SlideShare a Scribd company logo
1 of 9
Download to read offline
www.studentyogi.com www.studentyogi.com

                                  A Paper Presentation on
                       Artificial Intelligence




                       co om
                                 &
                            Global Risk




                          m
                    gi. .c
                  oogi
Abstract
        computer systems are becoming commonplace; indeed, they are almost
               ntyy
ubiquitous. We find them central to the functioning of most business, governmental,
military, environmental, and health-care organizations. They are also a part of many
             eent
educational and training programs. But these computer systems, while increasingly
affecting our lives, are rigid, complex and incapable of rapid change. To help us and our
organizations cope with the unpredictable eventualities of an ever-more volatile world,
        t t dd


these systems need capabilities that will enable them to adapt readily to change. They
need to be intelligent. Our national competitiveness depends increasingly on capacities
     ssuu


for accessing, processing, and analyzing information. The computer systems used for
such purposes must also be intelligent. Health-care providers require easy access to
information systems so they can track health-care delivery and identify the most recent
   w. .




and effective medical treatments for their patients' conditions. Crisis management teams
   w




must be able to explore alternative courses of action and support decision making.
Educators need systems that adapt to a student's individual needs and abilities. Businesses
ww




require flexible manufacturing and software design aids to maintain their leadership
ww




position in information technology, and to regain it in manufacturing


Software Risk Management is a proactive approach for minimizing the uncertainty and
potential loss associated with a project. A risk is an event or condition that, if it occurs,


www.studentyogi.com www.studentyogi.com
www.studentyogi.com www.studentyogi.com
has a positive or negative effect on a project’s objectives.         The three common
characteristics of risk are (1) it represents a future event, (2) it has a probability of
occurring of greater than 0%, but less than 100%, and (3) the consequence of the risk must
be unexpected or unplanned for. Future events can be categorized as opportunity-




                                                              om
focused (positive risk) if their consequences are favorable, or as threat-focused (negative
risk) if their consequences are unfavorable.




                                                           i.c
                                           og
INTRODUCTION(Artificial intelligence)
(AI) is a field of study based on the premise that intelligent thought can be regarded as a
                                        nty
form of computation—one that can be formalized and ultimately mechanized. To achieve
this, however, two major issues need to be addressed. The first issue is knowledge
representation, and the second is knowledge manipulation. Within the intersection of
these two issues lies mechanized intelligence
                               de

History
The study of artificial intelligence has a long history, dating back to the work of British
                    stu


mathematician Charles Babbage (1791–1871) who developed a special-purpose
"Difference Engine" for mechanically computing the values of certain polynomial
functions. Similar work was also done by German mathematician Gottfried Wilhem von
Leibniz (1646–1716), who introduced the first system of formal logic and constructed
           w.




machines for automating calculation. George Boole, Ada Byron King, Countess of
Lovelace, Gottlob Frege, and Alfred Tarski have all significantly contributed to the
advancement of the field of artificial intelligence.
ww




Knowledge representation
It has long been recognized that the language and models used to represent reality
profoundly impact one's understanding of reality itself. When humans think about a
particular system, they form a mental model of that system and then proceed to discover


www.studentyogi.com www.studentyogi.com
www.studentyogi.com www.studentyogi.com
truths about the system. These truths lead to the ability to make predictions or general
statements about the system. However, when a model does not sufficiently match the
actual problem, the discovery of truths and the ability to make predictions becomes




                                                               om
exceedingly difficult.

A classic example of this is the pre-Copernican model in which the Sun and planets
revolved around the Earth. In such a model, it was prohibitively difficult to predict the
position of planets. However, in the Copernican revolution this Earth-centric model was




                                                            i.c
replaced with a model where the Earth and other planets revolved around the Sun.

This new model dramatically increased the ability of astronomers to predict celestial




                                           og
events.Arithmetic with Roman numerals provides a second example of how knowledge
representation can severely limit the ability to manipulate that knowledge. Both of these
examples stress the important relationship between knowledge representation and
                                        nty
thought.
                               de
                    stu
           w.
ww




Through artificial intelligence, engineers and computer scientists are capable of creating
machines that perform dangerous tasks in place of humans. Here, a police robot handles a live
bomb.




www.studentyogi.com www.studentyogi.com
www.studentyogi.com www.studentyogi.com
In AI, a significant effort has gone into the development of languages that can be used to
represent knowledge appropriately. Languages such as LISP, which is based on the
lambda calculus, and Prolog, which is based on formal logic, are widely used for




                                                                 om
knowledge representation. Variations of predicate calculus are also common languages
used by automated reasoning systems. These languages have well-defined semantics and
provide a very general framework for representing and manipulating knowledge




                                                              i.c
Knowledge manipulation



                                           og
Many problems that humans are confronted with are not fully understood. This partial
understanding is reflected in the fact that a rigid algorithmic solution—a routine and
predetermined number of computational steps— cannot be applied. Rather, the concept
                                        nty
of search is used to solve such problems. When search is used to explore the entire
solution space, it is said to be exhaustive. Exhaustive search is not typically a successful
approach to problem solving because most interesting problems have search spaces that
are simply too large to be dealt with in this manner, even by the fastest computers.
                               de

Therefore, if one hopes to find a solution (or a reasonably good approximation of a
solution) to such a problem, one must selectively explore the problem's search space
                    stu



The difficulty here is that if part of the search space is not explored, one runs the risk that
the solution one seeks will be missed. Thus, in order to ignore a portion of a search space,
           w.




some guiding knowledge or insight must exist so that the solution will not be overlooked.
Heuristics is a major area of AI that concerns itself with how to limit effectively the
exploration of a search space. Chess is a classic example where humans routinely employ
ww




sophisticated heuristics in a search space. A chess player will typically search through a
small number of possible moves before selecting a move to play. Not every possible
move and countermove sequence is explored. Only reasonable sequences are examined.
A large part of the intelligence of chess players resides in the heuristics they employ




www.studentyogi.com www.studentyogi.com
www.studentyogi.com www.studentyogi.com
A heuristic-based search results from the application of domain or problem-specific
knowledge to a universal search function. The success of heuristics has led to focusing
the application of general AI techniques to specific problem domains. This has led to the




                                                                     om
development of expert systems capable of sophisticated reasoning in narrowly defined
domains within fields such as medicine, mathematics, chemistry, robotics, and aviation.

Another area that is profoundly dependent on domain-specific knowledge is natural
language processing. The ability to understand a natural language such as English is one




                                                                  i.c
of the most fundamental aspects of human intelligence, and presents one of the core
challenges for the AI community. Small children routinely engage in natural language
processing, yet it appears to be almost beyond the reach of mechanized computation.




                                              og
Over the years, significant progress has been made in the ability to parse text to discover
its syntactic structure. However, much of the meaning in natural language is context-
dependent as well as culture-dependent, and capturing such dependencies has proved
                                           nty
highly resistant to automation.

Introduction(Global risk)
                                 de

Providing insights to support informed decision making is the primary objective of Risk
                      stu


Management. In practice, Risk Management concentrates on performing bottom-up, detailed,
continuous assessment of risk and opportunity. It focuses on addressing the day-to-day
operational risks that a program faces. Risk Management follows a two-stage, repeatable and
iterative process of assessment (i.e., the identification, estimation and evaluation of the risks
confronting a program) and management (i.e., the planning for, monitoring of, and controlling of
the means to eliminate or reduce the likelihood or consequences of the risks discovered). It is
            w.




performed continually over the life of a program, from initiation to retirement.

There are a variety of risks that confront the global software industry, as illustrated in Figure 1
[McManus, 2004], which will be discussed in more detail. The characteristics of the legal, social,
economic and competitive environments impose constraints and opportunities that help to define
ww




the nature of the risks (and their exposure levels) for suppliers, buyers, and other stakeholders in
the software acquisition and development process.
 process.




www.studentyogi.com www.studentyogi.com
www.studentyogi.com www.studentyogi.com




                                                                     om
                                                                  i.c
                                              og
                Figure 1: Risk and the Global Software Industry [McManus, 2004]
                                           nty
The Concept Of Positive Risk

Positive risk refers to risk that we initiate ourselves because we see a potential opportunity along
with a potential for failure (the negative risk associated with “loss” of the opportunity). There are
several kinds of opportunities that can be leveraged in projects if responses to them are well-
                                  de

timed and prompt action is initiated [Kahkonen, 2001]. These include:

        •    Business opportunities, e.g., product development, customer care during the project
            life cycle, and focused attention on high profit margin activities
        •    Operational opportunities, e.g., value-added, do what is important, minimize rework
                      stu


        •    Systemic opportunities, which typically mean long-term savings resulting from
            improved safety, insurance, etc.



The Most Common/Serious Software Risks
            w.




There are numerous reasons as to why formal risk management is difficult to implement
effectively. These include the sheer number of risk factors that have been identified in the
literature. For example, Capers Jones assessed several hundred organizations and observed
over 100 risk factors (of which 60 he discusses in detail in [Jones, 1994]). He observed,
ww




however, that few projects have more than 15 active risk factors at any one time, but many
projects have approximately six simultaneous risk factors.

Another reason for the relatively low implementation of formal risk management methods in
practice are, according to [Kontio, 1998], the fact that risk is an abstract or fuzzy concept for
which users lack the necessary tools to more accurately define risk for a deeper analysis. In
addition, many risk management methods may be based on risk quantification. Users may not
have the ability to provide accurate estimates for probability and loss/opportunity projections
required for a reliable risk analysis. Table-based approaches can sometimes be too biased or too


www.studentyogi.com www.studentyogi.com
www.studentyogi.com www.studentyogi.com
coarse for proper risk prioritization. Risks may also have different implications for different
stakeholders (or, conversely, be perceived differently by different stakeholders). Existing risk
management methods may not provide support for dealing with these differences. Risks may
also affect a project in more than one way. For example, most risk management approaches
focus on cost, schedule or quality risks, but there may be combinations of risks or other
characteristics such as future required maintenance, company reputation, or potential




                                                                    om
liability/litigation that should be considered important in influencing the decision-making process.
Finally, many current risk management techniques may be perceived as too costly or too complex
to use. Simple, straightforward risk management techniques that require an acceptable amount
of time to produce results might be the answer.
The Risk Management Map contains five evolutionary stages of risk management capability,
defined as:




                                                                 i.c
        •    Problem Stage: Describes circumstances when risk identification is not seen as
            positive. Characterized by lack of communication which causes a subsequent lack of
            coordination. Crisis management is used to address existing problems. Risks
            ignored or tracked in ad-hoc fashion.




                                             og
        •    Mitigation Stage: Details a shift from crisis management to risk management.
            People become aware of risks but do not systematically confront them. There is
            uncertainty as to how to communicate risks. Risks are usually recorded, tracked and
            handled as discovered.
                                          nty
        •    Prevention Stage: Discusses the shift of risk management as solely a manager’s
            activity to risk management as a team activity. This is a transitional stage from
            avoidance of risk symptoms to identification and elimination of root cause of risk,
            characterized by team, and sometimes customer, involvement. For risk management
            to succeed it must occur at each level within an organization. This stage represents
            a turning point from a reactive to a more proactive approach to risk management.
                                 de

            Risks systematically … analyzed, planned, tracked and resolved.
        •    Anticipation Stage: Describes the shift from subjective to quantitative risk
            management, through the use of measures to anticipate predictable risks, that is
            characterized by the use of metrics to anticipate failures and predict future events.
                      stu


            This stage involves the ability to learn from, adapt to, and anticipate change,
            representing a completely proactive approach to risk management. Quantified
            analysis used to determine resolution cost/benefit for the project.
        •    Opportunity Stage: This represents a positive vision of risk management that is
            used to innovate and shape the future. Risks are perceived as an opportunity to
            save money and do better than planned. Risk, like quality, is everyone’s
            w.




            responsibility. A continuous process of identifying, communicating and resolving
            risks in an open and non-threatening environment is used. Admissions that some
            things are not known are acceptable and allowances are made for their existence
            using a best-case, worst-case scenario. Risk statistics are used to make
            organizational/process improvements.
ww




on a detailed plan that evolves over time.




www.studentyogi.com www.studentyogi.com
www.studentyogi.com www.studentyogi.com




                                                     om
                                                  i.c
Conclusion

                                    og
AI is a young field and faces many complexities. Nonetheless, the Spring
                                 nty
1998 issue of AI Magazine contained articles on the following innovative
applications of AI: This is suggestive of the broad potential of AI in the
future.

   1. "Case- and Constraint-Based Project Planning for Apartment
                          de

      Construction"
   2. "CREWS–NS: Scheduling Train Crews in The Netherlands"
   3. "An Intelligent System for Case Review and Risk Assessment in
      Social Services"
                 stu


   4. "CHEMREG: Using Case-Based Reasoning to Support Health and
      Safety Compliance in the Chemical Industry"
   5. "MITA: An Information-Extraction Approach to the Analysis of Free-
      Form Text in Life Insurance Applications"
         w.




Bibliography

Luger, George F., and William A. Stubblefield. Artificial Intelligence:
Structures and Strategies for Complex Problem Solving. Redwood City,
CA: Benjamin/Cummings Publishing Company, 1993.
ww




Mueller, Robert A., and Rex L. Page. Symbolic Computing with LISP and
Prolog. New York: Wiley and Sons, 1988.

Russel, Stuart J., and Peter Norvig. Artificial Intelligence: A Modern
Approach. Englewood Cliffs, NJ: Prentice Hall, 1994

www.studentyogi.com www.studentyogi.com
www.studentyogi.com www.studentyogi.com




                             om
                          i.c
                    og
                 nty
             de
        stu
     w.
ww




www.studentyogi.com www.studentyogi.com

More Related Content

What's hot

presentation on Artificial intelligence by prince kumar kushwaha from rustamj...
presentation on Artificial intelligence by prince kumar kushwaha from rustamj...presentation on Artificial intelligence by prince kumar kushwaha from rustamj...
presentation on Artificial intelligence by prince kumar kushwaha from rustamj...
Rustamji Institute of Technology
 
best presentation Artitficial Intelligence
best presentation Artitficial Intelligencebest presentation Artitficial Intelligence
best presentation Artitficial Intelligence
jennifer joe
 
Artificial Intelligence Course- Introduction
Artificial Intelligence Course- IntroductionArtificial Intelligence Course- Introduction
Artificial Intelligence Course- Introduction
Muhammad Sanaullah
 

What's hot (20)

Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial Intelligence 01 introduction
Artificial Intelligence 01 introduction Artificial Intelligence 01 introduction
Artificial Intelligence 01 introduction
 
Human Level Artificial Intelligence
Human Level Artificial IntelligenceHuman Level Artificial Intelligence
Human Level Artificial Intelligence
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Past, Present and Future of AI: a Fascinating Journey - Ramon Lopez de Mantar...
Past, Present and Future of AI: a Fascinating Journey - Ramon Lopez de Mantar...Past, Present and Future of AI: a Fascinating Journey - Ramon Lopez de Mantar...
Past, Present and Future of AI: a Fascinating Journey - Ramon Lopez de Mantar...
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Knowledge Management and Artificial Intelligence
Knowledge Management and Artificial IntelligenceKnowledge Management and Artificial Intelligence
Knowledge Management and Artificial Intelligence
 
Lect # 2
Lect # 2Lect # 2
Lect # 2
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Artificial intelligence : what it is
Artificial intelligence : what it isArtificial intelligence : what it is
Artificial intelligence : what it is
 
Introduction to AI
Introduction to AIIntroduction to AI
Introduction to AI
 
presentation on Artificial intelligence by prince kumar kushwaha from rustamj...
presentation on Artificial intelligence by prince kumar kushwaha from rustamj...presentation on Artificial intelligence by prince kumar kushwaha from rustamj...
presentation on Artificial intelligence by prince kumar kushwaha from rustamj...
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligence
 
best presentation Artitficial Intelligence
best presentation Artitficial Intelligencebest presentation Artitficial Intelligence
best presentation Artitficial Intelligence
 
Introduction to Artificial Intelligence - Cybernetics Robo Academy
Introduction to Artificial Intelligence - Cybernetics Robo AcademyIntroduction to Artificial Intelligence - Cybernetics Robo Academy
Introduction to Artificial Intelligence - Cybernetics Robo Academy
 
Introduction to Artificial Intelligence and few examples
Introduction to Artificial Intelligence and few examplesIntroduction to Artificial Intelligence and few examples
Introduction to Artificial Intelligence and few examples
 
Fundamental Questions - The Second Decade of AI: Towards Architectures for Hu...
Fundamental Questions - The Second Decade of AI: Towards Architectures for Hu...Fundamental Questions - The Second Decade of AI: Towards Architectures for Hu...
Fundamental Questions - The Second Decade of AI: Towards Architectures for Hu...
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Artificial Intelligence Course- Introduction
Artificial Intelligence Course- IntroductionArtificial Intelligence Course- Introduction
Artificial Intelligence Course- Introduction
 

Viewers also liked

Ieee rules for paper presentation
Ieee rules for paper presentationIeee rules for paper presentation
Ieee rules for paper presentation
ffunny
 
Artificial intelligence in power systems
Artificial intelligence in power systems Artificial intelligence in power systems
Artificial intelligence in power systems
Riyas K H
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentation
lpaviglianiti
 

Viewers also liked (14)

Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Artificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper PresentationArtificial Intelligence Techniques In Power Systems Paper Presentation
Artificial Intelligence Techniques In Power Systems Paper Presentation
 
Bluetooth Abstract Paper Presentation
Bluetooth Abstract Paper PresentationBluetooth Abstract Paper Presentation
Bluetooth Abstract Paper Presentation
 
Ieee rules for paper presentation
Ieee rules for paper presentationIeee rules for paper presentation
Ieee rules for paper presentation
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Ieee paper format
Ieee paper formatIeee paper format
Ieee paper format
 
Artificial intelligence report
Artificial intelligence reportArtificial intelligence report
Artificial intelligence report
 
Artificial intelligence in power systems
Artificial intelligence in power systems Artificial intelligence in power systems
Artificial intelligence in power systems
 
Artificial Intelligence in Power Systems
Artificial Intelligence in Power SystemsArtificial Intelligence in Power Systems
Artificial Intelligence in Power Systems
 
Sample project abstract
Sample project abstractSample project abstract
Sample project abstract
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Artificial Intelligence Presentation
Artificial Intelligence PresentationArtificial Intelligence Presentation
Artificial Intelligence Presentation
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 

Similar to A Paper Presentation On Artificial Intelligence And Global Risk Paper Presentation

A Path Towards Autonomous Machines
A Path Towards Autonomous MachinesA Path Towards Autonomous Machines
A Path Towards Autonomous Machines
Alejandro Franceschi
 
Artificial intelligence and cognitive modeling have the same problem chapter2
Artificial intelligence and cognitive modeling have the same problem   chapter2Artificial intelligence and cognitive modeling have the same problem   chapter2
Artificial intelligence and cognitive modeling have the same problem chapter2
sabdegul
 
34_artificial_intelligence_1.ppt
34_artificial_intelligence_1.ppt34_artificial_intelligence_1.ppt
34_artificial_intelligence_1.ppt
AnkitKumar891632
 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computing
Er. rahul abhishek
 
271_AI Lect Notes.pdf
271_AI Lect Notes.pdf271_AI Lect Notes.pdf
271_AI Lect Notes.pdf
kaxeca4096
 

Similar to A Paper Presentation On Artificial Intelligence And Global Risk Paper Presentation (20)

A Path Towards Autonomous Machines
A Path Towards Autonomous MachinesA Path Towards Autonomous Machines
A Path Towards Autonomous Machines
 
Artificial intelligence and cognitive modeling have the same problem chapter2
Artificial intelligence and cognitive modeling have the same problem   chapter2Artificial intelligence and cognitive modeling have the same problem   chapter2
Artificial intelligence and cognitive modeling have the same problem chapter2
 
ar
arar
ar
 
Artificial intelligence uses in productive systems and impacts on the world...
Artificial intelligence   uses in productive systems and impacts on the world...Artificial intelligence   uses in productive systems and impacts on the world...
Artificial intelligence uses in productive systems and impacts on the world...
 
34_artificial_intelligence_1.ppt
34_artificial_intelligence_1.ppt34_artificial_intelligence_1.ppt
34_artificial_intelligence_1.ppt
 
Artificial intel
Artificial intelArtificial intel
Artificial intel
 
intelligent computing relating to cloud computing
intelligent computing relating to cloud computingintelligent computing relating to cloud computing
intelligent computing relating to cloud computing
 
Unit I What is Artificial Intelligence.docx
Unit I What is Artificial Intelligence.docxUnit I What is Artificial Intelligence.docx
Unit I What is Artificial Intelligence.docx
 
DakshSemwalcsA38
DakshSemwalcsA38DakshSemwalcsA38
DakshSemwalcsA38
 
DOC-20221019-WA0003..pdf
DOC-20221019-WA0003..pdfDOC-20221019-WA0003..pdf
DOC-20221019-WA0003..pdf
 
DOC-20221019-WA0003..pdf
DOC-20221019-WA0003..pdfDOC-20221019-WA0003..pdf
DOC-20221019-WA0003..pdf
 
Lec-01.ppt
Lec-01.pptLec-01.ppt
Lec-01.ppt
 
Ai notes
Ai notesAi notes
Ai notes
 
271_AI Lect Notes.pdf
271_AI Lect Notes.pdf271_AI Lect Notes.pdf
271_AI Lect Notes.pdf
 
Artificial-intelligence and its applications in medicine and dentistry.pdf
Artificial-intelligence and its applications in medicine and dentistry.pdfArtificial-intelligence and its applications in medicine and dentistry.pdf
Artificial-intelligence and its applications in medicine and dentistry.pdf
 
AIML-M1 and M2-TIEpdf.pdf
AIML-M1 and M2-TIEpdf.pdfAIML-M1 and M2-TIEpdf.pdf
AIML-M1 and M2-TIEpdf.pdf
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Artificial intelligence.pptx
Artificial intelligence.pptxArtificial intelligence.pptx
Artificial intelligence.pptx
 
Mis 008
Mis 008Mis 008
Mis 008
 
Cosc 208 lecture note-1
Cosc 208 lecture note-1Cosc 208 lecture note-1
Cosc 208 lecture note-1
 

More from guestac67362

5 I N T R O D U C T I O N T O A E R O S P A C E T R A N S P O R T A T I O...
5  I N T R O D U C T I O N  T O  A E R O S P A C E  T R A N S P O R T A T I O...5  I N T R O D U C T I O N  T O  A E R O S P A C E  T R A N S P O R T A T I O...
5 I N T R O D U C T I O N T O A E R O S P A C E T R A N S P O R T A T I O...
guestac67362
 
4 G Paper Presentation
4 G  Paper  Presentation4 G  Paper  Presentation
4 G Paper Presentation
guestac67362
 

More from guestac67362 (20)

5 I N T R O D U C T I O N T O A E R O S P A C E T R A N S P O R T A T I O...
5  I N T R O D U C T I O N  T O  A E R O S P A C E  T R A N S P O R T A T I O...5  I N T R O D U C T I O N  T O  A E R O S P A C E  T R A N S P O R T A T I O...
5 I N T R O D U C T I O N T O A E R O S P A C E T R A N S P O R T A T I O...
 
4 G Paper Presentation
4 G  Paper  Presentation4 G  Paper  Presentation
4 G Paper Presentation
 
Bluetooth Technology Paper Presentation
Bluetooth Technology Paper PresentationBluetooth Technology Paper Presentation
Bluetooth Technology Paper Presentation
 
Ce052391 Environmental Studies Set1
Ce052391 Environmental Studies Set1Ce052391 Environmental Studies Set1
Ce052391 Environmental Studies Set1
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communications
 
Bio Chip Paper Presentation
Bio Chip Paper PresentationBio Chip Paper Presentation
Bio Chip Paper Presentation
 
Bluetooth Paper Presentation
Bluetooth Paper PresentationBluetooth Paper Presentation
Bluetooth Paper Presentation
 
Bio Metrics Paper Presentation
Bio Metrics Paper PresentationBio Metrics Paper Presentation
Bio Metrics Paper Presentation
 
Bio Medical Instrumentation
Bio Medical InstrumentationBio Medical Instrumentation
Bio Medical Instrumentation
 
Basic Electronics Jntu Btech 2008
Basic Electronics Jntu Btech 2008Basic Electronics Jntu Btech 2008
Basic Electronics Jntu Btech 2008
 
Basic electronic devices and circuits
Basic electronic devices and circuitsBasic electronic devices and circuits
Basic electronic devices and circuits
 
Awp
AwpAwp
Awp
 
Automatic Speed Control System Paper Presentation
Automatic Speed Control System Paper PresentationAutomatic Speed Control System Paper Presentation
Automatic Speed Control System Paper Presentation
 
Artificial Neural Networks
Artificial Neural NetworksArtificial Neural Networks
Artificial Neural Networks
 
Automata And Compiler Design
Automata And Compiler DesignAutomata And Compiler Design
Automata And Compiler Design
 
Auto Configuring Artificial Neural Paper Presentation
Auto Configuring Artificial Neural Paper PresentationAuto Configuring Artificial Neural Paper Presentation
Auto Configuring Artificial Neural Paper Presentation
 
Artificial Neural Network Paper Presentation
Artificial Neural Network Paper PresentationArtificial Neural Network Paper Presentation
Artificial Neural Network Paper Presentation
 
Applied Physics Jntu Btech 2008
Applied Physics Jntu Btech 2008Applied Physics Jntu Btech 2008
Applied Physics Jntu Btech 2008
 
Application Of Shuntactive Power Filter Paper Presentation
Application Of Shuntactive Power Filter Paper PresentationApplication Of Shuntactive Power Filter Paper Presentation
Application Of Shuntactive Power Filter Paper Presentation
 
An Expert System For Power Plants Paper Presentation
An Expert System For Power Plants Paper PresentationAn Expert System For Power Plants Paper Presentation
An Expert System For Power Plants Paper Presentation
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

A Paper Presentation On Artificial Intelligence And Global Risk Paper Presentation

  • 1. www.studentyogi.com www.studentyogi.com A Paper Presentation on Artificial Intelligence co om & Global Risk m gi. .c oogi Abstract computer systems are becoming commonplace; indeed, they are almost ntyy ubiquitous. We find them central to the functioning of most business, governmental, military, environmental, and health-care organizations. They are also a part of many eent educational and training programs. But these computer systems, while increasingly affecting our lives, are rigid, complex and incapable of rapid change. To help us and our organizations cope with the unpredictable eventualities of an ever-more volatile world, t t dd these systems need capabilities that will enable them to adapt readily to change. They need to be intelligent. Our national competitiveness depends increasingly on capacities ssuu for accessing, processing, and analyzing information. The computer systems used for such purposes must also be intelligent. Health-care providers require easy access to information systems so they can track health-care delivery and identify the most recent w. . and effective medical treatments for their patients' conditions. Crisis management teams w must be able to explore alternative courses of action and support decision making. Educators need systems that adapt to a student's individual needs and abilities. Businesses ww require flexible manufacturing and software design aids to maintain their leadership ww position in information technology, and to regain it in manufacturing Software Risk Management is a proactive approach for minimizing the uncertainty and potential loss associated with a project. A risk is an event or condition that, if it occurs, www.studentyogi.com www.studentyogi.com
  • 2. www.studentyogi.com www.studentyogi.com has a positive or negative effect on a project’s objectives. The three common characteristics of risk are (1) it represents a future event, (2) it has a probability of occurring of greater than 0%, but less than 100%, and (3) the consequence of the risk must be unexpected or unplanned for. Future events can be categorized as opportunity- om focused (positive risk) if their consequences are favorable, or as threat-focused (negative risk) if their consequences are unfavorable. i.c og INTRODUCTION(Artificial intelligence) (AI) is a field of study based on the premise that intelligent thought can be regarded as a nty form of computation—one that can be formalized and ultimately mechanized. To achieve this, however, two major issues need to be addressed. The first issue is knowledge representation, and the second is knowledge manipulation. Within the intersection of these two issues lies mechanized intelligence de History The study of artificial intelligence has a long history, dating back to the work of British stu mathematician Charles Babbage (1791–1871) who developed a special-purpose "Difference Engine" for mechanically computing the values of certain polynomial functions. Similar work was also done by German mathematician Gottfried Wilhem von Leibniz (1646–1716), who introduced the first system of formal logic and constructed w. machines for automating calculation. George Boole, Ada Byron King, Countess of Lovelace, Gottlob Frege, and Alfred Tarski have all significantly contributed to the advancement of the field of artificial intelligence. ww Knowledge representation It has long been recognized that the language and models used to represent reality profoundly impact one's understanding of reality itself. When humans think about a particular system, they form a mental model of that system and then proceed to discover www.studentyogi.com www.studentyogi.com
  • 3. www.studentyogi.com www.studentyogi.com truths about the system. These truths lead to the ability to make predictions or general statements about the system. However, when a model does not sufficiently match the actual problem, the discovery of truths and the ability to make predictions becomes om exceedingly difficult. A classic example of this is the pre-Copernican model in which the Sun and planets revolved around the Earth. In such a model, it was prohibitively difficult to predict the position of planets. However, in the Copernican revolution this Earth-centric model was i.c replaced with a model where the Earth and other planets revolved around the Sun. This new model dramatically increased the ability of astronomers to predict celestial og events.Arithmetic with Roman numerals provides a second example of how knowledge representation can severely limit the ability to manipulate that knowledge. Both of these examples stress the important relationship between knowledge representation and nty thought. de stu w. ww Through artificial intelligence, engineers and computer scientists are capable of creating machines that perform dangerous tasks in place of humans. Here, a police robot handles a live bomb. www.studentyogi.com www.studentyogi.com
  • 4. www.studentyogi.com www.studentyogi.com In AI, a significant effort has gone into the development of languages that can be used to represent knowledge appropriately. Languages such as LISP, which is based on the lambda calculus, and Prolog, which is based on formal logic, are widely used for om knowledge representation. Variations of predicate calculus are also common languages used by automated reasoning systems. These languages have well-defined semantics and provide a very general framework for representing and manipulating knowledge i.c Knowledge manipulation og Many problems that humans are confronted with are not fully understood. This partial understanding is reflected in the fact that a rigid algorithmic solution—a routine and predetermined number of computational steps— cannot be applied. Rather, the concept nty of search is used to solve such problems. When search is used to explore the entire solution space, it is said to be exhaustive. Exhaustive search is not typically a successful approach to problem solving because most interesting problems have search spaces that are simply too large to be dealt with in this manner, even by the fastest computers. de Therefore, if one hopes to find a solution (or a reasonably good approximation of a solution) to such a problem, one must selectively explore the problem's search space stu The difficulty here is that if part of the search space is not explored, one runs the risk that the solution one seeks will be missed. Thus, in order to ignore a portion of a search space, w. some guiding knowledge or insight must exist so that the solution will not be overlooked. Heuristics is a major area of AI that concerns itself with how to limit effectively the exploration of a search space. Chess is a classic example where humans routinely employ ww sophisticated heuristics in a search space. A chess player will typically search through a small number of possible moves before selecting a move to play. Not every possible move and countermove sequence is explored. Only reasonable sequences are examined. A large part of the intelligence of chess players resides in the heuristics they employ www.studentyogi.com www.studentyogi.com
  • 5. www.studentyogi.com www.studentyogi.com A heuristic-based search results from the application of domain or problem-specific knowledge to a universal search function. The success of heuristics has led to focusing the application of general AI techniques to specific problem domains. This has led to the om development of expert systems capable of sophisticated reasoning in narrowly defined domains within fields such as medicine, mathematics, chemistry, robotics, and aviation. Another area that is profoundly dependent on domain-specific knowledge is natural language processing. The ability to understand a natural language such as English is one i.c of the most fundamental aspects of human intelligence, and presents one of the core challenges for the AI community. Small children routinely engage in natural language processing, yet it appears to be almost beyond the reach of mechanized computation. og Over the years, significant progress has been made in the ability to parse text to discover its syntactic structure. However, much of the meaning in natural language is context- dependent as well as culture-dependent, and capturing such dependencies has proved nty highly resistant to automation. Introduction(Global risk) de Providing insights to support informed decision making is the primary objective of Risk stu Management. In practice, Risk Management concentrates on performing bottom-up, detailed, continuous assessment of risk and opportunity. It focuses on addressing the day-to-day operational risks that a program faces. Risk Management follows a two-stage, repeatable and iterative process of assessment (i.e., the identification, estimation and evaluation of the risks confronting a program) and management (i.e., the planning for, monitoring of, and controlling of the means to eliminate or reduce the likelihood or consequences of the risks discovered). It is w. performed continually over the life of a program, from initiation to retirement. There are a variety of risks that confront the global software industry, as illustrated in Figure 1 [McManus, 2004], which will be discussed in more detail. The characteristics of the legal, social, economic and competitive environments impose constraints and opportunities that help to define ww the nature of the risks (and their exposure levels) for suppliers, buyers, and other stakeholders in the software acquisition and development process. process. www.studentyogi.com www.studentyogi.com
  • 6. www.studentyogi.com www.studentyogi.com om i.c og Figure 1: Risk and the Global Software Industry [McManus, 2004] nty The Concept Of Positive Risk Positive risk refers to risk that we initiate ourselves because we see a potential opportunity along with a potential for failure (the negative risk associated with “loss” of the opportunity). There are several kinds of opportunities that can be leveraged in projects if responses to them are well- de timed and prompt action is initiated [Kahkonen, 2001]. These include: • Business opportunities, e.g., product development, customer care during the project life cycle, and focused attention on high profit margin activities • Operational opportunities, e.g., value-added, do what is important, minimize rework stu • Systemic opportunities, which typically mean long-term savings resulting from improved safety, insurance, etc. The Most Common/Serious Software Risks w. There are numerous reasons as to why formal risk management is difficult to implement effectively. These include the sheer number of risk factors that have been identified in the literature. For example, Capers Jones assessed several hundred organizations and observed over 100 risk factors (of which 60 he discusses in detail in [Jones, 1994]). He observed, ww however, that few projects have more than 15 active risk factors at any one time, but many projects have approximately six simultaneous risk factors. Another reason for the relatively low implementation of formal risk management methods in practice are, according to [Kontio, 1998], the fact that risk is an abstract or fuzzy concept for which users lack the necessary tools to more accurately define risk for a deeper analysis. In addition, many risk management methods may be based on risk quantification. Users may not have the ability to provide accurate estimates for probability and loss/opportunity projections required for a reliable risk analysis. Table-based approaches can sometimes be too biased or too www.studentyogi.com www.studentyogi.com
  • 7. www.studentyogi.com www.studentyogi.com coarse for proper risk prioritization. Risks may also have different implications for different stakeholders (or, conversely, be perceived differently by different stakeholders). Existing risk management methods may not provide support for dealing with these differences. Risks may also affect a project in more than one way. For example, most risk management approaches focus on cost, schedule or quality risks, but there may be combinations of risks or other characteristics such as future required maintenance, company reputation, or potential om liability/litigation that should be considered important in influencing the decision-making process. Finally, many current risk management techniques may be perceived as too costly or too complex to use. Simple, straightforward risk management techniques that require an acceptable amount of time to produce results might be the answer. The Risk Management Map contains five evolutionary stages of risk management capability, defined as: i.c • Problem Stage: Describes circumstances when risk identification is not seen as positive. Characterized by lack of communication which causes a subsequent lack of coordination. Crisis management is used to address existing problems. Risks ignored or tracked in ad-hoc fashion. og • Mitigation Stage: Details a shift from crisis management to risk management. People become aware of risks but do not systematically confront them. There is uncertainty as to how to communicate risks. Risks are usually recorded, tracked and handled as discovered. nty • Prevention Stage: Discusses the shift of risk management as solely a manager’s activity to risk management as a team activity. This is a transitional stage from avoidance of risk symptoms to identification and elimination of root cause of risk, characterized by team, and sometimes customer, involvement. For risk management to succeed it must occur at each level within an organization. This stage represents a turning point from a reactive to a more proactive approach to risk management. de Risks systematically … analyzed, planned, tracked and resolved. • Anticipation Stage: Describes the shift from subjective to quantitative risk management, through the use of measures to anticipate predictable risks, that is characterized by the use of metrics to anticipate failures and predict future events. stu This stage involves the ability to learn from, adapt to, and anticipate change, representing a completely proactive approach to risk management. Quantified analysis used to determine resolution cost/benefit for the project. • Opportunity Stage: This represents a positive vision of risk management that is used to innovate and shape the future. Risks are perceived as an opportunity to save money and do better than planned. Risk, like quality, is everyone’s w. responsibility. A continuous process of identifying, communicating and resolving risks in an open and non-threatening environment is used. Admissions that some things are not known are acceptable and allowances are made for their existence using a best-case, worst-case scenario. Risk statistics are used to make organizational/process improvements. ww on a detailed plan that evolves over time. www.studentyogi.com www.studentyogi.com
  • 8. www.studentyogi.com www.studentyogi.com om i.c Conclusion og AI is a young field and faces many complexities. Nonetheless, the Spring nty 1998 issue of AI Magazine contained articles on the following innovative applications of AI: This is suggestive of the broad potential of AI in the future. 1. "Case- and Constraint-Based Project Planning for Apartment de Construction" 2. "CREWS–NS: Scheduling Train Crews in The Netherlands" 3. "An Intelligent System for Case Review and Risk Assessment in Social Services" stu 4. "CHEMREG: Using Case-Based Reasoning to Support Health and Safety Compliance in the Chemical Industry" 5. "MITA: An Information-Extraction Approach to the Analysis of Free- Form Text in Life Insurance Applications" w. Bibliography Luger, George F., and William A. Stubblefield. Artificial Intelligence: Structures and Strategies for Complex Problem Solving. Redwood City, CA: Benjamin/Cummings Publishing Company, 1993. ww Mueller, Robert A., and Rex L. Page. Symbolic Computing with LISP and Prolog. New York: Wiley and Sons, 1988. Russel, Stuart J., and Peter Norvig. Artificial Intelligence: A Modern Approach. Englewood Cliffs, NJ: Prentice Hall, 1994 www.studentyogi.com www.studentyogi.com
  • 9. www.studentyogi.com www.studentyogi.com om i.c og nty de stu w. ww www.studentyogi.com www.studentyogi.com