Posts

Over the top (OTT) -The Dawn of new Era

Image
Over the top (OTT) -The Dawn of new Era                         Over the top (OTT) -The Dawn of new Era We all are facing the worlds pandemic covid-19 and along with all sectors it is also done impact on film industry too.so the filmmakers cannot afford the delay of release date of movies.A bunch of filmmakers have decided to take their movies to video streaming platforms instead of queuing up for theatrical release when theatres reopen.So they have choose the ott platform..so lets know about Over the time platforms. Over the top provide the film and television content on  high internet speed.An  over-the-top  ( OTT )  media service  is a  streaming media  service offered directly to viewers via the  Internet . OTT bypasses  cable ,  broadcast , and  satellite television  platforms, the companies that traditionally act as a controller or distributor of ...

New technical trends in data science

Image
New technical trends in data science Transparency and Traceability Consumers who are increasingly aware that their personal information is valuable, are demanding control. Many are recognizing the increasing risk of securing and managing personal data. Beyond that, governments are implementing strict legislation to ensure they do. Transparency and traceability are critical elements to support these digital ethics and privacy needs. Democratization of Technology Democratization of technology refers to the process by which access to technology rapidly continues to become more accessible to more people. Human Augmentation Human augmentation explores how technology can be used to deliver cognitive and physical improvements as an integral part of the human experience. This augmentation is leveraging technology to increase human capabilities both physically and cognitively. Companies like Boston Dynamics have already developed a wide variety of human augmenting devi...
Image
CLOUD COMPUTING THREATS THREATS of cloud computing- The cloud computing is a prominent and revolutionizing technology with virtually shared resources, Service and utility based computing. The characteristics of cloud computing may cause a lot of problems and threats in the security scope. The few are • Abuse and immoral use of cloud computing • Insecurity of interfaces and APIS • Loss or leakage of data • Malicious elements • Hijacking of accounts/ Maintenance • Technology sharing issues • Risk of exposing company’s confidential data • Data Breaches • Multitenancy some of them are explained- I.  Network Availability: The value of cloud computing in a particular environment can only be realized when your network connectivity and bandwidth meet the minimum requirement which are: According to the need of the customer the cloud should be available, i.e. every time the customer asks for it, the customer should be provided with his requirement . II.  Cloud ...
Image
AI :Use in Biomedical field Understanding the relationship between symptoms and diagnosis is important for the diagnostic process. A health knowledge graph is a representation of the connections between symptoms and diseases and can help with diagnosis prediction tasks. Chen and Agrawal et al present results evaluating health knowledge graphs and looking at what features are important for accurate diagnosis prediction. They identify major sources of error including unmeasured confounders and sample size and discuss new methods of robust medical knowledge extraction from electronic health records. Diagnosing a disease is not always straightforward; some disease states require multiple tests and longitudinal evaluation before a diagnosis is established. Artificial intelligence may play a role in helping diagnose a disease state sooner by learning predictive patterns that humans may miss. For example, Alzheimer’s disease is a neurodegenerative disorder marked with progr...
Image
Speech Recognization Speech recognition is the ability of a machine or a program to identify words and phrases in spoken language and convert them to a machine-readable format. Research is done for comparing best between Convolutional neural network (CNN) and Basic neural network. Some datasets collected from internet. After elimination of noise, cleaned audio data is fed to CNN and Basic NN and trained through different layers. Finally, the trained model is checked for accuracy, validation accuracy. Trained data is tested with test data to check the accuracy and efficiency of Model.  Introduction: Speech recognition is playing a major role in most of the fields such as smart phones, TVs, voice call routing, voice dialing, search keywords, simple data entry. While entering data in datasheets we can use ASR for that we are using microphones to dictate the word. Computer takes lots of time to enter data in particular cell. This problem can be reduced using more and mor...