Artificial intelligence idea

Assignment Help Basic Computer Science
Reference no: EM131441515

Assignment:

For this assignment I would like you to come up with an artificial intelligence idea and summarize it in a 1-2 page paper.  I would like you to use 12 Font Times Roman with 1 inch margins, full  APA format is NOT required for this paper however please make sure and cite your sources should you use any.  I would recommend that you perform some Internet research on the topic to get the ideas flowing. Nothing can really be too far-fetched.  Just think, 40 years ago there were ideas about talking into your phone one day and asking it for directions... now we can! 20 years ago I wouldn't think I would be able to deposit a check using my phone and having the money available real time... today we can!

I provided a few starting points for you in the media links section. There is a video labeled "The Rise of Artificial Intelligence", there is also an article named "10 ways AI will affect our lives" and then I added a link labeled "Eliza Chatterbot", this was the first chatterbot program developed by Joseph Weizenbaum in 1966 that mimics human conversation.  There is not much you can do with Eliza today, however I added this for your reference only.  If you can imagine back to 1966 for a moment... Eliza was probably pretty cool!

For this assignment, be creative, think outside the box, and come up with artificial intelligence idea that can change the way we live, work or do business. Who knows if it's really good you may want to get a patent on it!

When complete, please upload your idea into, Blackboard.

Reference no: EM131441515

Questions Cloud

Whats the purpose of the website : You open the bottom-right desk drawer and pull out your personal log book. Continuing your duties on the ship, you prepare another record of your tasks. The Captain got in his gig and went to shore, determined to get a parrot. The shipped anchored..
Discuss the importance of the future : Read the article by Wagner titled "Top 10 Disappearing Futures" located in the ABI/Inform database of the CSU OnlineLibrary. Choose one of the disappearing futures and write a paper at least two pages in length discussing it. Discuss the importanc..
Express last? years average inventory in weeks of supply : EBI Solar uses a? high-tech process to turn silicon wafers into tiny solar panels. These efficient and inexpensive panels are used to power? low-energy hand-held electronic devices. Last? year, EBI Solar turned their inventory 4.6 times and had a cos..
Electronic media and e-mail : Conduct research using the CSU Online Library to find at least two articles on a company that heavily uses electronic media and e-mail. You may need to visit the company's website policy page or other sources, in addition to the library article, i..
Artificial intelligence idea : For this assignment I would like you to come up with an artificial intelligence idea and summarize it in a 1-2 page paper.  I would like you to use 12 Font Times Roman with 1 inch margins, full  APA format is NOT required for this paper however pl..
Preparing the next section of the diversity training manual : As the new manager of human resources, you are preparing the next section of the diversity training manual, which focuses on making supervisors more aware and sensitive to religious discrimination issues.Give an explanation of the Civil Rights Act,..
Write summary of so you want to be a computational biologist : Write a summary about the below article and I need someone to help me summurize it in two pages. Article: So you want to be a computational biologist? by Nick Loman & Mick Watson.
Discuss the purpose of using a diagnostic instrument : Discuss the purpose of using a diagnostic instrument/model to help manage change. Describe the key aspects that an instrument/model should effectively identify or outline in order to facilitate change.
Snooping and directory protocol implementations : What is false sharing and how does it affect parallelism in a program explain using the necessary architectural details? How can you prevent or reduce the impact of it's occurence? What is cache coherence and how do the snooping and directory prot..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Problem regarding the cryptographic techniques

Have these methods proved to be adequate? So, this second part of this conference is to go beyond cryptographic techniques and think of other forms of protection information security needs.

  Data centers at three locations

Your organization has three data centers at three locations. The cost of ownership keeps rising. It has become a burden to the organization. The CEO has read that Cloud Computing is becoming the norm both in the private and public sectors.

  What is the maximal length of a codeword

The codeword's length of a more frequent symbol is always smaller than or equal to the codeword's length of a less frequent one.

  What is investigative reporting

What is investigative reporting? How is it relevant to white collar crime? Why or why not is it helpful in fighting white collar crime?

  Write the code to compute s on the basis of these values

In physics, a common useful equation for finding the position s of a body in linear motion at a given time t, based on its initial position s0, initial velocity v0, and rate of acceleration a, is the following:

  Will nearest neighbor method still wouldn''t be a good choice

What is the problem with using Brute Force method? Can Brute Force Method be efficient if you need to go through 10 cities(vertices)? How many different calculations do you have to do if you use Brute Force Method compare to Nearest Neighbor Metho..

  Wikis are web-based tools that make it easy

Wikis are Web-based tools that make it easy for users to add, remove, and change online content. Employees at companies such as Intel, Motorola, IBM, and Sony use them for a host of tasks, from setting internal meeting agendas to posting docume..

  Study peoples behavior

Is it possible to study peoples' behavior without influencing it? Give two examples on how you would accomplish this and explain why you think people would not be influenced.

  Compare the performance of two binary search trees

Generate 10 random values between 0 and 8000. Add these values to each tree in the same order. After each of these additions, update each tree's comparisonSum variable by the number of comparisons performed for the insertion.

  Call the accessor methods to get the data and print it

A method that computes and returns the premium (the extra amount you would pay) when buying one ounce's worth of coins (total cost of the number of coins computed by the above method, including S & H and sales tax) versus buying an ounce of gold.

  Areas under the standard normal curve

Without consulting a table or a calculator giving areas under the standard normal curve, determine the area under the standard normal curve that lies to the right of 1.84.

  Executing intrusion detection system

Your company is trying to decide whether to execute intrusion detection system (IDS), or intrusion prevention system (IPS).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd