248,731 research outputs found
Design of the Artificial: lessons from the biological roots of general intelligence
Our desire and fascination with intelligent machines dates back to the
antiquity's mythical automaton Talos, Aristotle's mode of mechanical thought
(syllogism) and Heron of Alexandria's mechanical machines and automata.
However, the quest for Artificial General Intelligence (AGI) is troubled with
repeated failures of strategies and approaches throughout the history. This
decade has seen a shift in interest towards bio-inspired software and hardware,
with the assumption that such mimicry entails intelligence. Though these steps
are fruitful in certain directions and have advanced automation, their singular
design focus renders them highly inefficient in achieving AGI. Which set of
requirements have to be met in the design of AGI? What are the limits in the
design of the artificial? Here, a careful examination of computation in
biological systems hints that evolutionary tinkering of contextual processing
of information enabled by a hierarchical architecture is the key to build AGI.Comment: Theoretical perspective on AGI (Artificial General Intelligence
Artificial Intelligence approaches in Cyber Security
As we all know that, the data that is been generated every second is increasing exponentially, as this information stored or received in any form is directly or indirectly is through Internet that means the data has to be travelled over a network for its completion of task, due to this the security for proper transmission of data plays a vital role in Cyber Security. The speed of processes and the amount of data to be used in defending the cyber space is cannot be handled by humans without considerable automations. However, it is difficult to develop software with conventional fixed algorithms for effectively defending against the dynamically evolving malicious attacks over the network. This situation can be handled by applying method of Artificial Intelligence that provides flexibility and learning capabilities of a network which later helps us in defending the attacks and as well as tracing down the culprits residing behind the terminology. This topic mainly emphasis on how well a packet is transferred from source to destination with proper security so that the end-user acquires the correct data as per his requirements
Recommended from our members
The management of intelligence-assisted finite element analysis technology
Artificial Intelligence (AI) approaches to Finite Element Analysis (FEA), have had tentative degrees of success over the last few years and some authors have argued that effective FEA can help in the manufacture reliability and safety aspects of engineered artefacts. The author of this paper reviews how such AI techniques have been applied and in this light, the author then uses a Fuzzy Cognitive Mapping (FCM), to develop a framework for the management of intelligence-assisted FEA
How Digital Cultural Heritage Resources can Lead to New Understandings in the Humanities: Future Challenges for Digital Libraries and Archives (Invited Paper)
This paper reports on the presentation made during the panel on "Digital Libraries and Digital Archives: Problems and Challenges for AI Approaches" of the 1st Workshop on Intelligent Techniques At LIbraries and Archives (ITALIA 2015) co-located with the XIV Conference of the Italian Association for Artificial Intelligence, 22 September 2015, Ferrara, Italy
- âŚ