Meaning and Concept of Artificial Intelligence to Help the Civil Defense
The title of this project is Artificial intelligence and its implications on the safety and security of the public: An evaluation of the safety and security measures of the Civil defense in Dubai, United Arab Emirates.
Artificial intelligence is highly used by people in the current times for their safety and security. In previous times, people highly avoid information-based security and machine-based data due to the threat of data piracy. But, it is developed in current scenario as information age continue to grow and society has been forced for developing the new and intimate familiarities with the algorithm and data-driven system (Bostrom, and Yudkowsky, 2018). In civil defense, the artificial agent is used for decision making and devices that support for automation, algorithm learning process, and data-driven. It also involves the devices for the online suggestion and advanced cognitive system and also helps in the safety and security of the public. These agents are becoming a vital part of the regular decision making procedure. Their origination and adoption may lead to a multitude of associated policy. The study will assess the implication of Artificial Intelligence to help the Civil Defense to reduce the time taken, to provide rescue aids, to the public or in the building to save people in accidents in Dubai, United Arab Emirates (Srivastava, Bisht, and Narayan, 2017).
The aim of the proposed study is to ensure safety and security to the public or people by reducing the time for providing rescue aids by the Civil Defence in Dubai. Following objectives would be used to complete the main aim of the research:
RO1: To explore the meaning and concept of Artificial Intelligence to help the Civil Defence
RO2: To address the role of Artificial Intelligence in Civil Defence
RO3: To recommend the implication of Artificial Intelligence to ensure safety and security to the public or people by reducing the time for providing rescue aids
According to Russell Dewey and Tegmark (2015), artificial intelligence is enduring a transaction from storage tower executions to a utility of function in across of different industries as a type of Artificial General Intelligence (AGI) competencies. It is becoming associated with different applications, products, and services and keeps end-users. This alteration would have an intense effect on safety, security, and private for the enterprise, consumers, and governments. It is also stated that uses of artificial intelligence are growing in across of diverse sector and it is related to security, privacy, and public safety.
Role of Artificial Intelligence in Civil Defense
In contrast to this, Parker (2018) evaluated that Al-powered techniques are performing the specific repetitive task with efficiency. The key cause of using AI is that it can remove the human errors from the task and helps to attain the feasible outcome. In addition, such a technique can be performed 24*7 as compared to humans. Hence, they avoid the requirement of organizing two sets of workforces in the day and night shifts to work on significant tasks. For instance, AI-powered chat support can answer the queries of customer and offers support to visitors every minute of the day and enhances the revenue of the corporation.
According to Portugal et al. (2018), people are working for learning artificial intelligence related machines to solve complex equations and obtains the critical tasks on their own hence, the outcome obtained may create the accuracy rather than person counterparts. This high accurateness makes indispensable to performance in different sector specifically, owing to the criticality of tasks. Robots are superior in terms of resolving serious condition such as rescue, and aids in the safety and security of the public.
In contrast to this, Sotala (2018) evaluated that AI practices machine learning algorithms such as deep learning with neural networks in order to learn the innovative things like civil defense do in Dubai, United Arab Emirates. This strategy may avoid the requirement to write new code at every time as people need to learn new things. It is also opined that AI machines optimize the machine learning capabilities so that they learn much faster regarding new procedures. This way creates a low cost for civil defense as there is low expenses required for training and helps to learn more rapid regarding the new process. Along with this, machines may decline the operational expenses with the high efficiency and accuracy of performing work in the civil defense sector. For illustration, machines do not take a break and can do the same ordinary task without a change in outcomes.
According to Scherer (2015), the key benefits of using artificial intelligence powered machines are to organize the work. It also supports to collect the high amount of data associated with performance. This information could be processed for gathering the depth perception regarding the procedure with quantitative assessment hence; people can maintain the safety and security in rescue condition. Moreover, machine learning capabilities of AI machines are gaining further information regarding safety and security measures.
Implication of Artificial Intelligence to Ensure Safety and Security to the Public
On the other side, Warwick (2018) stated that people should use software that is smarter and easier to use as they could be enabled for the development of AI application. It can also offer the digital mesh to insert AI from the key of edge. It will also enable people for real-time assessment. This demonstrates the competency to do smart ingestion, shifting, pivoting, splitting and quick data wrangling. People should address the AI machines that match with their needs to complete their objectives. For example, if, a people are performing smart data wrangling, then they may need to record everything that they have completed. This could lead to addressing the resources of task completion. People can also create the app for inserting and calling the rest boundaries.
According to Drexler (2018), people should take the vertically-oriented strategy and personalize to the domain. They can also use different components for resolving the AI based issue. It can also emphasize on different attributes of AI to measure the safety and security. It can also aid to understand the preference of consumers and supports for understanding attributes preferred by the customers. In the context of the business of Dubai, it can be suggested that the company should comprehend the business issue that needs to resolve. In this way, AI should be applied in the business process to address the issues. There are certain case studies that help to comprehend favorable and unfavorable aspect for leveraging the technology in the best manner. This technology would have highly influenced the business procedures in terms of measuring the safety and security in civil defense of Dubai, UAE.
In this research design, mixed research design would be used to complete the main aim of this research study. This research design would be selected as it contains the characteristics of both qualitative and quantitative research design. In this way, qualitative research design would be used to gather the conceptual aspect regarding the research concern. Together with, quantitative research design would be used to gather the numeric information regarding research issues. This research design is beneficial for acquiring reliable and valid data about research issues (Boden, et. al., 2017).
With the purpose of this investigation, interpretivism research philosophy would be used as this philosophy will enable the researcher for assessing the perception and belief of respondents. It would also aid an investigator for acquiring the valid result associated with artificial intelligence and its implications on the safety and security of the public in Dubai. This philosophy would be beneficial for gathering the real phenomenon regarding research issues. In opposed to this, realism and positivism research philosophies will not be used as this research is based on the subjective nature (Loo Mauri and Ortiz, J.H. 2016).
Is Artificial Intelligence Becoming Associated with Different Applications, Products and Services?
In this research, the inductive approach will be implemented as compared to the deductive approach as this investigation would facilitate the investigator for increasing the subjective understanding regarding research concern. By using this, an investigator would be competent for improving the validity and reliability of investigation results. This approach will make competent to the investigator to identify the artificial intelligence and its implications on the safety and security of the public. In contrast to this, the positive research approach would be not used as there would be no requirement of developing a hypothesis to respond to research questions (Grzonka, et. al., 2018).
In this dissertation, causal research would be used to assess the cause and effect relationship between two variables i.e. artificial intelligence and Civil Defence in Dubai. This research tool would be effective for providing depth information regarding research issues. It would also aids to gather the actual and real phenomenon regarding artificial intelligence and its implications on the safety and security of the public (Loreggia, et. al., 2018).
In this investigation, survey through questionnaire research strategies would be implemented by the investigator. This strategy would make competent to an investigator for gathering a large number of data associated with artificial intelligence and its implications on the safety and security of the public. Survey through questionnaire strategy would make competent to the investigator to gather the information in minimum time with low expenses. It will also improve the authenticity of the investigation between civil defense in Dubai (Xu, et. al., 2016).
In this dissertation, a probability sampling method would be used to choose the sample from a large number of populations. Since, it provides equal chances of being selected to the participants. In this sampling technique, simple random probability sampling will be selected where participants would be selected randomly from the high amount of population. This could be beneficial for avoiding the biases from research. With the purpose of this dissertation study, 200 people will be selected as a sample size that uses Artificial intelligence to keep safety and security in Dubai, UAE (Baggett, and Simpkins, 2018).
In this research, both primary and secondary data collection method would be used for assessing the data about the research issues. In this way, primary data would be used for gathering first hand, and innovative information regarding research issues. Primary data would be pooled via several sources such as survey through questionnaire and interview. In opposed to this, secondary data would be gathered via sources that are already published in the market. These sources would be journal articles, books, articles, online websites, and academic and government publication (Siau, and Wang, 2018). Both data collection method would be beneficial for obtaining the feasible result associated with research objectives.
Efficiency of Al-Powered Techniques
In the procedure of investigation, an investigator would face different problems that might adversely influence the investigation and affect the research outcomes. In such a way, data access, money and time are key constraints that could limit the investigation in terms of obtaining reliable and valuable results. Under the investigation, the minimum time for conducting the investigation may adversely affect the research study with reference to pooling a sufficient amount of information through several sources associated with research concern. Moreover, money is another limitation that may adversely affect the investigator for making an authentic investigation in this field (Paradkar, and Sharma, 2015). Due to less funding, an investigator would be unable to go through the different category of data resources and unable to acquire facts from different geographical locations of Dubai. It could also limit the validity and trustworthiness of investigation between key stakeholders.
In this research, the researcher can face different ethical issues such as plagiarism, in-text citation, and privacy. Hence, the researcher will use privacy act to keep the confidentiality and secrecy of participants. Furthermore, the researcher will give an in-text citation in each-paragraph for increasing the authenticity of the research. An investigator would take earlier consent through research participant to gather the primary information associated with research concern. By using this, an investigator would be competent for gathering the information through research respondents in depth. It is supportive for the investigator to keep the trustworthiness of facts and figures significantly (Hengstler, Enkel, and Duelli, 2016). In contrast to this, an investigator has informed the approached associated with privacy such as their confidential data will not be revealed after and at the time of the investigation.
There is a certain risk associated with investigation such as biases in research, a privacy research, and fake outcome. It could affect the research outcome and creates complexity in the attainment of research results (Bryson, and Winfield, 2017).
This investigation would aid the investigator for generating the depth understanding regarding the artificial intelligence and its implications on the safety and security of the public. This investigation proposal would be effective for existing and new corporation as it creates the knowledge regarding safety and security measures of the Civil defense in Dubai, United Arab Emirates. It would be also beneficial for the public to effectively use artificial intelligence with the purpose of safety and security.
In this research, there are some limitations and risk that directly affect the research outcome. Hence, the researcher should focus on the ways to avoiding it. Furthermore, the researcher can use more than 200 participants for gathering the depth information about research in the future. It can also use more secondary sources in further research to acquire more accurate outcomes (He, et. al., 2016).
Activities, which would be attained |
Initial Day |
Last Day |
Duration (Days) |
Selection of appropriate research concern |
09-10-18 |
12-10-18 |
4 |
Development of purpose and objective of investigations |
13-10-18 |
23-10-18 |
10 |
Gathering data via survey through questionnaire and literature review |
24-10-18 |
24-11-18 |
30 |
Framing the questionnaire |
25-11-18 |
06-12-18 |
12 |
Selecting the right sample size from the targeted population by using feasible sample tool |
07-12-18 |
31-12-18 |
24 |
Assessment of data with findings |
01-01-19 |
15-01-19 |
15 |
Report writing and final report making |
16-01-19 |
05-02-19 |
20 |
Submission of report |
06-02-19 |
28-02-19 |
22 |
Artificial Intelligence Machines Optimize Machine Learning Capabilities
Chart 1: Gantt chart
As per the above scheduling, it can be illustrated that obtaining survey through questionnaire and gathering the information through secondary information will take more time as compared to other activities.
References
Bostrom, N. and Yudkowsky, E., 2018. The Ethics of Artificial Intelligence. In Artificial Intelligence Safety and Security (pp. 57-69). UK: Chapman and Hall/CRC.
Russell, S., Dewey, D. and Tegmark, M., 2015. Research priorities for robust and beneficial artificial intelligence. Ai Magazine, 36(4), pp.105-114.
Parker, L.E., 2018. Creation of the National Artificial Intelligence Research and Development Strategic Plan. AI Magazine, 39(2), pp.10-11.
Portugal, D., Santos, M.A., Pereira, S. and Couceiro, M.S., 2018. On the security of robotic applications using ROS. In Artificial Intelligence Safety and Security (pp. 273-289). UK: Chapman and Hall/CRC.
Sotala, K., 2018. Disjunctive scenarios of catastrophic AI risk. In Artificial Intelligence Safety and Security (pp. 315-337). UK: Chapman and Hall/CRC.
Scherer, M.U., 2015. Regulating artificial intelligence systems: Risks, challenges, competencies, and strategies. Harv. JL & Tech., 29(2), p.353.
Warwick, K., 2018. Smart Machines ARE a Threat to Humanity. In Artificial Intelligence Safety and Security (pp. 423-430). UK: Chapman and Hall/CRC.
Drexler, K.E., 2018. MDL Intelligence Distillation: Exploring strategies for safe access to superintelligent problem-solving capabilities. In Artificial Intelligence Safety and Security (pp. 75-88). UK: Chapman and Hall/CRC.
Boden, M., Bryson, J., Caldwell, D., Dautenhahn, K., Edwards, L., Kember, S., Newman, P., Parry, V., Pegman, G., Rodden, T. and Sorrell, T., 2017. Principles of robotics: regulating robots in the real world. Connection Science, 29(2), pp.124-129.
Loo, J., Mauri, J.L. and Ortiz, J.H. eds., 2016. Mobile ad hoc networks: current status and future trends. UK: CRC Press.
Grzonka, D., Jakobik, A., Ko?odziej, J. and Pllana, S., 2018. Using a multi-agent system and artificial intelligence for monitoring and improving cloud performance and security. Future Generation Computer Systems, 86, pp.1106-1117.
Loreggia, A., Mattei, N., Rossi, F. and Venable, K.B., 2018. Value alignment via tractable preference distance. In Artificial Intelligence Safety and Security (pp. 249-261). UK: Chapman and Hall/CRC.
Xu, K., Wang, X., Wei, W., Song, H. and Mao, B., 2016. Toward software defined smart home. IEEE Communications Magazine, 54(5), pp.116-122.
Baggett, R.K. and Simpkins, B.K., 2018. Homeland security and critical infrastructure protection. UK: ABC-CLIO.
Siau, K. and Wang, W., 2018. Building Trust in Artificial Intelligence, Machine Learning, and Robotics. Cutter Business Technology Journal, 31(2), pp.47-53.
Paradkar, A. and Sharma, D., 2015. All in one Intelligent Safety System for Women Security. International Journal of Computer Applications, 130(11), pp.33-40.
Hengstler, M., Enkel, E. and Duelli, S., 2016. Applied artificial intelligence and trust—The case of autonomous vehicles and medical assistance devices. Technological Forecasting and Social Change, 105 (2), pp.105-120.
Bryson, J. and Winfield, A., 2017. Standardizing ethical design for artificial intelligence and autonomous systems. Computer, 50(5), pp.116-119.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y. and Gabrys, B., 2016, July. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on (pp. 1015-1021). UK: IEEE.
Srivastava, S., Bisht, A. and Narayan, N., 2017, January. Safety and security in smart cities using artificial intelligence—A review. In Cloud Computing, Data Science & Engineering-Confluence, 2017 7th International Conference on (pp. 130-133). UK: IEEE.