Sasecurity Wiki

Neural networks


Nervanasys, deepgroup activity analysis(semantic segmentation). Identifies kayaking, crime, loitering, jumping over walls and normal activity. Sends and alert on any abnormality, replacing expensive cctv operators. Pose estimation Indicates for example if a person is carefully sneaking around a corner, jumping, it can even flag the same person by his unique gait. 25 key points on a person, indicating normal and anomalous behavior. person reidentification and Yolo based Deep sort and ☀https://github.com/martinruenz/maskfusion/ tracking combined enables the reid of persons at an occlusion event, meaning multiple people crossing each others path are tracked without loss as they walk from street to street. It allows multiple Tracked vehicle fitted with PepperBall, model rc tanks to engage intruders at the gate as you arrive from home.

The same person reid algorithm is used for vehicle reid(github link to follow), if a specific vehicle/sets of vehicles pass the same sequence of stationary cameras on the network. The idea is to determine if a vehicle is being followed past a set of cameras and should another vehicle have taken the same route an alert is generated. A camera mounted in the back of the vehicle(connected to Nvidia Jetson) will also do reid and License plate of any tailing vehicles. Capturing every license number from the front oncoming vehicles and then having the same vehicle behind you will flag an alert. False number plate flagging is done in real time because every vehicle has its biometrics captured on a database. The Rolex gang for example finally had their wings clipped because their fake license plates were detected. Fit vehicles with Yolo based number plate scanning and intercept the vast number or armed robberies before they occur.

Yolo ,Yolo_training real time multiple object detection of cars, people, facial recognition etc. at frame rate of 30fps to 200fps, making it the fastest CNN on a TintanX gpu or Nvidia Jetson and written in plain procedural C allowing for the mechatronic convergence of Lathe, Tracked vehicle, Optical encoders, ESC speed control and PID control. It lessens the need for a complicated faster fpga implementation of other CNNs. faceter.io, https://aws.amazon.com/rekognition/ using pose estimation(skeleton tracking), tracks individuals. Use Yolo to do facial detection, upload it to Amazon cloud for recognition and save on using the github repos they are using. Yolo indicates whether a care giver is in close proximity to a child or frail person, Amazon's algorithms(from github) will flag inappropriate behavior. The code is from the pose estimation repos on github, but the proprietors of the opensource code are paid lots of money for commercial usage. In South Africa we can ignore this with a Fronting company.

Xilinx Demonstration of Quad-Video Analytics with Real-time, Multi-CNN Recognition Acceleration Xilinx ZU9 MPSoC processes each video stream is processed with a different CNN model: face detect, gesture detect, pedestrian single-shot detect and traffic single-shot detect on a single chip. FpGa allows Yolo to detect the object and the Object tracking neural net to track the object, on the same chip.

In two years a neural kpu compute chip will come out that does the dot product between the vectors in memory with analogue voltage, using only milliWatts as opposed a GTX1080 consuming 200watts for the same calculation. This will allow farmers to deploy hundreds of stealth virtual security guards, running off AA batteries seeing in the dark. with low powered Infrared leds. GPU's and Fpga have to shuttle the data from memory and back, dissipating between 10 and 200watts. Artificial intelligence is the metaphor for dot product based brute force curve fitting, there isn't anything contrived nor intelligent about it. Skynet is no more possible than partial differential equations taking over bridges.

Two minute papers using neural nets with wifi to detect people inside a building. Same tech could be used to discriminate between bush pigs and humans in the bush, using cheap Doppler Radar modules. https://www.spotterrf.com detects intruders in a 1x1.4km grid, providing updated position, heading, and speed measurements up to 8 times per second. With military grade human radar detection, a farm could be safer depending on circumstance. Each farm worker Gprs and wifi streaming his GPS position, which is correlated with the radar. A Quad frames fitted with Thermal imaging cameras and Yolo on FpGa flies out, intercepting a worker walking around the dam perimeter without his GPS tracking device.

Yolo and neural based Object tracking, Mdnet tracking allows for example ridding reefs of destructive Lion fish by capturing them for consumption with an unmanned model robotic submarine. Retail solutions would be stacking fifty Raspberry pi around the shopping aisle, streaming footage to a Nvidia GPU Jetson module. The jar of peanut butter and patron are tracked in real time. Yolo identifies the products on the cashier line, allowing for rapid processing of items in excess of manual laser scanning speeds. Much fewer cashiers will be needed. A Farmbot type Weed removal with Chris Annin six axis robot mounted on UGV is done with Yolo identifying the weeds.

Neural links
Neural networks

Cameras
Global Shutter IMX273,IMX287,IMX296,IMX297 sensors. Linux scriptable OEM boards from '''Point Grey, IDS Imaging, Basler. Many sensors to choose from, good SDK, support, and some also have ARM support by default. Their machine vision cameras are used by astrophotographers. Android and Win10 udoo supports IMX329, 119 etc. A workaround hack is to connect the udoo or any other android embedded system to the Jetson nano with Ethernet/usb cable. Hi3518E IP Camera sony imx327, imx219(2meg)  Hisense chip.
 * cctv cameras

Wifi streaming
Gprs and wifi streaming Ez-WifiBroadcast is a bidirectional data link using commercial off-the-shelf hardware like WiFi modules and a pair of Raspberry pi computers. Coupled with special software this unique system allows transmission of low latency HD video, telemetry and control data between endpoints. In comparison to a classical wireless connection Ez-WifiBroadcast tries to imitate the famous properties of an analog link like graceful signal degradation and no association between the endpoints.

Robotics and Aerial drones
Robotics and drones.

Energy
energy technology

Free space optics
Free space optics

Machine design
Machine design

3d printing
3d printers

Wireless and Fixed wired
wireless and wired

Free space optics
FreeSpaceOptics

Guns
guns

Software
software linux, state machines, redis

Security and home automation
alarm systems

Greenhouse
Greenhouse

links
inventions

GPL proprietary code
Patents, GPL and BSD The GPL restriction from the copyright holders are used to emulate the effect of patents. Apache2 contract means that the licensor proprietor hasn't exempted anyone from his patents, only that the licensees have on all their past, present and future patents. Opensource proprietary code are not really "licenses" but contracts incorporating both patent and copyright law per relevant legal jurisdiction. The usage is licensed under contract law(this is fuzzy), much of the GPL terms aren't enforceable in South Africa. https://github.com/martinruenz/maskfusion/blob/master/LICENSE-ElasticFusion.txt, no commercial gain is allowed making Elastic a de facto software patent, which ZA law doesn't recognize.

Sa Telecoms licensing, 5G Icasa, telecom operators can't prosecute anyone, only the NPA can do this and they won't on anything except SABC and Mhz radio spectrum. there is no criminal prosecution for example on using the 1Ghz spectrum, neither will there be any, since it won't ever be allocated for commercial use.

Object oriented hoax
Oop(object oriented programming) is category error or category mistake: Nouns,metaphors, "behavior", verbs, rocks and fields of mielies don't exist inside of computers, its only purpose is to map inputs to outputs(local and global variables), like a math function maps the domain to the range.

Oop stuffs procedures into structs(classes), manipulation of data is through hashmaps and contextualized namespacing of these hashmaps(State and behavior) and their associated methods(procedures), preventing naming collisions. It is a means of removing all the global variables from a single hashmap and plastering them all over multiple hashmaps, making it difficult to grasp what the data means. The procedures are either inside("behavior") or outside the struct, it fundamentally remains procedural programming because of the ontology of the computer. The "state" is how the variables of the instantiated class(object) changes. Something cs.stackexchange tries to obfuscate.

Functional programming attempts to model the world using lambda calculus, but you can't model for example relational databases with lambda calculus. Thinking through a linear sequence of steps when making coffee in the real world with lambda calculus is like like living in a world where your sense perceptions are not fed to you via the electromagnetic spectrum but with fiber pipes(monads) wired directly through your skull into your brain. Nobody views the process of making coffee in terms of lambda calculus or the boolian logic of sql.

You might have a good model of the world, but the constraint is the ontology of the computer like the L2 cache event. With the three paradigms of lambda (functional), struct stuffed procedural(oop) and procedural we attempt to model the world the way we see the world: a binary succession of ideas. Zeno's and Sorites paradoxes asks what is in between these binary events. When Zeno attempted to grab hold of the space between Achilles and the tortoise,he grabbed hold of the law of excluded middle. The paradoxes arises due the reification of the laws of logic, these laws can't be verified as any verification would have to use the same laws and they resurface each generation under a different rubric. Applying Popper falsification to the laws of logic would be a category mistake: the laws of logic are unfalsifiable by necessity, as this enables ratiocination about what is falsifiable and prevents Agrippian regress of falsifiability.

In relativity theory the ether doesn't exist, a wave is defined as an energy impulse through a medium, therefore a light wave is the reification of a verb.

Behe's Irreducible Complexity is a variation of Sorites paradox of the heap: when does a hole in the ground become a mouse trap, when does an indention become a hole? How much soil must you remove from a flat surface before you get a hole. A mouse trap, whether of a single element or multiple elements exists only as a Berkeleyan idea. We only have particular ideas, not abstract ideas, abstractions don't exist. Close your eyes and imagine anything, what did you see? You saw tigers and horses and things, even maybe the word 'abstract' plastered across the Aurora Borealis but not abstractions, only particulars.

Alexander Pope addressed the matter and being a friend of George Berkeley, his ideas could probably be found in Berkeley's works. Aristotle reflected Zeno's concept with constituted spontaneity(from Darwin's OoS) and D'Arcy Thompson preempted Behe's IC with composite integrity. Popper's idea of falsifiability was recognized by Richard Owen, Samuel Butler and Charles Hodge in their critiques of Darwin.

Oop has given the term "procedural" a PR problem, hence Dave West tries to enunciate it under the rubric of Data oriented design. Paparazzi uav, Gentlenav achieves uav control through interrupt driven plain procedural C coding, while Diydrones arducopter stuffed their PID control procedures into structs, making it difficult to discern what the data means(Mike Acton).

C++ was invented (Stroustrup), Alan Kay so that arbitrary code is executed in the cpu with each object instantiation(virtual functions and virtual tables), allowing for endless hacking of Apache databases, providing the top500 with a competitive edge as the trade secrets are exfiltrated via MINIX and ultrasonic pulseaudio.(See Encryption). Sharing of the data occurs each year at NSA headquarters under the rubric of "cyber security". That crackling sound the speakers make when pulseaudio consumes 30% of cpu cycles is when an ultrasonic link is established between your cell phone and the pc.

All operating systems install on top of minix, which will only allow Wireshark and Snort to see packets it wants it see. Verbs relate subject to object in the real world, which doesn't exist inside of computers. All programs of any size and complexity must always and only be a set of procedures and single hashmap storing the global variables. If you still can't solve your problem, then its beyond the ontological domain of silicon based input output mapping. Oop allows for embezzlement in ERP software, there is a reason why git is written in plain C(Torvalds on C++). The designer and writer of ZeroMQ discusses why he regrets writing  the code base in C++ instead of C coding.

From a Perl perspective Design patterns turns a programmer into a fancy macro processor, it uses polysemic pretentious language in a reverse Nigerian prince psyops. The grammatical gargoyleism of advance fee frauds hone in on the most obtuse of society, with high cognition "software engineers" a metaphorically induced category mistake cloud how the ontology grounds the epistemology.

never use getter and setter methods youtube video and new,delete,malloc in c++ wraps the malloc in a single command. The software design team with their $1.5 trillion F35 program and the welders at Eskom sabotaging the boilers have the same desire: lifelong employment.