Human intelligence in culture - artificial intelligence, Computer Engineering

Assignment Help:

Human intelligence in culture:

Understand human intelligence in culture 

"AI" can be seen as just the latest tool in the philosopher's toolbox for answering questions about the nature of human intelligence, by the following in the footsteps of mathematical analysis, logic, biology, psychology, fundamental research with cognitive science and others. Some basic obvious questions that philosophy has arrived with are: "We know that we are more 'intelligent' than the other animals, but what does this actually mean?" and "How many of the activities which we call intelligent can be replicated by computation (e.g.-'algorithmically')?"

For example, the ELIZA program discussed below is a classic example from the sixties where a very simple program raised some serious questions about the nature of human intelligence. Amongst other things, ELIZA (primitive natural language processing)helped philosophers and psychologists to question the notion of what it means to 'understand' in natural language (e.g., English) conversation. By stating that "AI" helps us understand the nature of human intelligence  in society, we should note that "AI" researchers are increasingly studying multi-tasking systems, which are, roughly speaking, collections of "AI" programs able to communicate and cooperate/compete on small tasks towards the completion of larger tasks. This sense that the social, rather than individual, nature of intelligence is now a issue within range of computational studies in simulation of Artificial Intelligence. 

Obviously, humans are not the only life-forms, and the questions of life (contain intelligent life) poses even bigger and tough questions. In fact some Artificial Life  ('A'Life) researchers have grand plans for their software.


Related Discussions:- Human intelligence in culture - artificial intelligence

Password, A phonetic password generator picks two segments randomly for eac...

A phonetic password generator picks two segments randomly for each six letter password. form is CVC. what is the total password population? 1> what is the total password population

Could tcp allow ip to checksum the data, Could TCP allow IP to checksum the...

Could TCP allow IP to checksum the data? TCP cannot permit IP to checksum data yet IP has its own checksum for its header. IP layer is fundamentally responsible for routing of

Use of arrays in assembly, An array is referencing using a base array value...

An array is referencing using a base array value as well as an index. To simplify addressing in arrays 8086 has provided two index registers for mathematical computations viz. BP a

#chemistry, Please explain the construction and working of calomel electrod...

Please explain the construction and working of calomel electrode..

What is an activex interface, An ActiveX interface is a group of linked fun...

An ActiveX interface is a group of linked functions that are grouped together

What is uml, ? UML is called as Unified Modeling Language. ? it is used...

? UML is called as Unified Modeling Language. ? it is used to Graphical language for visualizing artifacts of the system. ? It Allow to make a blue print of all the aspects

What is called when distortion caused on telephone line, Distortion caused ...

Distortion caused on telephone line by an adjacent one is called (A) Cross Fire                      (B) Inductive Disturbance (C)  Cross Talk                     (D) Non

Give example of real time processing, Give example of Real time (transactio...

Give example of Real time (transaction) processing Using this illustration of booking seats on a flight, below sequence of events would occur: -  Customer/travel agent conta

m-files and the power point presentation, Power point presentation Arra...

Power point presentation Arrange a 20 minutes power point presentation showing the original and processed filters.  Discuss the methods used for processing and comment on each r

Determine about the security- accidental damage, Determine about the securi...

Determine about the security- accidental damage accidental damage is best guarded against by keeping back up files or use Grandfather-Father-Son (GFS) method; also use of passw

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd