248,731 research outputs found

    Design of the Artificial: lessons from the biological roots of general intelligence

    Full text link
    Our desire and fascination with intelligent machines dates back to the antiquity's mythical automaton Talos, Aristotle's mode of mechanical thought (syllogism) and Heron of Alexandria's mechanical machines and automata. However, the quest for Artificial General Intelligence (AGI) is troubled with repeated failures of strategies and approaches throughout the history. This decade has seen a shift in interest towards bio-inspired software and hardware, with the assumption that such mimicry entails intelligence. Though these steps are fruitful in certain directions and have advanced automation, their singular design focus renders them highly inefficient in achieving AGI. Which set of requirements have to be met in the design of AGI? What are the limits in the design of the artificial? Here, a careful examination of computation in biological systems hints that evolutionary tinkering of contextual processing of information enabled by a hierarchical architecture is the key to build AGI.Comment: Theoretical perspective on AGI (Artificial General Intelligence

    Artificial Intelligence approaches in Cyber Security

    Get PDF
    As we all know that, the data that is been generated every second is increasing exponentially, as this information stored or received in any form is directly or indirectly is through Internet that means the data has to be travelled over a network for its completion of task, due to this the security for proper transmission of data plays a vital role in Cyber Security. The speed of processes and the amount of data to be used in defending the cyber space is cannot be handled by humans without considerable automations. However, it is difficult to develop software with conventional fixed algorithms for effectively defending against the dynamically evolving malicious attacks over the network. This situation can be handled by applying method of Artificial Intelligence that provides flexibility and learning capabilities of a network which later helps us in defending the attacks and as well as tracing down the culprits residing behind the terminology. This topic mainly emphasis on how well a packet is transferred from source to destination with proper security so that the end-user acquires the correct data as per his requirements

    How Digital Cultural Heritage Resources can Lead to New Understandings in the Humanities: Future Challenges for Digital Libraries and Archives (Invited Paper)

    Get PDF
    This paper reports on the presentation made during the panel on "Digital Libraries and Digital Archives: Problems and Challenges for AI Approaches" of the 1st Workshop on Intelligent Techniques At LIbraries and Archives (ITALIA 2015) co-located with the XIV Conference of the Italian Association for Artificial Intelligence, 22 September 2015, Ferrara, Italy
    • …
    corecore