The fourth industrial revolution glossarium: over 1500 of the hottest terms you will use to create the future. Textbook - Chesalov Alexander 4 стр.



Artificial Narrow Intelligence (ANI) also known as weak or applied intelligence, represents most of the current artificial intelligent systems which usually focus on a specific task. Narrow AIs are mostly much better than humans at the task they were made for: for example, look at face recognition, chess computers, calculus, and translation. The definition of artificial narrow intelligence is in contrast to that of strong AI or artificial general intelligence, which aims at providing a system with consciousness or the ability to solve any problems. Virtual assistants and AlphaGo are examples of artificial narrow intelligence systems74,75.


Artificial Neural Network (ANN) is a computational model in machine learning, which is inspired by the biological structures and functions of the mammalian brain. Such a model consists of multiple units called artificial neurons which build connections between each other to pass information. The advantage of such a model is that it progressively «learns» the tasks from the given data without specific programing for a single task.


Artificial neural networks (ANNs) usually simply called neural networks (NNs) are computing systems inspired by the biological neural networks that constitute animal brains. An ANN is based on a collection of connected units or nodes called artificial neurons, which loosely model the neurons in a biological brain. Each connection, like the synapses in a biological brain, can transmit a signal to other neurons. An artificial neuron receives signals then processes them and can signal neurons connected to it. The «signal» at a connection is a real number, and the output of each neuron is computed by some non-linear function of the sum of its inputs. The connections are called edges. Neurons and edges typically have a weight that adjusts as learning proceeds. The weight increases or decreases the strength of the signal at a connection. Neurons may have a threshold such that a signal is sent only if the aggregate signal crosses that threshold. Typically, neurons are aggregated into layers. Different layers may perform different transformations on their inputs. Signals travel from the first layer (the input layer), to the last layer (the output layer), possibly after traversing the layers multiple times76.


Artificial neuron is a mathematical function conceived as a model of biological neurons, a neural network. The difference between an artificial neuron and a biological neuron is shown in the figure.

Artificial neurons are the elementary units of an artificial neural network. An artificial neuron receives one or more inputs (representing excitatory postsynaptic potentials and inhibitory postsynaptic potentials on nerve dendrites) and sums them to produce an output signal (or activation, representing the action potential of the neuron that is transmitted down its axon). Typically, each input is weighted separately, and the sum is passed through a non-linear function known as an activation function or transfer function. Transfer functions are usually sigmoid, but they can also take the form of other non-linear functions, piecewise linear functions, or step functions. They are also often monotonically increasing, continuous, differentiable, and bounded77,78.



Artificial Superintelligence (ASI) is a term referring to the time when the capability of computers will surpass humans. «Artificial intelligence,» which has been much used since the 1970s, refers to the ability of computers to mimic human thought. Artificial superintelligence goes a step beyond and posits a world in which a computers cognitive ability is superior to a human.


ASCII is a character-encoding scheme used by many computers. The ASCII standard uses 7 of the 8 bits in a byte to define the codes for 128 characters. Example: In ASCII, the number «7» is treated as a character and is encoded as: 00010111. Because a byte can have a total of 256 possible values, there are an additional 128 possible characters that can be encoded into a byte, but there is no formal ASCII standard for those additional 128 characters. Most IBM-compatible personal computers do use an IBM «extended» character set that includes international characters, line and box drawing characters, Greek letters, and mathematical symbols. (ASCII stands for American Standard Code for Information Interchange)79.


Asset are mission-critical systems, physical hardware, applications, support systems, high-impact programs, personnel, equipment, locations, and more80.


Asset framework is a hierarchy tree depicting the high level assets, sub assets, and individual sensors at the leaf level of the tree81.


Assist  assessment and evaluation tools for e-service deployment in health, care and ageing  is an assessment and evaluation framework and tool built by Empirica for assessing the economic sustainability of telemedicine and telehealth services. Originally developed and successfully applied for business case development in telemedicine on behalf of the European Space Agency, the ASSIST tool exists also in adaptations for use in integrated eCare and eHealth services82.


Assisted registration  the process that enables healthcare providers to assist their patients to register for a My Health Record83.


Assisted Registration Tool (ART)  purpose-built software to enable an HPI-O to assert a patients identity and then submit their details to the My Health Record system for registration84.


Assistive intelligence is AI-based systems that help make decisions or perform actions.


Assistive technology (AT) is any item, piece of equipment, software program, or product system that is used to increase, maintain, or improve the functional capabilities of persons with disabilities85.


Association for the Advancement of Artificial Intelligence (AAAI)  an international, nonprofit, scientific society devoted to promote research in, and responsible use of, artificial intelligence. AAAI also aims to increase public understanding of artificial intelligence (AI), improve the teaching and training of AI practitioners, and provide guidance for research planners and funders concerning the importance and potential of current AI developments and future directions.


Assumed Consent  informational consent done in the absence of any formal recorded or verbal indication of agreement or any overt action (or inaction) on the part of the data subject86.


Assurance  activities designed to reach a measure of confidence. Assurance is different from audit, which is more concerned with compliance to formal standards or requirements87.


Asynchronous inter-chip protocols are protocols for data exchange in low-speed devices; instead of frames, individual characters are used to control the exchange of data.


Athenahealth Inc. is a developer of cloud-based practice management, point-of-care mobile applications and electronic health record (EHR) systems for small to medium-sized (SMB) physician practices and hospitals88.


Attack Surface refers to the system elements and interactions that are vulnerable to cyberattacks89.


Attack Vector is a pathway by which a cybercriminal can gain access to an entity90.


Attention mechanism is one of the key innovations in the field of neural machine translation. Attention allowed neural machine translation models to outperform classical machine translation systems based on phrase translation. The main bottleneck in sequence-to-sequence learning is that the entire content of the original sequence needs to be compressed into a vector of a fixed size. The attention mechanism facilitates this task by allowing the decoder to look back at the hidden states of the original sequence, which are then provided as a weighted average as additional input to the decoder.


Attributes (XML) (Атрибуты (XML)) XML elements can have attributes that further describe them, such as the following: 25.43  In the example above, «currency» is an attribute of «Price», and the attributes value is «Euro»91.


Audit  an independent examination of an effort to determine its compliance with a set of requirements. An audit may be carried out by internal or external groups92.


Audit Trail is a record that can be interpreted by auditors to establish that an activity has taken place. Often, a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event. An audit trail of system resource usage may include user login, file access, and triggers that indicate whether any actual or attempted security violations occurred93.


Auditability  property that ensures that any action of any security subject on any security object may be examined in order to establish the real operational responsibilities94.


Augmented and virtual reality enable the creation of immersive and interactive experiences using digital simulations. In a post-pandemic world, where buying takes place at a distance, serving up products virtually has never been so crucial95.


Augmented Intelligence is the intersection of machine learning and advanced applications, where clinical knowledge and medical data converge on a single platform. The potential benefits of Augmented Intelligence are realized when it is used in the context of workflows and systems that healthcare practitioners operate and interact with. Unlike Artificial Intelligence, which tries to replicate human intelligence, Augmented Intelligence works with and amplifies human intelligence96.


Augmented Reality (AR) is an enhanced version of the real physical world that is achieved through the use of digital visual elements, sound, or other sensory stimuli delivered via technology. It is a growing trend among companies involved in mobile computing and business applications in particular. Also, Augmented Reality (AR) refers to an interactive experience that blends together the virtual world and the real world. For example, visuals of a product or component can be overlaid onto the real world via a mobile phone or tablet, enabling users to visualize a virtual object in a real-world space97,98.


Augmented reality technologies are visualization technologies based on adding information or visual effects to the physical world by overlaying graphic and/or sound content to improve user experience and interactive features.


Authentication  process of reliably identifying security subjects by securely associating an identifier and authenticator99.


Authoring organisation  the healthcare provider organisation that created the content of a document100.


Authorization  permission to perform certain operations or use certain methods or services101.


Authorization link is a link that connects a healthcare provider to a healthcare provider organisation so the healthcare provider can access the My Health Record system via the National Provider Portal on behalf of their organisation102.


Authorized employee  an employee of a registered healthcare provider organisation who has been authorized by the organisation to use the My Health Record system and access an individuals My Health Record on behalf of the organisation103.


Authorized representative  someone who can apply for and manage a My Health Record on behalf of another person. For the purposes of the My Health Record system someone can be an authorized representative if they: Have parental responsibility for a person under 14; or Have legal authority to act on behalf of a person who is at least 14 and who is not capable of making his or her own decisions. If there is no one with parental responsibility or legal authority, a person who is otherwise appropriate to act on behalf of the individual can be an authorized representative. An individual can have more than one authorized representative104.


Auto Associative Memory is a single layer neural network in which the input training vector and the output target vectors are the same. The weights are determined so that the network stores a set of patterns. As shown in the following figure, the architecture of Auto Associative memory network has «n number of input training vectors and similar «n number of output target vectors105.



Autoclave is a strong heated container used for chemical reactions and other processes using high pressures and temperatures, e.g., steam cleaning and sterilization106.


Automata theory is the study of abstract machines and automata, as well as the computational problems that can be solved using them. It is a theory in theoretical computer science and discrete mathematics (a subject of study in both mathematics and computer science). Automata theory (part of the theory of computation) is a theoretical branch of Computer Science and Mathematics, which mainly deals with the logic of computation with respect to simple machines, referred to as automata107,108.


Automated control system is a set of software and hardware designed to control technological and (or) production equipment (executive devices) and the processes they produce, as well as to control such equipment and processes.


Automated is a machine that has been preprogrammed for a task, such as automated work order creation. While automated processes do not require outside control to complete the tasks for which they are programmed, automated processes do not have the ability to respond independently109.


Automated processing of personal data  processing of personal data using computer technology.


Automated system is an organizational and technical system that guarantees the development of solutions based on the automation of information processes in various fields of activity.


Automation is a technology by which a process or procedure is performed with minimal human intervention.


Autonomic computing is the ability of a system to adaptively self-manage its own resources for high-level computing functions without user input.


Autonomous artificial intelligence is a biologically inspired system that tries to reproduce the structure of the brain, the principles of its operation with all the properties that follow from this.


Autonomous refers to a machine that 1) has the ability to self-govern or undertake actions without external control and 2) can respond independently to new information. One example is autonomous mobile robots (AMRs), which navigate without an operator, intelligently choosing the best path and avoiding obstacles110.


Autonomous vehicle is a mode of transport based on an autonomous driving system. The control of an autonomous vehicle is fully automated and carried out without a driver using optical sensors, radar and computer algorithms.


Autonomy is an intelligent systems ability to independently create and select different courses of action to achieve goals based on the systems understanding and knowledge of the world and other factors111.


Auxiliary intelligence  systems based on artificial intelligence that complement human decisions and are able to learn in the process of interacting with people and the environment.


Ayasdi is an enterprise scale machine intelligence platform that delivers the automation that is needed to gain competitive advantage from the companys big and complex data. Ayasdi supports large numbers of business analysts, data scientists, end users, developers and operational systems across the organization, simultaneously creating, validating, using and deploying sophisticated analyses and mathematical models at scale.

Назад Дальше