The artificial intelligence (AI) pioneer Geoffrey Hinton recently resigned from Google, warning of the dangers of the technology “becoming more intelligent than us.” His fear is that AI will one day succeed in “manipulating people to do what it wants.”The artificial intelligence (AI) pioneer Geoffrey Hinton recently resigned from Google, warning of the dangers of the technology “becoming more intelligent than us.” His fear is that AI will one day succeed in “manipulating people to do what it wants.”Consumer & Gadgets[#item_full_content]
AI tools based on artificial neural networks (ANNs) are being introduced in a growing number of settings, helping humans to tackle many problems faster and more efficiently. While most of these algorithms run on conventional digital devices and computers, electronic engineers have been exploring the potential of running them on alternative platforms, such as diffractive optical devices.AI tools based on artificial neural networks (ANNs) are being introduced in a growing number of settings, helping humans to tackle many problems faster and more efficiently. While most of these algorithms run on conventional digital devices and computers, electronic engineers have been exploring the potential of running them on alternative platforms, such as diffractive optical devices.Electronics & Semiconductors[#item_full_content]
Soft robotics have several key advantages over rigid counterparts, including their inherent safety features—soft materials with motions powered by inflating and deflating air chambers can safely be used in fragile environments or in proximity with humans—as well as their flexibility that enables them to fit into tight spaces. Textiles have become a choice material for constructing many types of soft robots, especially wearables, but the traditional “cut and sew” methods of manufacturing have left much to be desired.Soft robotics have several key advantages over rigid counterparts, including their inherent safety features—soft materials with motions powered by inflating and deflating air chambers can safely be used in fragile environments or in proximity with humans—as well as their flexibility that enables them to fit into tight spaces. Textiles have become a choice material for constructing many types of soft robots, especially wearables, but the traditional “cut and sew” methods of manufacturing have left much to be desired.[#item_full_content]
Researchers at Rutgers University have found a major flaw in the way that algorithms designed to detect “fake news” evaluate the credibility of online news stories.Researchers at Rutgers University have found a major flaw in the way that algorithms designed to detect “fake news” evaluate the credibility of online news stories.[#item_full_content]
Artificial intelligence-powered writing assistants that autocomplete sentences or offer “smart replies” not only put words into people’s mouths, they also put ideas into their heads, according to new research.Artificial intelligence-powered writing assistants that autocomplete sentences or offer “smart replies” not only put words into people’s mouths, they also put ideas into their heads, according to new research.[#item_full_content]
High-performance computing (HPC) has become an essential tool for processing large datasets and simulating nature’s most complex systems. However, researchers face difficulties in developing more intensive models because Moore’s Law—which states that computational power doubles every two years—is slowing, and memory bandwidth still cannot keep up with it. But scientists can speed up simulations of complex systems by using compression algorithms running on AI hardware.High-performance computing (HPC) has become an essential tool for processing large datasets and simulating nature’s most complex systems. However, researchers face difficulties in developing more intensive models because Moore’s Law—which states that computational power doubles every two years—is slowing, and memory bandwidth still cannot keep up with it. But scientists can speed up simulations of complex systems by using compression algorithms running on AI hardware.[#item_full_content]
You may be one of those waiting for the quantum computer, the arrival of which we have been told is imminent for several years. Already at this point, DTU Associate Professor Sven Karlsson begins to look a little strained, because among his partners are the two European companies AQT and IQM which produce and sell quantum computers.You may be one of those waiting for the quantum computer, the arrival of which we have been told is imminent for several years. Already at this point, DTU Associate Professor Sven Karlsson begins to look a little strained, because among his partners are the two European companies AQT and IQM which produce and sell quantum computers.[#item_full_content]
An experiment in which two people play a modified version of Tetris—the 40-year-old block-stacking video game—revealed that players who get fewer turns perceive the other player as less likable, regardless of whether a person or an algorithm allocates the turns.An experiment in which two people play a modified version of Tetris—the 40-year-old block-stacking video game—revealed that players who get fewer turns perceive the other player as less likable, regardless of whether a person or an algorithm allocates the turns.[#item_full_content]
Biometric speech recognition systems are often subject to various spoofing attacks, the most common of which are speech synthesis and speech conversion attacks. These spoofing attacks can cause the biometric speech recognition system to incorrectly accept these spoofing attacks, which can compromise the security of this system. Researchers have made many efforts to address this problem. But existing voice spoofing detection methods only consider the physical features of speech, resulting in poor detection performance.Biometric speech recognition systems are often subject to various spoofing attacks, the most common of which are speech synthesis and speech conversion attacks. These spoofing attacks can cause the biometric speech recognition system to incorrectly accept these spoofing attacks, which can compromise the security of this system. Researchers have made many efforts to address this problem. But existing voice spoofing detection methods only consider the physical features of speech, resulting in poor detection performance.[#item_full_content]
Although few-shot learning (FSL) has achieved great progress, it is still an enormous challenge especially when the source and target sets are from different domains, which is also known as cross-domain few-shot learning (CD-FSL). Utilizing more source domain data is an effective way to improve the performance of CD-FSL. However, knowledge from different source domains may entangle and confuse with each other, which hurts the performance on the target domain.Although few-shot learning (FSL) has achieved great progress, it is still an enormous challenge especially when the source and target sets are from different domains, which is also known as cross-domain few-shot learning (CD-FSL). Utilizing more source domain data is an effective way to improve the performance of CD-FSL. However, knowledge from different source domains may entangle and confuse with each other, which hurts the performance on the target domain.[#item_full_content]