Recent Posts

Recent Videos

Eclipsed US in AI Research in China

Research background image

    As more industries and policymakers awaken to the benefits of machine learning, two countries appear to be pulling away in the research race. The results will probably have significant implications for the future of AI.Humanity may still be years if not decades away from producing sentient artificial intelligence. But with the rise of machine-learning services in our smartphones and other devices, one type of narrow, specialized AI has become all the rage. And the research on this branch of AI is only accelerating.As more industries and policymakers awaken to the benefits of machine learning, two countries appear to be pulling away in the research race.
The results will likely have significant implications for the future of AI.If you're not familiar with the term, "deep learning" is a subset of the overall branch of AI known as machine learning - which basically involves the use of computer algorithms to perform pattern recognition and analysis. It's this type of AI that powers personal digital assistants like Google Now, for example
Quality of China's research 
   "Current levels of R&D spending are half to one-quarter of the level of R&D investment that would produce the optimal level of economic growth," a companion report published this week by the Obama administration finds.The government is pushing for a major role for itself in AI research in china, and here's why: Becoming a leader in artificial-intelligence R&D puts the United States in a better position to establish global norms on how AI should be safely used. When AI stands to transform everything from labor to the environment to the future of warfare and cyber conflict, the United States could be put at a disadvantage if other countries, such as China, get to dictate terms instead.

 In fact, as more industries and policymakers awaken to the benefits of machine learning, two countries appear to be pulling away in the ai research race. The results will probably have significant implications for the future of AI.If you're not familiar with the term, “deep learning” is a subset of the overall branch of AI known as machine learning — which basically involves the use of computer algorithms to perform pattern recognition and analysis. It's this type of AI that powers personal digital assistants such as Google Now

China leading the world for growth in high-quality science output, Nature Index shows

China's ten most productive cities in the Nature Index by WFC in 2014 are Beijing, Shanghai, Nanjing, Wuhan, Hefei, Changchun, Hong Kong, Hangzhou, Guangzhou and Tianjin. They made a combined contribution of 70.4% of China's WFC. Beijing, Shanghai and Nanjing remain the dominant scientific centres. Beijing has the highest number of institutions contributing to the Nature Index in China and the city is particularly strong in chemistry and physical sciences. Shanghai has less than half the total number of institutions of Beijing in the index, but its top 10 are as strong as the capital's top 10. Like Shanghai, almost 60% of Nanjing's output in the Nature Index is in China's high quality research output grew 37% from 2012 to 2014, according to new analysis of Nature Index data. The United States saw a 4% drop over this period in the same Nature Index metric (weighted fractional count; WFC)

The Nature Index 2015 China, publishing as a supplement to Nature on 17 December, shows China's total contribution to high-quality science has risen to become the second largest in the world, surpassed only by the United States."Clearly China is catching up to the US and is already a high-quality scientific powerhouse. The country's ever-increasing R&D budgets fuelled by its burgeoning economy since the early 1980s have driven this pattern," said Dr. Nick Campbell, Executive Editor, Nature. "The expansion in China's higher education system and improvements in the quality and quantity of its scientific workforce are key factors in delivering this impressive return on investment."While chemistry and physical sciences are prominent in China's Nature Index contribution, accounting for 61% and 30% of its total WFC respectively, the life sciences contribution is growing almost as rapidly (30% increase from 2012 to 2014).emistry.

Nanjing University contributed more than half of the city's overall 2014 output in the index.Between 2012 and 2014, Xi'an, Chengdu and Hangzhou experienced some of the fastest WFC growth rate, largely driven by chemistry. Xi'an in particular experienced an exceptional rise in the relative increase of its WFC of 142%, while Chengdu and Hangzhou rose 78% and 55% respectively.The Nature Index data also identifies Shenzhen, Beijing and Wuhan as China's industrial research powerhouses, home to corporations making a significant contribution to ai research, especially in cutting-edge life sciences. Shenzhen in particular has experienced a remarkable transformation into a research-based industry hub and companies based there now account for almost half of the country's international patent filings.

Three Chinese cities stand out for their collaborative orientation: while Hong Kong and Hefei institutions have formed a record number of partnerships with their international peers. Tianjin scientists have focused on forging local links, mainly between Nankai and Tianjin universities.China's top five university contributors are Peking University, Nanjing University, Tsinghua University, University of Science and Technology of China, and Zhejiang University.


Ethical hacking is an emerging tools used by most of the organizations for testing network security. The security risks and vulnerabilities in a network can be recognized with the help of ethical hacking. This research completely concentrates on ethical hacking, problems that may occur while hacking process is in progress and various ethical hacking tools available for organizations. Information is the important source for any organizations while executing business operations. Organizations and government agencies have to adopt ethical hacking tools in order secure important documents and sensitive information (Harold F. Tipton and Micki Krause, 2004). Ethical hacker professionals have to be hired in order to test the networks effectively. Ethical hackers perform security measure on behalf of the organization owners. In order to bring out the ethical hacking efforts perfectly a proper plan must be executed. Ethical hacking has the ability to suggest proper security tools that can avoid attacks on the networks. Hacking tools can be used for email systems, data bases and voice over internet protocol applications in order to make communications securely. Ethical hacking can also be known as penetration testing which can be used for networks, applications and operating systems  Using hacking tools is a best method for identifying the attacks before it effect the entire organization. Ethical hackers are nothing but authorized users for the sensitive information or networks of an organization. Using hacking techniques for handling employees in organization and for solving critical judicial cases is not a crime. An ethical hacker use same tools and actions as performed by normal hacker. The main aspect in ethical hacking is that target permission is essential for performing hacking on the information. Ethical hacking can be used while performing security audits in the organization .Thus, ethical hacking can help in testing the networks by finding out various vulnerabilities. In ethical hacking, a user will get permission to access the important data.


Hacking Background image

100 Continue 

101 Switching Protocols 

200 OK Action completed successfully

201 Created Success following a POST command

202 Accepted The request has been accepted for processing, but the processing has not been completed.

203 Partial Information Response to a GET command, indicates that the returned meta information is from a private overlaid web.

204 No Content Server has received the request but there is no information to send back.

205 Reset Content

206 Partial Content The requested file was partially sent. Usually caused by stopping or refreshing a web page.

300 Multiple Choices

301 Moved Permanently Requested a directory instead of a specific file. The web server added the filename index.html, index.htm, home.html, or home.htm to the URL.

302 Moved Temporarily

303 See Other

304 Not Modified The cached version of the requested file is the same as the file to be sent.

305 Use Proxy

400 Bad Request The request had bad syntax or was impossible to be satisified.

401 Unauthorized User failed to provide a valid user name / password required for access to file / directory.

402 Payment Required

403 Forbidden The request does not specify the file name. Or the directory or the file does not have the permission that allows the pages to be viewed from the web.

404 Not Found The requested file was not found.

405 Method Not Allowed

406 Not Acceptable

407 Proxy Authentication Required

408 Request Time-Out

409 Conflict

410 Gone

411 Length Required

412 Precondition Failed

413 Request Entity Too Large

414 Request-URL Too Large

415 Unsupported Media Type

500 Server Error In most cases, this error is a result of a problem with the code or program you are calling rather than with the web server itself.

501 Not Implemented The server does not support the facility required.

502 Bad Gateway

503 Out of Resources The server cannot process the request due to a system overload. This should be a temporary condition.

504 Gateway Time-Out The service did not respond within the time frame that the gateway was willing to wait.

505 HTTP Version not supported

How to bypass android pattern unlock

One of the top reason to set up lock in your phone is to keep strangers and friends away from checking private messages, galleries and private pictures. Furthermore, we put security passwords in our phone so that even it get stolen then they won't be able to open our phone and misuse it. But one of the disastrous moment comes in our life when we forget our own Android phone's lock pattern or password or Pin code. This may happen to any of us if we change our phone security too often and forget the new one or if some friend of yours plays a prank on you to make you struggle with it.

lockscreen background image

Requirements :
~Linux distro
~USB cable
-> Connect your phone to your PC using USB cable.
->Installing ADB over terminal
-> Boot into any Linux distro you have.
-> Open up terminal and type :
"sudo apt-get install android-tools-adb"
This will install ADB.
->Disabling pattern unlock over terminal
Open up terminal again and type :
adb devices
adb shell
cd data/system
rm *.key
Disconnect your phone and reboot.
Unlock pattern still should be here.Give a random pattern and it will unlock... grin emoticon




The APOLLO 1 smartphone is the latest in the nature-meets-tech trend that elegantly merges raw wood with ultramodern electronics. Its touchscreen display is delicately integrated into the wood body, appearing as though it almost grew that way! The rounded bottom makes for enhanced ergonomics and plays host to an entirely new spinning interface that allows users to navigate through applications quickly and intuitively.
RS.28,999 Best Price


  • Apollo 1 runs on Android, Nougat 7.0.
  • It has a 5.5 Inch Full HD display.
  • The Phone is powered by a Octa-core Processor with 4 GB RAM .
  • The device comes with a Rear 16 MP camera with an LED flash.
  • It comes with 64GB of built-in storage which can further be expanded using a No.
  • Connectivity includes Dual SIM , 4G LTE.
  • The Device has a non-removable Li-Po 3500 mAh battery.



Best Ethical Hacking Ebooks Collection Free {Giveaway}

Hackers e-books background images

  • Black Belt Hacking & Complete Hacking Book
  • Hackers High School 13 Complete Hacking E-books
  • Penentration Testing With Backtrack 5
  • A Beginners Guide To Hacking Computer Systems
  • Black Book of Viruses and Hacking
  • Secrets of Super and Professional Hackers
  • Dangerours Google Hacking Database and Attacks
  • Internet Advanced Denial of Service (DDOS) Attack
  • Computer Hacking & Malware Attacks for Dummies
  • G-mail Advance Hacking Guides and Tutorials
  • Vulnerability Exploit & website Hacking for Dummies
  • Web App Hacking (Hackers Handbook)
  • Security Crypting Networks and Hacking
  • Botnets The Killer Web Applications Hacking
  • Hacking attacks and Examples Test
  • Network Hacking and Shadows Hacking Attacks
  • Gray Hat Hacking and Complete Guide to Hacking
  • Advance Hacking Exposed Tutorials
  • 501 Website Hacking Secrets
  • Internet Security Technology and Hacking
  • CEH Certified Ethical Hacker Study Guide
  • Advanced SQL Injection Hacking and Guide
  • Web Hacking & Penetration testing
  • OWASP Hacking Tutorials and Web App Protection
  • CEH - Hacking Database Secrets and Exploit
  • Ethical Hacking Value and Penetration testing
  • Hack any Website, Complete Web App Hacking
  • Beginners Hackers and tutorials 
  • Social Engineering (The Art of Human Hacking)
  • Ethical Hacking Complete E-book for Beginners
  • Backtrack : Advance Hacking tutorials
  • SQL Injection attacks and tutorials by Exploit DB
  • XSS + Vulnerability Exploitation & Website Hacking
  • Ultimate Guide to Social Enginnering attacks
  • White Hat Hacking complete guide to XSS Attacks 
  • Cross Site Scripting and Hacking Websites 
  • The Hackers Underground Handbook ( hack the system)
  • Blind SQL Injection tutorials and Hacking
  • Hacking Secrets Revealed
  • Hacking Website Database and owning systems
  • Reverse Engineering for Beginners 
  • Hacking Computer Systems and Tutorials
  • Reverse Enginnering (The Real Hacking)
  • Computer Hacking
  • Hack your Friend using Backtrack
  • Reverse Enginnering Hacking and Cracking
  • Hack the System for beginners
  • Hacking into Computer Systems
  • Blind SQL Injection Discovery & Exploitati

For more info stay tuned!!

Copyright © 2013. All TechDay - All Rights Reserved
Template Created by ThemeXpose