Betterment of the Human
Condition?
Outline
Types of harm
Some ethical theories
A few case studies
Dealing with error
Whats a life worth?
Going forward
Categories of Harm
Category 1: Unexpected, unintentional harm
Category 2: Expected, unintentional harm
C
Engineering and the
Environment
October 30, 2015
`A minimum of 3,500,000 people will starve to
death this year, mostly children. But this is a
mere handful compared with the numbers that
will be starving in a decade or so. And it is
now too late to take a
Artificial Intelligence
and
Computing Science
October 21, 2015
Why
AI?
Can a Computer Think?
Can a Submarine Swim?
The Turing Machine
A complete abstract description of the
perfectly stupid slave
The ELIZA Effect
Joseph Weizenbaum, MIT, 1966
Patient: `I w
Artificial Intelligence
and
Computing Science
October 19, 2012
AI in the Seventies and Eighties
A belated realization: in most
situations, intelligent behaviour
requires knowledge
How many things do you know?
`I cant think of a hundred things
that I know
`Magnetic termite mounds, Australia
Conclusion
Dramatic changes are possible
But some hard problems must be
solved first, especially in flock
intelligence.
Engineering Design
October 28, 2015
Requirement: a teapot suitable for preparing
up to two litres o
Artificial Intelligence
and
Nanotechnology
October 26, 2015
2011: IBMs Watson Wins Jeopardy
Inside Watson:
4 Terabytes disk storage: 200 million pages
(including all of Wikipedia)
16 Terabytes of RAM
90 3.5GHz eightcore processors
One of the components
Are We Doomed?:
the REMbuttal
Presented by Morgan Braglewicz, Taylor Groenewoud
and Zoe Long
M.R.M Candidates, School of Resource and Environmental Management

Agenda:
POPULATION
AGRICULTURE
NATURAL RESOURCES
ENERGY
CLIMATE CHANGE
Ecosystem services
Cur
Quiz Question:
If I am employing the Vigenere
cipher to encode the message
`WeAttackAtDawn, and my
codeword is `SicSemperTyrannis,
what will be the third letter of my
encoded message?
Message
We Attack
Sic Semper
Codeword
So the answer is C
If I am employ
Summary of Mondays Class
Information can be measured in bits
There is a tradeoff between bandwidth and speed
A variety of telegraphs were invented between 1750 and 1850,
mostly impractical
Transatlantic cable, first laid in 1857. Broke after 380 miles.
Tr
Chaos and Order (2)
Rabbits
If there are xn rabbits in the nth
generation, then in the n+1th
generation, there will be
xn+1=(1+r)xn
(only works if xn > 2)
Rabbits and Foxes
If foxes increase when rabbits become
plentiful, this equation becomes:
xn+1=(1+
Chaos
Stateoftheart
calculator,1974
(about $400)
Stateoftheart
calculator, 2013
(about $40)
How does the `solve function work?
Research (looking in the manual) shows that
it employs something called `the secant method.
Using the secant method to sol
Thermodynamics
Summary of Thermo Part I:
Zeroth Law: Thermometers exist
First Law: Energy in = Energy Out
Second Law: Exergy in
Exergy Out
The available energy of an energy source
(`exergy) is the amount that can be
converted to mechanical work.
For examp
Information Theory
Measuring Information
Claude Shannon
Bell Labs
The Information Function (1)
An event is about to happen.
It has N possible outcomes, all equally likely.
The information we gain in learning which outcome has occurred is:
log2(N)
Example
The Nature of
Engineering Knowledge
The Froude Number
Fr = V2/Lg
If the Froude number is the same for a ship
and its model, both will behave the same way
(e.g., capsize and sink)
Catamaran model in a towing tank
The Mach Number
M = v/c
If the Mach number
The TrickleDown
Theory of Engineering
Major source of inefficiency is Bremsstrahlung:
Xrays emitted when highvelocity electrons
strike the walls.
Bremsstrahlung losses go as surface area,
energy generation goes as Tokamak volume.
Laws of Engineering
1.
Summary of Wednesdays Class
Francis Bacon and the beginning of experimental science
Science and technology still separate no science of
steam engines
Collateral damage from Industrial Revolution
Jaccards loom uses punched cards to store a program
Twentiet
DARPA
Investigates exotic
technologies that
may have defence
applications
2007 budget: $3.294 billion
(NSERC, 2004, $615 million)
Some notable DARPA projects:
Robot race across the Mojave Desert
Some notable DARPA projects:
The Hafnium handgrenade
Chemic
Xi
Zeta
Tau
Ta
Rho
Qoppa
Omega Omicron
Iota
Gim
Digamma
Delta
Alpha
Alif
Tha
Theta
Sampi
San
Phi
Kappa
Epsilon
Ba
Pi
Upsilon
Sigma
Psi
Mu
Lambda
Eta
Gamma
Beta
Chi
The Syracosia
The Tombstone of Archimedes
Roman Engineering
In the service of the military
Xi
Zeta
Tau
Ta
Rho
Qoppa
Omega Omicron
Iota
Gim
Digamma
Delta
Alpha
Alif
Tha
Theta
Sampi
San
Phi
Kappa
Epsilon
Ba
Pi
Upsilon
Sigma
Psi
Mu
Lambda
Eta
Gamma
Beta
Chi
Summary of Mondays Lecture
(500 BC to 1500 AD)
Archimedes: war machines and mathematics
Inv
Course Website
http:/canvas.sfu.ca/courses/23062
The website contains all Powerpoints used
in lectures, plus supplementary material
Design Labs
Class is divided into lab groups of
about eight students
ENSC 100W group meetings start
week
In a few minute
Part VI
Input/Output and Interfacing
Mar. 2007
Computer Architecture, Input/Output and Interfacing
Slide 1
About This Presentation
This presentation is intended to support the use of the textbook
Computer Architecture: From Microprocessors to Supercompute
Part VII
Advanced Architectures
Mar. 2007
Computer Architecture, Advanced Architectures
Slide 1
About This Presentation
This presentation is intended to support the use of the textbook
Computer Architecture: From Microprocessors to Supercomputers,
Oxford
Part V
Memory System Design
Mar. 2007
Computer Architecture, Memory System Design
Slide 1
About This Presentation
This presentation is intended to support the use of the textbook Computer Architecture: From Microprocessors to Supercomputers, Oxford Univer
VHDL for COE608
Overview
Objective
Quick introduction to VHDL
basic language concepts
basic design methodology
Use VHDL Tutorial available on the course
website:
/home/courses/coe608/vhdl_tutorial.ps
selflearning for more depth
reference for proje
Part III
The Arithmetic/Logic Unit
Jan. 2007
Computer Architecture, The Arithmetic/Logic Unit
Slide 1
About This Presentation
This presentation is intended to support the use of the textbook Computer Architecture: From Microprocessors to Supercomputers, O
Part I
Background and Motivation
Jan. 2007
Computer Architecture, Background and Motivation
Slide 1
About This Presentation
This presentation is intended to support the use of the textbook
Computer Architecture: From Microprocessors to Supercomputers,
Oxf
174
Chapter 9 / Number Representation
PROBLEMS
9.1 Fixedradix positional number systems
version of this representation was discussed in
Example 9.3.
For each of the following conventional radixr
number systems, using the digit values 0 through
r
I , de
Register Transfer and
Datapath Structures
COE608: Computer Organization and
Architecture
Dr. Gul N. Khan
http:/www.ee.ryerson.ca/~gnkhan
Electrical and Computer Engineering
Ryerson University
Overview
Introduction to Register Transfer
Design of Datapaths
Problem Set 1
due Friday May 23rd 2014 11:59 pm
Please Submit Solutions to the following question from the textbook.
Give a reasonably detailed explanations with each solution.
Please attach the Cover Sheet included in this file to your paper.
Please note