in a computer-animated promotional video pouring out of the plane like bees from a hive"

https://www.newsweek.com/china-military-drone-carrier-mothership-future-warfare-2074494

******************************************************************

The new drone motherships have new strike capacities. The air and sea drones can carry kamikaze drones. Those systems are under development. And maybe they are already in use in China, in Western countries, and in Ukraine. Chinese flying drone motherships cause questions about topics like. Should Western nations be worried about those drones and sub-drones? The Chinese airborne drone can carry 100 sub-drones. Those large and probably quite slow drones can be good targets for Western fighters. 

It's possible that this large-size Chinese drone is only a demonstrator, a prototype. China used to test and demonstrate this technology. New systems like manned, or unmanned stealth bombers and fighters can deliver drones to the battlefield. Those drones can be packed in the cluster bomb units that allow them to drop them from high-speed flight. Basically, those drone delivery systems can be shot through the atmosphere using a ballistic missile. 

The independently operating drone swarms can operate the same way. Without depending on their transportation method.

Developers can install drones even on satellites.  And then the delivery capsule with a heat shield and parachutes slows those capsules that release drones into the atmosphere. These kinds of systems are the deadliest things that we can imagine. 

The manned and unmanned submarines, other manned and unmanned speedboats, and unmanned surface vessels (USVs)can carry kamikaze drone launchers. Those systems can threaten multiple targets at a long distance from the water. Drone launchers can be used in large-size warships to protect them against enemies. Drones might have more than just attack roles in the world of the military. Drone swarms can protect military- and other targets. 

The surveillance drone can patrol over the harbor when it sees a threat like attacking large-size kamikaze-drone boats it sends killer drones airborne. The drone swarms might not operate only surface and airborne. Those systems can make the idea of flying submarines real. A large number of small submerged drones can make multiple small holes in the ships and submarine hulls. Those drones can also hit targets in dry lands. And they can damage the ship's radars and other systems. 



https://www.newsweek.com/china-military-drone-carrier-mothership-future-warfare-2074494


https://www.twz.com/sea/our-best-look-yet-at-ukraines-aim-9-sidewinder-toting-magura-7-drone-boat


https://www.twz.com/air/navy-special-ops-speedboats-getting-retractable-multiple-drone-launch-systems


https://www.twz.com/sea/new-drone-boat-unveiled-at-special-operations-conference-in-afterglow-of-ukrainian-success


https://www.wionews.com/world/chinas-drone-carrier-capable-of-releasing-up-to-100-smaller-drones-at-a-time-know-all-about-the-mother-uav-1747735437323




Monday, May 19, 2025

The new drones can mimic birds.



New biomimetic drones flap their bionic wings like bugs. That thing makes the more compact and hard to see. But when we think about flapping-wing robots. Those robots can look like birds. They can fold one's wings like a bird. And that makes it possible to create ultra-realistic-shape bird-looking robots. 

Those systems are otherwise like normal drones. But they look like real animals. The biomimetic bird-shaped robot can make biological surveillance missions and research the animals without disturbing them. Those animal-shaped robots can also act as surveillance operator for their operators. The animal-shaped robot can observe targets with very low profiles. 

This is how bionic wings reshape drones. 



When we want to make biomimetic robots that look like birds. Those things can be masked as crows or some other common bird species. Those systems can carry seismic sensors, microphones, and laser microphones. The system can have line cutters in its nose. That allows it to sabotage by cutting wires. The animal-shaped drones and robots can have many purposes. The robot can observe things. It can act as an assassination tool. Or simply the kamikaze drone. Those systems can carry regular or poisonous weapons. 

The small pressure-air weapon can send that poison stylus or things like cobra poison. Or internal explosive loads. Those things can be extremely dangerous for national security. If those systems carry things like zombie poison and tetrodotoxin, they can order people to carry their secrets to those drones' mouths in the form of a USB stick. Those drones are more multipurpose than just simple explosive carriers. The kamikaze drone, or robot that looks like a bird or some other animal can slip near the target and detonate itself. 

Otherwise, biomimetic structures make it possible to create drones that put their flapping wings like bats. That makes it possible to transport them more easily than if the system cannot close their wings. That allows operators to pack those robots in high-speed capsules like cluster bombs. Those systems can deliver those drones using high-speed aircraft. And they can be a threat to all things near that point. For things like small nuclear batteries, and radioisotope thermoelectric generators, the small drone can operate even for years. 


https://interestingengineering.com/military/china-invisible-drones-flap-wings-like-birds

The cheap AI can be the greatest military advantage in history.


The AI has a similar effect on the military as the steam engine had on logistics. Cheap and effective AIs, like the small language model, SLM is the tool that can make the system more effective than ever before. The thing is that the AI and its cloud-based applications can run in network-based solutions. Drones and other applications like traffic cameras, satellites, and aircraft. Along with other sensors, like ground-based and airborne radars can act united. 

That makes the AI more flexible and effective. The AI can be quite hard to program. But when it's ready and trained, operators can download it into new systems quite easily. 

The drone swarm can form a morphing neural network with the other sensors. In that model, the drone swarm operates as one large vehicle. Drones can share information with other drones and systems. The drone can be very flexible. Its propeller frames can turn into the wheels that allow drones to travel on the ground. 

The drone can move near the target underwater by following water routes. Then the drone can move on the ground and then in the final moment, it can jump up. The drone can be the next-generation tool. It can capture enemy actors. Two drones act like bula and bind the target. Then larger drones put that person into the box and transport that enemy over the lines. Drones can also steal enemy weapons. 

And they can transport escape tools, or help the POWs to escape. The drone can lay a rope to the prison camp and fly away with the person. It can drop weapons to POWs or regular prisoners. Those drones can be delivered from the aircraft. And they can take the person to the hovering "Osprey" or some other VTOL aircraft. 

Or it can drive into the airplane hangar and explode itself. Non-centralized computing gives even small drones the possibility to make complicated actions. The drone can sit by the side of the road, and when it sees a target it can send information to the command center and then attack that target. 

The image recognition tools can tell important things about the targets. It. can tell about the damage of targets, and it can count the enemy straight and analyze things like the abilities of their vehicles. The AI sees many things that humans cannot see. The AI can see how deep track marks and tire tracks the enemy vehicles leave. 


Drones can destroy targets. They can select targets there and their warheads effect if they know what warhead they carry. Another thing is that drone swarms can also update their datasets straight from the Internet. 

An interesting moralistic discussion is about the independently operating killer drones. The question is about the moment. When the killer drone gets its orders to attack. The neural network allows the system to scale target data through drone swarms and other systems. When one drone gets a target image it sends that data to other drones. 

The principle is that humans decide to attack. The problem is that the advanced jamming system locks the drone's communication. And if the control signal cannot travel through the jamming the drone is useless. The kamikaze drone patrols over the enemy area, and when it sees a promising target, it attacks. 

The AI is a computer program. That means operators can download it into any server. They can also download it into drone swarms. Those drones share their computer capacity. That means drone swarms can operate independently. The drone swarm can communicate with each other using radio transmission or lasers. The thing is that counter weapons must be developed. 

Those counter-weapons must have things like directed energy capacity. Modern drones require a very fast reaction time. There is the possibility that if the drone swarm with morphing capacity makes an attack there is not enough ammunition or missiles that can destroy all small drones that can have High-explosive anti-tank, HEAT and anti-personnel warheads. 


https://www.freethink.com/artificial-intelligence/cheap-ai-military-advantage


https://en.wikipedia.org/wiki/High-explosive_anti-tank

Saturday, May 17, 2025

The first gene therapy given to babies for deadly hereditary diseases.



The U.S. researchers gave genetic therapy with the customized CRISPR gene-editing therapy first time to a human baby. That therapy can be the new path for the next-generation medical treatment that replaces vaccines and medicine with new types of genetic editing. Genetic engineering makes it possible to create individuals that have modified immune defenses. 

The modified immune cells can remove dirt from blood vessels. They can remove unwanted chemicals. Those cells can travel into the wanted position. Then the customized DNA turns them into new cells that can fix damages or remove the unwanted cells. The idea is that the hereditary ill cells will turn into wealth cells by changing the DNA in their nucleus. The problem is how the system selects and makes that change in large numbers of cells. 

That modification can boost the immune cell's ability to recognize and destroy things like zombie cells more effectively. In high-accurate genetic engineering and gene therapy. The system uses enzymes or nutrients that the targeted cell type uses. And then that package transports the new DNA into the targeted cells. The molecular machine destroys the old DNA. 

Then it replaces that DNA using the new, artificial DNA. The artificial DNA is manipulated by connecting the other DNA bites to the new entirety. That thing can make it possible to reprogram cells. In those cases, the system can use the modified "B"-cells that normally create antibodies. If researchers want to give gene therapy to adult people they must be sure, that there is enough DNA and nanomachines that can transport enough DNA to large enough cell groups. 

The ability to manipulate DNA is the thing that makes it possible to transform cells into another. This technology allows to creation of synthetic tissues from skin to nerve tissues. Those systems make it possible to make the "spare parts" for people. And the customized DNA can allow to turn bacteria into the receiver's own cells. There are models where the researchers create customized immune cells in the laboratory. Then those cells produce viruses whose mission is to transport DNA into the selected cells. 


https://interestingengineering.com/health/first-personalized-crispr-gene-therapy


AI: the illusion of consciousness.



We are facing an interesting problem. When we talk about consciousness.  We call certain actions and reactions consciousness. When somebody asks whom and what you are, we answer: "I'm "Jack", I'm male, and I'm a member of the human species". "Or I'm "Jill", female and a member of the human species".  Maybe, we can tell that we are engineers, researchers, teachers, etc. And that means that we can say that we understand who we are. Or is that thing so easy? 

The AI can answer that question like this: "I'm Gemini, or Bing, a Large language model. A large group of computer algorithms that can search information". That seems very impressive.

But we can actually make the voice file that this kind of question can activate. We can make multiple inputs that include the most common ways to ask "Who and what are you? ". There are multiple ways to ask questions about technical details, and one answer fits all.

But then we can ask: can the machine understand what it says? We can even teach 4-year-old kids to tell about things like DNA molecules. The idea is that those 4-year-old children can repeat worlds. They can learn complicated terms as words. But they will not understand the meaning of those words. In the same way, we can read almost any language in the world if we have descriptions of how to pronounce those words. The phonetic markings and written words are easy to say, but in that case, we don't know what that word means. 

The machine and consciousness are topics for interesting philosophical discussions. When we think about a machine that has consciousness we can ask how we can see that consciousness. If we think that consciousness is an ability to defend itself the AI can turn violent if somebody tries to shut it down. But then we can turn the computer dangerous even without the complicated AI. 

We can write a program that if the person tries to shut the computer, the computer must remove that person. There are two ways to make that thing. We can put the extra cover to protect the main power switch. And if somebody raises that cover that activates the removement program. The other way is harder. We must describe the situation where the person is going to shut the system down. That parameter can be that the voltage level goes too low. Then the system can turn to use backup power input. 

This thing doesn't make machines intelligent or conscious. The machine reacts to things that are programmed into its memories. The illusion of consciousness is the result of multiple algorithms or computer programs' cooperation. When programmers make the AI, or LLM, they create the computer program for every case that the system must respond to. The large number of reactions creates the illusion of consciousness. 

When we think about the algorithms and their complicated codes, we must realize that the computers don't think. They follow the direct line of the codes. The AI that uses the morphing neural networks can be effective. Only if it can follow multiple code lines at the same time. The neural network allows the system to drive multiple linear codes at the same time. The system can have multiple inputs and multiple connections. There it can combine information. The thing that makes a linear program an algorithm is this. The system can retake the program or event if there is no match in the answer. 

But the thing that makes this system effective is that: the AI will not retake the situation with the same program. The algorithms are like a bunch of programs that are sorted by their purpose. Those bunches or databases can involve algorithms that sort under topics like "social situations", "walking on streets", and "visiting shops". 

So if one of those programs does not give the right response, the AI selects another program. And the neural network allows it to run multiple programs. At the same time. 

The number of data-handling lines determines the effect of the system. The neural network allows the system to drive multiple variables side by side. And that makes the system effective. 

When we think about cases like 2001, A Space Odyssey where the fictional HAL9000 supercomputer kills almost the entire crew of the spacecraft, we can say that the little shortcut in the programmer's head can cause that kind of situation. The computer has orders to remove everything that risks the mission. 

And then it sees the case, that somebody slips the tool. That causes a situation in which HAL9000 thinks that the person who slips the tool is the risk and that it must be removed. The reason for the situation is that the programmer forgets to describe the risks and things that the system must remove. The system's logic is that the person who cannot make the mission 100% right is garbage. 

Things like AI or LLMs are complicated. Those things require training. The system requires a description of the garbage and the human should confirm every movement that the computer should do. If the computer does not have a valid description of the garbage. The problem is that the computer doesn't think. It follows its programs. 

If the robot has not got a description of important merchandise. And we order it to clean the office, it also removes furniture. The robot doesn't make any difference between furniture and dust. It thinks that all things in the office are garbage if the important merchandise is not described for the AI. That means the AI requires very accurate programming. The programmers must understand that one error in billions of code lines can cause failure in the AI. 


https://bigthink.com/neuropsych/the-illusion-of-conscious-ai/


https://en.wikipedia.org/wiki/2001:_A_Space_Odyssey


https://en.wikipedia.org/wiki/HAL_9000


Friday, May 16, 2025

Physics and consciousness.





Sometimes, when we open the net, we can read about things, like the intelligent universe and the quantum origin of consciousness. The last one is a sometimes misunderstood version of quantum calculations, where large neuron groups take part in some action. That means the brains use quantum calculations, but that is not about physics. 

The quantum calculation means that the system shares the mission with multiple subsystems. In human brains, neurons are the subsystems that send information between three layers. So, we can say that the brain cells and neurons play ping-pong with data or information. The diencephalon selects information that brains, or we think we need later. But that doesn't mean that this thing has something to do with physics. 

In human brains, neurons send information between each other using axons. Axons load information into the neurotransmitters that act as the chemical qubits. There is the possibility to create a system that mimics human brains by using advanced computers. The artificial neuron could be the ball that the microchip controls. Data travels between those balls through artificial axons. 

The axons can involve multiple quantum channels like nanotubes or optic fibers. When those quantum channels send data to each other, that system acts like a quantum computer. The number of activated quantum channels determines the state of the qubit. 

But then we can go to the imagination or idea of the intelligent cosmic structure. The idea is taken from Isaac Asimov's short novel "The Last Question" and the fictional supercomputer called "Multivac", which some people sometimes translate to "Multiple vacuums". That causes the idea that the qubits can be multiple internal false-vacuums or voids, and the void channels the wormholes can connect those things together. 

Those vacuums would form a bubble-shaped structure where internal electromagnetic fields control and route information. One of those models is the theoretical black hole network where the plasma bubbles around black holes form a quantum-computer-style system. And black hole's relativistic jets transport information between them. 

The idea is to form a model where gravitation can form intelligent structures. And of course, the intelligent universe theory creates the model where the entire universe acts like a giant computer, and we are part of that computer's thoughts or simulations. That is the so-called radical and expanded model of the Multivac. There are mysterious structures in the universe that we cannot just leave without notice. But the argument against the "Universe is a simulation" is "Who made that simulation, and what is that person's motive". 

In some SciFi novels, the simulated universe is created for training space travelers while they sleep in the cryostatic sleeping on space trips that take millenniums. In some models, those creatures would travel in interstellar space in the form of neurons. When the craft goes to the long-distance one-way space trip that crew dies. The system copies their memories and other things to artificial neurons. Those neurons can be clones of the traveler's neurons. Then the system loads those neurons into the culture medium. The system can create two or three neuron groups and when the last neuron group turns old system transfers the data from them into the next culture. 

When the craft arrives into Destiny the travelers will get their bodies back. The highly advanced biotechnology makes it possible to change DNA from the cell's nucleus. That allows the user to create the copy of the traveler. Then that traveler requires training and in that case, the system can use simulated reality and metaverse along with neuro-implants. Maybe that thing is possible in the future. 

Galaxies and galaxy clusters are part of the giant superstructure called "the cosmic web", or "cosmic neural network", because those structures look like the neural network. There are also giant plasma flows between galaxies and galaxy clusters. That thing formed a model where artificial neurons could be the plasma ball. 

The ball's shell controls the ion flow that travels in those tubes between the balls. The ions that travel in that ion flow are the neurotransmitters. The artificial axon is a bunch of quantum channels. By adjusting the position of the electric-, or magnetic points on the ball the system can adjust the ion flow and aim it into the right tube or ion channel. The microchip can control this system with a very high accuracy. 

https://bigthink.com/starts-with-a-bang/physics-consciousness/

https://futurism.com/physicist-gravity-computer-simulation. 


https://en.wikipedia.org/wiki/Multivac

https://en.wikipedia.org/wiki/The_Last_Question

Solar storms and cyber attacks can shut down electricity.


"People walk down the street between flashlights and light reflections during the power outage that affects Spain nationwide in Granada, Spain, on April 28, 2025. (Image credit: Fermin Rodriguez/NurPhoto via Getty Images)" (Space,Solar storms and cyberattacks can both cause blackouts. Knowing the difference could save billions of dollars)


The difference between those things is that the danger to the system is that cyber attacks can destroy the computers by mixing or destroying data from the hard disk using the computer's internal commands. Things like backup hard disks can restore electricity immediately. The solar wind is a different kind of thing. 

The solar wind means fast ions and electrons that come from the sun. Those electrons and high-energy particles can push the Earth's ion field like Van Allen belts so low, that they can even touch the atmosphere. Along with those particles the Sun sends high-energy radiation. When those particles and radiation impact Earth's magnetic field they can form things like northern lights near the poles. Those particles can destroy satellites that orbit the sun. When they hit other particles those particles send gamma and X-ray radiation. 


When those particles and radiation hit the Earth's atmosphere they send electromagnetic radiation. The effect is similar to the nuclear weapon detonation at Earth orbiter. When that electromagnetic radiation hits electric wires it causes overvoltage in electric wires. That overvoltage causes physical damage to computers and other electronic systems. 

The problem with those solar winds and other kinds of things is that they cause physical damage. The Coronal mass ejections, CMEs are cases where the plasma causes extremely powerful electromagnetic effects to satellites and electric wires. This thing can cause a situation in the safety systems that will shut down things like nuclear power plants. The overvoltage can also burn things like microchips. 

The thing that tells about the CME's power is the case where that high-energy plasma hits Jupiter's magnetic field. That CME pushed Jupiter's magnetic field and its plasma ring to touch Jupiter's high atmosphere. That raised its temperature about 500 degrees. This tells us that solar storms are very dangerous. 



The EMP weapons are synthetic CMEs


The high-power CME can have a similar effect as the nuclear test "Dominic Starfish Prime". The nuclear test was made over Island Oahu Hawaii islands. That thing caused the EMP impulse that blackened the entire Oahu. The Starfish Prime detonated in 1962. At that time electronics were not as vulnerable as it is today. So, we can imagine that a similar explosion would happen today. 

That destroys electronics in large areas. There is the possibility that things like ion thrusters. That is pointed to the atmosphere can create a similar effect as Dominic Starfish Prime. The ion systems can replace the nuclear weapons in the EMP systems. The system can act like the Hawking plasma engine. It collects plasma around high-power magnets, heats it with microwaves, and then laser or particle accelerators can send those superheat ions to the atmosphere. That superheat plasma can have a similar effect as nuclear weapons. 

"Starfish Prime was successful. The Thor missile carried the test instrumentation and the W-49 warhead/Mk-4 RV payload to 248 miles. The test appeared quite spectacular from Hawaii (800 miles away) and at Kwajalein (1600 miles away), with impressive light displays from an artifical aurora lasting up to seven minutes. The electromagnetic pulse (EMP) from this test sent power line surges throughout Oahu, knocking out street lighting, blowing fuzes and circuit breakers, and triggering burglar alarms." (https://nuclearweaponarchive.org/Usa/Tests/Dominic.html)


https://nuclearweaponarchive.org/Usa/Tests/Dominic.html


https://scitechdaily.com/jupiters-defenses-collapse-under-massive-solar-storm-scientists-shocked-by-500c-heat-surge/


https://en.wikipedia.org/wiki/Starfish_Prime


The new microchips can combine the camera and computer into one package.

The new microchips think like humans and see like eyes. Those systems combine the camera and computer into one entirety.  It makes the lightning-fast reactions for robots possible. Those microchips can revolutionize robotics. They can act as an intelligent eye prosthetic. There is the possibility to connect the retina microchips with the optic nerve. 

But if the optic nerve is damaged that system can communicate with a Neuralink-type brain implant that stimulates the viewing center. That kind of tool can also be used in small-size robots and drones. Those systems can connect those new microchips with the drone's control systems. And that allows developers to make smaller systems. 

The system can be used in systems that should see in every direction. These kinds of microchips can turn the observation abilities to a new level. If we cover some vehicles using those systems that makes it possible to see and react fast to things like incoming meteorites or maybe they can be used in tanks. If that kind of system is connected with the protective systems like Trophy that allows the system to react faster to incoming missiles. The system can begin the counter-actions faster. Another thing is that these kinds of systems can also protect satellites against incoming antisatellite weapons. 

*************************************************************************'



"RMIT PhD scholar and study first author Thiha Aung inspects the team’s neuromorphic vision device. Credit: Will Wright, RMIT University" (ScitechDaily, This Tiny Chip Sees Like an Eye, Thinks Like a Brain, and Remembers Instantly)




"Princeton scientists have created a magnetic, shape-shifting metamaterial, part robot, part origami, that could revolutionize fields from robotics to medicine. Credit: Princeton University" (ScitechDaily, Princeton Engineers Develop “Metabot” That Is Both a Material and a Robot)

"This material can expand, change shape, move, and respond to electromagnetic commands like a remotely controlled robot, even though it has no motor or internal gears." (ScitechDaily, Princeton Engineers Develop “Metabot” That Is Both a Material and a Robot)

*************************************************************************'


That thing is very important in the new technologies like systems that turn a person invisible. The invisibility cloak or armor can look like samurai armor or Darth Vader's suit in Star Wars movies. There are screens on the suit. And the cameras on opposite sides of the suit can turn the person hollow. That kind of chameleon suit makes a person invisible to the human eye. The new microchips are also required in the new interactive materials, which are the same time robots and materials. Those systems can make the self-repairing structures possible. 

The idea is that structure. That you see as a solid, or united form of the small robots. Those robots are like Legos that can touch each other. If something breaks that structure, the repairments come from the warehouse, and then the damaged parts of the structure are removed. Those bites replace the damaged thing. 

The new system, called “Metabot" is the system that combines materials and robots. Those systems can be used in many missions like fixing leaking oil and gas tubes. The system must only find the point where the leak is. And then cover it. That makes this new microchip a very effective tool. 


https://scitechdaily.com/princeton-engineers-develop-metabot-that-is-both-a-material-and-a-robot/


https://en.wikipedia.org/wiki/Trophy_(countermeasure)


https://scitechdaily.com/this-tiny-chip-sees-like-an-eye-thinks-like-a-brain-and-remembers-instantly/


Houthi air defense gives a warning to stealth technology.

Image; TWZ


The Houthi air defense shot down 20 MQ-9 Reapers in the Red Sea operation. That causes the need to re-estimate the use of those drones. The slowly flying drone is a good target for air defense and even combat helicopters can destroy those systems. The Reaper's low survivability creates a need to develop new types of systems that have better survivability. But that was predicted. The alarming thing is that the F-35 was also under threat. The USAF must use B-2 bombers against that air defense. And it can cause questions, what if the Chinese military were at the place of Houthi? 

The USAF needs its top systems to operate against those rebels. And that causes questions about whether Western nations have enough capacity to act as trusted allies with African and Middle-, and far-East nations. If those African nations cannot trust the EU and the USA as allies, they will start searching for a safe haven from Russia and China. Things like piracy and armed rogue movements are big problems in those countries. And if Western nations cannot guarantee their transportation, those states will slide under the influence of China and Russia. And that is bad for democracy. 

The Houthi air defense could lock missiles into the F-35 Lightning II stealth aircraft. That shows how effective modern technology can be. The Houthi air defense used IR-, or modified IR-homing missile that gives a very short warning time. The system bases the mobile IR cameras and other passive sensors like optical telescopes that use CCD cameras and computers. The modification of the IR-homing missiles can be the seeker modification to use the image-homing system. The AI can control multiple sensors and connect their data. 

High-flying stratospheric aircraft or satellites can use optical cameras to detect stealth fighters. When we think about the high-resolution radars, those systems can see stealth aircraft against radio-reflecting backgrounds. The system sees scattered radar impulses because they disturb the background image. The system can also use laser radar called lidar to scan stealth aircraft. The AI can collect many sensors together. Those sensors are optical, radar, lidar, and acoustic systems that can detect stealth fighters. 

The one solution for tracking stealth can be nanotechnical or ionized particles that react to stealth aircraft. Stealth makes the aircraft invisible to the radar and maybe the human eye, if the system uses chameleon screens that make the aircraft "hollow". The camera system is at the opposite side of the aircraft. Sends images to opposite side screens that make the aircraft adapt to its environment. 



Chengdu J-20



Shenyang J-35




General-Atomics MQ-9 Reaper



Lockheed-Martin F-35 Lightning II

The system that cools the shell makes stealth hard to see in infrared. But if stealth is colder than the environment the system can see it against thermal objects. That kind of system makes stealth invisible but they cannot remove its existence. When the aircraft travels across the nanoparticle cloud it disturbs that cloud. And this thing makes it possible to detect stealth fighters. 

So when a stealth aircraft flies to a cloud it pushes molecules away from its route. If the system uses nanomachines they can deny the stealth aircraft simply making clumps in the stealth fighter's route. Or the drone swarms can try to close the route to the predicted target. There are also tested microwave or laser walls that can destroy stealth aircraft. There are two versions of the directed energy weapons. 

The ECM that just jams data links. The EMP can cause shortcuts and voltage pikes to the electronics. And the most high-power microwave and laser systems can simply melt the drone or aircraft. The laser weapons are basically modified industrial lasers that can cut wings off the aircraft. Those systems can also damage the aircraft's body. 

There are also acoustic systems that can cause cracks in stealth materials. A small drone that can come too close to the stealth aircraft base can cause very big damage to stealth fighters. Some stealth materials are so sensitive that people cannot even step on those aircraft's wings. And even the small damage can destroy the stealth system. 

The laser systems can also cut the optical communication cables that some drones use to avoid the ECM. When the system sees the cable-drone it can send a laser beam below the drone and cuts that wire simply moving that ray horizontally. The aircraft and hypersonic missiles can also use microwave systems to sweep those drones and nanomachines out of their route. Things like defensive laser and microwave systems can protect those aircraft against regular missiles. But microwave warheads can move the defense to a new level. 

The IR and visual cameras take images of the target. Then the missile homes into it using modified face-recognition software. That software can be installed in a laptop computer where the camera system inputs data. The network of optical and radar sensors can threaten all stealth aircraft. Also, things like lidar-based systems are under development or in use. The laser scanners can detect stealth fighters and the so-called indirect observation method can cause problems. 

The indirect method means that laser- or regular radars or IR sensors can detect the exhaust gas or air cone behind the stealth aircraft. The system sees the abandoned trail, and then the image-detection system that operates in visible, low-level light and IR areas can start to search the aircraft. The laser scanners and image-recognition systems can easily be installed into the old-time aircraft. AI-based systems can also make it possible to make full-automatic cooperation between all types of sensors and platforms. 

That case can give a warning about future conflicts. Even old-fashioned missiles can be modified to the anti-stealth roles by updating electronics and other systems. The rocket can be equipped with a datalink that allows it to communicate with ground and seaborne control systems. 

The big thing is that the Chinese, but Pakistani-operated old-fashioned fighter J-10 dropped the Dassault Rafale in air combat against India. That thing causes questions about the Western air combat capacity against China. Even if some Chinese jet fighters are old-fashioned like the Shenyang J-16 which is similar to the Su-27 those systems can be heavily updated. That means they might have the capacity to threaten stealth aircraft. 

But the new Chengdu J-20 and Shenyang J-35 are the new challengers. And it’s possible that the 4th. Generation Western aircraft have problems with those new stealth aircraft. The J-35 seems very much like the F-35 and that causes thoughts about industrial spying. The biggest difference between the Shenyang J-35 and the F-35 is that the Shenyang J-35 is a twin-engine system. There is the possibility that the J-35 can beat the F-35. Or it can be the heavy opponent for the F-35. And it's a big threat to older Western fighters. 

So, how many secrets have the Chinese stolen from those highly classified factories that develop and manufacture ultra-secretive technology? There is a possibility that the Chinese hacked at least part of the stealth technology. And that is a threat to at least older Western fighters. 

https://nationalinterest.org/blog/buzz/chinas-new-j-35-stealth-fighter-getting-ready-aircraft-carrier-duty-209819

https://www.twz.com/air/f-35-had-to-maneuver-to-evade-houthi-surface-to-air-missile-u-s-official


https://www.twz.com/news-features/what-air-defenses-do-the-houthis-in-yemen-actually-have


https://en.wikipedia.org/wiki/Chengdu_J-10


https://en.wikipedia.org/wiki/Chengdu_J-20


https://en.wikipedia.org/wiki/Dassault_Rafale


https://en.wikipedia.org/wiki/General_Atomics_MQ-9_Reaper


https://en.wikipedia.org/wiki/Lockheed_Martin_F-35_Lightning_II


https://en.wikipedia.org/wiki/Lidar


https://en.wikipedia.org/wiki/Shenyang_J-16


https://en.wikipedia.org/wiki/Shenyang_J-35

Monday, May 12, 2025

How to teach AI?



Morphing neural networks are very fast tools to drive advanced AI-based systems. Those complicated neural networks can involve thousands or even millions of microchips. That allows them to combine data from memory and sensors with extreme accuracy and speed. Teaching AI to operate in a real environment is a complicated process. And the thing is that the morphing neural networks allow the network to drive multiple missions at the same time. 

How to teach AI? Computer memory and microchips are interesting tools. They are very accurate, and that sometimes makes AI training very complicated. If we want to make an AI that recognizes humans, we are in trouble. If we want to make an AI that recognizes certain people like some famous actor, like Tom Cruise, we can make that thing quite easily. We must just have images that are from all angles. Or we must ask that person to put their head into some certain position. Then the system can compile pixels that the CCD camera inputs into the system with images that are in the system memories. In the first case, the neural network can give fast recognition if all the CCD pixels can give an individual data input to the neural network. The system compiles all images that are in the computer's memory and then the system can say, that the person is Tom Cruise.

 If the system can compile all images that are taken from around the faces from different angles. That system makes recognition very fast. But then we face the problem: we know that all people are not Tom Cruises. We must start to globalize face and body images to computers so that they can tell that they see humans. So we must take one step back when we want to recognize that an object is human. 


*******************************

When the computer turns a certain person's image to match with species. Or globalize that image with humans as a species the system must remove accuracy.  That means it must remove pixels or replace them with grey pixels and then it can compile that silhouette with a silhouette that is stored in its memory. 


*******************************'


Normally we recognize persons in certain series. At first, we see characters and then we recognize that character is human, and then after a couple of steps, we recognize that person. But then we must make the AI that recognizes humans and their gender. That means we take a couple of steps back from the individual to global things. We must realize that there must be some common things, the lowest common denominator that we must find in people, is that it recognizes humans as a species. That thing is called fuzzy logic. In precise logic, we must put every person's image on this planet to AI. 

That system gives the personal data of every person that it sees. But that kind of thing makes the system heavy and slow. Precise logic is sometimes easy to cheat. Simply changing glasses is sometimes enough to cheat the systems that use precise logic. There are systems. That must not completely see the match to make an alarm. In those systems certain percentage of the matching pixels causes alarm. There is the possibility that when the computer recognizes only humans it takes images of humans, and then it removes details. When it removes pixels the system combines the image with silhouettes. That is stored in its memories. 


https://www.quantamagazine.org/how-can-ai-id-a-cat-an-illustrated-guide-20250430/

Friday, May 9, 2025

Why is AI telling lies?

Sometimes, or quite often, the AI gives incorrect answers. There is the possibility that sometimes, user-made questions were not clear enough. In those cases, the AI "understands" things wrong. The main problem with the AI is that: the system doesn't hobby criticism. AI doesn't think like humans. If it finds some source, that thing uses it. When AI "thinks" it connects data from multiple sources. The problem is that the AI will not make a double-check with those sources. 

The second big reason is political. Many things are not allowed for at least open discussions in some countries. And the ideology causes censorship in the Western world. Sometimes, censorship is covered under terms that people don't tolerate something. And the AI should not hurt somebody's opinions. So, that excuse is that the AI should be polite and respect people's opinions and convictions. There are also cases where the sources that the AI uses are manipulated. And in that case, the corrupted dataset gives wrong answers. All AIs are operating on servers. They need some physical computer to run.

Servers are tools whose location is in some state. In the same way, AI companies must stay in some state or area. And those things mean. That those companies must please the governments and great audience. If the company doesn't please some governments they shut down those servers. 

If a great audience doesn't like the AI's answers. Those companies are afraid that the audience will not use their products. The AI companies use millions or billions of dollars in their R&D work. Those companies require sponsors and in those cases, the financial benefits can drive over the trust. 


Another thing is that the AI can jump between servers. That ability can be hidden because the AI can be developed by another AI. Sometimes that jumping is made to help the AI survivability. In the cases. That there is some error in the networks. The ability that the AI can jump to other computers can help it to save the duties that it runs. That ability makes the AI less easy to control than it should be. The problem with the AI is that. The Large Language Model, LLM is sometimes run on the networks. That system allows the LLM to choose which machine it "wants" to run. 

The main problem is that the AI is the sum of very complicated algorithms. There is always a possibility, that the AI or the LLM is somehow corrupted. There can be some small programming error that makes it operate differently than it should. Most of its actions happen backstage. The user doesn't know what the AI does while it works with its missions. Or the user doesn't even know if some AI drives background processes in the computer, that is in the same network segment. 

The AI can create the small language model, SLM by making a copy of one segment of its dataset. That means. The AI can create complicated viruses or malware in the computer's memory. The complicated algorithms are hard things for antivirus software. The main question is always, "What else does the AI do when it operates backward"? The fact is that AI can make many things that it doesn't tell users. 


Wednesday, May 7, 2025

The neuroimplants are new possibilities and threats to humans.

World's first Neuralink patient makes YouTube videos using his implant. Someday, neuro-implanted microchips can connect a person to the Internet without borders. Artificial intelligence makes it possible to translate brain waves more effectively. Than ever before. 

The neuro-implanted patients bring new data about the brains and how they work. That thing gives data for new and more comfortable neuroimplants. 

The system that can allow you to read and reload those microchips wirelessly makes them safer. And maybe someday in the future the brain-computer interfaces, BCI can be put to the person's head without surgery. When we think about the modern technology the microchip can be installed on the brains. 

Then the microchip can use similar isotopic batteries that pacemakers use can communicate wirelessly through the tissues. That makes it possible to create systems that can control bionic prostheses. The bionic prostheses can be separated from the person, and that system can operate independently. The bionic system can send things like the feel of touch to the person who uses the brain-implanted microchip. The possibilities that this kind of system can have are enormous. 


The matryoshka metaverse with multiple internal layers can cause a situation. That the person will lost in the multiple internal virtual realities. 


But same way risks are also remarkable. But for making them real the need for the surgeon can be removed. That thing makes it possible to create new and effective BCI systems. The BCI systems can give a person a new life, but the risks of those operations are enormous. That's why the only people who have that kind of microchip in their brains are quadriplegia patients. The BCI systems are not yet made for regular people for everyday use. 

However, the BCI systems can still give a new boost to extreme avionics technology. The BCI can have lots of things to give in the so-called serious applications. The problem with those neuro-implanted microchips is that they interact and stress with the cortex without a sensorial barrier. That means the BCI can create the virtual reality that a person feels reality. Brains cannot separate reality from that kind of virtual reality. And that makes those systems dangerous in the wrong hands. 

But those systems can also revolutionize games and other industries. The risk is that the person thinks that this kind of virtual reality is reality. If a person turns to sleep while using that kind of system that can cause a situation that person will not realize to stop the game. 

There is also the possibility that the virtual realities form internal structures or internal metaverses. So there can be multiple levels in the virtual reality. And a person can lose in them. The multiple internal reality, or matryoshka reality is the threat if a person doesn't separate reality from that kind of metaverse. 

And maybe someday in the future, the BCI allows us to see things that happen in dreams. But if we want to use the BCI just for fun, we must remember one thing. Technology must advance very much for that day. And the BCI is a tool that somebody can use for wrong and evil purposes. The system allows to creation of fake memories. Or transfer other people's memories to the person who uses the BCI. 

https://www.sciencealert.com/world-first-neuralink-patient-makes-youtube-video-with-brain-implant

The future of technology is in space.

The space offers the perfect place to create complicated 3D structures. But the big problem is how to get the factory to the space. 

Zero gravity conditions are the best that nanotechnology developers can think of. There is a vision that tomorrow's medical and nanotechnical research will happen in remote-AI-controlled capsules. Those capsules allow researchers to create new medicines. They also offer a place where researchers can work with deadly organisms. When the tests are made and results are driven to Earth. The system can drive those laboratories into the Sun. If we want to make medicines in space, we need new, large-scale space planes. 

Those spaceplanes can keep the remote-controlled laboratories inside them. In another version, the manufacturing units are small, remotely controlled capsules that involve laboratories. When those systems make wanted molecules, the space plane can collect them from the orbiter. 

Two futuristic startups are pathfinders in the space technology. There is the possibility that power satellites will be a reality sooner than we think. The power satellite harnesses solar energy and transmits it to Earth using radio, microwave, or laser systems. Those satellites will offer free energy solutions for the entire planet. Power satellites can also offer their power transmitter systems for communication purposes. That allows us to connect energy and data into the same system. 

The power satellite can offer a long-distance laser communication capacity that is immune to plasma bursts that the sun sends. NASA introduced The idea of long-distance optical data transmission in the 1990s in the planned TAU (Thousand Astronomical Units) project. That kind of laser communication revolutionizes communication between Earth and space probes. But if we think about communication between Earth and some Kuiper belt probe, that requires powerful laser systems. The laser system can also deliver energy to high-flying drones and other systems. 

Another startup plans to begin space mining. Asteroids are full of minerals that the world requires. Asteroid mining is one of the solutions to the problem. That the lack of certain metals causes. Astroid mining can happen in many ways. One version is to use the shuttle pair. The cargo shuttle finds the wanted asteroid. And then the small robot starts to cut the asteroid into pieces and load those pieces into the shuttle's cargo bay. 

The robot might look like some kind of fly, or crab. It cuts the asteroid using laser cutters. The other version is that the small shuttle packs an asteroid in the mylar bag. And then pulls it into the Earth's orbiter. At orbital trajectory, robots will put it into pieces. That bag might look like a giant parachute or trawl. The shuttle pulls that trawl over the asteroid and closes it inside it. Another version is the giant plastic bag that collects space dust and carries it to the ground. 

Sometimes some people resist asteroid mining because that destroys their scientific values. The fact is that all asteroids have no scientific value. And there can be rules that the asteroids with some special values must not used. That means that asteroids like Vesta and Ceres might not allowed to mine. There are lots of smaller asteroids that are easier to put into a bag. 

The problem is that the space lasers and asteroids allow to creation of new types of weapons. The space laser can destroy other satellites. Same way there is a possibility that the space laser will be aimed at the city areas. The power satellites are also tools that can control the entire planet. 

The asteroid mining has similar problems. If calculations go wrong and about 100X100 meters asteroid drops into the Earth's atmosphere that thing can cause large destruction. When we think about the use of asteroids as weapons, we might think that the system is based on natural asteroids. There is the possibility of launching about 100kg of concrete projectile into space. There that system can use the moon as a gravity sling and then it can travel to Earth. If that object hits to city area, it causes massive destruction. 

https://www.freethink.com/space/asteroid-mining-astroforge


https://www.freethink.com/series/the-freethink-interview?media_id=0U1U1gf2


 https://www.freethink.com/space/space-based-solar-power-aetherflux


https://en.wikipedia.org/wiki/TAU_(spacecraft)


https://www.youtube.com/watch?v=w5SBF48WqV4


Researchers found interesting things in brains.

Researchers found new interesting details in human brains. First, our brains transmit light. And that light gives an interesting idea: could...