Auto AdSense

Sunday, 24 November 2013

Internet Download Manager Keys


NTOQN-7HUL9-NEPFL-13I0A

629U7-XLT5H-6SCGJ-2CENZ

XONF7-PMUOL-HU7P4-D1QQX

F9TZ9-P6IGF-SME74-2WP21

CJA0S-K6CO4-R4NPJ-EKNRK

N0Z90-KJTTW-7TZO4-I27A1

4DFQ4-OAPFS-L50GF-3GWRJ

L67GT-CE6TR-DFT1D-XWVCM

D91GM-T5X1J-DW7YG-1GHIS


I23LZ-H5C2I-QYWRT-RZ2BO


8XJTJ-ZTWES-CIQNV-9ZR2C


PAQ34-MHDIA-1DZUU-H4DB8


4CSYW-3ZMWW-PRRLK-WMRAB


DDLFR-JKN5K-B4DE3-H2WYO


9RVII-F3W58-6FAYV-WPTFD


M7CQ2-VARGX-QFYGZ-URKG0


POOUS-S8V4C-1RXUH-HG6NQ


7JPTJ-4XLY3-HM4LK-9UP4Q


OJNGE-77NS5-MW5FC-MFB7A


HSIWU-KRQQQ-Y870K-YI6QQ


HF0I6-AYL1O-BHDI7-DG9LW


LC3OG-66OU3-38BTX-SX20M


52OGI-AKRTG-MT6YU-YZ7OU


WNJ39-J1JN0-JKNVS-BZSCB


7WPV5-NHHF3-A2P39-LRJ74


OV4O3-1ASY1-8CDWI-9UGX4


O00C4-MYLXJ-LYUDP-QFGD5


I80CQ-RUG1G-LEP9V-O7UN0


OUC2X-F1F8A-8LO76-ETQCK


SN1OJ-P3ZGF-RU4XN-S61TZ


4P6BG-WGN41-C5CQQ-QXIO8


76JVD-ISRBG-KZB4U-LGL9D


PBPXJ-BC1EH-FKO7F-VUXJ2


30P7F-IG6PZ-CSZ3L-FRL7N


4B5XT-BOSBK-94O5F-669DJ

Tuesday, 5 November 2013

Falguni Pathak's Pal Pal Tere Yaad song Lyrics

Pal Pal Teri Yaad lyrics
pal pal teri yaad sataye o piya......
pal pal teri yaad sataye o piya,
tujh bin jeene ki sochun to,
dhadke haye mera jiya,
dhadke haye mera jiya,
dil ye bole piya piya
tujh bin jeene ki sochun to,
dhadke haye mera jiya,
pal pal teri yaad sataye o piya
tujh bin jeene ki sochun to,
dhadke haye mera jiya,

saamne jo tu aaye to
bol na paun kuch bhi piya,
jaisi meri haalat hai kya
teri bhi hai bol piya
saamne jo tu aaye to
bol na paun kuch bhi piya,
kaisa rog lagaya,
haye kaisa rog lagaya,
tune kya kiya,
jaisi meri haalat hai kya
teri bhi hai bol piya
tujh bin jeene ki sochun to,
dhadke haye mera jiya,
pal pal teri yaad sataye o piya
tujh bin jeene ki sochun to,
dhadke haye mera jiya,

naam kisi ka lu lab pe to
naam tera hi aaye piya
jeena mushkil ho gaya mera
jabse dil hai tujhe diya,
naam kisi ka lu lab pe to
naam tera hi aaye piya
jeena mushkil ho gaya mera
jabse dil hai tujhe diya,
kya main karun kaise main karun,
kya main karun kaise main karun,
kya kar liya,
tujh bin jeene ki sochun to,
dhadke haye mera jiya,
pal pal teri yaad sataye o piya
tujh bin jeene ki sochun to,
dhadke haye mera jiya,

pal pal teri yaad sataye o piya......

Tuesday, 3 September 2013

Download Hayt Kemmerly Engineering Circuit Analysis


CONTENTS

PART ONE : THE RESISTIVE CIRCUIT

01. DEFINITIONS AND UNITS
02. EXPERIMENTAL LAWS AND SIMPLE CIRCUITS
03. SOME USEFUL TECHNIQUES OF CIRCUIT ANALYSIS

PART TWO : THE TRANSIENT CIRCUIT

04. INDUCTANCE AND CAPACITANCE
05. SOURCE FREE RL AND RC CIRCUITS
06. THE APPLICATION OF THE UNIT STEP FORCING FUNCTION
07. THE RLC CIRCUIT

PART THREE : SINUSOIDAL ANALYSIS

08. THE SINUSOIDAL FORCING FUNCTION
09. THE PHASOR CONCEPT
10. THE SINUSOIDAL STEADY STATE RESPONSE
11. AVERAGE POWER AND RMS VALUES
12. POLYPHASE CIRCUITS

PART FOUR : COMPLEX FREQUENCY

13. COMPLEX FREQUENCY
14. FREQUENCY RESPONSE

PART FIVE : TWO PORT NETWORKS

15. MAGNETICALLY COUPLED CIRCUITS
16. TWO PORT NETWORKS

PART SIX : NETWORK ANALYSIS

17. FOURIER ANALYSIS
18. FOURIER TRANSFORMS
19. LAPLACE TRANSFORM TECHNIQUES


DOWNLOAD LINK


https://drive.google.com/file/d/0BxCGwQIReqoMNy1fV19VbmNSaGs/edit?usp=sharing


Sunday, 1 September 2013

Download Fiber Optics Technician's Manual 2nd Edition by Delmar

The Contents of the Book

01. The Origins of Fiber Optic Communications
02. Basics of Fiber Optics
03. Fiber Optic Networks
04. Optical Fiber Cables
05. Specifying Fiber Optic Cable
06. Fiber Optic Connectors, Splices & Tools
07. Fiber Optic Hardware
08. Getting Started in Fiber Optics
09. Guidelines for Fiber Optic Design & Installation
10. Cable Plant Link Loss Budget Analysis
11. Fiber Optic Installation Safety
12. Planning Installation
13. Fiber Optic Cable Plant Documentation
14. Estimation & Bidding Fiber Optic Installation
15. Fiber Optic Cable Pulling
16. Fiber Optic Restoration
17. Fiber Optic Testing

To Download the Book Click the Below Link

https://drive.google.com/file/d/0BxCGwQIReqoMVFJyMlhoS3YxVXc/edit?usp=sharing


Download Digital Signal Processing Filtering Approach by Delmar

The Contents of the Book

01. Introduction to Digital Signal Processing & Digital Filtering
02. Effect of Signal Processing
03. Digital Filter Specifications
04. Z-Transforms
05. Z-Transform of DSP Equation
06. Frequency Response of Digital Filters & DSP Systems
07. IIR Filter Design
08. Digital Filter & DSP Stability
09. Filter Coefficient Precision
10. FIR Filter Design
11. Windows for FIR Filters
12. Practical Digital Filter Considerations
13. Digital Integration

To Download the Book  click the below link

https://drive.google.com/file/d/0BxCGwQIReqoMZ21SZUc5amltSmc/edit?usp=sharing


Download Modern Control Technology Components Systems 2nd Ed by Delmar


CONTENTS

01.Introduction to Control Systems
02.Introduction to Microprocessor-Based Control
03.Operational Amplifiers and Signal Conditioning
04.Switches, Relays, and Power-Control Semiconductors
05.Mechanical Systems
06.Sensors
07.Direct Current Motors
08.Stepper Motors
09.Alternating Current Motors

10.Actuators: Electric, Hydraulic, and Pneumatic
11.Feedback Control Principles
12.Relay Logic, Programmable Logic Controllers, and Motion Controllers

DOWNLOAD LINK

https://drive.google.com/file/d/0BxCGwQIReqoMeTZWZ0lRV1BPWkk/edit?usp=sharing


Thursday, 29 August 2013

Download Artech. Radio Frequency Integrated Circuit Design

Contents

01.Introduction to Communications Circuits
02.Issues in RFIC Design, Noise, Linearity, and Filtering
03.A Brief Review of Technology
04.Impedance Matching
05.The Use and Design of Passive Circuit Elements in IC Technologies
06.LNA Design
07.Mixers
08.Voltage-Controlled Oscillators
09.High-Frequency Filter Circuits
10.Power Amplifiers



DOWNLOAD LINK


https://drive.google.com/file/d/0BxCGwQIReqoMZzFLNG1NZ0hsRnM/edit?usp=sharing




Download eWiley Mobile Fading Channels Modelling Analysis Simulation

CONTENTS

01. INTRODUCTION
02. RANDOM VARIABLES, STOCHASTIC PROCESSES, AND DETERMINISTIC SIGNALS
03. RAYLEIGH AND RICE PROCESSES AS REFERENCE MODELS
04. INTRODUCTION TO THE THEORY OF DETERMINISTIC PROCESSES
05. METHODS FOR THE COMPUTATION OF THE MODEL PARAMETERS OF DETERMINISTIC PROCESSES
06. FREQUENCY-NONSELECTIVE STOCHASTIC AND DETERMINISTIC CHANNEL MODELS
07. FREQUENCY-SELECTIVE STOCHASTIC AND DETERMINISTIC CHANNEL MODELS
08. FAST CHANNEL SIMULATORS


DOWNLOAD LINK


https://drive.google.com/file/d/0BxCGwQIReqoMT0laVy1VRFVRUXc/edit?usp=sharing



Download 802.11 Security

Part I: 802.11 Security Basics
        Chapter 1. A Wireless World
                Section 1.1. What Is Wireless?
                Section 1.2. Radio Transmission
                Section 1.3. Inherent Insecurity
                Section 1.4. 802.11
                Section 1.5. Structure of 802.11 MAC
                Section 1.6. WEP
                Section 1.7. Problems with WEP
                Section 1.8. Is It Hopeless?
        Chapter 2. Attacks and Risks
                Section 2.1. An Example Network
                Section 2.2. Denialof-Service Attacks
                Section 2.3. Man-inthe-Middle Attacks
                Section 2.4. Illicit Use
                Section 2.5. Wireless Risks
                Section 2.6. Knowing Is Half the Battle
Part II: Station Security
        Chapter 3. Station Security
                Section 3.1. Client Security Goals
                Section 3.2. Audit Logging
                Section 3.3. Security Updates
        Chapter 4. FreeBSD Station Security
                Section 4.1. FreeBSD Client Setup
        Chapter 5. Linux Station Security
                Section 5.1. Linux Client Setup
                Section 5.2. Kernel Configuration
                Section 5.3. OS Protection
                Section 5.4. Audit Logging
                Section 5.5. Secure Communication
        Chapter 6. OpenBSD Station Security
                Section 6.1. OpenBSD Client Setup
                Section 6.2. Kernel Configuration
                Section 6.3. OS Protection
                Section 6.4. Audit Logging
        Chapter 7. Mac OS X Station Security
                Section 7.1. Mac OS X Setup
                Section 7.2. OS Protection
               Section 7.3. Audit Logging
        Chapter 8. Windows Station Security
                Section 8.1. Windows Client Setup
                Section 8.2. OS Protection
                Section 8.3. Audit Logging
                Section 8.4. Secure Communication
Part III: Access Point Security
        Chapter 9. Setting Up an Access Point
                Section 9.1. General Access Point Security
                Section 9.2. Setting Up a Linux Access Point
                Section 9.3. Setting Up a FreeBSD Access Point
                Section 9.4. Setting Up an OpenBSD Access Point
                Section 9.5. Taking It to the Gateway
Part IV: Gateway Security
        Chapter 10. Gateway Security
                Section 10.1. Gateway Architecture
                Section 10.2. Secure Installation
                Section 10.3. Firewall Rule Creation
                Section 10.4. Audit Logging
        Chapter 11. Building a Linux Gateway
                Section 11.1. Laying Out the Network
                Section 11.2. Building the Gateway
                Section 11.3. Configuring Network Interfaces
                Section 11.4. Building the Firewall Rules
                Section 11.5. MAC Address Filtering
                Section 11.6. DHCP
                Section 11.7. DNS
                Section 11.8. Static ARP
                Section 11.9. Audit Logging
                Section 11.10. Wrapping Up
        Chapter 12. Building a FreeBSD Gateway
                Section 12.1. Building the Gateway
                Section 12.2. Building the Firewall Rules
                Section 12.3. Rate Limiting
                Section 12.4. DHCP
                Section 12.5. DNS
                Section 12.6. Static ARP
                Section 12.7. Auditing
        Chapter 13. Building an OpenBSD Gateway
                Section 13.1. Building the Gateway
                Section 13.2. Building the Firewall Rules
                Section 13.3. Rate Limiting
                Section 13.4. DHCP
                Section 13.5. DNS
                Section 13.6. Static ARP
                Section 13.7. Auditing
        Chapter 14. Authentication and Encryption
                Section 14.1. Portals
                Section 14.2. IPsec VPN
                Section 14.3. 802.1x
        Chapter 15. Putting It All Together
                Section 15.1. Pieces of a Coherent System
                Section 15.2. User Knowledge
                Section 15.3. Looking Ahead Colophon Index

DOWNLOAD LINK

https://drive.google.com/file/d/0BxCGwQIReqoMWXJjUWlySFJCSlU/edit?usp=sharing



Download Kluwer Reuse Methodology Manual for System on a Chip Designs 3rd Edition

TABLE OF CONTENTS
1. Introduction
    1.1 Goals of This Manual     
    1.2 Design for Reuse: The Challenge         
    1.3 The Emerging Business Model for Reuse
2. The System-on-Chip Design Process
    2.1 A Canonical SoC Design
    2.2 System Design Flow
    2.3 The Specification Problem         
    2.4 The System Design Process
3. System-Level Design Issues: Rules and Tools
    3.1 The Standard Model          
    3.2 Design for Timing Closure: Logic Design Issues        
    3.3 Design for Timing Closure: Physical Design Issues         
    3.4 Design for Verification: Verification Strategy
    3.5 System Interconnect and On-Chip Buses         
    3.6 Design for Bring-Up and Debug: On-Chip Debug Structures
    3.7 Design for Low Power          
    3.8 Design for Test: Manufacturing Test Strategies         
4. The Macro Design Process
    4.1 Overview of IP Design
    4.2 Key Features
    4.3 Planning and Specification          
    4.4 Macro Design and Verification         
    4.5 Soft Macro Productization         
5. RTL Coding Guidelines
    5.1 Overview of the Coding Guidelines
    5.2 Basic Coding Practices       
    5.3 Coding for Portability         
    5.4 Guidelines for Clocks and Resets
    5.5 Coding for Synthesis
    5.6 Partitioning for Synthesis
    5.7 Designing with Memories
    5.8 Code Profiling
6. Macro Synthesis Guidelines
    6.1 Overview of the Synthesis Problem
    6.2 Macro Synthesis Strategy
    6.3 Physical Synthesis
    6.4 RAM and Datapath Generators
    6.5 Coding Guidelines for Synthesis Scripts
7. Macro Verification Guidelines
    7.1 Overview of Macro Verification
    7.2 Inspection as Verification
    7.3 Adversarial Testing
    7.4 Testbench Design
    7.5 Design of Verification Components
    7.6 Getting to 100%
    7.7 Timing Verification
8. Developing Hard Macros
    8.1 Overview
    8.2 Design Issues for Hard Macros
    8.3 The Hard Macro Design Process
    8.4 Productization of Hard Macros
    8.5 Model Development for Hard Macros
    8.6 Porting Hard Macros
9. Macro Deployment: Packaging for Reuse
    9.1 Delivering the Complete Product
    9.2 Contents of the User Guide
10. System Integration with Reusable Macros
      10.1 Integration Overview
      10.2 Integrating Macros into an SoC Design
      10.3 Selecting IP
      10.4 Integrating Memories
      10.5 Physical Design
11. System-Level Verification Issues
      11.1 The Importance of Verification
      11.2 The Verification Strategy

      11.3 Interface Verification
      11.4 Functional Verification
      11.5 Random Testing

      11.6 Application-Based Verification
      11.7 Gate-Level Verification
      11.8 Specialized Hardware for System Verification
12. Data and Project Management
      12.1 Data Management
      12.2 Project Management
13. Implementing Reuse-Based SoC Designs
      13.1 Alcatel 
      13.2 Atmel 
      13.3 Infineon Technologies
      13.4 LSI Logic
      13.5 Philips Semiconductor
      13.6 STMicroelectronics

      13.7 Conclusion

DOWNLOAD LINK


https://drive.google.com/file/d/0BxCGwQIReqoMenp4SkVnQk1TLVk/edit?usp=sharing

Download Schaum's Outlines of Signals And Systems


Contents
Chapter 1. Signals and Systems 
                   1.1 Introduction 
                   1.2 Signals and Classification of Signals 
                   1.3 Basic Continuous-Time Signals
                   1.4 Basic Discrete-Time Signals 
                   1.5 Systems and Classification of Systems 
                         Solved Problems 
Chapter 2. Linear Time-Invariant Systems 
                   2.1 Introduction 
                   2.2 Response of a Continuous-Time LTI System and the Convolution Integral 
                   2.3 Properties of Continuous-Time LTI Systems 
                   2.4 Eigen functions of Continuous-Time LTI Systems 
                   2.5 Systems Described by Differential Equations 
                   2.6 Response of a Discrete-Time LTI System and Convolution Sum 
                   2.7 Properties of Discrete-Time LTI Systems 
                   2.8 Eigenfunctions of Discrete-Time LTI Systems 
                   2.9 Systems Described by Difference Equations 
                         Solved Problems 
Chapter 3. Laplace Transform and Continuous-Time LTI Systems 
                   3.1 Introduction 
                   3.2 The Laplace Transform 
                   3.3 Laplace Transforms of Some Common Signals 
                   3.4 Properties of the Laplace Transform 
                   3.5 The Inverse Laplace Transform 
                   3.6 The System Function 
                   3.7 The Unilateral Laplace Transform 
                         Solved Problems 
Chapter 4. The z-Transform and Discrete-Time LTI Systems
                   4.1 Introduction 
                   4.2 The z-Transform 
                   4.3 z-Transforms of Some Common Sequences 
                   4.4 Properties of the z-Transform 
                   4.5 The Inverse z-Transform 
                   4.6 The System Function of Discrete-Time LTI Systems
                   4.7 The Unilateral z-Transform 
                          Solved Problems 
Chapter 5. Fourier Analysis of Continuous-Time Signals and Systems 
                   5.1 Introduction 
                   5.2 Fourier Series Representation of Periodic Signals 
                   5.3 The Fourier Transform 
                   5.4 Properties of the Continuous-Time Fourier Transform 
                   5.5 The Frequency Response of Continuous-Time LTI Systems
                   5.6 Filtering 
                   5.7 Bandwidth 
                         Solved Problems 
Chapter 6. Fourier Analysis of Discrete-Time Signals and Systems 
                   6.1 Introduction 
                   6.2 Discrete Fourier Series 
                   6.3 The Fourier Transform 
                   6.4 Properties of the Fourier Transform 
                   6.5 The Frequency Response of Discrete-Time LTI Systems 
                   6.6 System Response to Sampled Continuous-Time Sinusoids
                   6.7 Simulation 
                   6.8 The Discrete Fourier Transform 
                         Solved Problems 
Chapter 7. State Space Analysis 
                    7.1 Introduction 
                    7.2 The Concept of State 
                    7.3 State Space Representation of Discrete-Time LTI Systems
                    7.4 State Space Representation of Continuous-Time LTI Systems
                    7.5 Solutions of State Equations for Discrete-Time LTI Systems
                    7.6 Solutions of State Equations for Continuous-Time LTI Systems

                          Solved Problems

DOWNLOAD LINK


https://drive.google.com/file/d/0BxCGwQIReqoMVHlVeFhaQm9VMlU/edit?usp=sharing

Download Schaum's Outlines of Digital Signal Processing


Contents
Chapter 1. Signals and Systems 
                  1.1 Introduction 
                  1.2 Discrete-Time Signals 
                  1.3 Discrete-Time Systems 
                  1.4 Convolution
                  1.5 Difference Equations 
                        Solved Problems 
Chapter 2. Fourier Analysis 
                  2.1 Introduction 
                  2.2 Frequency Response 
                  2.3 Filters 
                  2.4 Interconnection of Systems 
                  2.5 The Discrete-Time Fourier Transform 
                  2.6 DTFT Properties 
                  2.7 Applications 
                        Solved Problems 
Chapter 3. Sampling 
                  3.1 Introduction 
                  3.2 Analog-to-Digital Conversion 
                  3.3 Digital-to-Analog Conversion 
                  3.4 Discrete-Time Processing of Analog Signals 
                  3.5 Sample Rate Conversion 
                        Solved Problems 
Chapter 4. The Z-Transform 
                   4.1 Introduction 
                   4.2 Definition of the z-Transform

                   4.3 Properties 
                   4.4 The Inverse z-Transform 
                   4.5 The One-Sided z-Transform 
                          Solved Problems 
Chapter 5. Transform Analysis of Systems 
                  5.1 Introduction 
                  5.2 System Function 
                  5.3 Systems with Linear Phase 
                  5.4 Allpass Filters 
                  5.5 Minimum Phase Systems 
                  5.6 Feedback Systems 
                        Solved Problems 
Chapter 6. The DFT 
                  6.1 Introduction 
                  6.2 Discrete Fourier Series 
                  6.3 Discrete Fourier Transform 
                  6.4 DFT Properties 
                  6.5 Sampling the DTFT 
                  6.6 Linear Convolution Using the DFT 
                        Solved Problems 
Chapter 7. The Fast Fourier Transform 
                  7.1 Introduction 
                  7.2 Radix-2 FFT Algorithms 
                  7.3 FFT Algorithms for Composite N 
                  7.4 Prime Factor FFT 
                        Solved Problems 
Chapter 8. Implementation of Discrete-Time Systems 
                  8.1 Introduction 
                  8.2 Digital Networks 
                  8.3 Structures for FIR Systems 
                  8.4 Structures for IIR Systems 
                  8.5 Lattice Filters 
                  8.6 Finite Word-Length Effects 
                        Solved Problems 
Chapter 9. Filter Design 
                  9.1 Introduction 
                  9.2 Filter Specifications
                  9.3 FIR Filter Design 
                  9.4 IIR Filter Design 
                  9.5 Filter Design Based on a Least Squares Approach 

                        Solved Problems 

DOWNLOAD LINK

https://drive.google.com/file/d/0BxCGwQIReqoMQkJyQzl2MFV4WFE/edit?usp=sharing

Friday, 23 August 2013

Cybernetics

Cybernetics, interdisciplinary science dealing with communication and control systems in living organisms, machines, and organizations. The term, derived from the Greek word kybernÄ“tÄ“s (“steersman” or “governor”), was first applied in 1948 to the theory of control mechanisms by the mathematician Norbert Wiener.
Cybernetics developed as the investigation of the techniques by which information is transformed into desired performance. The science arose out of problems that were encountered during World War II in the development of so-called electronic brains and automatic-control mechanisms for military apparatuses such as bombsights.
Systems of communication and control in living organisms and those in machines are considered analogous in cybernetics. To achieve desired performance from human organs or from mechanical devices, information concerning the actual results of intended action must be made available as a guide for future action. In the human body, the brain and nervous system function to coordinate the information, which is then used to determine a future course of action; control mechanisms for self-correction in machines serve a similar purpose. The principle is known as feedback, which is the fundamental concept of automation.
According to information theory, one of the basic tenets of cybernetics is that information is statistical in nature and is measured in accordance with the laws of probability. In this sense, information is regarded as a measure of the freedom of choice involved in selection. As the freedom of choice increases, the probability that any particular message will be chosen decreases. The measure of probability is known as entropy. According to the second law of thermodynamics, in natural processes the tendency is towards a state of disorganization, or chaos, occurring without assistance or control. Thus, according to the principles of cybernetics, order (lowering of entropy) is least probable and chaos (increased entropy) is most probable. Purposive behaviour in humans or in machines requires control mechanisms that maintain order by counteracting the natural tendency towards disorganization.
Cybernetics has also been applied to the study of psychology, artificial intelligence, servomechanisms, economics, neurophysiology, systems engineering, and the study of social systems. The term cybernetics is no longer much used to describe a separate field of study, and most of the research activity in the field now focuses on the study and design of artificial neural networks.


Artificial Neural Network





                                               The neural networks that are increasingly being used in artificial intelligence research mimic those found in the nervous systems of vertebrates. The main characteristic of these (top) is that each neuron, or nerve cell, receives signals from many other neurons, through its branching dendrites. It produces an output signal that depends on the values of all the input signals, and passes this output on to many other neurons along a branching fibre called an axon. In an artificial neural network (bottom), input signals, such as signals from a television camera’s image, fall on a layer of input nodes, or computing units. Each of these is linked to several other nodes, which, being intermediate between the input and output nodes of the network, are called “hidden” nodes. Each hidden node performs a calculation on the signals reaching it, and sends a corresponding output signal to further nodes. The final output is a highly processed version of the input. Artificial neural networks can be rapid, and can “learn” to perform more and more accurately without needing to be explicitly programmed.

Monday, 19 August 2013

ARTIFICIAL INTELLIGENCE AND REAL INTELLIGENCE




ARTIFICIAL INTELLIGENCE AND REAL INTELLIGENCE

                        The question, “Is artificial intelligence possible?” is ambiguous. It may mean “Can AI programs actually produce results that resemble human behaviour?” This is a scientific question. The answer at present is yes, at least in some cases. Whether it would also be true to say that this is so in all cases is not yet known. Some things that most people assume computers could never do are already possible. AI programs can compose aesthetically appealing music, draw attractive pictures, and even play the piano “expressively”. Other things are more elusive: producing perfect translations of a wide range of texts; making fundamental, yet aesthetically acceptable, transformations of musical style; producing robots that move nimbly over rough ground, swim across rivers, or climb mountains. It is controversial whether these things are merely very difficult in practice, or impossible in principle.
Alternatively, “Is artificial intelligence possible?” may mean “Could any program (or robot), no matter how humanlike its performance, really be intelligent?” This question involves highly controversial issues in the philosophy of mind, including the importance of embodiment and the nature of intentionality and consciousness. Some philosophers and AI researchers argue that intelligence can arise only in bodily creatures sensing and acting in the real world. If this is correct, then robotics is essential to the attempt to construct truly intelligent artefacts. If not, then a mere AI program might be intelligent.
The celebrated mathematician and computer scientist Alan Turing proposed what is now called the Turing Test as a way of deciding whether a machine is intelligent. He imagined a person and a computer hidden behind a screen, communicating by electronic means. If we cannot tell which one is the human, we have no reason to deny that the machine is thinking. That is, a purely behavioural test is adequate for identifying intelligence (and consciousness). The philosopher John Searle has expressed a different view. He admits that a program might produce replies identical to those of a person, and that a programmed robot might behave exactly like a human. But he argues that a program cannot understand anything it “says”. It is not actually saying (asserting) anything at all, merely outputting meaningless symbols that it has manipulated according to purely formal rules. Lacking understanding (intentionality), it is all syntax and no semantics. But human beings can ascribe meaning to its empty symbols, because our brains can somehow (Searle does not say how) cause intentionality, whereas metal and silicon cannot. There is no consensus, in either AI or philosophy, as to which theory, that of Turing or that of Searle, is right.
Whether an AI system could be conscious is an especially controversial topic. The concept of consciousness itself is ill-understood, both scientifically and philosophically. Some people think it obvious that any robot, no matter how superficially humanlike, must be zombie-like. But others think it obvious that a robot whose functions matched the relevant functions of the brain (whatever those may be) would inevitably be conscious. The answer has moral implications: if an AI system were conscious, it would arguably be wrong to “kill” it, or even to use it as a “slave”.

PURPOSES OF ARTIFICIAL INTELLIGENCE



PURPOSES OF ARTIFICIAL INTELLIGENCE

AI developers have one or both of two motivations: technological and psychological. Some want to make their computers do a useful task, without caring just how they do it. These may include methods that people cannot match, such as sensitivity to ultraviolet light, or an exhaustive search ahead through all the legal chess moves for several steps. Others want to learn about human minds (or brains). They see their programs as psychological theories, and avoid methods that humans cannot use.
Psychologists can be helped by AI because they must state their theories very clearly to express them as programs. If the program fails to produce the intended results, then the theory must be mistaken, but the computer run may indicate where the mistake is. If the program succeeds, it does not follow that people think in the same way: only psychological (or neurophysiological) evidence can confirm that.
AI is used by financial institutions, scientists and medical practitioners, design engineers, public transport schedulers, planning authorities, government departments, and security services, among many others. AI techniques are also applied in systems used to browse the Internet and online news and wire services. In the home, AI systems can provide guidance on gardening, travel, car maintenance, and many other matters; and AI robots are being developed to assist the disabled.

Types of Artificial Intelligence

 TYPES OF ARTIFICIAL INTELLIGENCE 

There are three types of AI: symbolic, connectionist, and evolutionary. Each has characteristic strengths and weaknesses.

A  Symbolic AI 

Symbolic AI is based in logic. It uses sequences of rules to tell the computer what to do next. Expert systems consist of many so-called IF-THEN rules: IF this is the case, THEN do that. Since both sides of the rule can be defined in complex ways, rule-based programs can be very powerful. The performance of a logic-based program need not appear “logical”, since some rules may cause it to take apparently irrational actions. “Illogical” AI programs are not used for practical problem-solving, but are useful in modelling how humans think. Symbolic programs are good at dealing with set problems, and at representing hierarchies (in grammar, for example, or planning). But they are brittle: if part of the expected input data is missing or mistaken, they may give a bad answer, or no answer at all.

B  Connectionist AI 

Connectionism is inspired by the brain. It is closely related to computational neuroscience, which models actual brain cells and neural circuits. Connectionist AI uses artificial neural networks made of many units working in parallel. Each unit is connected to its neighbours by links that can raise or lower the likelihood that the neighbour unit will fire (excitatory and inhibitory connections respectively). Neural networks that are able to learn do so by changing the strengths of these links, depending on past experience. These simple units are much less complex than real neurons. Each can do only one thing: for instance, report a tiny vertical line at a particular place in an image. What matters is not what any individual unit is doing, but the overall activity-pattern of the whole network.

Consequently, connectionist systems are less brittle than symbolic AI programs: even if the input data is faulty, the network may give the right answer. They are therefore good at pattern recognition, where the input-patterns within a certain class need not be identical. But connectionism is weak at doing logic, following action sequences, or representing hierarchies of goals. What symbolic AI does well, connectionism does badly, and vice versa. “Hybrid” systems combine the two, switching between them as appropriate. And work on recurrent neural networks, where the output of one layer of units is fed back as input to some previous layer, aims to enable connectionist systems to deal with sequential action and hierarchy.

C  Evolutionary AI 

Evolutionary AI draws on biology. Its programs make random changes in their own rules, and select the best daughter programs to breed the next generation. This method develops problem-solving programs, and can evolve the “brains” and “eyes” of robots. It is often used in modelling artificial life (A-Life). A-Life studies self-organization: how order arises from something that is ordered to a lesser degree. Biological examples include the flocking patterns of birds and the development of embryos. Technological examples include the A-Life flocking algorithms used for computer animation.

Artificial Neural Network

                        The neural networks that are increasingly being used in artificial intelligence research mimic those found in the nervous systems of vertebrates. The main characteristic of these (top) is that each neuron, or nerve cell, receives signals from many other neurons, through its branching dendrites. It produces an output signal that depends on the values of all the input signals, and passes this output on to many other neurons along a branching fibre called an axon. In an artificial neural network (bottom), input signals, such as signals from a television camera’s image, fall on a layer of input nodes, or computing units. Each of these is linked to several other nodes, which, being intermediate between the input and output nodes of the network, are called “hidden” nodes. Each hidden node performs a calculation on the signals reaching it, and sends a corresponding output signal to further nodes. The final output is a highly processed version of the input. Artificial neural networks can be rapid, and can “learn” to perform more and more accurately without needing to be explicitly programmed.

Scope of Artificial Intelligence



                    AI programs can do many different things. They can play games, predict share values, interpret photographs, diagnose diseases, plan travel itineraries, translate languages, take dictation, draw analogies, help design complex machinery, teach logic, make jokes, compose music, do drawings, and learn to do tasks better. Some of these things they do well. Expert systems can make medical diagnoses as well as, or better than, most human doctors. The world chess champion Garry Kasparov was beaten by a program in 1997, computers often predict share prices better than humans, and some AI-generated music sounds like compositions by famous composers. Other things, they do rather badly. Their translations are imperfect, but good enough to be understood. Their dictation is reliable only if the vocabulary is predictable and the speech unusually clear. And their jokes are poor, although some are found funny by children. To match everything that people can do, they would need to model the richness and subtlety of human memory and common sense. Moreover, programs do only one thing, whereas people do many things.
AI robots, although more flexible than industrial robots, are similarly limited. Very few can avoid obstacles smoothly, or move across uneven surfaces without falling over. Robots that plan their actions beforehand are vulnerable to unexpected environmental changes. Even if a robot performs successfully, it cannot undertake a wide variety of tasks. And its success often requires simplification of the environment: floor-cleaning robots are useful only if the floor is uncluttered. Nevertheless, AI-robots can do boring, dirty, or dangerous jobs, sometimes in places that humans cannot reach.
.