Note: The original article is on authors website and on her medium account as well. Here are some questions that came out from current war between Hamas and Israel! How to detect terror attacks? How to find terrorists and their hiding places? How to take militants out so that the loss of common people’s lifeContinue reading “Terrorism detection using Artificial Intelligence #hamas_violence #israel.”
Category Archives: computer science
Telemedicine and AI
#ai #ml #artificialintelligence Telemedicine name started to be used in the 1970s [1]. It refers to treatments and medical directions being provided from a distance. These include the use of ICT, medical images, and medical data sharing with secure communications. Use of radiology from a distance, oncological services, gynae, respiratory illness treatment, and consultations allContinue reading “Telemedicine and AI”
Responsibility of AI Systems
#AI #Artificial_Intelligence #Ethics How do AI systems perform? Who measures the correctness of AI systems? In case of some problem, who is responsible for the cause? Who is to blame in the case of a mishappening? What if AI systems do not perform as they should have been? These are the questions that govern theContinue reading “Responsibility of AI Systems”
Trust in AI Products
AI products become popular on the basis of the trust of people in these systems. People and professionals use AI systems to ease their lives, while they can rely on these systems to organize work and business. AI systems can be used for profession, news, and entertainment, while some rely on AI tools to provideContinue reading “Trust in AI Products”
The Economics of Computer Hacking
Note: The article is present in duplicate on authors medium.com account as well. This is my review, summary and analysis of this well-written paper “The economics of computer hacking” [1]. There are various kinds of hackers. Some are driven only by fame others are driven by profit alone, and some by profession. The authors hereContinue reading “The Economics of Computer Hacking”