AI Fills In The Missing Gaps From Ancient Greece

At some point during the 5th century BC ancient Athens embraced a more aggressive foreign policy. The tributes demanded from allies grew larger, military actions against those who revolted more vicious. For decades historians have argued over whether it was the great general Pericles or a successor who oversaw this shift. 

Now, Artificial Intelligence (AI) has entered the debate and could bring ancient texts back to life. Researchers have developed an Artificial Intelligence (AI) model which deciphered texts missing from ancient Greek inscriptions and has even dated them, helping historians decipher ancient text. 

Ancient history relies on disciplines such as epigraphy, the study of inscribed texts known as inscriptions for evidence of the thought, language, society and history of past civilisations. However, over the centuries, many inscriptions have been damaged to the point of illegibility, transported far from their original location and their date of writing is steeped in uncertainty. 

AI is transforming many areas of research, and a new AI tool helps to fill in missing text and estimate the time-frame and geographical origin of ancient inscriptions. A system created by DeepMind has been “trained” to analyse decrees from the ancient Athenian empire.

These written records, carved in stone, reflect decisions made by the leaders of Athens but are often damaged. The team of AI researchers at DeepMind, working with colleagues from the University of Venice, the University of Oxford and Athens University of Economics and Business, has developed an AI application to help historians fill in the gaps of text missing from stone, metal or pottery artefacts. 

These AI and Machine Learning techniques are providing new tools that could help archaeologists understand the past, particularly when it comes to deciphering ancient texts.

DeepMind’s AI model not only restore text that is missing from ancient Greek inscriptions but offers suggestions for when the text was written, within a 30-year period, and its possible geographic origins. “Inscriptions are really important because they are direct sources of evidence ... written directly by ancient people themselves,” Thea Sommerschield, a distinguished historian and machine learning expert who has helped created the model, told journalists in a press briefing.

And new software, named Ithaca, is trained on a dataset of some 78,608 ancient Greek inscriptions, each of which is labelled with metadata describing where and when it was written, to the best of historians’ knowledge. Like all Machine Learning systems, Ithaca looks for patterns in this information, encoding this information in complex mathematical models, and uses these inferences to suggest text, date, and origins.

Nature:    Greek Reporter:    The Times:    The Verge:    TechXplore:    Techcrunch:    TRT:     

You Might Also Read:

Using Artificial Intelligence To Fight Cancer:

 

« The Limits Of Social Media Soft Power
Hacker Behind Kaseya Ransomware Attack Extradited »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Aunalytics

Aunalytics

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Capgemini

Capgemini

Capgemini is one of the world's foremost providers of consulting, technology and outsourcing services. Areas of expertise include Cybersecurity.

Hook Security

Hook Security

Setting a new standard in security awareness. Hook Security is a people-first company that uses psychological security training to help companies create security-aware culture.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

XONA Systems

XONA Systems

XONA is The Zero Trust user access platform for the OT enterprise. Secure operational access to critical systems - from anywhere.

S4E (Security for Everyone)

S4E (Security for Everyone)

At S4E.io, our mission is to democratize digital security, making it accessible, simple, and effective for individuals and businesses of all sizes.