Skip to main content

Artificial Intelligence and Data Mining

  • Chapter
  • First Online:
Counterterrorism and Cybersecurity
  • 1933 Accesses

Abstract

In 1955, American computer scientist and cognitive scientist John McCarthy coined the term “artificial intelligence” (AI).

A lot of cutting edge AI has filtered into general applications, often without being called AI because once something becomes useful enough and common enough it’s not labeled AI anymore.

—Nick Bostrom.

Oxford University Future of Humanity Institute (2006).

Whenever an AI research project made a useful new discovery, that product usually quickly spun off to form a new scientific or commercial specialty with its own distinctive name.

—Professor Marvin Minsky.

MIT Artificial Intelligence Laboratory (2009).

HAL’s not the focus; the focus is on the computer on ‘Star Trek’.

—David Ferrucci.

IBM Thomas J. Watson Research Center (2011).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. McCarthy, John. What is Artificial Intelligence. [Online] Stanford University, November 12, 2007. http://www-formal.stanford.edu/jmc/whatisai/node1.html.

  2. IMDb. A.I. Artificial Intelligence. [Online] IMDb, June 29, 2001. http://www.imdb.com/title/tt0212720/.

  3. IMDb. I, Robot. [Online] IMDb, July 16, 2004. http://www.imdb.com/title/tt0343818/.

  4. Paul, Ian. IBM Watson Wins Jeopardy, Humans Rally Back. [Online] PCWorld, February 17, 2011. http://www.pcworld.com/article/219900/IBM_Watson_Wins_Jeopardy_Humans_Rally_Back.html.

  5. Markoff, John. Computer Wins on ‘Jeopardy!’: Trivial, It’s Not. [Online] The New York Times, February 16, 2011. http://www.nytimes.com/2011/02/17/science/17jeopardy-watson.html?pagewanted=all.

  6. IBM. Deep Blue. [Online] IBM. [Cited: November 5, 2012.] http://researchweb.watson.ibm.com/deepblue/.

  7. Goldman, David. Top U.S. supercomputer guns for fastest in world. [Online] CNNMoney, October 29, 2012. http://money.cnn.com/2012/10/29/technology/innovation/titan-supercomputer/index.html.

  8. Apple. Learn more about Siri. [Online] Apple. [Cited: November 5, 2012.] http://www.apple.com/ios/siri/siri-faq/.

  9. SRI International. Cognitive Assistant that Learns and Organizes. [Online] SRI International. [Cited: November 5, 2012.] http://www.ai.sri.com/project/CALO.

  10. Markoff, John. A Software Secretary That Takes Charge. [Online] The New York Times, December 13, 2008. http://www.nytimes.com/2008/12/14/business/14stream.html.

  11. Hay, Timothy. Apple Moves Deeper Into Voice-Activated Search With Siri Buy. [Online] The Wall Street Journal, April 28, 2010. http://blogs.wsj.com/venturecapital/2010/04/28/apple-moves-deeper-into-voice-activated-search-with-siri-buy/.

  12. Minsky, Marvin. THE AGE of INTELLIGENT MACHINES | Thoughts About Artificial Intelligence. [Online] Kurzweil Accelerating Intelligence, February 21, 2001. http://www.kurzweilai.net/marvin-minsky.

  13. CNN. AI set to exceed human brain power. [Online] CNN, August 9, 2006. http://www.cnn.com/2006/TECH/science/07/24/ai.bostrom/.

  14. 3VR Inc. Use Video Analytics and Data Decision Making to Grow Your Business. [Online] Digital Signage Today. [Cited: May 28, 2012.] http://www.digitalsignagetoday.com/whitepapers/4891/Use-Video-Analytics-and-Data-Decision-Making-to-Grow-Your-Business.

  15. Rayner, Gordon. New intelligent CCTV cameras can see and hear. [Online] The Telegraph, June 23, 2008. http://www.telegraph.co.uk/news/uknews/2180628/New-intelligent-CCTV-cameras-can-see-and-hear.html.

  16. Aviv, Juval. Can AI Fight Terrorism? [Online] Forbes, June 22, 2009. http://www.forbes.com/2009/06/18/ai-terrorism-interfor-opinions-contributors-artificial-intelligence-09-juval-aviv.html.

  17. New York City Police Department. Public Security Privacy Guidelines. [Online] New York City Police Department, April 2, 2009. http://www.nyc.gov/html/nypd/downloads/pdf/crime_prevention/public_security_privacy_guidelines.pdf.

  18. Thistle, Michele Bedford. Microsoft, NYPD team up on global counterterrorism solution. [Online] Microsoft, August 9, 2012. http://www.microsoft.com/government/ww/public-services/blog/Pages/post.aspx?postID=158&aID=4.

  19. Bamford, James. The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say). [Online] Wired, March 15, 2012. http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/.

  20. Bamford, James. War of Secrets; Eyes in the Sky, Ears to the Wall, and Still Wanting. [Online] The New York Times, September 8, 2002. http://www.nytimes.com/2002/09/08/weekinreview/war-of-secrets-eyes-in-the-sky-ears-to-the-wall-and-still-wanting.html?pagewanted=all.

  21. Bamford, James. War of Secrets; Eyes in the Sky, Ears to the Wall, and Still Wanting. [Online] The New York Times, September 8, 2002. http://www.nytimes.com/2002/09/08/weekinreview/war-of-secrets-eyes-in-the-sky-ears-to-the-wall-and-still-wanting.html?pagewanted=all.

  22. Kalil, Tom. Big Data is a Big Deal. [Online] The White House, March 29, 2012. http://www.whitehouse.gov/blog/2012/03/29/big-data-big-deal.

  23. Chakrabarti, Soumen, et al. Data Mining Curriculum: A Proposal (Version 1.0). [Online] ACM SIGKDD, April 30, 2006. http://www.sigkdd.org/curriculum/CURMay06.pdf.

  24. Block, Robert, Fields, Gary and Wrighton, Jo. U.S. ‘Terror’ List Still Lacking. [Online] The Wall Street Journal, January 2, 2004. http://online.wsj.com/article/0,,SB107300534268021800,00.html.

  25. Gorman, Siobhan. How Team of Geeks Cracked Spy Trade. [Online] The Wall Street Journal, September 4, 2009. http://online.wsj.com/article/SB125200842406984303.html.

  26. Flynn, Michael T. Advanced Analytical Capability Joint Urgent Operational Need Statement. [Online] Department of Defense US Forces Afghanistan, July 2, 2010. http://www.politico.com/static/PPM223_110629_flynn.html.

  27. Carik, Kenneth. The Nature of Explanation. [Online] Cambridge University Press, UK, 1943. http://www.cambridge.org/us/knowledge/isbn/item1121731/.

  28. Minsky, Marvin. A Framework for Representing Knowledge. [Online] MIT AI Laboratory Memo 306, June 1974. http://web.media.mit.edu/~minsky/papers/Frames/frames.html.

  29. DeRosa, Mary. Data Mining and Data Analysis for Counterterrorism. [Online] Center for Strategic and International Studies, March 2004. http://csis.org/files/media/csis/pubs/040301_data_mining_report.pdf.

  30. McCarthy, John. Recursive Functions of Symbolic Expressions and Their Computation by Machine, Part I. [Online] Massachusetts Institute of Technology, April 1960. http://www-formal.stanford.edu/jmc/recursive/recursive.html.

  31. Simran, Max & Charence. Prolog. [Online] Imperial College London, 2006. http://www.doc.ic.ac.uk/~cclw05/topics1/prolog.html.

  32. Brachman, Ronald J. and Schmolze, James G. An Overview of the KL-ONE Knowledge Representation System. [Online] Cognitive Science, 1985. http://eolo.cps.unizar.es/docencia/MasterUPV/Articulos/An%20Overview%20of%20the%20KL-ONE%20Knowledge%20Representation%20System-Brachman1985.PDF.

  33. Minsky, Marvin. Logical vs. Analogical or Symbolic vs. Connectionist or Neat vs. Scruffy. [Online] MIT Press, 1990. http://web.media.mit.edu/~minsky/papers/SymbolicVs.Connectionist.html.

  34. Liu, Ling and Ozsu, M. Tamer. Encyclopedia of Database Systems. [Online] Springer, 2009. http://www.springer.com/computer/database+management+%26+information+retrieval/book/978-0-387-35544-3.

  35. Wu, Xindong. Knowledge Acquisition from Databases. [Online] Ablex Publishing Corporation, 1995. http://www.cs.uvm.edu/~xwu/Publication/Book-95.html.

  36. Buchanan, Bruce G. and Shortliffe, Edward H. Rule-Based Expert Systems: The MYCIN Experiments of the Stanford Heuristic Programming Project. [Online] Addison Wesley, 1984. http://www.amia.org/staff/eshortliffe/Buchanan-Shortliffe-1984/MYCIN%20Book.htm.

  37. Lee, Newton S., Phadke, Madhav S. and Keny, Rajiv. An expert system for experimental design in off-line quality control. [Online] Wiley, November 1989. http://onlinelibrary.wiley.com/doi/10.1111/j.1468-0394.1989.tb00148.x/abstract.

  38. Chessbase. Dark horse ZackS wins Freestyle Chess Tournament. [Online] Chessbase News, June 19, 2005. http://www.chessbase.com/newsdetail.asp?newsid=2461.

  39. Lee, Newton S. DM2: an algorithm for diagnostic reasoning that combines analytical models and experiential knowledge. [Online] International Journal of Man-Machine Studies, June 1988. http://www.sciencedirect.com/science/article/pii/S002073738880066X.

  40. De Kleer, Johan. How Circuits Work. [Online] Artificial Intelligence, December 1984. http://www2.parc.com/spl/members/dekleer/Publications/How%20Circuits%20Work.pdf.

  41. Genesereth, Michael R. The use of design descriptions in automated diagnosis. [Online] Artificial Intelligence, December 1984. http://www.sciencedirect.com/science/article/pii/0004370284900432.

  42. Davis, Randall. Diagnostic reasoning based on structure and behavior. [Online] Artificial Intelligence, December 1984. http://www.sciencedirect.com/science/article/pii/0004370284900420.

  43. Berwaner, Mary. The Problem of Diagnostic Aiding. [Online] The Defense Technical Information Center, October 30, 1989. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA239200.

  44. Trafton, J. Gregory. Dynamic mental models in weather forecasting. [Online] Defense Technical Information Center, 2004. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA480241.

  45. Gentner, Dedre and Stevens, Albert L. Mental Models. [Online] Lawrence Erlbaum Associates, May 1, 1983. http://books.google.com/books/about/Mental_Models.html?id=QFI0SvbieOcC.

  46. Williams, Michael D. and Hollan, James D., Stevens, Albert L. Human Reasoning About a Simple Physical System. [Online] Lawrence Erlbaum Associates, May 1, 1983. http://books.google.com/books?id=QFI0SvbieOcC&pg=PA131.

  47. Dougherty, Jill. Experts: No easy cure for the disease of terror. [Online] CNN, July 27, 2012. http://security.blogs.cnn.com/2012/07/27/experts-no-easy-cure-for-the-disease-of-terror/.

  48. Markman, A.B., et al. Analogical Reasoning Techniques In Intelligent Counterterrorism Systems. [Online] International Journal on Information Theories and Applications, 2003. http://www.foibg.com/ijita/vol10/ijita10-2-p04.pdf.

  49. Reid, Edna, et al. Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism. [Online] The University of Arizona. [Cited: November 24, 2012.] http://ai-vm-s08-rs1-1.ailab.eller.arizona.edu/people/edna/AILab_terrorism%20Knowledge%20Discovery%20ISI%20_apr04.pdf.

  50. Koltko-Rivera, Mark E. Detection of Terrorist Preparations by an Artificial Intelligence Expert System Employing Fuzzy Signal Detection Theory. [Online] Defense Technical Information Center, October 2004. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA460204.

  51. Dixon, S.J., et al. Neural Network for Counter-Terrorism. [Online] Leeds Metropolitan University. [Cited: November 24, 2012.] http://www.leedsmet.ac.uk/aet/computing/aNNforCTShortPaper.pdf.

  52. Heath, Nick. Police enlist AI to help tackle crime. [Online] ZDNet, November 6, 2008. http://www.zdnet.com/police-enlist-ai-to-help-tackle-crime-3039541531/.

  53. McDuffie, Mike. Microsoft and NYPD Announce Partnership Providing Real-Time Counterterrorism Solution Globally. [Online] Microsoft, August 8, 2012. http://www.microsoft.com/government/en-us/state/brightside/Pages/details.aspx?Microsoft-and-NYPD-Announce-Partnership-Providing-Real-Time-Counterterrorism-Solution-Globally&blogid=697.

  54. The Economist. Flight of the drones: Why the future of air power belongs to unmanned systems. [Online] The Economist, October 8, 2011. http://www.economist.com/node/21531433.

  55. America’s Most Wanted. America’s Most Wanted. [Online] Lifetime. [Cited: January 17, 2013.] http://www.amw.com/.

  56. SETI@home. SETI@home. [Online] University of California. [Cited: January 17, 2013.] http://setiathome.berkeley.edu/index.php.

  57. BOINC STATS. Project stats info. BOINC STATS. [Online] January 15, 2013. http://boincstats.com/en/stats/projectStatsInfo.

  58. Terdiman, Daniel. Sony’s Folding@home project gets Guinness record. [Online] CNet, October 31, 2007. http://news.cnet.com/8301-13772_3-9808500-52.html.

  59. Stanford University. Folding@home distributed computing. [Online] Stanford University. [Cited: January 17, 2013.] http://folding.stanford.edu/English/HomePage.

  60. Boyle, Alan. Gamers solve molecular puzzle that baffled scientists. [Online] NBC News, September 18, 2011. http://cosmiclog.nbcnews.com/_news/2011/09/18/7802623-gamers-solve-molecular-puzzle-that-baffled-scientists.

  61. Lee, Newton. Facebook Nation: Total Information Awareness. [Online] Springer, September 15, 2012. http://www.amazon.com/Facebook-Nation-Total-Information-Awareness/dp/1461453070.

  62. 3VR. Use Video Analytics and Data Decision Making to Grow Your Business. [Online] [Cited: May 28, 2012.] http://www.digitalsignagetoday.com/whitepapers/4891/Use-Video-Analytics-and-Data-Decision-Making-to-Grow-Your-Business.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Newton Lee .

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Lee, N. (2013). Artificial Intelligence and Data Mining. In: Counterterrorism and Cybersecurity. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7205-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-7205-6_5

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-7204-9

  • Online ISBN: 978-1-4614-7205-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics