Professional Documents
Culture Documents
Digital Tech
Digital Tech
Digital Tech
The process of learning begins with observations or data, such as examples, direct
experience, or instruction, in order to look for patterns in data and make better
decisions in the future based on the examples that we provide. The primary aim is to
allow the computers learn automatically without human intervention or assistance
and adjust actions accordingly.
Attackers will use a variety of methods to get malware into your computer, but
at some stage it often requires the user to take an action to install the
malware. This can include clicking a link to download a file, or opening an
attachment that may look harmless (like a Word document or PDF
attachment), but actually has a malware installer hidden within.
Phishing
Of course, chances are you wouldn’t just open a random attachment or click
on a link in any email that comes your way—there has to be a compelling
reason for you to take action. Attackers know this, too. When an attacker
wants you to install malware or divulge sensitive information, they often turn
to phishing tactics, or pretending to be someone or something else to get you
to take an action you normally wouldn’t. Since they rely on human curiosity
and impulses, phishing attacks can be difficult to stop.
An SQL injection attack works by exploiting any one of the known SQL
vulnerabilities that allow the SQL server to run malicious code. For example, if
a SQL server is vulnerable to an injection attack, it may be possible for an
attacker to go to a website’s search box and type in code that would force the
site’s SQL server to dump all of its stored usernames and passwords for the
site.
Applications include –
Smart homes
Wearable (Smart watches)
Manufacturing Industries’
Transportation
Agriculture
Retail Industries
Healthcare etc.
AR vs VR vs MR
A lot of people use the term “virtual reality” for different types of “Immersive
Experiences”. This includes augmented and mixed reality as well as 360° video.
Although they each offer alternate or altered reality experiences, they are quite
different and too frequently are the technologies confused with one another.
1. Virtual Reality
2. Augmented Reality
3. Mixed Reality
4. 360° Video
Virtual Reality
In its simplest form, Virtual Reality (VR) transposes the user to an alternate world.
The real world which the user is in, does not exist. This is done through live video or
computer generated graphics and uses closed head-mounted displays (HMD’s) that
completely blind the user from seeing anything in the real-world. The Oculus Rift,
Playstation VR, HTC Vive, Google Daydream, Gear VR are examples of HMD’s.
* The differences in HMD’s will be explained in an upcoming article from BluFocus.
Non-Interactive VR:
With non-interactive VR applications and content, the user is a spectator in another
world. They sit back and can look anywhere as if they were there. But they cannot
interact (other than point and click). They are still fully immersed though and with
added components such as immersive audio, the user is fully engulfed into a
different reality thus altering the user’s senses, etc.
Types of Non-Interactive VR:
Experience — These are experiences which allow the user to feel actively involved
and engaged but still in an entirely passive role.
Examples of Experience VR: Oculus Dreamdeck, G2A Land, Face Your Fears,
Everest VR
Storytelling and Story Enabling — Examples are movies, short stories and
narrative pieces. This is another important subject regarding the art of
storytelling vs. story enabling with VR. Both deal with a certain plot the author
has introduced, but while storytelling gives no control to the user, story
enabling allows the user to interact with the story; thus giving them choices
and some amounts of freedom to engage.
It is argued that this type of “VR Cinema” is yet to be discovered because
current storytellers are unable to see beyond conventional cinematic
processes which dictate every part of how the story is told. Creators of
cinema content for the virtual realm are yet to be born.
Interactive VR
This type of experience gives the user interactive abilities while in their
alternate world. Users can fully immerse themselves in their alternate realities
by moving forward or backwards, sideways, up and down. This immersion
expands the user’s senses and they can also interact with objects by holding,
throwing, pushing and pulling.
Most of this is not real-world but instead computer generated using high
powered game engine PC’s that allow for real time rendering.
Augmented Reality
This adds to our reality. It supplements the real world with digital objects. It
does not take us elsewhere but instead enhances our present. It literally
“augments” our reality instead of blocking out the world.
With AR, computer generated graphics overlay the current reality and provide
enhancing data that can be used regularly in day-to-day life. Examples of AR
have been seen in movies for quite some time such as The Terminator,
Minority Report and others.
The digital object overlays can be text data, 3D objects or video such as with
Google Glass notifications or on the head-up displays (HUD) in cars which
provide valuable information to a driver.
As Tim Cook, CEO of Apple said, “AR allows individuals to be present in the
world but hopefully allows an improvement on what’s happening presently”.
Mixed Reality
MR is a mixture of VR and AR where virtual objects interact with real world
objects. An example would be if you placed a virtual object (a cup for
example) onto a real-world object (a table). The cup would remain in that
same position as you walk or change locations. Basically, the virtual object
attaches itself to the real-world object and it becomes part the real-world.
Take a look at the Magic Beans demo or Bridge Engine Demo for awesome
examples.
Examples of Mixed Reality: Microsoft HoloLens, ODG headsets, Google
Glass, Magic Beans Demo
360° Content
360° content can be easily created using the plethora of 360° camera’s on the
market today. Typically, this is a 2 step process where multiple cameras or
lenses capture an image from a different angle and are then stitched together
to create a single image that can be projected into a 360° environment. There
are many challenges in filming and stitching 360° video that will be discussed
in a later article.
360° content utilizes “live” video, or even pre-rendered computer generated
graphics. It can be of concerts, car rides, drone videos, and so much more.
Is 360° content VR?
(The main argument is that if the user views 360° content within a VR headset, like
the Oculus Rift, is it not technically VR because the user is then immersed into an
alternate world with no visibility of the “real world”?)
No. This isn’t VR.
Why?
Well, because true VR utilizes sensors to track your head movements giving
you the illusion that you are in this alternate world. When your head moves,
the view of the world moves as well, affecting both your subconscious and
conscious mind. It also tracks your position in space and requires highly
powered computers with head-mounted displays such as the Rift, Vive or PS
VR to give precise displays of individual frames that accurately match the
head’s position.
With 360° content, you are not fully immersed. You can look up, down and
around but you can’t move forward. And frame rates are no where near in
comparison therefore not tricking your brain into really believing you are in
another world.
360° content at its most basic can be viewed without a headset on
applications such as YouTube, Facebook posts or through websites requiring
mouse movements to navigate.
Data Science and Machine Learning
You are given a data set consisting of variables with more than 30 percent
missing values. How will you deal with them?
The following are ways to handle missing data values:
If the data set is large, we can just simply remove the rows with missing data values.
It is the quickest way; we use the rest of the data to predict the values.
For smaller data sets, we can substitute missing values with the mean or average of
the rest of the data using the pandas' data frame in python. There are different ways
to do so, such as df.mean(), df.fillna(mean).
Explain cross-validation.
Cross-validation is a model validation technique for evaluating how the outcomes of
a statistical analysis will generalize to an independent data set. It is mainly used in
backgrounds where the objective is to forecast and one wants to estimate how
accurately a model will accomplish in practice.
The goal of cross-validation is to term a data set to test the model in the training
phase (i.e. validation data set) to limit problems like overfitting and gain insight into
how the model will generalize to an independent data set.
Cross Validation is a model performance improvement technique. This is a Statistics
based approach in which the model gets to train and tested with rotation within the
training dataset so that model can perform well for unknown or testing data.
In this the training data are split into different groups and in rotation those groups are
used for validation of model performance.
What do you understand by Confusion Matrix ? How does Confusion Matrix help in
evaluating model performance?
Confusion Matrix is a matrix to find the performance of a Classification model. It is in
general a 2×2 matrix with one side as prediction and the other side as actual values.
We can find different accuracy measures using a confusion matrix. These parameters
are Accuracy, Recall, Precision, F1 Score, and Specificity.
What is the significance of Sampling?
For analyzing the data we cannot proceed with the whole volume at once for large
datasets. We need to take some samples from the data which can represent the whole
population. While making a sample out of complete data, we should take that data which
can be a true representative of the whole data set.
What are Type 1 and Type 2 errors? In which scenarios the Type 1 and Type 2 errors
become significant?
Rejection of True Null Hypothesis is known as a Type 1 error. In simple terms, False
Positive are known as a Type 1 Error.
Not rejecting the False Null Hypothesis is known as a Type 2 error. False Negatives are
known as a Type 2 error.
Type 1 Error is significant where the importance of being negative becomes significant.
For example – If a man is not suffering from a particular disease marked as positive for
that infection. The medications given to him might damage his organs.
While Type 2 Error is significant in cases where the importance of being positive
becomes important. For example – The alarm has to be raised in case of burglary in a
bank. But a system identifies it as a False case that won’t raise the alarm on time
resulting in a heavy loss.
What are the conditions for Overfitting and Underfitting?
In Overfitting the model performs well for the training data, but for any new data it fails
to provide output. For Underfitting the model is very simple and not able to identify the
correct relationship. Following are the bias and variance conditions.
Overfitting – Low bias and High Variance results in overfitted model. Decision tree is
more prone to Overfitting.
Underfitting – High bias and Low Variance. Such model doesn’t perform well on test
data also. For example – Linear Regression is more prone to Underfitting.
Describe Decision tree Algorithm?
Decision tree is a Supervised Machine Learning approach. It uses the predetermined
decisions data to prepare a model based on previous output. It follows a system to
identify the pattern and predict the classes or output variable from previous output .
What is Ensemble Learning. Give an important example of Ensemble Learning?
Ensemble Learning is a process of accumulating multiple models to form a better
prediction model. In Ensemble Learning the performance of the individual model
contributes to the overall development in every step. There are two common techniques
in this – Bagging and Boosting.
Bagging – In this the data set is split to perform parallel processing of models and
results are accumulated based on performance to achieve better accuracy.
Boosting – This is a sequential technique in which a result from one model is passed to
another model to reduce error at every step making it a better performance model.
The most important example of Ensemble Learning is Random Forest Classifier. It takes
multiple Decision Tree combined to form a better performance Random Forest model.
Explain Naive Bayes Classifier and the principle on which it works?
Naive Bayes Classifier algorithm is a probabilistic model. This model works on the Bayes
Theorem principle. The accuracy of Naive Bayes can be increased significantly by
combining it with other kernel functions for making a perfect Classifier.
Bayes Theorem – This is a theorem which explains the conditional probability. If we
need to identify the probability of occurrence of Event A provided the Event B has
already occurred such cases are known as Conditional Probability.
What is Deep Learning ?
Deep Learning is the branch of Machine Learning and AI which tries to achieve better
accuracy and able to achieve complex models. Deep Learning models are similar to
human brains like structure with input layer, hidden layer, activation function and output
layer designed in a fashion to give a human brain like structure.
Deep Learning have so many real time applications –
Self Driving Cars
Computer Vision and Image Processing
Real Time Chat bots
Home Automation Systems
Large collection of data sets that cannot An interdisciplinary field that includes
be stored in a traditional system analytical aspects, statistics, data mining,
machine learning, etc.
Popular in the field of communication, Common application are digital advertising,
purchase and sale of goods, financial web research, recommendation systems
services, and educational sector (Netflix, Amazon, Facebook), speech and
handwriting recognition applications
Big Data solves problems related to data Data Science uses machine learning
management and handling, and analyze algorithms and statistical methods to obtain
insights resulting in informed decision accurate predictions from raw data
making
Popular tools are Hadoop, Spark, Flink, Popular tools are Python, R, SAS, SQL, etc.
NoSQL, Hive, etc.