Академический Документы
Профессиональный Документы
Культура Документы
STUDY GUIDE 4
INDEX
Artificial Intelligence
Artificial Intelligence in our Lives
Artificial Intellegence and Data AI
Machines vs Humans
Ethics
Legal Issue
Code of Conduct
Internet of Things
How the IOT is Emerging
IOT Application
IOT Challenges
Conclusion
ICT’s
GDGI MODEL UN 2018
Emerging UNGA 1
DISEC
ㅡ
Artificial Intelligence in our Lives There are many examples of the presence of AI in our current
life, that we don’t even know of. Whenever we buy something
with a credit card, an AI algorithm approves that transaction (or
not). When we use the GPS in our car, the algorithm that finds
the best way to go from where we are to where we need to go is
called the A* algorithm and it is an essential tool for AI, present
in every AI teaching book. Spam filters are based on AI.
Recommender systems such as that of Amazon are AI. The
Google translate service, which nowadays is able to translate
from and to more than 70 languages, is based on statistical
machine learning, which is part of AI. Even web searches, such
as those that we ask of Google or Baidu or other search
engines, rely on AI to give us the web pages that are most
relevant to our query. The face recognition capability of any of
our cameras, shown usually with a green rectangle around each
face we want to take a picture of, is AI. Siri, the IPhone app that
understands us when we speak and responds (usually) in a
useful way, is based on AI algorithms for speech understanding.
And of course there is the whole branch of robotics, which is
more easily associated with AI because of the iconic image of
humanoid robots that make it seem that humans have been
reproduced artificially.
Of course not all of them are intelligent in the way we would
say a human is intelligent, but they are usually very good at
doing what they are supposed to in their environment, from the
Roomba robot that cleans the floors of our houses, to the
Baxter robot that can work together with humans in production
chains, passing through the Kiva warehouse robots that can
take care of the tasks of an entire warehouse and the
companion robots like Nao, Pepper, Aibo, and Giraff, who can
entertain us, talk to us, and help elderly people to stay
connected to their friends, relatives, and doctors. The realm of
possible uses of AI techniques is enormously vast, and this is
one of the reasons why many companies have been heavily
investing in AI in recent years. Google is building selfdriving
cars and has acquired more than 10 robotics companies,
Facebook had opened a whole new research facility focused
only on AI research, Apple has developed Siri, Microsoft has
built Cortana, a similar personalized assistant, Google has
acquired DeepMind, a UK company whose long-term aim is to
build general AI and has already shown great potential in
winning at the game of Go the current world champion, and
IBM is investing a huge amount of resources in applying its
Watson cognitive computing system to the medical domain, to
finance, and to personalized education, just to name a few. This
expansion of AI-based systems and services is reaching all
corners of the globe. In Europe, IBM is establishing new centres
in Munich and Milan focused on the application of cognitive
computing capabilities to the Internet of Things and healthcare,
respectively.
Self-driving cars are all about AI: they need to be able to see
what happens in the street (signals, lanes, other cars,
pedestrians, traffic lights), they need to able to predict what
other cars and pedestrian will do, and they need to be able to
cope with unforeseen situations. Since most car accidents are
due to human fault, it is estimated that the adoption of
self-driving cars will save about half of the lives that are usually
lost in car accidents, which totals around 40,000 each year in
the US alone.
ㅡ
Artificial Intellegence and Data AI AI is not all about computing power. Intelligent machines can
also rely on huge amounts of data, to be used to learn how to
make better and better decisions. This data comes from all of
us. Over the years, Facebook users have uploaded more than
250 billion pictures, and every day they upload about 350
million more. Every second, we submit 40,000 Google search
queries, which means 3.5 billion per day and 1.2 trillion per
year. As of today, there are 2 billion people connected to
internet, which is estimated to get to 5 billion by 2020. And by
that time, also 50 billion “things” will be connected through the
web: from appliances to traffic lights, from cars to watches.
ㅡ
ㅡ
Ethics Ethics and law are inextricably linked in modern society, and many
legal decisions arise from the interpretation of various ethical
issues. Artificial intelligence adds a new dimension to these
questions. Systems that use artificial intelligence technologies are
becoming increasingly autonomous in terms of the complexity of
the tasks they can perform, their potential impact on the world
and the diminishing ability of humans to understand, predict and
control their functioning. Most people underestimate the real
level of automation of these systems, which have the ability to
learn from their own experience and perform actions beyond the
scope of those intended by their creators. This causes a number of
ethical and legal difficulties that we will touch upon.
There is a well-known thought experiment in ethics called the
trolley problem. The experiment raises a number of important
ethical issues that are directly related to artificial intelligence.
Imagine a runaway trolley going down the railway lines. There are
five people tied to the track ahead. You are standing next to a
lever. If you pull it, the trolley will switch to a different set of track.
However, there is another person tied to that set of track. Do you
pull the lever or not?
There is no clear-cut answer to this question. What is more, there
are numerous situations in which such a decision may have to be
made And different social groups tend to give different answers.
For example, Buddhist monks are overwhelmingly willing to
sacrifice the life of one person in order to save five, even if
presented with a more complicated variation of the trolley
problem.
As for artificial intelligence, such a situation could arise, for
example, if a self-driving vehicle is travelling along a road in a
situation where an accident is unavoidable. The question thus
arises as to whose lives should take priority – those of the
passengers, the pedestrians or neither. A special website has been
created by the Massachusetts Institute of Technology that deals
with this very issue: users can test out various scenarios out on
themselves and decide which courses of action would be the most
worthwhile.
Other questions also arise in this case: What actions can be
allowed from the legal point of view? What should serve as a basis
for such decisions? Who should ultimately be held responsible?
This problem has already been addressed by companies and
regulators. Representatives at Mercedes, for example, have said
outright that their cars will prioritize the lives of passengers.
The Federal Ministry of Transport and Digital Infrastructure of
Germany responded to this immediately, anticipating future
regulation by stating that making such a choice based on a set of
criteria would be illegal, and that the car manufacturer be held
responsible for any injury or loss of life.
Other countries may go a different route. Take the Chinese Social
Credit System, for example, which rates its citizens based how
law-abiding and how useful to society they are, etc. Those with low
ratings will face sanctions. What is stopping the Chinese
government from introducing a law that forces manufacturers of
self-driving vehicles to sacrifice the lives of lower-rated citizens in
the event of an unavoidable accident? Face recognition
technologies and access to the relevant databases make it
perfectly possible to identify potential victims and compare their
social credit ratings.
ㅡ
Legal Issue The legal problems run even deeper, especially in the case of
robots. A system that learns from information it receives from
the outside world can act in ways that its creators could not
have predicted , and predictability is crucial to modern legal
approaches. What is more, such systems can operate
independently from their creators or operators thus
complicating the task of determining responsibility. These
characteristics pose problems related to predictability and the
ability to act independently while at the same time not being
held responsible.
There are numerous options in terms of regulation, including
regulation that is based on existing norms and standards. For
example, technologies that use artificial intelligence can be
regulated as items subject to copyright or as property.
Difficulties arise here, however, if we take into account the
ability of such technologies to act autonomously, against the
will of their creators, owners or proprietors. In this regard, it is
possible to apply the rules that regulate a special kind of
ownership, namely animals, since the latter are also capable of
autonomous actions. In Russian Law, the general rules of
ownership are applied to animalS
France
In late March 2018, President of France Emmanuel Macron
presented the country’s new national artificial intelligence
strategy, which involves investing 1.5 billion Euros over the
next five years to support research an innovation in the field.
The strategy is based on the recommendations made in the
report prepared under the supervision of French
mathematician and National Assembly deputy Cédric Villani.
The decision was made for the strategy to be aimed at four
specific sectors: healthcare; transport; the environment and
environmental protection; and security. The reasoning behind
this is to focus potential of the comparative advantages and
competencies in artificial intelligence on sectors where
companies can play a key role at the global level, and because
these technologies are important for the public interest, etc.
Seven key proposals are given, one of which is of particular
interest for the purposes of this article – namely, to make
artificial intelligence more open. It is true that the algorithms
used in artificial intelligence are discrete and, in most cases,
trade secrets. However, algorithms can be biased, for example,
in the process of self-learning, they can absorb and adopt the
stereotypes that exist in society or which are transferred to
them by developers and make decisions based on them. There
is already legal precedent for this. A defendant in the United
States received a lengthy prison sentence on the basis of
information obtained from an algorithm predicting the
likelihood of repeat offences being committed. The defendant’s
appeal against the use of an algorithm in the sentencing process
was rejected because the criteria used to evaluate the
possibility of repeat offences were a trade secret and therefore
not presented. The French strategy proposes developing
transparent algorithms that can be tested and verified,
determining the ethical responsibility of those working in
artificial intelligence, creating an ethics advisory committee,
etc.
European Union
The creation of the resolution on the Civil Law Rules on
Roboticsmarked the first step towards the regulation of
artificial intelligence in the European Union. A working group
on legal questions related to the development of robotics and
artificial intelligence in the European Union was established
back in 2015. The resolution is not a binding document, but it
does give a number of recommendations to the European
Commission on possible actions in the area of artificial
intelligence, not only with regard to civil law, but also to the
ethical aspects of robotics.
The resolution defines a “smart robot” as “one which has
autonomy through the use of sensors and/or interconnectivity
with the environment, which has at least a minor physical
support, which adapts its behaviour and actions to the
environment and which cannot be defined as having ‘life’ in the
biological sense.” The proposal is made to “introduce a system
for registering advanced robots that would be managed by an
EU Agency for Robotics and Artificial Intelligence.” As regards
liability for damage caused by robots, two options are
suggested: “either strict liability (no fault required) or on a
risk-management approach (liability of a person who was able
to minimise the risks).” Liability, according to the resolution,
“should be proportionate to the actual level of instructions
given to the robot and to its degree of autonomy. Rules on
liability could be complemented by a compulsory insurance
scheme for robot users, and a compensation fund to pay out
compensation in case no insurance policy covered the risk.”
ㅡ
ㅡ
ㅡ
How the Internet of Things is The strong growth currently observed in IoT applications is
Emerging attributable to several major underlying trends that are just
now coming to fruition:
How the Internet of Things is Emerging The strong growth
currently observed in IoT applications is attributable to several
major underlying trends that are just now coming to fruition:
● The reduction in the cost of computing (including sensors)
and the growth of Wi-Fi are enabling factors driving growth in
IoT applications;
● Growth in mobile and the deployment of data-friendly 3G
networks from 2001 onwards, as well as the expansion of
network connectivity across the world, and from urban to rural
settings (including Wi-Fi, but also macro cell connectivity);
● The rise of software development, partly attributable to
economies of scale; and
● The emergence of standardized low-power wireless
technologies
one possible explanation for why the IoT is advancing rapidly
now is that it is moving from a position where it delivers
incremental efficiency improvements to existing business
models to one where it positively impacts new business models
and processes as well.
Terms of existing processes, the IoT can improve and enable a
broad range of applications — from more efficient
manufacturing, logistics, counterfeit detection, monitoring of
people, stock, vehicles, equipment and infrastructure, to
improved healthcare, traffic management, product
development and hydrocarbon exploration. In addition, the IoT
is now also enabling the exploration of new business models
such as car and truck rental clubs, whose members can book
and use vehicles parked around their neighborhood almost
on-demand; or “pay-as-you-drive” insurance based on driving
patterns, behavior, and risk. For marketers, the IoT enables
brands to gather more information about their customers, and
create “truly compelling, magical experiences
ㅡ
ㅡ
IOT Challenges The fact that Internet of things applications and scenarios
outlined above are very interesting which provides
technologies for smart every things. , but there are some
challenges to the application of the Internet of Things concept
in cost of implementation. The expectation that the technology
must be available at low cost with a large number of objects. IoT
are also faced with many other challenges such as
- Scalability: Internet of Things has a big concept than the
conventional Internet of computers, because of things are
cooperated within an open environment. Basic functionality
such as communication and service discovery therefore need to
function equally efficiently in both small scale and large scale
environments. The IoT requires a new functions and methods in
order to gain an efficient operation for scalability.
- Self-Organizing: Smart things should not be managed as
computers that require their users to configure and adapt them
to particular situations. Mobile things, which are often only
sporadically used, need to establish connections spontaneously,
and able to be organize and configure themselves to suit their
particular environment.
- Data volumes: Some application scenarios of the internet
of things will involve to infrequent communication, and
gathering information’s form sensor networks, or form logistics
and large scale networks, will collect a huge volumes of data on
central network nodes or servers. The term represent this
phenomena is big data which is requires many operational
mechanism in addition to new technologies for storing,
processing and management.
- Data interpretation: To support the users of smart things,
there is a need to interpret the local context determined by
sensors as accurately as possible. For service providers to profit
from the disparate data that will be generated, needs to be able
to draw some generalizable conclusions from the interpreted
sensor data.
- Interoperability: Each type of smart objects in Internet of
Things have different information, processing and
communication capabilities. Different smart objects would also
be subjected to different conditions such as the energy
availability and the communications bandwidth requirements.
To facilitate communication and cooperation of these objects,
common standards are required.
- Automatic Discovery: In dynamic environments, suitable
services for things must be automatically identified, which
requires appropriate semantic means of describing their
functionality.
-
- Software complexity: A more extensive software
infrastructure will be needed on the network and on
background servers in order to manage the smart objects and
provide services to support them. that because the software
systems in smart objects will have to function with minimal
resources, as in conventional embedded systems.
- Security and privacy: In addition to the security and
protection aspects of the Internet such in communications
confidentiality, the authenticity and trustworthiness of
communication partners, and message integrity, other
requirements would also be important in an Internet of Things.
There is a need to access certain services or prevent from
communicating with other things in IoT and also business
transactions involving smart objects would need to be
protected from competitors’ prying eyes.
- Fault tolerance: Objects in internet of things is much more
dynamic and mobile than the internet computers, and they are
in changing rapidly in unexpected ways. Structuring an Internet
of Things in a robust and trustworthy manner would require
redundancy on several levels and an ability to automatically
adapt to changed conditions.
- Power supply: Things typically move around and are not
connected to a power supply, so their smartness needs to be
powered from a self-sufficient energy source. Although passive
RFID transponders do not need their own energy source, their
functionality and communications range are very limited.
Hopes are pinned on future low power processors and
communications units for embedded systems that can function
with significantly less energy. Energy saving is a factor not only
in hardware and system architecture, but also in software, for
example the implementation of protocol stacks, where every
single transmission byte will have to justify its existence.
- Wireless communications: From an energy point of view,
established wireless technologies such as GSM, UMTS, Wi-Fi
and Bluetooth are far less suitable; more recent WPAN
standards such as ZigBee and others still under development
may have a narrower bandwidth, but they do use significantly
less power.
- Security and Privacy: Due the fact that IoT applications
able to access the multiple administrative domains and involve
to multiple ownership regimes , there is a need for a trust
framework to enable the users of the system to have
confidence that the information and services being exchanged
can indeed be relied upon . The trust framework needs to be
able to deal with humans and machines as users, for it needs to
convey trust to humans and needs to be robust enough to be
used by machines without denial of service. The development
of trust frameworks that address this requirement will require
advances in areas such as lightweight public key infrastructures
(PKI) as a basis for trust management . Lightweight key
management systems is used to enable trust encryption
materials using minimum communications and processing
resources, as is consistent with the resource constrained
nature of many IoT devices . IoT based systems require a
quality of information for metadata which can be used to
provide an assessment of their liability of IoT data. A novel
methods is required for IoT based systems for assessing trust in
people, devices and data. One of the most methods used are
trust negotiation that allows two parties to automatically
negotiate, on the basis of a chain of trust policies, the minimum
level of trust required to grant access to a service or to a piece
of information. Internet of things uses a methods for access
control to prevent untrusted data breaches by control the
process of ensuring the correct usage of certain information
according to a predefined policy after the access to information
is granted . Recently, the IoT becomes a key element of the
future internet, the need to provide adequate security for the
IoT infrastructure becomes ever more important. A large scale
applications and services based on the IoT are increasingly
vulnerable to disruption from attack or information theft. Many
advanced security methods are required in several areas to
make the IoT secure from attacks, thefts and many other
security problems such as DoS/DDOS attacks, compromised
nodes, and malicious code hacking attacks, that because the IoT
is susceptible to such attacks and will require specific
techniques and mechanisms to ensure that transport, energy,
city infrastructures cannot be disabled or subverted. The IoT
requires a variety of access control and associated accounting
schemes to support the various authorization and usage models
that are required by users. The heterogeneity and diversity of
the devices/gateways that require access control will require
new lightweight schemes to be developed. The IoT needs to
handle virtually all modes of operation by itself without relying
on human control. New techniques and approaches for example
like machine learning, are required to lead to a self-managed
IoT. Cryptographic techniques is also very important in IoT
based systems for enable a means of protection for data to be
stored processed and shared, without the information content
being accessible to other parties. Technologies such as
homomorphic and searchable encryption are potential
candidates for developing such approaches.
ㅡ