Artificial Intelligence Is Too Narrow

Artificial Intelligence has made significant strides, but it still has a major constraint: narrowness.

The inherent limitation of AI today is its specificity. You can get a narrow AI application to take orders at the McDonald's drive-thru or beat the world's best chess and Go players. You can build AI software that drives cars with fewer accidents than humans.

You can also use AI for quality control in product assembly, diagnosing cancer or prequalifying mortgage applicants. However, the moment you change up the task even slightly, the AI tool is at a loss as to how to respond.

To understand the specificity issue of AI, it is key to look at the underlying core principle of how AI works today. The issue is rooted in the conceptual approach of approximating human decision-making by combining sets of algorithms into a model that is then rewarded for good responses to environmental stimuli and punished for bad ones.

The narrow AI of today is based on sophisticated algorithms and incredible amounts of brute force compute power. We define AI as an accumulation of better and better algorithms relying on better and better hardware to calculate their way out of narrowly defined challenges.

For example, when looking for a tumor on a CT image, an AI application sees combinations of individual pictures that have no meaning by themselves. However, different combinations of pixels in an image can be correlated with different probabilities of cancer being present.

This is a fundamentally different approach from how a human doctor looks for cancer. Instead of using abstract processing power, the doctor leverages her experience, skill and intuition to look for indications of cancer where they are most likely to occur. Ultimately, this can lead her to identify a few corner cases of cancer and, hopefully, save some lives by doing so.

On the other hand, the AI application is relentless in examining all of the available data, potentially yielding more thorough results than a human doctor. But the same AI program that can identify the rarest corner cases of lung cancer will not be able to diagnose bone cancer or even a broken leg because its set of training images were strictly focused on lung cancer.

Expert Go players are able to use sophisticated strategies and diversions when playing the board game, but they can't think through every obscure set of moves that is likely to lead to a game-winning trap much later down the road. An AI program can.

In its 2016 match against human champion Lee Sedol, Google subsidiary DeepMind Technologies Ltd.'s AlphaGo algorithm deployed a long-range game plan that didn't produce any immediate measurable gains on the board. However, DeepMind managed to incentivize the algorithm to explore unconventional strategies that increased the probability of it gaining significant advantages later in the game.

Of course, once AlphaGo used this spark of curiosity to abstractly calculate large sets of permutations that would play out over many turns, it knew how to win games by exploiting the limitations of the human brain. It is exactly this combination of the ability to tap into a full repository of what has worked in past games, explore strategies that are a bit out there, and then mercilessly implement the ones best suited to the situation on the board that makes AI algorithms unbeatable in most games.

First, the AI software takes a series of different guesses and observes the predictive accuracy of each guess as the model training begins. It then combines successful configurations from different models into one winning set of hyper-parameters that can be expected to yield the best result for the specific human-defined task.

This type of algorithmic curiosity is similar to our oncologist knowing where to start looking when evaluating a CT image for cancer. However, the auto-tuning of hyper-parameters or AlphaGo's auto-detection of human weaknesses still can't shake the brute force, iterative character of AI.

The AlphaGo developers made the correct assumption based on evolution theory that some degree of variation is needed to come up with spectacular wins. However, these guesses are initially random, without the human intuition -- or bias -- accumulated through experience and training.

The cheaper that compute power becomes, the more this variation can be introduced without too much cost impact, which could push AI past its lack of intuition. But can all of this lead to general artificial intelligence?

Conceptually, if we assume unlimited compute power and humans preparing a sufficiently large training set of text and multimedia data, a narrow AI application could jump from playing chess to playing Go, and from there to taking orders at your local burger joint. However, the dependent variable is still missing for a lot of potential AI use cases. And, in many cases, it has to be provided manually by humans as part of the training process.

It doesn't even end there. How does a human train a self-driving car on whether it's OK to run over an animal in a certain situation, or if it's better to apply the emergency brake when doing so could mean getting rear-ended by an 18-wheeler? The racist Chatbot that Microsoft inadvertently deployed in 2016 is only one of many examples where humans can provide a problematic frame of reference for an AI tool.

These questions that extend beyond the purely technical aspects of AI will continue to challenge the technology as it looks to extend beyond current applications that are narrow in scope.

SearchEnterpriseAI

You Might Also Read: 

Computers Say ‘No’ But AI’s Decisions Must Be Fair & Transparent:

Combating The Threat Of Malicious AI:

 

« Killer Robots Are A Revolution in Warfare
Six Benefits From Artificial Intelligence & Machine Learning »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

Cyber 2.0

Cyber 2.0

Cyber 2.0 is the only system in the world that blocks all forms of cyber attack within the organization, including new and unfamiliar attack methods.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

Trapmine

Trapmine

TRAPMINE is an innovative cybersecurity products company mainly focusing on protecting organizations from Advanced Persistent Threat & Zero-Day attacks.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

Check Point Software Technologies

Check Point Software Technologies

Check Point Software Technologies is a leading provider of cyber security solutions to governments and corporate enterprises globally.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

Intellinexus

Intellinexus

Intellinexus turns data into actionable insights to revolutionise decision-making in your business.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.

Amtivo Group

Amtivo Group

Amtivo provides Certification, Inspection and Training services to national and local Government bodies, multi-nationals, enterprise clients and SMEs.

ITConnexion

ITConnexion

ITConnexion is an Australian-based Managed IT Service with over 20 years of experience. We offer a complete IT management service for non-profits, SMEs, and enterprises.