overidon.com Central Database for Overidon Omnimedia

March 22, 2011

Genetic Vehicular Algorithms at BoxCar2D

Filed under: Innovation — Tyler @ 11:48 pm
BoxCar2D

BoxCar2D.com has programming that has huge potential

BoxCar2D.com is a website that simulates virtual genetics. But instead of creating some sort of life form, the website creates a vehicle with a very clear goal. The goal is to reach the end of a track or course, with variable terrain and difficulty. How far the car gets in the course directly corresponds to the acquired score. What makes things interesting is that the computer tries to create vehicles that do better in the course. But the twist is how it does that. The simulation actually uses virtual chromosomes that keep track of the body, number of wheels, and orientation of the car. So the program can literally, ‘mate’ two cars that may have achieved a decent score, and then create a new car that is a hybrid of the two parents. Although the simulation is quite entertaining and fun…there’s more. The user can actually mark cars that he or she feels are good vehicles. These cars get higher priority in genetic selection. Conversely, a user can ‘down’ a vehicle and basically delete them from the gene pool. This adds a level of dynamics that makes the simulation much more interactive and adds insight to the evolution of the program.

There is tremendous potential for this kind of programming technology to be adapted into a myriad of other fields. These types of virtual genes could be used for a problem solving computer that has to deal with creative ways to deal with flaws in construction. Or another application could be in creating a computer that could better recognize patterns. One computer could have the job of attempting to determine what an image is, and another computer could take that answer and input it into google and determine if there is a pattern match. If the computer does not acquire a match, then the genetic algorithm would not pass on. But if there was a partial match, then the gene could be stored until it could mate with another partially successful match. The program itself could evolve and be recoded and be evaluated in virtual ‘computer time’ and the process of evolution could happen quite quickly. Human interaction could be used to give feedback on the program’s development and guide the process.

This may seem like a very Sci-Fi application of this type of technology, but the potential is really there. I honestly love the BoxCar2D website and I think they are seriously onto something big.

One thing that is mind blowing is that the cars are not indestructible. There is a complete physics engine that can punish a structurally weak car if it takes a jump too hard, or hits the ground at the wrong angle. This is truly virtual evolution in real time.

Click HERE to visit BoxCar2D.com

-Tyler

*SHARE*

March 9, 2011

Profitability of Desalination

Filed under: Innovation — Tyler @ 5:05 pm

Desalination, although it may seem like an infrastructural necessity for growing cities, can actually become a hugely profitable sector for inter-state and international trade. One point that is rarely mentioned in the discussions of desalination, is that many methods for distributing water over long distances have already been designed and tested by the oil industry. If we look at Eastern Europe, massive networks of sending oil from countries as remote as Khazakstan to neighbors in the region have been created. So actually distributing potable water is not a problem when it comes to its profitability. The main factor that stands in the way of water as becoming a huge export of the United States is its lack of representation on the commodities market.

But what exactly is the value of clean, healthy, drinkable water? This question is extremely important because water actually has multiple grades, quite similar to how oil has different levels of grades and refinement.

Think of a barrel of crude oil. Let’s just hypothetically say it is sold for 100 dollars per barrel. But as the oil is refined into gasoline and/or jet fuel the value goes up quite significantly.

The same relationship goes for a barrel of water. A desalination plant may have a large amount of salt-water that has little value. But as it is cleaned it can be used in industrial purposes or even converted into drinking water. Now think of the water bottles we purchase while on the go. We are quite willing to pay a dollar or two for a very small amount of water, especially because thirst is an overwhelming life craving. Water is necessary for almost all human life functions and so we pay for it gladly.

Interestingly enough, desalination does not simply mean removal of salt from water. The process also includes the removal of impurities and micro-organisms.

So if the USA continues to invest in and research more efficient desalinization technology, we may have a new resource that could be worth it’s weight in gold. One thing to consider is that as the global population increases, there will not only be more people hat need to drink water, but there will be billions more people that are quite literally made out of water. And since the amount of water on the planet is a zero sum game, and water is definitely NOT a renewable resource, then the value could skyrocket faster and higher than the price of oil, natural gas, or even the most precious metals.

The most logical trade partner the USA could have for water, is Mexico. This is for several reasons. Mexico and the USA already are a part of NAFTA, so trade barriers are negligible, and US water distributors would not have to deal with massive tariffs. Also, the existence of maquiladoras in Mexico are often associated with environmental pollution of local water supplies via rivers and lakes etc. So there is a demand for clean water in Mexico. This is compounded with how there is already pipelines either proposed or already established for the transport of natural gas, and oil, as well as fiber optic communication between Mexico and he USA as a result for the Security and Prosperity talks between he two countries. An addition of water pipelines would not only be intuitive along these previously envisioned infrastructure routes, but their construction could create jobs and career employment as well.

These water pipeline networks could eventually be extended south of Mexico, deeper into Latin America.

In addition to the concept of profitability for US water purifiers and distributors, there are political benefits as well. As water becomes more scarce, especially within Mexico and South America, there is greater risk of political instability. Unrest within cities as well as disputes between sovereign countries could become a huge threat to US companies that have engaged in Foreign Direct Investment (FDI) in those areas. So by engaging in the massive abundant production o clean water here in the USA, we could secure financial interests abroad in the short and long-term.

Providing access to American water could also be a plan to improve the US image in Western Hemisphere politics.

Since the USA has a gigantic reserve of coal energy potential and one of the longest coastlines in the world, there is nothing holding us back from massive desalination efforts.

What needs to happen is a paradigm and perspective change on water. Instead of viewing desalination as a method to overcome domestic potable water scarcity within the domestic USA. We need to consider water as a potential money-making export that could very easily flow us through this economic dry spell, and help the USA navigate to the oceans of maximum prosperity.

-Tyler

February 21, 2011

Stealth camouflage and Disguise

Filed under: Innovation — Tyler @ 11:14 pm
Stealth Camouflage Disguise

Stealth Camouflage Disguise

There is more to stealth, camouflage and disguise than wavelengths of light and shadow. Several distinct factors of physics, biology and psychology make the successful shroud possible. The first way to approach a successful endeavor into non-detection would be to determine what method one will be observed with. For example, a Stealth Bomber, despite its name, would be easily detected visually if it was sitting still on an airfield surrounded by F-16’s. It would stick out like a sore thumb. But if a those planes were in the air, especially at night…the stealth bomber would be challenging to find visually and via radar. So it is important to establish, the setting and detection methods of the observer.

One possible explanation for the reason why most people can see many shades of green is interesting. People say that when early humans spent a great deal of time in forests, snakes were dangerous predators. The snakes were camouflaged by their color and patterns on their scaly skin. So the people that survived hunting and foraging in the forests were the ones that were able to distinguish snakes from the green foliage. Eventually people with better eyesight, especially in seeing differences in many shades of green were able to pass down their genes. And over time green became a color that most people can see great variance in.

So the snakes were technically using two different forms of stealth. First they had their primary color, which in many cases was green. And this helped them to blend in with their environments. The second form was their spots or colored shapes on their skin. These worked as a form of camouflage which works in conjunction with the base color but does something entirely different. The base color is an attempt to compensate for creatures that are scanning a jungle or terrain quickly. If you don’t look closely you won’t be able to notice the snake.

But the pattern camouflage is interesting because it tricks the mind into thinking that one thing is something that it is not. So camouflage is a more active than base color. Many soldiers use camouflage in order to decrease their visibility in the battlefield. But the more complicated the camouflage, the more terrain-specific it becomes.

But stealth is more than simply how things appear. Movement is a huge part of stealth. And usually it is relative. You can always pick a perpetrator out of a crowd when he is being chased by the police, because he is usually running and everyone else is not.

Panhandlers on busy street corners are easily visible because they are the only ones standing still. Someone carrying a sign on a sidewalk while walking in times square would blend into the crowd and probably would be ignored more than if he/she was stationary.

But we have just discussed visual stealth. There is stealth of sound as well. By walking on one’s tip toes, you make less sound. Unless of course if you are on your tip toes because you are wearing high-heels. Then one would probably make a great deal of noise.

Actually there is stealth for all the different senses one can think of. It doesn’t really matter if we are talking about visual or auditory, or even sent based stealth. The main thing to think of is that stealth is related to lowering one’s relative vibration level. It is all about not standing out.

Disguise, on the other hand is entirely different. It implies that one is trying to conceal an identity, by having a different appearance. The important thing to think about is that although appearance may imply that we are only talking about visual appearance. It doesn’t necessarily have to be that way. By simply changing someone’s inflection and using a blocked number, one can sound like an entirely different person on the phone. A change of cologne can make someone think that you feel differently about that person’s company. So disguise is focused on change.

Celebrities wear disguises all the time in order to avoid paparazzi. People grow beards, wear hats, and sometimes even prosthetic limbs.

But there is a special circumstance that combines many of these discussed methods of detection avoidance: Well timed honesty.

Someone being honest with his or her intentions or identity can have catastrophic consequences when they are forced to reveal them, under harsh scrutiny. But if those very same intentions are disseminated over a calculated period of time, people and organizations can become desensitized to them.

Let’s do a thought experiment.

Imagine Walter frequents his local coffee shop quite often. And every other time he goes to get his Latte, he mentions how much he loves gorillas and mentions some kind of interesting fact on gorilla lifestyles or physiology. Over time, the staff will become accustomed to listening to his gorilla info for the day and won’t think twice about it. Maybe even a barista may ask Walter about gorillas when he forgets to bring them up for a few days.

After a year of this behavior, Walter walks into the coffee shop wearing a gorilla suit.

Most of the staff, will probably guess that the person is Walter, playing a joke or going to a party and they will not call the police.

They might even ask Walter in his gorilla suit if he wants a banana smoothie as a joke.

The repetitive honesty of Walter, desensitized the coffee shop staff to the concept of him in conjunction with gorillas.

Now imagine if Walter doesn’t like gorillas and he never talked about them. Actually in this scenario, Walter is a huge fan of Jazz music. So every day he talks about Thelonious Monk and other famous Jazz musicians.

And after a year of constantly bringing up Jazz…Walter walks into the coffee shop wearing a gorilla suit.

You can see that the staff would be very shocked, especially if it wasn’t a holiday like Halloween.

So there is a form of power in honesty. But it is all about the timing and repetition of the information.

The shroud of honesty.

-Tyler

If you enjoyed this article – here is another on Invisibility and Energy Frequencies HERE

February 18, 2011

Sonic Meta Tagging

Filed under: Innovation — Tyler @ 6:05 pm
Sonic Meta Tagging

Sonic Meta Tagging

With voice recognition software at its current high level of sophistication, new advancements in the search engine optimization field may become available. The target for this potential technology may be videos on the internet that are primarily made up of human speech. The purpose would be to scan the audio track of a video and then use voice recognition software to pick out discernible words. After words are picked out they can be used in a type of “META” tag that could be used to make Videos more relevant and searchable on Google and other search engines. This is important because currently, text based written articles receive the most, “weight” for searches online.

The reason why text based articles get weighted heavier than videos is because even though videos have descriptions and tags associated with them, text based articles have crawlable text that robots use to determine whether or not the META keywords are truly relevant to the actual article.

So in that regard videos that are about interesting topics with poignant information are at a disadvantage to text based articles. Many videos rely on sharing by multiple people on social media network sites or require articles being written about the video and then having the video embedded in the post itself.

One solution to this problem that overidon.com presents is the concept of Sonic Meta Tagging. The same kind of surveillance technology that is already being used to detect keywords in telephone communication can be implemented toward videos.

So a hypothetical example of how this could be used would sound like this:

A person named Jordan made a video on YouVideoMaximum.net (ficticious website) that is basically a webcam recording of him talking about his concerns on how hamburgers are prepared at fast food restaurants. Jordan added information to his description and titled his video with his name and the words, “Burger Concerns.” In the description there is a little information with a general summary of what he is talking about.

But let’s say YouVideoMaximum.net eventually uses Sonic Meta Tagging and so when the video file was uploaded, the entire 9 minute speech on the hamburgers was scanned by speech recognition software. Then YouVideoMaximum.net creates a virtual transcript of the entire audio portion of the video that is visible to the computer mainframe. This transcript is converted into Sonic META tags that are actually crawlable by search engine robots. The file for this type of transcript can be modified and manipulated by editing a control file that is directly responsible for Sonic Meta Tags called robots.vox  (fictitious hypothetical file type).

What Jordan doesn’t realize is that his description is good, but there is information in his video regarding how employees use wipe their aprons with their gloves on and then proceed to make more hamburgers without changing the gloves. Jordan thought that everybody knew about this so he didn’t bother to mention it in his description, or title.

The beauty of this technology is that when a hypothetical internet user searches on a major engine for “hamburger wiping gloves on apron and continues working” there would be a slight likelihood that Jordan’s video would show up in the search results. How it would work would be that not only would the search engine scan the blogs and text based documents online for the words. And not only would the engine scan the descriptions of videos and the titles of videos. The search engine would be theoretically scanning INSIDE the audio portions of the videos themselves, via the text transcriptions in robots.vox.

A system such as Sonic Meta Tagging could have National Security applications as well. Currently Fusion Centers and information gathering agencies scan a tremendous amount of emails and websites for information that could be a security risk. With this technology a well equipped government agency with access to robots.vox or Sonic Meta Tagging could be able to quickly and efficiently search and scan for “red flagged” keywords or subject matter that may be a potential security risk.

Think of the millions of videos circulating on the internet. It is very likely that disturbed people or malevolent organizations may be using free internet video services in order to disseminate orders to each other by using “code” words. Since watching videos takes a tremendous amount of time, a system like Sonic Meta Tagging could enable security agencies to decrypt plans that are being distributed via free internet video services at a faster rate.

Remember, text based alpha-numeric information is much simpler than decoding wave form patterns. So an agency could really be more effective at weeding out malicious activity using Sonic Meta Tagging.

The real niceness of this type of technology is that it is just an amalgamation of several smaller technologies that have already been developed and perfected. So the research and development would be negligible.

-Tyler

« Newer PostsOlder Posts »

Powered by WordPress