AI Fills In The Missing Gaps From Ancient Greece

At some point during the 5th century BC ancient Athens embraced a more aggressive foreign policy. The tributes demanded from allies grew larger, military actions against those who revolted more vicious. For decades historians have argued over whether it was the great general Pericles or a successor who oversaw this shift. 

Now, Artificial Intelligence (AI) has entered the debate and could bring ancient texts back to life. Researchers have developed an Artificial Intelligence (AI) model which deciphered texts missing from ancient Greek inscriptions and has even dated them, helping historians decipher ancient text. 

Ancient history relies on disciplines such as epigraphy, the study of inscribed texts known as inscriptions for evidence of the thought, language, society and history of past civilisations. However, over the centuries, many inscriptions have been damaged to the point of illegibility, transported far from their original location and their date of writing is steeped in uncertainty. 

AI is transforming many areas of research, and a new AI tool helps to fill in missing text and estimate the time-frame and geographical origin of ancient inscriptions. A system created by DeepMind has been “trained” to analyse decrees from the ancient Athenian empire.

These written records, carved in stone, reflect decisions made by the leaders of Athens but are often damaged. The team of AI researchers at DeepMind, working with colleagues from the University of Venice, the University of Oxford and Athens University of Economics and Business, has developed an AI application to help historians fill in the gaps of text missing from stone, metal or pottery artefacts. 

These AI and Machine Learning techniques are providing new tools that could help archaeologists understand the past, particularly when it comes to deciphering ancient texts.

DeepMind’s AI model not only restore text that is missing from ancient Greek inscriptions but offers suggestions for when the text was written, within a 30-year period, and its possible geographic origins. “Inscriptions are really important because they are direct sources of evidence ... written directly by ancient people themselves,” Thea Sommerschield, a distinguished historian and machine learning expert who has helped created the model, told journalists in a press briefing.

And new software, named Ithaca, is trained on a dataset of some 78,608 ancient Greek inscriptions, each of which is labelled with metadata describing where and when it was written, to the best of historians’ knowledge. Like all Machine Learning systems, Ithaca looks for patterns in this information, encoding this information in complex mathematical models, and uses these inferences to suggest text, date, and origins.

Nature:    Greek Reporter:    The Times:    The Verge:    TechXplore:    Techcrunch:    TRT:     

You Might Also Read:

Using Artificial Intelligence To Fight Cancer:

 

« The Limits Of Social Media Soft Power
Hacker Behind Kaseya Ransomware Attack Extradited »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Datec PNG

Datec PNG

Datec is the the largest end-to-end information and communications technology solutions and services provider in Papua New Guinea.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.