AI Fills In The Missing Gaps From Ancient Greece

At some point during the 5th century BC ancient Athens embraced a more aggressive foreign policy. The tributes demanded from allies grew larger, military actions against those who revolted more vicious. For decades historians have argued over whether it was the great general Pericles or a successor who oversaw this shift. 

Now, Artificial Intelligence (AI) has entered the debate and could bring ancient texts back to life. Researchers have developed an Artificial Intelligence (AI) model which deciphered texts missing from ancient Greek inscriptions and has even dated them, helping historians decipher ancient text. 

Ancient history relies on disciplines such as epigraphy, the study of inscribed texts known as inscriptions for evidence of the thought, language, society and history of past civilisations. However, over the centuries, many inscriptions have been damaged to the point of illegibility, transported far from their original location and their date of writing is steeped in uncertainty. 

AI is transforming many areas of research, and a new AI tool helps to fill in missing text and estimate the time-frame and geographical origin of ancient inscriptions. A system created by DeepMind has been “trained” to analyse decrees from the ancient Athenian empire.

These written records, carved in stone, reflect decisions made by the leaders of Athens but are often damaged. The team of AI researchers at DeepMind, working with colleagues from the University of Venice, the University of Oxford and Athens University of Economics and Business, has developed an AI application to help historians fill in the gaps of text missing from stone, metal or pottery artefacts. 

These AI and Machine Learning techniques are providing new tools that could help archaeologists understand the past, particularly when it comes to deciphering ancient texts.

DeepMind’s AI model not only restore text that is missing from ancient Greek inscriptions but offers suggestions for when the text was written, within a 30-year period, and its possible geographic origins. “Inscriptions are really important because they are direct sources of evidence ... written directly by ancient people themselves,” Thea Sommerschield, a distinguished historian and machine learning expert who has helped created the model, told journalists in a press briefing.

And new software, named Ithaca, is trained on a dataset of some 78,608 ancient Greek inscriptions, each of which is labelled with metadata describing where and when it was written, to the best of historians’ knowledge. Like all Machine Learning systems, Ithaca looks for patterns in this information, encoding this information in complex mathematical models, and uses these inferences to suggest text, date, and origins.

Nature:    Greek Reporter:    The Times:    The Verge:    TechXplore:    Techcrunch:    TRT:     

You Might Also Read:

Using Artificial Intelligence To Fight Cancer:

 

« The Limits Of Social Media Soft Power
Hacker Behind Kaseya Ransomware Attack Extradited »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

42Gears

42Gears

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables.

Cervello

Cervello

Cervello is a leading provider of comprehensive and proven solutions to protect railways against cyber attacks.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

NetApp Excellerator

NetApp Excellerator

NetApp Excellerator is NetApp’s global start-up program that aims to fuel innovation by partnering with deep-tech start-ups.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

Telenor Cyberdefence

Telenor Cyberdefence

Telenor Cyberdefence is a newly established (2024) cloud-born Managed Security Service Provider focused on the Nordic markets.

Nothreat

Nothreat

Nothreat has revolutionized how businesses like yours protect themselves from damaging cyber attacks. Our tech learns and adapts in real time, protecting clients from even zero-day attacks.