Intelligence Artificielle

Assessing different types of generative AI applications

AI encompasses many techniques for developing software models that can accomplish meaningful work, including neural networks, genetic algorithms and reinforcement learning. Previously, only humans could perform this work. Now, these techniques can build different kinds of AI models.

Generative AI models are one of the most important kinds of AI models. A generative model creates things. Any tool that uses AI to generate a new output — a new picture, a new paragraph or a new machine part design — incorporates a generative model.

The various applications for generative models

Generative AI functions across a broad spectrum of applications, including the following:

  • Natural language interfaces. In performing both speech and text synthesis, these AI systems power digital assistants such as Amazon’s Alexa, Apple’s Siri and Google Assistant, as well as tools that auto-summarize text or autogenerate press releases from a set of key facts.
  • Image synthesis. These AI systems create images based on instructions or directions. They will, if told to, create an image of a kiwi bird eating a kiwi fruit while sitting on a big padlock key. They can be used to create ads, fashion designs or movie production storyboards. DALL-E, Midjourney and Wombo Dream are examples of AI image generators.
  • Space synthesis. AI can also create three-dimensional spaces and objects, both real and digital. It can design buildings, rooms and even whole city plans, as well as virtual spaces for gameplay or metaverse-style collaboration. Spacemaker is a real-world architectural program, while Meta’s BuilderBot (in development) will focus on virtual spaces.
  • Product design and object synthesis. Now that the public is more aware of 3D printing, it’s worth noting that generative AI can design and even create physical objects like machine parts and household goods. AutoCAD and SOL75 are tools using AI to perform or assist in physical object design.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Les 7 menaces cyber les plus fréquentes en entreprise

Introduction La cybersécurité est devenue une priorité stratégique pour toutes les entreprises, grandes ou petites.…

2 semaines ago

Cybersécurité : Vers une montée en compétence des établissements de santé grâce aux exercices de crise

Cybersécurité : les établissements de santé renforcent leur défense grâce aux exercices de crise Face…

4 semaines ago

Règlement DORA : implications contractuelles pour les entités financières et les prestataires informatiques

La transformation numérique du secteur financier n'a pas que du bon : elle augmente aussi…

4 semaines ago

L’IA : opportunité ou menace ? Les DSI de la finance s’interrogent

L'IA : opportunité ou menace ? Les DSI de la finance s'interrogent Alors que l'intelligence…

4 semaines ago

Telegram menace de quitter la France : le chiffrement de bout en bout en ligne de mire

Telegram envisage de quitter la France : le chiffrement de bout en bout au cœur…

4 semaines ago

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le secteur financier

Sécurité des identités : un pilier essentiel pour la conformité au règlement DORA dans le…

4 semaines ago

This website uses cookies.