Blog

Home / Blog
Pattern Recognition and Problem Decomposition in Artificial Intelligence

Pattern Recognition and Problem Decomposition in Artificial Intelligence

AI
  Introduction Artificial Intelligence (A.I) is a word created in 1955 by J. McCarthy, M. L., N, and C.E. Shannon after a proposed "Dartmouth summer research project on artificial intelligence", remembered now as the Dartmouth Conference. This Conference held in the summer of 1956, discussed various aspects of learning and intelligence that could be simulated on machines. Artificial intelligence is based around the idea that human intelligence can be defined in such exact terms that a machine can mimic it. The goals of artificial intelligence include learning, reasoning and perception, and machines are wired using a cross-disciplinary approach based in mathematics, computer science, linguistics, psychology and more (Investopedia, 2018) Since then Pattern Recognition has remained one of the principal fields in Artificial Intelligence till the beginning of 70's when the first IJCPR…
Read More
CYBERSECURITY AND ITS APPLICATION IN WEB DEVELOPMENT

CYBERSECURITY AND ITS APPLICATION IN WEB DEVELOPMENT

Cyber security, Internet
    In the present day, the Internet is often tagged an unsafe, and the only safe computer system is one without a network connection. In recent times, example during the ENDSARS protest We often hear rumors of organizations websites becoming unavailable due to denial-of-service attacks, or displaying modified (and often precarious or misinformation) information on their homepages. In other high-profile cases, millions of passwords, email addresses, and credit card details have been leaked into the public domain, exposing website users to both personal embarrassment and financial risk. The purpose of cybersecurity application in web development is mainly to thwart these (or any) sorts of attacks. Cybersecurity application in web development can be defined as the application of acts or practices that will protect or shield web applications such as…
Read More
Internet Design

Internet Design

Internet, Networking, Telecoms
INTRODUCTION The concept of the internet started over 50 years ago when computers filled the entire room, today it is an ubiquitous information infrastructure, the initial prototype of what J. C. R. Licklider called the inter-galactic computer network (Wikipedia, 2018) has indeed becoming an inter-galactic network. Its history is complex and involves many aspects – technological, organizational, and community; its influence reaches not only to the technical field of computer communications but throughout society. The initial design of the internet was conceived by ARPA, was network that would be able to withstand a nuclear strike in event of nuclear strike. ARPANET development began with two network nodes which were interconnected between the Network Measurement Center at the University of California, Los Angeles (UCLA) Henry Samueli School of Engineering and Applied…
Read More
Network Congestion Control Mechanisms (Leaky Bucket VS Token Bucket Algorithm)

Network Congestion Control Mechanisms (Leaky Bucket VS Token Bucket Algorithm)

Internet, Networking, Telecoms
Network congestion is a challenging misnomer in today’s networking world as the number of connected devices continues to increase; this article enumerates different congestion control mechanisms and compares the leaky bucket and token bucket algorithm. INTRODUCTION Network congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node or link is carrying more data than it can handle. Typical effects include queueing delay, packet loss or the blocking of new connections. A consequence of congestion is that an incremental increase in offered load leads either only to a small increase or even a decrease in network throughput. (Al-Bahaddili, 2012) Network resources are limited, including router processing time and link throughput. Resource contention may occur on networks in a number of common circumstances.…
Read More
Ensemble Learning

Ensemble Learning

AI
Ensemble Learning Ensemble learning is a machine learning archetype or theory where multiple learners are trained or applied to datasets to solve the same problem by extracting multiple predictions then combined into one composite prediction. It is a process that uses a set of models, each of them obtained by applying a learning process to a given problem. This set of models (ensemble) is integrated in some way to obtain the final prediction.” (Moreira, et al. 2012, 3) This in contrast to ordinary machine learning approaches which try to learn one hypothesis from training data, ensemble methods try to construct a set of hypotheses and combine them to use. It is a powerful way to improve the performance of your model. It usually pays off to apply ensemble learning over…
Read More
Telecoms network switch subsystem (NSS) key performance indicators (KPI)

Telecoms network switch subsystem (NSS) key performance indicators (KPI)

Telecoms
Telecoms KPI, Contributors to Poor KPI and Improvement plans What is NSS Network switching subsystem (NSS) (or GSM core network) is the component of a GSM system that carries out call switching and mobility management functions for mobile phones roaming on the network of base stations. It is owned and deployed by mobile phone operators and allows mobile devices to communicate with each other and telephones in the wider public switched telephone network (PSTN). The architecture contains specific features and functions which are needed because the phones are not fixed in one location. WHAT IS KPI A Key Performance Indicator is a measurable value that demonstrates how effectively a company is achieving key business objectives. Organizations use KPIs at multiple levels to evaluate their success at reaching targets. Telecommunication KPI…
Read More
Internet of Things (IoTs)

Internet of Things (IoTs)

IoT
Internet of Things (IoTs) We have recently come across devices called "smart". These could be phones, televisions, ovens, refrigerators, electric bulbs etc, they are so called because they can be easily connected with other devices hence internet of things.A means where connected devices can be accessed/pinged by other connected devices is called Internet of Things (IoTs). It is estimated that 26 billion devices / units to be installed within the Internet of Things by 2020, according to Gartner, Inc., do not include PCs, tablets and mobile phones.[caption id="attachment_285" align="aligncenter" width="300"] smart refrigerator[/caption]IoT is simply connecting devices with an on/off switch; it is a network constituted by identifiable objects or devices equipped with some sensing system which enables the objects and subsequently communicates with other objects for data exchange through an…
Read More
Facebook
Facebook
LinkedIn
RSS