370,437 research outputs found
Artificial Intelligence in the Aviation Manufacturing Process for Complex Assemblies and Components
Aviation manufacturing is at the leading edge of technology with materials, designs and processes where automation is not only integral; but complex systems require more advanced systems to produce and verify processes. Critical Infrastructure theory is now used to protect systems and equipment from external software infections and cybersecurity techniques add an extra layer of protection. In this research, it is argued that Artificial Intelligence can reduce these risks and allow complex processes to be less exposed to the threat of external problems, internal errors or mistakes in operation
A New Paradigm for Intellectual Property Rights in Software
A Winter 2004 article by Bradford L. Smith and Susan O. Mann of Microsoft published in The University of Chicago Law Review suggests that the development and growth of the software industry in the U.S. is a direct outgrowth of the implementation of intellectual property regimes, specifically copyright and patent, with respect to software in the late 1970s and early 1980s. This paper suggests that such patents were neither the sole nor the principal factor for the development of the software industry, that concerns about patents manifested prior to or soon after their application to software have proven true, and that patents are, in fact, not serving the interests of either the U.S. software industry or the consuming public. To that end, this paper advances recommendations for reforming the U.S. patent system as well as consideration of a new schema for protecting software
Generating Rembrandt: Artificial Intelligence, Copyright, and Accountability in the 3A Era--The Human-like Authors are Already Here- A New Model
Artificial intelligence (AI) systems are creative, unpredictable, independent, autonomous, rational, evolving, capable of data collection, communicative, efficient, accurate, and have free choice among alternatives. Similar to humans, AI systems can autonomously create and generate creative works. The use of AI systems in the production of works, either for personal or manufacturing purposes, has become common in the 3A era of automated, autonomous, and advanced technology. Despite this progress, there is a deep and common concern in modern society that AI technology will become uncontrollable. There is therefore a call for social and legal tools for controlling AI systems’ functions and outcomes. This Article addresses the questions of the copyrightability of artworks generated by AI systems: ownership and accountability. The Article debates who should enjoy the benefits of copyright protection and who should be responsible for the infringement of rights and damages caused by AI systems that independently produce creative works. Subsequently, this Article presents the AI Multi- Player paradigm, arguing against the imposition of these rights and responsibilities on the AI systems themselves or on the different stakeholders, mainly the programmers who develop such systems. Most importantly, this Article proposes the adoption of a new model of accountability for works generated by AI systems: the AI Work Made for Hire (WMFH) model, which views the AI system as a creative employee or independent contractor of the user. Under this proposed model, ownership, control, and responsibility would be imposed on the humans or legal entities that use AI systems and enjoy its benefits. This model accurately reflects the human-like features of AI systems; it is justified by the theories behind copyright protection; and it serves as a practical solution to assuage the fears behind AI systems. In addition, this model unveils the powers behind the operation of AI systems; hence, it efficiently imposes accountability on clearly identifiable persons or legal entities. Since AI systems are copyrightable algorithms, this Article reflects on the accountability for AI systems in other legal regimes, such as tort or criminal law and in various industries using these systems
Using ACIS on the Chandra X-ray Observatory as a particle radiation monitor II
The Advanced CCD Imaging Spectrometer is an instrument on the Chandra X-ray
Observatory. CCDs are vulnerable to radiation damage, particularly by soft
protons in the radiation belts and solar storms. The Chandra team has
implemented procedures to protect ACIS during high-radiation events including
autonomous protection triggered by an on-board radiation monitor. Elevated
temperatures have reduced the effectiveness of the on-board monitor. The ACIS
team has developed an algorithm which uses data from the CCDs themselves to
detect periods of high radiation and a flight software patch to apply this
algorithm is currently active on-board the instrument. In this paper, we
explore the ACIS response to particle radiation through comparisons to a number
of external measures of the radiation environment. We hope to better understand
the efficiency of the algorithm as a function of the flux and spectrum of the
particles and the time-profile of the radiation event.Comment: 10 pages, 5 figures, to be published in Proc. SPIE 8443, "Space
Telescopes and Instrumentation 2012: Ultraviolet to Gamma Ray
Recommended from our members
An Assessment of PIER Electric Grid Research 2003-2014 White Paper
This white paper describes the circumstances in California around the turn of the 21st century that led the California Energy Commission (CEC) to direct additional Public Interest Energy Research funds to address critical electric grid issues, especially those arising from integrating high penetrations of variable renewable generation with the electric grid. It contains an assessment of the beneficial science and technology advances of the resultant portfolio of electric grid research projects administered under the direction of the CEC by a competitively selected contractor, the University of California’s California Institute for Energy and the Environment, from 2003-2014
The future of Cybersecurity in Italy: Strategic focus area
This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management
- …