23,215 research outputs found

    Enhancing Privacy of Smart Speakers Using Image Recognition and Motion Sensors

    Get PDF
    Smart speakers provide a convenient, often hands-free way for a user to interface with smart technology. For instance, if a user receives an email, text message, or other communication, the communication can be played aloud via the smart speaker. However, it may not be desirable for a communication containing personal or otherwise sensitive information to be read aloud. As such, systems and methods are needed that can provide enhanced privacy of smart speakers while maintaining expected functionality of smart speakers. Furthermore, authenticating a user based on audio alone can be challenging and may be less secure than other forms of authentication

    Adding Semantic Web Knowledge to Intelligent Personal Assistant Agents

    Get PDF
    Intelligent Personal Assistant (IPA) agents are software agents which assist users in performing specific tasks. They should be able to communicate, cooperate, discuss, and guide people. This paper presentsa proposal to add Semantic Web Knowledge to IPA agents. In our solution,the IPA agent has a modular knowledge organization composed by four differentiated areas: (i) the rational area, which adds semantic webknowledge, (ii) the association area, which simplifies building appropriate responses, (iii) the commonsense area, which provides common sense responses, and (iv) the behavioral area, which allows IPA agents to show empathy. Our main objective is to create more intelligent and more humana alike IPA agents, enhancing the current abilities that these software agents provide

    Hi, how can I help you?: Automating enterprise IT support help desks

    Full text link
    Question answering is one of the primary challenges of natural language understanding. In realizing such a system, providing complex long answers to questions is a challenging task as opposed to factoid answering as the former needs context disambiguation. The different methods explored in the literature can be broadly classified into three categories namely: 1) classification based, 2) knowledge graph based and 3) retrieval based. Individually, none of them address the need of an enterprise wide assistance system for an IT support and maintenance domain. In this domain the variance of answers is large ranging from factoid to structured operating procedures; the knowledge is present across heterogeneous data sources like application specific documentation, ticket management systems and any single technique for a general purpose assistance is unable to scale for such a landscape. To address this, we have built a cognitive platform with capabilities adopted for this domain. Further, we have built a general purpose question answering system leveraging the platform that can be instantiated for multiple products, technologies in the support domain. The system uses a novel hybrid answering model that orchestrates across a deep learning classifier, a knowledge graph based context disambiguation module and a sophisticated bag-of-words search system. This orchestration performs context switching for a provided question and also does a smooth hand-off of the question to a human expert if none of the automated techniques can provide a confident answer. This system has been deployed across 675 internal enterprise IT support and maintenance projects.Comment: To appear in IAAI 201

    Why Internal Moral Enhancement Might Be politically Better than External Moral Enhancement

    Get PDF
    Technology could be used to improve morality but it could do so in different ways. Some technologies could augment and enhance moral behaviour externally by using external cues and signals to push and pull us towards morally appropriate behaviours. Other technologies could enhance moral behaviour internally by directly altering the way in which the brain captures and processes morally salient information or initiates moral action. The question is whether there is any reason to prefer one method over the other? In this article, I argue that there is. Specifically, I argue that internal moral enhancement is likely to be preferable to external moral enhancement, when it comes to the legitimacy of political decision-making processes. In fact, I go further than this and argue that the increasingly dominant forms of external moral enhancement may already be posing a significant threat to political legitimacy, one that we should try to address. Consequently, research and development of internal moral enhancements should be prioritised as a political project

    Pervasive surveillance-agent system based on wireless sensor networks: design and deployment

    Get PDF
    Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment
    • …
    corecore