AI Fills In The Missing Gaps From Ancient Greece

At some point during the 5th century BC ancient Athens embraced a more aggressive foreign policy. The tributes demanded from allies grew larger, military actions against those who revolted more vicious. For decades historians have argued over whether it was the great general Pericles or a successor who oversaw this shift. 

Now, Artificial Intelligence (AI) has entered the debate and could bring ancient texts back to life. Researchers have developed an Artificial Intelligence (AI) model which deciphered texts missing from ancient Greek inscriptions and has even dated them, helping historians decipher ancient text. 

Ancient history relies on disciplines such as epigraphy, the study of inscribed texts known as inscriptions for evidence of the thought, language, society and history of past civilisations. However, over the centuries, many inscriptions have been damaged to the point of illegibility, transported far from their original location and their date of writing is steeped in uncertainty. 

AI is transforming many areas of research, and a new AI tool helps to fill in missing text and estimate the time-frame and geographical origin of ancient inscriptions. A system created by DeepMind has been “trained” to analyse decrees from the ancient Athenian empire.

These written records, carved in stone, reflect decisions made by the leaders of Athens but are often damaged. The team of AI researchers at DeepMind, working with colleagues from the University of Venice, the University of Oxford and Athens University of Economics and Business, has developed an AI application to help historians fill in the gaps of text missing from stone, metal or pottery artefacts. 

These AI and Machine Learning techniques are providing new tools that could help archaeologists understand the past, particularly when it comes to deciphering ancient texts.

DeepMind’s AI model not only restore text that is missing from ancient Greek inscriptions but offers suggestions for when the text was written, within a 30-year period, and its possible geographic origins. “Inscriptions are really important because they are direct sources of evidence ... written directly by ancient people themselves,” Thea Sommerschield, a distinguished historian and machine learning expert who has helped created the model, told journalists in a press briefing.

And new software, named Ithaca, is trained on a dataset of some 78,608 ancient Greek inscriptions, each of which is labelled with metadata describing where and when it was written, to the best of historians’ knowledge. Like all Machine Learning systems, Ithaca looks for patterns in this information, encoding this information in complex mathematical models, and uses these inferences to suggest text, date, and origins.

Nature:    Greek Reporter:    The Times:    The Verge:    TechXplore:    Techcrunch:    TRT:     

You Might Also Read:

Using Artificial Intelligence To Fight Cancer:

 

« The Limits Of Social Media Soft Power
Hacker Behind Kaseya Ransomware Attack Extradited »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

CyberSeek

CyberSeek

CyberSeek provides detailed, actionable data about supply and demand in the cybersecurity job market.

Seltek Technology Solutions

Seltek Technology Solutions

Seltek provides Digital Forensics, eDiscovery, Cybersecurity Assessments and IT Support services.

Zuratrust

Zuratrust

Zuratrust provide protection for all kinds of email related cyber attacks.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

GV (Google Ventures)

GV (Google Ventures)

GV provides venture capital funding to bold new companies in the fields of life science, healthcare, artificial intelligence, robotics, transportation, cyber security and agriculture.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

Aliro Security

Aliro Security

AliroNet is the world’s first entanglement Advanced Secure Network solution.

Minsait Cyber

Minsait Cyber

Minsait Cyber (formerly SIA Group) is the Indra Group's cybersecurity company, a leader in Spain and Portugal in terms of both revenue and expert talent, with more than 2,000 specialists.