Menu
emerging areas of research
areas that are in the best interest of the future
Data Mining
Security
Artificial Intelligence
Areas of emerging research
scroll to continue learning
Data MiningEnjoy reading textbooks? Great, neither do I. But computers do. In Data Mining, computers sift through tons of terrabytes of data to find patterns in the data and translate that into information that can be consumed by simple people like you and I. Data Mining is closely related with other areas of reasearch such as machine learning (school for computers), statistics and database systems.
How exactly does this affect us? Well, rememebr the last time you checked your spam folder. How did the computer know that your iternary wasn't spam but a free ticket to the Caribbean was? Data Mining. The computer was trained to be able to pickup patterns in spam emails and applied that by teaching itself to sort those sort of emails to spam. (https://www.uvm.edu/~cems/cs/?Page=research/datamining/default.php&SM=research/_researchmenu.html) |
Security
The lock of the cyberspace.We have locks on our front and backdoors, in our cars, what about locks on all the information that is stored in programs, codes, databases, and clouds?
As technology advances, the way to secure and protect the technology keeps emerging and growing. Security takes many faces in the cyber world. Recall any account you have on the computer (email, social media, work), they all require a log in, don't they?
(http://www.disys.com/it-managers-rely-on-encryption-strategies-for-cybersecurity/ http://searchsecurity.techtarget.com/definition/encryption ) |
|
Three steps to encyrption
Although there are many nuances, to keep things short and simple, I've broken it down to 3 parts.
EncryptionThe message, or data, is encrypted so that it is no longer open or public. This is done using a program and encryption key.
(dont lose the key we'll need it later!) |
TransformationThe data is made into literal gibberish (they like to call it cyphertext). This is done so that the data is not readable in its native language and the true meaning can only be accessed by the one who has the key
|
DecryptionUsing the key, the intended recipient is able to unlock the cyphertext to understand its true meaning.
|