Artificial Intelligence Is Too Narrow

Artificial Intelligence has made significant strides, but it still has a major constraint: narrowness.

The inherent limitation of AI today is its specificity. You can get a narrow AI application to take orders at the McDonald's drive-thru or beat the world's best chess and Go players. You can build AI software that drives cars with fewer accidents than humans.

You can also use AI for quality control in product assembly, diagnosing cancer or prequalifying mortgage applicants. However, the moment you change up the task even slightly, the AI tool is at a loss as to how to respond.

To understand the specificity issue of AI, it is key to look at the underlying core principle of how AI works today. The issue is rooted in the conceptual approach of approximating human decision-making by combining sets of algorithms into a model that is then rewarded for good responses to environmental stimuli and punished for bad ones.

The narrow AI of today is based on sophisticated algorithms and incredible amounts of brute force compute power. We define AI as an accumulation of better and better algorithms relying on better and better hardware to calculate their way out of narrowly defined challenges.

For example, when looking for a tumor on a CT image, an AI application sees combinations of individual pictures that have no meaning by themselves. However, different combinations of pixels in an image can be correlated with different probabilities of cancer being present.

This is a fundamentally different approach from how a human doctor looks for cancer. Instead of using abstract processing power, the doctor leverages her experience, skill and intuition to look for indications of cancer where they are most likely to occur. Ultimately, this can lead her to identify a few corner cases of cancer and, hopefully, save some lives by doing so.

On the other hand, the AI application is relentless in examining all of the available data, potentially yielding more thorough results than a human doctor. But the same AI program that can identify the rarest corner cases of lung cancer will not be able to diagnose bone cancer or even a broken leg because its set of training images were strictly focused on lung cancer.

Expert Go players are able to use sophisticated strategies and diversions when playing the board game, but they can't think through every obscure set of moves that is likely to lead to a game-winning trap much later down the road. An AI program can.

In its 2016 match against human champion Lee Sedol, Google subsidiary DeepMind Technologies Ltd.'s AlphaGo algorithm deployed a long-range game plan that didn't produce any immediate measurable gains on the board. However, DeepMind managed to incentivize the algorithm to explore unconventional strategies that increased the probability of it gaining significant advantages later in the game.

Of course, once AlphaGo used this spark of curiosity to abstractly calculate large sets of permutations that would play out over many turns, it knew how to win games by exploiting the limitations of the human brain. It is exactly this combination of the ability to tap into a full repository of what has worked in past games, explore strategies that are a bit out there, and then mercilessly implement the ones best suited to the situation on the board that makes AI algorithms unbeatable in most games.

First, the AI software takes a series of different guesses and observes the predictive accuracy of each guess as the model training begins. It then combines successful configurations from different models into one winning set of hyper-parameters that can be expected to yield the best result for the specific human-defined task.

This type of algorithmic curiosity is similar to our oncologist knowing where to start looking when evaluating a CT image for cancer. However, the auto-tuning of hyper-parameters or AlphaGo's auto-detection of human weaknesses still can't shake the brute force, iterative character of AI.

The AlphaGo developers made the correct assumption based on evolution theory that some degree of variation is needed to come up with spectacular wins. However, these guesses are initially random, without the human intuition -- or bias -- accumulated through experience and training.

The cheaper that compute power becomes, the more this variation can be introduced without too much cost impact, which could push AI past its lack of intuition. But can all of this lead to general artificial intelligence?

Conceptually, if we assume unlimited compute power and humans preparing a sufficiently large training set of text and multimedia data, a narrow AI application could jump from playing chess to playing Go, and from there to taking orders at your local burger joint. However, the dependent variable is still missing for a lot of potential AI use cases. And, in many cases, it has to be provided manually by humans as part of the training process.

It doesn't even end there. How does a human train a self-driving car on whether it's OK to run over an animal in a certain situation, or if it's better to apply the emergency brake when doing so could mean getting rear-ended by an 18-wheeler? The racist Chatbot that Microsoft inadvertently deployed in 2016 is only one of many examples where humans can provide a problematic frame of reference for an AI tool.

These questions that extend beyond the purely technical aspects of AI will continue to challenge the technology as it looks to extend beyond current applications that are narrow in scope.

SearchEnterpriseAI

You Might Also Read: 

Computers Say ‘No’ But AI’s Decisions Must Be Fair & Transparent:

Combating The Threat Of Malicious AI:

 

« Killer Robots Are A Revolution in Warfare
Six Benefits From Artificial Intelligence & Machine Learning »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Vantage Point Security

Vantage Point Security

Vantage Point are specialists in penetration testing and application security with a focus on the industries undergoing rapid digital transformation.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Cyclops

Cyclops

Cyclops is the first Contextual Search Platform for cybersecurity.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

COcyber

COcyber

COcyber aims to enhance collaboration between the cybersecurity civilian and defence spheres. It is a two-year project funded by the European Union and it kicked off in July 2024.

London School of Emerging Technology (LSET)

London School of Emerging Technology (LSET)

LSET's Cyber Security Unit is your premier destination for comprehensive cybersecurity education and training.