The art of building new content: Generative AI By Aditya Abeysinghe At present, regenerating images and audio from existing images and audio is a common activity. Most images are edited to attract viewers and audio files are edited to enhance listening quality. However, creating new content from existing files, especially generating images and other media files has been a trend that sprung recently. This process of using artificial intelligence (AI) to generate new content is known as generative AI. What is the use of generative AI? One of the uses of generative AI is to generate synthetic content inexpensively. For example, think about photos of models for image recognition. Unless these photos are publicly available, they can rarely be used for commercial purposes due to copyright issues. However, with generative AI, new images can be generated with machine learning for humans that didn’t even exist. Thus, generative AI can generate ...

Read More →

Synthetic Data: Dataset generation for your need By Aditya Abeysinghe During the last few decades, research into various fields has expanded rapidly with advances in technology and tools used for research. In many fields, data is expensive to be generated or found from sources matching research requirements and sometimes is inaccessible due to privacy concerns or sometimes data is unavailable. In these kinds of cases, data needs to be artificially generated to match real world data and tested. These kind of data is called synthetic data and is now considered an emerging topic in many research fields. Synthetic data is not a new model; it has its origins since 1980s when researches started to grow with advances in technologies. However, it became an emerging topic with emerging technologies such as self-driving cars where data required for training using algorithms is hard to be found. Meanwhile, many restrictions on data sharing ...

Read More →

Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to concern about their privacy when communicating over third party applications. While many applications today ensure encryption, masking and other techniques to hide the original form during transmission between two users many say that these techniques are easily decodable by eavesdropping middle parties during transmission. Therefore, research has focused on a new avenue to solve this issue by enforcing technologies that ensure privacy of data. These collections of technologies used for ensuring consumer privacy is called Privacy Enhancing Computation (PEC). How does PEC ensure privacy? Data used at present is mainly of two categories: ...

Read More →

Hyperautomation: Article 3 of a series of articles on Hyperautomation By Aditya Abeysinghe This article series discussed about what is automation, how to identify which processes are to be automated and how robotic process automation can be used to automate processes. Robotic process automation (RPA) used robots to automate tasks which are usually performed by humans using multiple processes and tools. Using Artificial Intelligence (AI) and Machine Learning (ML) processes can be further automated, so that the dependency on humans is further minimized. This type of combining automations using AI and ML to automate processes is called hyperautomation. Why hyperautomation? Before addressing why hyperautomation is necessary, we must understand the difference between automation and hyperautomation. Consider the same example, I used in the RPA article *. A robot is used to read a list of contacts and send invoices to these contacts via email. In this process, the list of ...

Read More →