Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

The Ratio Method: Addressing Complex Tort Liability In The Fourth Industrial Revolution, Harrison C. Margolin, Grant H. Frazier Oct 2021

The Ratio Method: Addressing Complex Tort Liability In The Fourth Industrial Revolution, Harrison C. Margolin, Grant H. Frazier

St. Mary's Law Journal

Emerging technologies of the Fourth Industrial Revolution show fundamental promise for improving productivity and quality of life, though their misuse may also cause significant social disruption. For example, while artificial intelligence will be used to accelerate society’s processes, it may also displace millions of workers and arm cybercriminals with increasingly powerful hacking capabilities. Similarly, human gene editing shows promise for curing numerous diseases, but also raises significant concerns about adverse health consequences related to the corruption of human and pathogenic genomes.

In most instances, only specialists understand the growing intricacies of these novel technologies. As the complexity and speed of …


Deep Fakes: The Algorithms That Create And Detect Them And The National Security Risks They Pose, Nick Dunard Sep 2021

Deep Fakes: The Algorithms That Create And Detect Them And The National Security Risks They Pose, Nick Dunard

James Madison Undergraduate Research Journal (JMURJ)

The dissemination of deep fakes for nefarious purposes poses significant national security risks to the United States, requiring an urgent development of technologies to detect their use and strategies to mitigate their effects. Deep fakes are images and videos created by or with the assistance of AI algorithms in which a person’s likeness, actions, or words have been replaced by someone else’s to deceive an audience. Often created with the help of generative adversarial networks, deep fakes can be used to blackmail, harass, exploit, and intimidate individuals and businesses; in large-scale disinformation campaigns, they can incite political tensions around the …


Research On The Issues Of Next Generation Wargame System Model Engine, Yubo Tang, Bilong Shen, Shi Lei, Yi Xing Sep 2021

Research On The Issues Of Next Generation Wargame System Model Engine, Yubo Tang, Bilong Shen, Shi Lei, Yi Xing

Journal of System Simulation

Abstract: Aiming at the more and more complex war systems, widely used artificial intelligence technology is needed to make up the human deficiencies in future wargame deduction, which is necessary for the next generation wargame system model engine. To address these challenges, a framework prototype of the next generation wargame model engine based on the experience of the long-term development and application is proposed. The decoupling method for the complexity of structure and computation is researched. The human-computer integration architecture on digital twinning technology is studied. Some new modeling techniques which the threshold of model development is reduced and the …


The Power Of The "Internet Of Things" To Mislead And Manipulate Consumers: A Regulatory Challenge, Kate Tokeley Apr 2021

The Power Of The "Internet Of Things" To Mislead And Manipulate Consumers: A Regulatory Challenge, Kate Tokeley

Notre Dame Journal on Emerging Technologies

The “Internet of Things” revolution is on its way, and with it comes an unprecedented risk of unregulated misleading marketing and a dramatic increase in the power of personalized manipulative marketing. IoT is a term that refers to a growing network of internet-connected physical “smart” objects accumulating in our homes and cities. These include “smart” versions of traditional objects such as refrigerators, thermostats, watches, toys, light bulbs, cars, and Alexa-style digital assistants. The corporations who develop IoT are able to utilize a far greater depth of data than is possible from merely tracking our web browsing in regular online environments. …