You are on page 1of 13

ARTIFICIAL INTELLIGENCE ASSIGNMENT

1
Table of Contents
Part 1.....................................................................................................................................................3
Part 2.....................................................................................................................................................5
Part 3.....................................................................................................................................................7
Part 4.....................................................................................................................................................9
Part 5...................................................................................................................................................11
References...........................................................................................................................................13

2
Part 1
Pros and Cons of Ubiquitous Computing

UBIQUITOUS COMPUTING:

While ubiquitous computing might make many daily operations quicker and more cost-effective, it
can also jeopardise privacy and raise problems about user permission. Smart lighting and air
conditioning systems in a home enhanced by ubiquitous computing might communicate with
wearable sensors to monitor people' comfort levels. Using sensor data, the automated house can
continually modify the temperature and lighting to provide the most pleasant atmosphere possible.
This sort of solution can help to decrease waste while also promoting environmental sustainability.

PRO’S OF UBIQUITOUS COMPUTING:

1) HIDDEN: "Smart" settings will be implanted with machine learning that are mostly hidden from
view. Design will acquire numerous new possibilities while reducing image noise.

2) ASSOCIATION: Relationships with design will become more social. As computer user interfaces
embed themselves inside design, "smart" buildings will elicit a more social reaction from residents. 

3) CHOICE: "Intelligent" surroundings will assist inhabitants in making better decisions in their daily
lives. Such design will be proactive rather than reactive.

4) ARISING ACTIONS: Structures are getting more dynamic in both form and function. Their motions
and created designs interact dynamically to produce behaviours that improve their adaptability.

5) DATA ACQUISITION: Design will become a sort of "nervous system," information processing will
take on a new meaning. Design will shift from processing data to making meaning of data,
minimising the need for us to make frequent modifications.

6) EXPANDED KNOWLEDGE: Technology become more prevalent in our settings, sensors and
actuators will create "intelligent" environments with goal-oriented architectural space. As a result,
more inhabitant needs will be satisfied.

7) REALIGNMENT: Interconnected digital technology will complement much of our surroundings.


That connection will enable a new sort of "giving," which will help to reduce many boring jobs.
Additionally, when systems gather data from shared digital places, less mistakes will occur.

3
CON’S OF UBIQUITOUS COMPUTING:

IMPACT ON SECRECY: For the assist of security, medical, and manufacturing, modestly benefits are
projected; moderately negative consequences are expected in other application settings. There is a
risk that regular usage of this programme will result in inattentive handling of personal information.
This means that the early release of a game-changing ubiquitous computing application may result in
a lack of public attention to privacy protection during its critical phase of deployment.

MONETARY AFFECT: Work efficiency is predicted to increase as a result of the economic implications
related with ubiquitous computing. It is worth emphasizing that no major benefits in efficiency are
envisaged from ubiquitous computing for housework, professionals working from home, or
homecare for the old or unwell. The goal for incorporating ubiquitous computing into the smart
home is to promote personal comfort, which is not economically measurable.

There will be a digital divide between people who have access to ubiquitous computing and those
who do not. Small enterprises and retail, political minority, critics or sceptics, marginal groups, and
people with atypical backgrounds are among the other groups who may suffer as a result of
ubiquitous computing. Ubiquitous systems collect a large amount of sensitive personal data, and
handling this data requires negotiating legal, technological, and ethical issues.

4
Part 2
Artificial General Intelligence and real-time barriers of AGI

ARTIFICIAL GENERAL INTELLIGENCE:

The first objective of the AI area was to create "thinking machines or computer systems with human-
like general intelligence. Due to the difficulties of this job, the bulk of AI Experts have spent the
previous several decades focusing on what has been dubbed "limited AI" - the creation of AI systems
demonstrating intelligence for certain, extremely confined activities. There is a growing need for a
return to dealing with the more challenging concerns of "human level intellect" and, more broadly,
artificial general intelligence (AGI). The AGI conference series has played and continues to play an
important role in the revival of research on artificial intelligence in its broadest, most original
meaning.

GENERAL ARTIFICIAL INTELLIGENCE'S BARRIERS IN REALITY:

The concept of an agent with general intelligent ability is undoubtedly the authentic cruising view of
artificial intelligence (AI) research and dominates much of its international perception, and though
well almost every AI Technologies work is on unique property, much further eliminated from the
kind of overall ability - and regularly without descriptor Machine learning.

Members in the AGI group believe that the creative vision of living person general intelligence was
sound, and that the time has come to return to the roots because existing techniques are, in theory,
adequate to accomplish it in the near future.

There is little evidence to suggest that artificial intellect is unique in the universe of possibilities; it is
simple to envisage natural or manufactured intelligent beings that are considerably ahead of
humans.

There emerge to be reasons to believe that the advancement of AI, along with based systems, is
accelerating, so the creation of smart robots may further boost this development, establishing a
'statement from momentum' for the scientific theory that certain obstructive conversion will take
place.

Another prospect is that 'first super expert system is the final creation that human has to produce,
assuming also that device is gentle enough even to instruct humans how to operate it. When
elevated AI emerges, it will have a huge influence on mankind, particularly on humans' capacity to
determine own outcome on Earth. This control loss poses a huge hazard, maybe even an ultimate
threat to mankind.

5
The risk debate is not predicated on the belief that AGI is on a productive route to human-level AI -
however it becomes more pressing if such 'success' is a quasi-probability in the upcoming years. It
also becomes more pressing when the stakes are raised, even to the point of annihilation. When the
risk is too high, even a little chance (say, 3%) is enough to inspire the investigation.

Assume the possibility of a 3% chance that the flight about to board will crash: it's enough reason to
get off. The usefulness obtained from scientific or intellectual inquiry is typically much lower.

Per our latest analysis, the possibility of elevated deep learning (that exceeds people's capabilities in
practically all aspects) surpassing the 50% mark by 2050, i.e., it is more possible than it seems based
on whether one can believe such calculations, this volume.

6
Part 3
Advances In Digital Technology Led to An Invasion of Privacy

Actual human beings respect their privacy and the security of their personal lives. They appreciate
having something over which one realizes how about them. They surely want no one to have access
to their personal information at any moment. However, current improvements in information
technology have jeopardised privacy by reducing control over personal data and opening the door to
a variety of undesirable outcomes of private information. Genetics and the research methods of bio-
markers, neuroimaging, drones, monitoring devices and wireless sensors, media platforms, mobile
phones, closed circuit television, to administration cyber defence schemes, online sales, RFID tags,
Big Data, head-mounted presents, and browsers are almost always revolving around new
technology. There are essentially two responses to the flow of new technology and its impact on
sensitive data and privacy. 

 DIGITAL TECHNOLOGY ADVANCEMENTS

The term "digital technology" refers to automated methods for saving, analysing, and distributing
data. This usually entails the utilization of computers and communication networks. The quantity of
knowledge that can be kept or handled in an info system is influenced by the features offered.
According to Moore's law, technology's capacity has expanded fast over the last several generations.
This is true for storage space, computational power, and processing capacity.

The increasing advancement of cloud services raises several privacy problems. Earlier, while data
was accessible over the web, individual data and applications were still kept locally, prohibiting
application providers from data access and usage statistics. Both information and applications are
available (in the cloud) in cloud computing, and it is rarely apparent what client and device data are
utilised for. Furthermore, because data are situated all over the universe, it is often clear which laws
apply and which agencies might seek for the information. Data collected by internet services and
apps like search engines and gaming is of special importance here.

SURVEILLANCE

All types of surveillance duties make use of information technology. It may be used to supplement
and expand standard surveillance equipment such as CCTV as well as other surveillance systems, for
example, to identify specific persons in crowds using facial recognition algorithms, or to observe
specific locations for undesirable behaviour. When paired with other techniques, like monitoring
Internet-of-Things devices, such techniques become even more potent.

7
METHODS OF DESIGN

A theoretically based strategy to the development of technology that considers for social dignity in a
systematic and thorough way through out design process is provided by value sensitive design. It
offers a set of principles and recommendations for establishing a system with a specific goal in view.

IDENTIFYING SYSTEM

Using attribute-based authentication might be a better approach. It allows users to access internet
services according on their attributes such as friends, nationality, school, and so on. Individuals can
neither longer be tracked to other services because they are able use different qualities to access
various services, making it harder to identify online identities across many transactions, giving the
user with fragments. Recently, the notion of self-sovereign identification has evolved, with the goal
of giving consumers total ownership and control over their digital identities. Block chain technology
is utilised to allow consumers to govern their digital identities without the need for a regular trusted
third party.

8
Part 4
Sustainable Development Goals

From this module, I learnt the contribution of many researchers in the development of Artificial
Intelligence concepts. AI technologies are helpful in development of humans in various dimensions.
All the aspects of human life become smart by the application of AI technologies. Also, I understood
that AI evolved from various fields of science and mathematics. Though there many more benefits
for the future world, if this technology is not used with good thought and ethics, it will also become
a destructive thing against the humans.

The significant technology which helps to achieve the sustainable development of goals is the
Internet of Things. We can create "smart grids" that maximise renewable energy sources, when
possible, minimise outages and blackouts, and otherwise greatly enhance the dependability, quality,
and efficiency of energy consumption if energy use is fed into a central AI framework. Our
requirements will be met in a more and more precise manner as a result of deeply connected homes
and cities for example, if the refrigerator sees out of milk, it might order another one. Early
detection of electrical issues, health issues, and pandemics is also possible. Recently, there has been
a lot of interest in the relationship between artificial intelligence and climate change. AI can be used,
for instance, to manage environmental consequences and changes in a variety of economic contexts
and settings. These are just a few examples of potential uses, which also include safer supply chain
management, controlling the environmental issues, and predicting the weather. It is also predicted
that the application of AI technology solutions might reduce global greenhouse gas (GHG) emissions
by 4% in 2030. AI might result in millions of new employments across the global economy as a result
of this transition, increasing competitiveness and opening up more opportunities for competent
individuals which in turn achieve the sustainability development goals. The use of AI technology can
significantly contribute to environmental preservation. A better comprehension of the specific
behavioural patterns can improve the administration of protected areas. This can be especially
helpful for safeguarding water and the delicate environments it depends on. Wearable technology
that uses heart rate sensor data to identify early signs of diabetes is known as artificial intelligence
(AI) for health. The Nutrition Early Warning System uses big data and machine learning to identify
areas that are particularly vulnerable to food shortages, droughts, and floods, as well as to rising
food prices and soil erosion. The farmers that followed the advice and skipped planting season when
the drought hit saved a lot of money on planting expenses. Traffic signal systems, for instance, can
be set up utilising Internet of Things sensors and real-time traffic camera data to boost vehicle
throughput. AI might also be used to monitor the state of public transportation systems like

9
railroads and other forms of infrastructure used by the general public, such as bridges, in order to
identify potentially faulty components (Vinuesa, et al., 2020).

10
Part 5
Who you are designing the AI for?

A person's verbal or written output, facial expressions, tone of voice, body language, and several
other characteristics can all be used to diagnose a variety of mental and behavioural problems. AI
models in psychology and psychiatry will help patients maintain active self-care to ensure improved
sickness treatment and ideal mental and behavioural health.

What role is the AI designed to perform?

One potential application of AI in mental health is chatbots. Mental health chatbots give people who
are reluctant to seek out direct professional psychological and psychiatric help the chance to take
their first step toward self-care, despite the fact that mental disorders continue to be associated
with significant social stigma and that many people find it difficult to express their thoughts and
feelings in a direct manner. In this method, mental AI chatbots can provide initial support for those
who are not ready for professional or non-professional care and can supplement that support in
between contacts with psychologists, psychiatrists, and peers.

How should the AI act?

 Core principles of generally proclaimed responsible AI chatbots should include inclusivity,


fairness, security, and transparency.
 AI deployment that is secure, responsible, and ethical demands a coordinated, multidisciplinary,
and knowledgeable strategy.
 It must abide by all relevant rules and regulations to be considered lawful and ethical, to make
sure that moral standards and societal values are upheld.
 Reliable and trustworthy from a technological and social standpoint to guarantee predictability
in the outputs and consequences of AI-based solutions.
 The outcomes and interpretations produced by AI-based algorithms ought to be comprehensible
in light of accepted scientific theory.
 For all stakeholders to be able to make informed decisions, information on the development and
deployment must be readily accessible.
 Users should have control over the information that has been gathered about them in order to
create and construct AI systems for healthcare. The ability to access, change, or erase such data
from AI technology should always be available to users.

11
 The patient's privacy may be harmed by the improper outcomes that predictive algorithms of AI
technology may produce. Before using a prediction algorithm on participants or patients,
consent must be required.
 The medical, psychological, and social risks of using this AI system should be clearly disclosed to
patients, along with their advantages. The decision to accept or reject this system must be
completely up to the patient.
 AI systems are vulnerable to security attacks and can be used to acquire private and critical data,
endangering the security and privacy of patients' data as well. For its intended usage, the data
must be totally unidentified, offline, or delinked from the internet technology.
 There must be safeguards in place to prevent patients and participants from being subjected to
stigma or discrimination because of a health problem that artificial intelligence technologies may
uncover.
 A simple protocol should be established to prevent any spamming or improper activity on the
part of the user by guaranteeing that the conversation is immediately terminated when such
behaviour is discovered.
 The success and widespread use of AI depends critically on upholding the confidence of all
stakeholders, including the individual receiving healthcare, regarding the safe and secure use of
their data.
 In order for AI technologies to consistently perform while reducing unintended repercussions
and outputs, it is imperative that risks be considered in the design process.
 AI technologies should be developed in accordance with national legal and data protection
requirements and with careful attention to the fundamental ethical standards.

How should the AI not act?

 Any data that users provide to the bot during a discussion should not be gathered, utilised, or
sold without their permission.
 The chatbot should not use offensive language, be racially or sexist, or both.
 The integration of AI technology into the healthcare industry could hand decision-making over to
computers. Medical decision-making and the AI-based healthcare system should be entirely
under human control. Under no circumstances could AI technology interfere with patient
autonomy.
 The data used in AI systems should not be biased since AI is a data-driven technology, and as a
result, the results heavily depend on the data that was used to train and test the AI. This is
especially crucial in the field of AI for health because a dataset that is biased and insufficiently
large might result in problems with data mistakes, discrimination, and prejudice.

12
 The privacy of the patient should not be harmed by the improper outcomes that predictive
algorithms of AI technology may produce.
 The Chatbot should not behave such way that the user can feel that they are conversing with a
software program. They should feel that the human is conversing with them.

References
Berruti, F., Nel, P. & Whiteman, R., 2020. An executive primer on artificial general intelligence.
https://www.mckinsey.com/capabilities/operations/our-insights/an-executive-primer-on-artificial-
general-intelligence, pp. 1-1.

D’SOUZA, A. M., n.d. TECHNOLOGICAL ADVANCES LEADING TO THE DIMINISHING OF PRIVACY


RIGHTS. https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1014&context=stu_llm,
pp. 1-1.

Fatima, D. S., 2018. UBIQUITOUS COMPUTING: ADVANTAGES AND CHALLENGES. International


Journal of Computer Science and Mobile Applications, 6(4), pp. 217-221.

Heath, N., 2018. What is artificial general intelligence?. https://www.zdnet.com/article/what-is-


artificial-general-intelligence/, pp. 1-1.

hypr, 2022. Ubiquitous Computing. https://www.hypr.com/security-encyclopedia/ubiquitous-


computing, pp. 1-1.

Quach, S. et al., 2022. Digital technologies: tensions in privacy and data. Journal of the Academy of
Marketing Science, pp. 1299-1323.

Vinuesa, R. et al., 2020. The role of artificial intelligence in achieving the Sustainable Development
Goals. Nature Communications volume .

13

You might also like