Skip to main content

Biomimetic machines can emulate natural creature behavior.


"A biological model based on slime mold has provided astronomers with new insights into the structure and evolution of the universe. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Slime Mold Algorithms Unlock Secrets of Vast Cosmic Structures)

Biomimetics is the emulation of nature. The drone swarms can emulate slime molds and starling swarms. Another thing is that computer viruses are things that emulate natural viruses. 

Biomimetics is not necessarily a physical thing. Also, virtual systems can emulate living nature. Things like the slime mold algorithm that uses slime mold as a model of the universe's structures emulates nature in the virtual model. The slime mold algorithm can also be used in things like drone swarms. Those systems can use slime mold algorithms to create drone swarms that behave like slime mold. Another way is to create an algorithm that makes drone swarms behave like starling swarms. 

The networked systems make it possible that the drone swarm can act like one large creature. And the AI-driven drone swarms can emulate the starling swarm, which makes it hard to separate them from natural and harmless starlings. The drone swarms can also make it possible to create macro entireties. The drone swarms can cooperate. One of them can act as an eyeball, and some other drone swarms can close targets from opposite directions. In those cases that drone swarm can emulate natural entireties. 

When we think about things like data security the drone swarms can break it. Small autonomous drones can follow people on the streets. They can take images through windows and hear what people say. The AI-controlled drones can also slip data viruses to the computers using the UBG gates. The robot will just fly to the open computer. Then it pushes the data socket to the USB gate and then downloads the virus to the computer. 




If the small drones can slip into the house, and those drones can use wireless electric transfer, that kind of system can see everything that happens on the screens. The system can also eavesdrop on the office. When we think about the most modern data security tools the robots can slip the malware into the system using the USB gates. 

The modern drone swarms can involve the user interface, which allows operators to give orders to those swarms using the spoken language or keyboard. Operators can use the drone swarms for recon, intelligence, and attack missions. The attack drones can make the recon missions until they find the target. 

The recon drone involves a microphone and camera with a laser microphone that can transmit data to the other side of the world if it can use a satellite modem. The other version is that drones make chains that transmit information from drone to drone. 

Or the drone can use voice and video recorders when it stays in passive mode. When the drone's mission is done, it can fly home using the automatized location system. Even small drones can use terrain contour matching TERCOM or they can use stellar navigation. The system emulates birds if it uses stellar maps to navigate. Or there could be the data transmitter that calls the drone. 

Or a drone can connect itself to the internet socket, and transmit data through the network. The system can use the AI-based speech-to-text application. And it can send data in the form of the text. 

The AI is the tool that can be used to create computer viruses and malicious software. The virus and malware creation must be denied in network-based official solutions. However, we know that many nations are developing AI-based large language models, or, LLM chatbots that can create custom spyware and custom malware that make those systems very effective. There are also private workers like organized crime, that can try to create the LLM that can used for custom intruding operations. 


https://www.freethink.com/robots-ai/ai-hacking

https://scitechdaily.com/slime-mold-algorithms-unlock-secrets-of-vast-cosmic-structures/

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....