To start with this topic, I want to go in directly into a scenario which can serve as a simple case of intelligence in a program. We will talk about it and later will see how we can develop a program to solve for that scenario.
Suppose you have a group of people, let's say you have friends or you joined a new team and now you've got a discussion going on using mobile phones and group sms technology. Now consider what you have access to here is just the phone numbers flashing on the screen as soon as someone types a message and the communication text which the person sent. So in other words, you don't have any idea who the person typing is other than their last text.
Question is -
A) how long will it take for you to identify all the members of your group correctly by their texts?
B) how long will it take for you to identify at least half of the members of your group?
C) would you be contributing in any way leading to the identification of the members? (you can't ask them directly - who's this? - most of the times you have to take a passive approach).
The concept used above can be given any complex terminology name but essentially it's a combination of two factors -
1. behavioural prediction recognition.
2. identifying direct pointers between members talks (for example somebody addressing another person by their name or someone in authoritative position asking for a timeline based result).
It's some time for a human mind to identify all the people - for example when I did this experiment with a group of 25 odd people - it took me 5 days to reach half level identification mark when participants were communicating for 12-16 hrs a day with me on passive end most of the times.
If done correctly this concept uses phrases between 2 sets of people to understand their relativistic positions and roles and it also takes into fact the burst of communication, the quickness, the urgency or the timeliness, if this combined with a plethora of other factors in a working environment - it can expedite this identification process exponentially but is not preferred as this is a typical case of self training.
Why develop something like the above?
Think about it - any communication established with identification parameters is subject to that communication being reliant or based on those parameters and the scope of the output governed by those parameter roles, here were are removing the roles and letting the system decide the roles based on communication, essentially reversing the identification process. This process can be used to -
A) identify a pattern.
B) maintain that the pattern is uniform.
C) detect any changes on the pattern in due course leading to an indication of a security flaw.
This is just one basic use of above kind of area where this concept can be applied, another area can be new environments or unknown environments, the possibilities are vast.
In my next post, I will try to put an algorithm and develop a program to perform the above identification.
Well - now at least with such a program - I don't have to spend time guessing who it may be I am talking to or being impolite to ask that question in a group? ;).
Suppose you have a group of people, let's say you have friends or you joined a new team and now you've got a discussion going on using mobile phones and group sms technology. Now consider what you have access to here is just the phone numbers flashing on the screen as soon as someone types a message and the communication text which the person sent. So in other words, you don't have any idea who the person typing is other than their last text.
Question is -
A) how long will it take for you to identify all the members of your group correctly by their texts?
B) how long will it take for you to identify at least half of the members of your group?
C) would you be contributing in any way leading to the identification of the members? (you can't ask them directly - who's this? - most of the times you have to take a passive approach).
The concept used above can be given any complex terminology name but essentially it's a combination of two factors -
1. behavioural prediction recognition.
2. identifying direct pointers between members talks (for example somebody addressing another person by their name or someone in authoritative position asking for a timeline based result).
It's some time for a human mind to identify all the people - for example when I did this experiment with a group of 25 odd people - it took me 5 days to reach half level identification mark when participants were communicating for 12-16 hrs a day with me on passive end most of the times.
If done correctly this concept uses phrases between 2 sets of people to understand their relativistic positions and roles and it also takes into fact the burst of communication, the quickness, the urgency or the timeliness, if this combined with a plethora of other factors in a working environment - it can expedite this identification process exponentially but is not preferred as this is a typical case of self training.
Why develop something like the above?
Think about it - any communication established with identification parameters is subject to that communication being reliant or based on those parameters and the scope of the output governed by those parameter roles, here were are removing the roles and letting the system decide the roles based on communication, essentially reversing the identification process. This process can be used to -
A) identify a pattern.
B) maintain that the pattern is uniform.
C) detect any changes on the pattern in due course leading to an indication of a security flaw.
This is just one basic use of above kind of area where this concept can be applied, another area can be new environments or unknown environments, the possibilities are vast.
In my next post, I will try to put an algorithm and develop a program to perform the above identification.
Well - now at least with such a program - I don't have to spend time guessing who it may be I am talking to or being impolite to ask that question in a group? ;).
No comments:
Post a Comment