Artificial Intelligence Oriented Security System Using Alexa

Author(s):  
Gandu Harilatha ◽  
K. Riyazuddin
2018 ◽  
Vol 7 (4.38) ◽  
pp. 82
Author(s):  
Aleksey Valentinovich Bogdanov ◽  
Igor Gennadievich Malygin

The paper considers the conceptual provisions of building a promising cognitive information security system of the museum complex on a cyber-physical basis. The stratified model of cognitive information security system of the museum complex was presented. It was shown that the key technological platform for the security of the museum complex is information and network technologies integrated (converged) with the technologies of industrial artificial intelligence. The generalized structural scheme of the cognitive cycle of the information security system of the museum complex was considered. The characteristic of the basic processes realized in a cognitive contour was given.   


2021 ◽  
pp. 55-56
Author(s):  
М.В. Свирина

Рассматриваются тенденции развития искусственного интеллекта как основы обеспечения экономической безопасности. This article examines the trends in the development of artificial intelligence as the basis for ensuring economic security.


2012 ◽  
Vol 271-272 ◽  
pp. 488-492
Author(s):  
Ji Ming Yan ◽  
Zhi Ping Guo ◽  
Hong Li Gao ◽  
Bei Bei Zheng ◽  
Yong Hong Dai ◽  
...  

This paper proposes to establish a CNC machine tool security system using artificial intelligence-based, and discusses the key technologies: the dynamic fuzzy neural network(DFNN), and based on this, describes an established security system of CNC machine tool.


Author(s):  
A.M. Turobov ◽  
M.G. Mironyuk

How does the state security system evolve under the influence of the artificial intelligence technology? To answer this question, an empirical model is proposed. The model evaluates the state security system (by the example of the USA) using the security consistency parameter, which estimates how the state perceives threats (indicator of threats) and whether the state has the necessary capabilities to counter them (indicator of capabilities) in relation to the artificial intelligence technology. The model (as well as the conceptualization of the artificial intelligence technology in the context of the security domain) provides evidence of how security transformations occur. It serves as a tool for studying the corresponding changes and assessing the state security system. It is necessary to indicate the limitation of the study: we do not consider direct military applications in the field of automation and algorithms (artificial intelligence technology). The validation of the empirical model has been undertaken using the case of the USA (eight-time intervals are subject to analysis, namely: 1999, 2002, 2006, 2010, 2012, 2015, 2017, 2019). With the development of the technology itself, the “interest” of the state and the definition of threats, as well as the rapid growth of the capabilities of the artificial intelligence technology (coincides with the years of maximum progress in computing power and the introduction of new algorithms) are growing, and since 2012, the dynamic has been linear, since more new “discoveries” have contributed to evolutionary rather than “revolutionary” growth trajectory. The developed model is scalable. This feature may be useful in the empirical security studies: the artificial intelligence technology within the model can be replaced with other types of digital technologies (for example, big data, cloud computing or 5 g connection technologies, etc.); thus, empirical models of security consistency under the impact of other technologies can be developed. The approach proposed allows to under take cross-country comparisons with respect to specific types of digital technologies and their interactions with the security domain.


Author(s):  
Sergio Ordoñez ◽  
Omar González ◽  
Miguel Obregón ◽  
Juan Mendoza ◽  
Joaquín Lara

2022 ◽  
Vol 2022 ◽  
pp. 1-11
Author(s):  
Yanqing Chen

At present, many companies have many problems such as high financial costs, low financial management capabilities, and redundant frameworks; at the same time, the SASAC requires that the enterprise’s financial strategy transfer from “profit-driven” to “value-driven”, finance separate from accounting to improve the operational efficiency of the company. Under this background, more and more enterprise respond to the call of the SASAC; in order to achieve the goals of corporate financial cost savings and financial management efficiency improved, we began to provide services through financial sharing. The research of information fusion theory involves many basic theories, which can be roughly divided into two large categories from the algorithmic point of view: probabilistic statistical method and artificial intelligence method. The main task of artificial intelligence is to realize the computer for some learning, thinking process, and wisdom formation of simulation, and an important goal of information integration is the human brain comprehensive processing ability simulation, so artificial intelligence method will have broad application prospects in the field of information fusion; the common methods have D-S evidence reasoning, fuzzy theory, neural network, genetic algorithm, rough set, and other information fusion methods. The purpose of this paper is to proceed from the internal financial situation of the enterprise, analyze data security issues in the operation of financial shared services, and find a breakthrough in solving problems. But, with constantly expanding of enterprise group financial sharing service scale, the urgent problem to be solved is how to ensure the financial sharing services provided by enterprises in the cloud computing environment. This paper combines financial sharing service theory and information security theory and provides reference for building financial sharing information security for similar enterprises. For some enterprise that have not established a financial shared service center yet, they can learn from the establishment of the financial sharing information security system in this paper and provide a reference for enterprise to avoid the same types of risks and problems. For enterprise that has established and has begun to practice a financial shared information security system, appropriate risk aversion measures combined with actual situation of the enterprise with four dimensions related to information security system optimization was formulated and described in this paper. In summary, in the background of cloud computing, financial sharing services have highly simplified operational applications, and data storage capabilities and computational analysis capabilities have been improved greatly. Not only can it improve the quality of accounting information but also provide technical support for the financial sharing service center of the enterprise group, perform financial functions better, and enhance decision support and strategic driving force, with dual practical significance and theoretical significance.


2020 ◽  
Vol 1 (154) ◽  
pp. 272-287
Author(s):  
V. Tiutiunyk ◽  
L. Chernogor ◽  
V. Kalugin ◽  
T. Agazade

In conditions of uneven distribution of sources of danger across the territory of the state, each territory has its own levels of natural, technogenic, social and military loads, which influence on the composition of forces, tactical and technical characteristics of the means of the functioning geoinformation security system, namely the national security system. In Ukraine the civil defense system is functioning to ensure the implementation of state policy in the field of civil defense for protection of the population, territories, environment and property from emergencies by preventing such situations, eliminating their consequences and providing assistance to victims in peacetime and during a special period. The system consists of functional and territorial subsystems and is aimed to solving the issues of ensuring the necessary level of security of the state in the conditions of emergency. At the same time, the issues of implementation of the monitoring function and development of effective decisions by all local subsystems, which aimed at prevention and localization of different emergencies, remain completely open to the state. In this paper in order to further develop the scientific and technical foundations for creating an artificial intelligence system for monitoring emergencies of tectonic origin have been presented the results of a mathematical description of the hierarchical clustering local territories of the globe in terms of the amount and of destructive energy of tectonic origin emergency situations. The results have been obtained by discriminant and canonical multivariate statistical analysis of the Earth's seismic activity in the Sun – Earth – Moon nonlinear energy interaction system. The discriminant and canonical analyzes of the results of hierarchical clustering (zoning) of the local territories of the globe according to the level of seismic activity were carried out using the statistical packages STATISTICA 6.1 and SPSS 2.0. The results obtained in this work are the basis for further comprehensive assessment of the interconnections between the main parameters of the Earth’s movement in the Sun – Earth – Moon system and the main parameters of the tectonic hazard of seismically active local territories of the Earth, aimed at developing the scientific and technical foundations for creating an artificial intelligence system for monitoring emergencies of tectonic origin. Keywords: emergency, seismic activity, seismic hazard, emergency monitoring of tectonic origin, discriminant analysis, canonical analysis


This research abstract shares open source theme smart materials and technology for the Current and Future Global Challenges in relation with artificial intelligence which is the simulation of human intelligence processes by machines, especially computer systems. AI will also have a major impact on illegal/illicit /legal harmful drugs, chemicals, toxic herbs and others Control Intervention. the patent pending this scientific computing innovation; will include illegal/illicit/ legal harmful drugs, chemicals, toxic herbs and others Control security system and special purpose computer connected intelligent equipment’s, with sensors capable of taking thousands of measurements throughout the production process and generating billions of data points used to monitor, analyze and control the trafficking process. AI and machine learning are also contributing to the development of next-generation security system, accelerating the development of security intervention for conditions where there are no viable options today. Artificial intelligence promises both to improve existing goods and services, by enabling the automation of many tasks, to greatly increase the efficiency with which they are produced. But it may have an even larger impact on the economy by serving as a new general-purpose method of invention for unique or special tasks; Where Artificial intelligence (AI) clearly lead to better outcomes, already producing benefits and optimizing processes, increasingly sophisticated algorithms and machine learning techniques of data on a particular issue, generate insights, detections and resulting with more efficiency than teams of humans ever could.


Sign in / Sign up

Export Citation Format

Share Document