20 research outputs found

    Interface to a Differential Adeptness: David Lesh

    Get PDF

    Computational aerodynamics and artificial intelligence

    Get PDF
    The general principles of artificial intelligence are reviewed and speculations are made concerning how knowledge based systems can accelerate the process of acquiring new knowledge in aerodynamics, how computational fluid dynamics may use expert systems, and how expert systems may speed the design and development process. In addition, the anatomy of an idealized expert system called AERODYNAMICIST is discussed. Resource requirements for using artificial intelligence in computational fluid dynamics and aerodynamics are examined. Three main conclusions are presented. First, there are two related aspects of computational aerodynamics: reasoning and calculating. Second, a substantial portion of reasoning can be achieved with artificial intelligence. It offers the opportunity of using computers as reasoning machines to set the stage for efficient calculating. Third, expert systems are likely to be new assets of institutions involved in aeronautics for various tasks of computational aerodynamics

    Cyber warfare: threats and opportunities

    Get PDF
    Relatório apresentado à Universidade Fernando Pessoa como parte dos requisitos para o cumprimento do programa de Pós-Doutoramento em Ciências da InformaçãoCybersecurity has gone through several changes that have presented new challenges in recent years, complicated by the rise of cybercrime and digital warfare. With the introduction of militarizing the space domain, it has become apparent that we must consider multidomain concepts. Thus, the threat landscape has again shifted, and defenders must become knowledgeable about how the cyber domain crosses into maritime, land, air, and space. The traditional thinking of protecting enterprise systems locked away in a building is no longer. Thus, we have the emergence of cyber warfare and cyber as a fifth domain that brings together maritime, land, space, and air. These domains are not just for the military but the civilian sector as well. Understanding the role of cyber and how it can be used to take advantage or secure the remaining domains will give entities the upper hand in strategy. The technological advancements that pave the way to the mass implementation of the Internet of Things (IoT) and Internet connectivity to everyday devices have led to an explosion in cyberattacks such as breaches resulting in millions of accounts being compromised. (Dawson, Eltayeb, & Omar, 2016). Bad actors such as those focused on criminal activities regarding human trafficking and espionage navigate these domains to circumvent law enforcement agencies globally. We must understand how exploitation, circumvention, and defense needs to occur in a multidomain concept. However, knowing that the cyber domain is a domain that goes through land, maritime, space, and air can be an area that serves as a central point for realizing assured security. Executive Orders (EO), laws, policies, doctrine, and other directives have shaped the landscape of cybersecurity. New EOs have been released that allow a cyber-attack with responsive measures such as one that involves military force. Laws created that impose rights for Personal Identifiable Information (PII) being breached, leaving millions of individuals unprotected. One of these most well-known items is General Data Protection Regulation (GDPR) as it relates to the European Union (EU) and the evolving threats with hyperconnectivity (Martínez, 2019a; Martínez, 2019b). Understanding the role of cybercrime and digital warfare and how they continue to play in shaping the technological landscape is critical. These various actions change the spectrum regarding combating nefarious actors or design errors that leave the system susceptible. As attacks continue to rise from bad actors such as nation-states, terrorists, and other entities, it is essential to understand the threat landscape and select cybersecurity methodologies that can be put in place to provide adequate measures. This document presents the work form a post-doctoral project that provides a perspective of cybersecurity under a information science perspective. This six-month project allows to stress the broadly importance that information and its management (not just within the information security context), and the urgent need to deal with cybersecurity as a societal challenge. The document is organized in four main chapters presenting different but complementary issues, going from high level to a more operational level: National Cybersecurity Education: Bridging Defense to Offense, stressing the importance of societal awareness and education. Emerging Technologies in the Fourth Industrial Revolution, stressing the importance to consider cybersecurity issues as core ones, even to economic and production areas. Nefarious Activities within the Deep Layers of the Internet, stressing the need to be part of digital places where information is traded, shared and, even sometimes, created. The fourth chapter provide a few hints and issues related with software development and test: Software Security Considerations. A final session presents several remarks as Final Thoughts, closing the work pointing out some of the current challenges that we are facing of.N/

    HAL 9000, la Odisea del 2001

    Get PDF
    El HAL 9000 de 2001Hace más de 30 años, el escritor de ciencia ficción, Arthur C. Clarke (junto con StanleyKubrick), se imaginó, entre otras cosas, que en este nuevo milenio existirían ordenadoresinteligentes funcionando de manera análoga a los cerebros de los seres humanos. Tales el caso del ordenador HAL 9000, protagonista de la novela 2001, una odisea en elespacio [2], quien "razonaba" de forma muy similar (o igual) a la mente humana. Elnombre de HAL, cuyas siglas curiosamente anteceden a las siglas de la conocida IBM,significa Heuristically programmed ALgorithmic computer y este significado lo relacionadirectamente con el campo de la inteligencia artificial (IA). HAL era el sexto miembrode la tripulación a bordo de una nave con destino a Saturno1 y sus responsabilidadesincluían desde el soporte básico de vida en la "Discovery", navegación, comunicaciones,contingencias y emergencias de todo tipo, hasta compañía para el resto de la tripulaciónque se encontraba a bordo. Es interesante notar también que HAL era el único miembrodespierto de la tripulación que conocía el objetivo real de la misión2

    Culturally sensitive strategies for automatic music prediction

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2012.Cataloged from PDF version of thesis.Includes bibliographical references (p. 103-112).Music has been shown to form an essential part of the human experience-every known society engages in music. However, as universal as it may be, music has evolved into a variety of genres, peculiar to particular cultures. In fact people acquire musical skill, understanding, and appreciation specific to the music they have been exposed to. This process of enculturation builds mental structures that form the cognitive basis for musical expectation. In this thesis I argue that in order for machines to perform musical tasks like humans do, in particular to predict music, they need to be subjected to a similar enculturation process by design. This work is grounded in an information theoretic framework that takes cultural context into account. I introduce a measure of musical entropy to analyze the predictability of musical events as a function of prior musical exposure. Then I discuss computational models for music representation that are informed by genre-specific containers for musical elements like notes. Finally I propose a software framework for automatic music prediction. The system extracts a lexicon of melodic, or timbral, and rhythmic primitives from audio, and generates a hierarchical grammar to represent the structure of a particular musical form. To improve prediction accuracy, context can be switched with cultural plug-ins that are designed for specific musical instruments and genres. In listening experiments involving music synthesis a culture-specific design fares significantly better than a culture-agnostic one. Hence my findings support the importance of computational enculturation for automatic music prediction. Furthermore I suggest that in order to sustain and cultivate the diversity of musical traditions around the world it is indispensable that we design culturally sensitive music technology.by Mihir Sarkar.Ph.D

    Social Learning Systems: The Design of Evolutionary, Highly Scalable, Socially Curated Knowledge Systems

    Get PDF
    In recent times, great strides have been made towards the advancement of automated reasoning and knowledge management applications, along with their associated methodologies. The introduction of the World Wide Web peaked academicians’ interest in harnessing the power of linked, online documents for the purpose of developing machine learning corpora, providing dynamical knowledge bases for question answering systems, fueling automated entity extraction applications, and performing graph analytic evaluations, such as uncovering the inherent structural semantics of linked pages. Even more recently, substantial attention in the wider computer science and information systems disciplines has been focused on the evolving study of social computing phenomena, primarily those associated with the use, development, and analysis of online social networks (OSN\u27s). This work followed an independent effort to develop an evolutionary knowledge management system, and outlines a model for integrating the wisdom of the crowd into the process of collecting, analyzing, and curating data for dynamical knowledge systems. Throughout, we examine how relational data modeling, automated reasoning, crowdsourcing, and social curation techniques have been exploited to extend the utility of web-based, transactional knowledge management systems, creating a new breed of knowledge-based system in the process: the Social Learning System (SLS). The key questions this work has explored by way of elucidating the SLS model include considerations for 1) how it is possible to unify Web and OSN mining techniques to conform to a versatile, structured, and computationally-efficient ontological framework, and 2) how large-scale knowledge projects may incorporate tiered collaborative editing systems in an effort to elicit knowledge contributions and curation activities from a diverse, participatory audience

    Architects of a new intelligence

    Get PDF
    Thesis (S.M. in Science Writing)--Massachusetts Institute of Technology, Dept. of Humanities, Graduate Program in Science Writing, 2012.Cataloged from PDF version of thesis.Includes bibliographical references (p. 57-62).The modem world is awash in technology, little of which amazes like artificial intelligence. Siri speaks to us out of our iPhones. Google answers our every question. Watson, IBM's Jeopardy!-playing supercomputer, is popularly perceived as a hair's breadth from Arthur C. Clarke's HAL 9000. But the truth of the matter is that all these technologies are far more artificial than they are intelligent. They are designed to give an impression of intelligence, a ruse at which many of them succeed. But none of them begins to approach the all-purpose intelligence of even a human child. Siri and Watson and Google and all other existing AI is what researchers refer to as "narrow" -adept at one task only. But there is a small community of scientists who are working toward "strong" AI: a synthetic intelligence as flexible, as adaptable, and as genuinely intelligent as any human being. Strong AI is an innately interdisciplinary effort at the intersection of neuroscience, cognitive psychology, and computer science, among others. Each of these fields is coming to understand the challenge in its own way, and each has its champions. Little is clear. Few agree on how best to build strong AL, and none can foresee its consequences. But one thing is certain: in constructing this new intelligence we will take our cues from an understanding of the human mind. And so the quest for strong AI ultimately becomes the quest to understand ourselves.by Stephen Paul Craft.S.M.in Science Writin

    Sarkasmin automaattinen tunnistus : tämä toimii hyvin!

    Get PDF
    Tutkimuksen tavoitteena on yhtäältä tunnistaa sarkasmiin liittyviä piirteitä ja toisaalta luoda malli löydettyjen piirteiden pohjalta koneoppimisalgoritmia varten. Algoritmin tarkoituksena on tunnistaa sarkasmia automaattisesti. Sarkasmin piirteitä tutkitaan laadullisin menetelmin valitun korpuksen perusteella. Korpus koostuu kahden South Park -TV-sarjan ja kahden Archer-TV-sarjan jaksoista tehdyistä transkriptiosta. Analyysissä ei oteta huomioon kinesiikkaa eikä paralingvistiikkaa, sillä näiden piirteiden automaattinen tunnistus on monimutkaisuutensa tähden jätettävä omaksi tutkimushaarakseen. Analyysin tuloksena löydetään hankalasti tunnistettavaa sarkasmia, kuten sellaista, joka vaatii mielenteoriaa, sekä helpommin tunnistettavaa sarkasmia, jota värittää ristiriitaisuus yleistiedon kanssa, sarkasmin eksplisiittinen toteaminen tai relevanssin maksiimin rikkominen. Myös liioittelu ja ylenpalttisen positiiviset kuvaukset liittyvät sarkasmiin. Ohjattua koneoppimisalgoritmia varten kehitettään laskennallinen tapa eristää seuraava piirrejoukko syötteestä: leksikaalinen taso (kuten liioittelu), sentimentti, ristiriitaisuus yleistiedon kanssa sekä mielenteoria. Näiden piirteiden eristäminen ei kuitenkaan ole triviaalia, joten tutkimuksessa esitetään vain approksimaatioita piirteiden eristämiseen. Perustavanlaatuisempi piirteiden eristäminen vaatii huomattavan määrän lisätutkimusta, ja se jääkin tulevaisuuden tutkimussuunnaksi

    A critical explorative investigation into the operation of memory in human expression and artificial intelligence : a Joussean perspective.

    Get PDF
    Thesis (M.A.)-University of Natal, Durban, 2000.There is a supposition that with the current progress in artificial intelligence (AI), machines that surpass the cognitive functioning of human beings is imminent. There is no doubt that singular human functions can be performed more efficiently by machines. however. the complexity of human functioning involves the simultaneous cognizance of information received through the various senses. The complexity of human functioning is best reflected in the perceptions of Marcel Jousse in The Anthropology of Geste and Rhythm (I997). Whilst proponents of AI envisage the cognitive functioning of the computer surpassing human cognitive functioning, they fail to acknowledge that human cognitive functioning extends beyond mere information processing and expression of predictable responses. The complexity of human expression is influenced by a variety of sensory environmental stimuli as well as previous experience. The fundamental 'law' of the indivisibility of the psycho-physiological complexus of the human composite identified by Jousse, indicates that human memory emanates from human interaction with the environment. The computer is incapable of interacting with the environment in the way that the human being interacts, which implies that it cannot replicate human memory. This study argues that: • The human being operates simultaneously as a psychological, physiological and biological being, which implies that human memory, is simultaneously biological, psychological and emotional. • Human memory arises out of mimism and is biologically rhythmed, and that this rhythm operates in synchrony with the universal cosmoiogicai rhythms. • Computer rhythms do not operate in synchrony with universal cosmological rhythms. which implies that the operation of its memory is very different to that of the human being. Therefore the computer will not be able to replicate human functioning
    corecore