AI Cracks A Long Term Scientific Mystery

A scientific mystery, which had taken microbiologists a decade to get to the bottom of, has been solved in just 48 hours by a new Google Artificial Intelligence (AI) tool. Furthermore, the scientists using this AI tool have discovered a new antibiotic that can kill a deadly superbug.

Google's AI system has showcased its transformative potential in the realm of scientific research by making a significant breakthrough in anti-microbial resistance study. 

By decoding a complex puzzle of how bacteria acquire antibiotic resistance through viral tail mechanisms, this AI got solutions that human researchers at Imperial College London had taken ten years to experimentally validate. 

Professor José Penadés and his team at Imperial College London had spent years working out and proving why some superbugs are immune to antibiotics and are expected to kill millions of people a year by 2050. Penadés gave his co-scientist a tool made by Google and gave it the core problem he had been investigating and it reached a conclusion in 48 hours.

The decade spent by the scientists also includes the time it took to prove the research, which itself took  several years.

Prof Penadés' said the tool had in fact done more than successfully replicate his research. The researchers have been trying trying to find out how some superbugs, dangerous germs that are resistant to antibiotics, get created. Their hypothesis is that the superbugs can form a tail from different viruses which allows them to spread between species. Prof Penadés likened it to the superbugs having "keys" which enabled them to move from home to home, or host species to host species.

Critically, this hypothesis was unique to the research team and had not been published anywhere else. Nobody in the team had shared their findings. Just two days later, the AI returned a few hypotheses, and its first thought, the top answer provided, suggested superbugs may behave in exactly the way his research described.

The AI currently functions as a 'co-scientist', generating hypotheses with remarkable accuracy and speed but relies on human researchers for the conduction of physical experiments and validation of results. 

This symbiotic relationship between AI and scientists underscores the necessity of human insight and experimentation in the validation process and highlights AI's role as a powerful tool for hypothesis generation and preliminary analysis.

Nature   |   BBC   |  Telegraph  |    Yahoo   |    Open Tools   |   Guardian  

Image:  Ideogram

You Might Also Read: 

AI Can Revolutionise Science:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible





 

« Fake News Threatens The German Election

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

Krypsis

Krypsis

Krypsys is an information security company with a focus on helping you defend your information and data against emerging security threats.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Endure Secure

Endure Secure

Endure Secure is a managed cyber security & information security consultancy. Our passion for IS and our understanding of the threat landscape is reflected in the services that we provide.

Longbow Security

Longbow Security

Longbow automates root cause for your application and cloud risks, enabling teams with intelligent remediation actions that reduce the most risk with the least effort.

Access Talent Today

Access Talent Today

Access Talent Today is an AI/ML and cyber security talent provider.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.