Why should everybody learn Artificial Intelligence?

Digital or visual media


Turner, S. and Souag, A. 2022. Why should everybody learn Artificial Intelligence? ETD blog, Canterbury Christ church University
CreatorsTurner, S. and Souag, A.
Description

Blog post on Why should everybody learn Artificial Intelligence?

Artificial Intelligence (AI) is not science fiction. It is around us now (e.g., for automatic plate number recognition, credit-card fraud detection), and it is here to remain. AI is also not just one technology, but a range of technologies inspired by everything from how the brain works to how ants find food. These allow computers to appear intelligent and apply more focused processing power than the human brain can produce, though usually only to narrowly defined tasks. This is why AI technology has become so important to the modern economy. AI is here and working now.

KeywordsArtificial Intelligence; AI; Society
Date08 Nov 2022
Place of publicationETD blog, Canterbury Christ church University
Web address (URL)https://blogs.canterbury.ac.uk/engineering/why-should-everybody-learn-artificial-intelligence/
Files
Media type
Website
File Access Level
Open
References

[1] Kok, J.N., Boers, E.J., Kosters, W.A., Van der Putten, P. and Poel, M., 2009. Artificial intelligence: definition, trends, techniques, and cases. Artificial intelligence, 1, pp.270-299.

[2] https://www.swlondoner.co.uk/news/20052022-skills-shortage-stalls-uk...

Publication process dates
Deposited28 Nov 2022
Permalink -

https://repository.canterbury.ac.uk/item/9338v/why-should-everybody-learn-artificial-intelligence

  • 67
    total views
  • 0
    total downloads
  • 4
    views this month
  • 0
    downloads this month

Export as

Related outputs

Cancer: Investigating the impact of the implementation platform on machine learning models
Olowolayemo, A. S., Souag, A. and Sirlantzis, K. 2024. Cancer: Investigating the impact of the implementation platform on machine learning models. in: Mengoni, M. and Souag, A. (ed.) AIHealth 2024, The First International Conference on AI-Health ThinkMind.
The role of use cases when adopting augmented reality into higher education pedagogy
Ward, G., Turner, S., Pitt, C., Qi, M., Richmond-Fuller, A. and Jackson, T. 2024. The role of use cases when adopting augmented reality into higher education pedagogy.
The National Teaching Repository and social media
Turner, S., Faulkner, S and Withnell, N 2023. The National Teaching Repository and social media. https://doi.org/10.25416/NTR.24942471.v1
Trustworthy Insights: A Novel Multi-Tier Explainable framework for ambient assisted living
Kasirajan, M., Azhar, H. and Turner, S. 2023. Trustworthy Insights: A Novel Multi-Tier Explainable framework for ambient assisted living . https://doi.org/10.1109/TrustCom60117.2023.00357
The National Teaching Repository − Sharing effective interventions: Learning from each other so that we can continue to enhance and improve what we do
Turner, S., Beckingham, S, Bullingham, L, Hartley, P, Cuthbert, K, Irving-Bell, D, Wooff, D, Tasler, N, Stinson, L and Withnell, N 2023. The National Teaching Repository − Sharing effective interventions: Learning from each other so that we can continue to enhance and improve what we do. Educational Developments. 24 (2), pp. 5-7.
An intelligent routing approach for multimedia traffic transmission over SDN
Jameel, Mohammed Al, Kanakis, Triantafyllos, Turner, Scott, Al-Sherbaz, Ali, Bhaya, Wesam S. and Al-khafajiy, Mohammed 2023. An intelligent routing approach for multimedia traffic transmission over SDN. in: IEEE.
Optimizing artificial neural networks using LevyChaotic mapping on Wolf Pack optimization algorithm for detect driving sleepiness
Turner, S., Jassin, S.S. and Hassan, A.K.A 2022. Optimizing artificial neural networks using LevyChaotic mapping on Wolf Pack optimization algorithm for detect driving sleepiness. Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE). 22 (3), pp. 128-136. https://doi.org/10.33103/uot.ijccce.22.3.12
Driver drowsiness detection using Gray Wolf Optimizer based on voice recognition
Sasim, S. S., Hassan, A. K. A. and Turner, S. 2022. Driver drowsiness detection using Gray Wolf Optimizer based on voice recognition. Aro - The Scientific Journal of Koya University. 10 (2), pp. 142-151. https://doi.org/10.14500/aro.11000
Practical ways to analyse Twitter data (quantitative and qualitative)
Turner, S. and Kelly, O. 2022. Practical ways to analyse Twitter data (quantitative and qualitative).
#LTHEchat 243: Self exclusion – through digital inequalities
Turner, S., Ward, G. and Elliott, C. 2022. #LTHEchat 243: Self exclusion – through digital inequalities. LTHEchat.
A reinforcement learning-based routing for real-time multimedia traffic transmission over software-defined networking
Al Jameel, M., Kanakis, T., Turner, S., Al-Sherbaz, A. and Bhaya, W. 2022. A reinforcement learning-based routing for real-time multimedia traffic transmission over software-defined networking. Electronics. 11 (15), p. e2441. https://doi.org/10.3390/electronics11152441
Driver drowsiness detection using Gray Wolf Optimizer based on face and eye tracking
Jasim, S., Abdul Hassan, AK and Turner, S. 2022. Driver drowsiness detection using Gray Wolf Optimizer based on face and eye tracking. Aro - The Scientific Journal of Koya University. 10 (1), pp. 49-56. https://doi.org/10.14500/aro.10928
Deep learning approach for real-time video streaming traffic classification
Jameel, Mohammed Al, Turner, Scott, Kanakis, Triantafyllos, Al-Sherbaz, Ali and Bhaya, Wesam S. 2022. Deep learning approach for real-time video streaming traffic classification. in: 2022 International Conference on Computer Science and Software Engineering (CSASE) IEEE.
#SocMedHE more than a conference
Turner, S. 2021. #SocMedHE more than a conference.
Referencing within code in software engineering education
Turner, S. and Hill, G 2021. Referencing within code in software engineering education. National Repository of Teaching and Learning. https://doi.org/10.25416/NTR.14907891.v1
Free augmented reality
Turner, S. 2021. Free augmented reality. Edge Hill University. https://doi.org/10.25416/NTR.13622918.v1
Why everyone should learn a bit about Machine Learning
Turner, S. 2020. Why everyone should learn a bit about Machine Learning.
How can the semantic web and ontologies help history and archeology
Souag, A. 2019. How can the semantic web and ontologies help history and archeology. in: Dans les dédales du web. Historiens en territoires numériques Paris Éditions de la Sorbonne.
Using the AMAN-DA method to generate security requirements: a case study in the maritime domain
Souag, A., Mazo, R., Salinesi, C. and Comyn-Wattiau, I. 2018. Using the AMAN-DA method to generate security requirements: a case study in the maritime domain. Requirements Engineering Journal. 23 (557–580). https://doi.org/10.1007/s00766-017-0279-5
Reusable knowledge in security requirements engineering: a systematic mapping study
Souag, A., Mazo, R., Salinesi, C. and Comyn-Wattiau, I. 2016. Reusable knowledge in security requirements engineering: a systematic mapping study. Requirements Engineering Journal. 21 (251–283). https://doi.org/10.1007/s00766-015-0220-8
A security ontology for security requirements elicitation
Souag, A. and Salinesi C., Mazo R., Comyn-Wattiau I. 2015. A security ontology for security requirements elicitation. https://doi.org/10.1007/978-3-319-15618-7_13
AMAN-DA: A knowledge reuse based approach for domain specific security requirements engineering
Souag, A. 2015. AMAN-DA: A knowledge reuse based approach for domain specific security requirements engineering. PhD Thesis Université Paris 1 Panthéon-Sorbonne CRI - Centre de Recherche en Informatique de Paris 1
A methodology for defining security requirements using security and domain ontologies
Souag, A., Salinesi C. and Comyn-Wattiau I. 2013. A methodology for defining security requirements using security and domain ontologies. Insight. Volume 16 (4), pp. 14-16. https://doi.org/10.1002/inst.201316414
Ontologies for security requirements: a literature survey and classification’
Souag, A. and Salinesi C., Comyn-Wattiau I. 2012. Ontologies for security requirements: a literature survey and classification’. https://doi.org/10.1007/978-3-642-31069-0_5