A Critical Conceptual Analysis of Definitions of Artificial Intelligence as Applicable to Computer Engineering
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
The purpose of artificial intelligence is to acquire knowledge of required subject. Knowledge acquisition involves knowledge of dark energy (74% of universe), knowledge of dark matter (22%) and knowledge of visible matter (4%). This knowledge can be gathered through biological sensors (5 senses) and non-biological sensors like, robot, TV, mobile, camera, microscopes, radar, computer etc. The present definitions of artificial intelligence cover only the computer portion of the visible word i.e., an iota of 4% hence are not complete. A complete definition is required to cover the entire universe and all the means of acquisition of intelligence through artificial means. This paper analyses all the existing definitions of artificial intelligence and recommends that “Artificial Intelligence is the mechanical simulation system of collecting knowledge and information and processing intelligence of universe: (collating and interpreting) and disseminating it to the eligible in the form of actionable intelligence
Authors and Affiliations
Prof Dalvinder Grewal
A Review on Quality Assurance of Component- Based SoftwareSystem
Abstract: Among the various challenges to industry, the major challenge is to offer products with high level ofquality andfunctionality at inexpensive value and short time and energy to market. Component-based softwarede...
An Intelligence System for Detection of Cancer and Diagnosis
Abstract: Currently the digital images are used in various areas like medical, fashion, architecture, face recognition, finger print recognition and bio metrics. Recently the CBIR reduced the semantic gap between t...
Upgrading the Performance of Speech Emotion Recognition at the Segmental Level
This paper presents an efficient approach for maximizing the accuracy of automatic speech emotion recognition in English, using minimal inputs, minimal features, lesser algorithmic complexity and reduced proces...
Enhancing Security of Multimodal Biometric Authentication System by Implementing Watermarking Utilizing DWT and DCT
Conventional personal identification techniques for instance passwords, tokens, ID card and PIN codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing &...
A Study of vampire Attack to Avoid the Intruders without Backtracking Method
Abstract: In a Wireless sensor network, every hub gathers the information and transmits all the information parcels to the sink hub utilizing any directing conventions. The directing Protocols are intended to be se...