Skip to main content

The strange tale about modeling and QR-codes

The strange tale about modeling and QR-codes

Could it be possible that some physical form or image on the wall can cause that the computerized image recognition systems would jam? That idea bases theory, that if the computer sees something, what it doesn't understand that thing can cause the forever operating loop or destruction in the computer program itself or it's databases.

The idea is that when the camera would see this particular statue or form it would start to write data to the wrong place in the database, and that thing would cause the destruction of that system. And the thing is that this theoretical form can make so-called electronic migraine to the computer, what will jam its operations.

There is a strange tale that some modeler has created the form, that would lock the computerized image recognition system. But is it true or fake? That's the problem. The idea is that the form of some statue causes the leak of the data in the computer program, what is used in image recognition. That story about the physical form or statue, what would cause the over leak in the computer programs, what are controlling the image recognition programs is not new.

There is a similar tale about the QR codes, what are delivering data viruses. The last thing is easier to create than the statue, and the idea is simple, the QR-code would click the computer in the special homepage on the Internet, and then the system just downloads the virus to the computer. The idea of this kind of system is that when the computer clicks to the homepage, the TCP/IP message, what that homepage would send contains the virus, what will installed to the system.

The idea of the artificial intelligence-based computer viruses is that those viruses could put themselves in the position to the Internet, and connect part of their codes to the data, what is traveling to certain IP-address. And if in each data packet is a couple of bits of virus data, that complicated tool can avoid virus scanners. Then the virus would be connecting by using artificial intelligence, what will collect those bytes together. But this thing would need excellent programming skills.

Comments

Popular posts from this blog

Plasmonic waves can make new waves in quantum technology.

"LSU researchers have made a significant discovery related to the fundamental properties and behavior of plasmonic waves, which can lead ot the development of more sensitive and robust quantum technologies. Credit: LSU" (ScitechDaily, Plasmonics Breakthrough Unleashes New Era of Quantum Technologies) Plasmonic waves in the quantum gas are the next-generation tools. The plasmonic wave is quite similar to radio waves. Or, rather say it, a combination of acoustic waves and electromagnetic waves. Quantum gas is an atom group. In those atom groups, temperature and pressure are extremely low.  The distance of atoms is long. And when an electromagnetic system can pump energy to those atoms. But the thing in quantum gas is that the atoms also make physical movements like soundwaves. It's possible. To create quantum gas using monoatomic ions like ionized noble gas. In those systems, positive (or negative) atoms push each other away.  When the box is filled with quantum gas and som...

What is the difference between TR-3A and TR-3B? And are those planes real?

What is the difference between TR-3A and TR-3B? And are those planes real? Is TR-3B (0) "Black Triangle UFO" or is it only the piece of paper?  The study project, what is used to create advanced ideas for use of the nuclear-powered aircraft. Or is it the study project or black budget aircraft, where lost 2,3 trillion dollars (1)of the stealth bomber were gone. In this text is things, that might seem very difficult to accept, and when we are thinking about things like doubling the object or making it smaller by using huge layers of energy, nothing denies to test those things. But were those tests successful, there is no data about that in public Internet, so we must say that things like doubling the human or aircraft can be tested, but the results can be unknown.  But in the source two is the tale, what seems like impossible, those men, who got Noble Prize put at first time one atom to the box, and hit it with photon one photon in the box and hit it with t...

The interesting coincidence between USS Sea Shadow (1982) and CSS Virginia (1862)

Image I The interesting coincidence between  USS Sea Shadow (1982) and CSS Virginia (1862) Far away from its time is the thing, that you might notice when you see those two images. The upper one (Image I) is portraying the modern naval USS Sea Shadow (IX-529)(1) experimental Stealth ship, which was created by Lockheed-Martin, and the image below (Image II) is portraying the CSS Virginia (2), the ironclad from the Civil War Era. The thing why the hull of the CSS Virginia, what is ironclad from 1862 is that the ammunition of the cannons would not transfer their impact energy to the hull of the ship. And the reason why Sea Shadows hull has this form is that it should point the radar echo away from the hull.  The thing that I must say that CSS Virginia is far ahead its time because that structure is effective against the explosive ammunition, and the slanting armor of tanks like T-34 and Sherman have made them effective. But for some reason, the use of slanting ...