Experts have outlined their main concerns about AI safety, focusing on three major areas: safety risks, societal risks, and existential risks. When asked, “What worries you most about AI safety?” they pointed to various challenges.
Safety risks include the creation of AI systems that are unsafe, inaccurate, unreliable, or fail in unexpected situations. Both U.K. and Chinese experts raised concerns about AI systems not aligned with human goals or values, as well as the dangers of human-AI interactions, such as robots causing harm or accidents with self-driving cars.
Societal risks involve issues like AI misuse, such as the creation of deepfakes for fraudulent purposes. U.K. experts emphasized ethical concerns, particularly regarding AI’s impact on children and the risk of job displacement leading to high unemployment. They highlighted the need to address these issues to prevent social disruption.
Existential risks were a primary focus for some Chinese experts, who stressed the potential threats posed by advanced AI systems, including weaponization. They noted that AI’s rapid development could lead to significant and possibly irreversible global consequences.
It’s clear that addressing AI safety is essential to mitigate potential harm on a societal and global scale.
Experts in the Automotive Industry Asia
You need one, but don`t want to hire one permanently?
GTEC German Technology and Engineering Asia Business Outlook enables business leaders to make informed decisions and stay ahead of the competition. Its readers gain first-hand insights into emerging market trends, disruptive technologies, regulatory developments and investment opportunities across Asia.
GTEC also showcases success stories from leading companies in the region, highlighting their journey to success, profit and wealth. CEO Karlheinz Zuerl also provides exclusive articles on Asian countries, offering a panoramic view of strategies in the respective sectors.
“As a leading provider of interim management and experts in Asia, GTEC and its team need to stay ahead of industry applications in order to provide excellent service to its clients. Therefore, attending exhibitions and congresses is a must to get in touch with other companies and their leaders to learn what they are offering in the market,” said Karlheinz Zuerl.
Today’s press release is aimed at C-level executives attending the Future Energy Asia conference in Bangkok, May 15-17.
“We offer a wealth of expert analysis that enables readers to make informed decisions, seize opportunities and thrive in the ever-evolving Asian market,” summarizes Karlheinz Zuerl.
Future Energy Asia focuses on low-carbon societies and decarbonized energy ecosystems. The Asia-Pacific region is the world’s largest energy market, already accounting for nearly 50% of global energy consumption. With projections for rapid economic and population growth in the coming decades, the world is seeking to meet the critical goals of low carbon footprint and decarbonization.
For example, STRATEGICS EXPERTS from Malaysia and Bharat Petroleum Corporation Limited from India.
1. About STRATEGICS EXPERTS
Founder and CEO L. Shaktivell said: “We are committed to transforming industries through innovation and sustainability. For example, in Gas & Oil, our Fiber Comp. is revolutionizing maintenance practices for piping systems through Smart AI Predictive Maintenance and Composite Wrapper technology”.
61% of pipe leaks are caused by corrosion, resulting in $30 billion in lost revenue annually. Currently, when a pipe leaks, there is an emergency shutdown and the pipeline needs to be closed and repaired. Their solution has the following steps:
Macro inspection by drones, send data to base station. Monitored by cloud computing.
Micro inspection
3D model analysis
Pipe integrity simulation
Apply intelligent repair method simulated with AI integration.
How does AI technology work?
L. Shaktivll explained: “After 3D inspection of the defective pipe, we use our AI imaging system to categorize the condition of the structure and evaluate the severity. Solutions are generated by our AI prediction. We validate the suitability of the proposed solution using blockchain technology.”
What does AI failure detection mean?
“Computational simulation, CFD analysis and simulated wrapper selection with calculation of maximum stress on the repaired pipe, lifetime prediction with GFRP and CFRP wrapped pipe. In our case study, CFRP reduces the average crack growth rate to 60% of the base rate, while GFRP reduces it to 50% and shortens the service life. Therefore, the average emission (kg * CO2) of a CFRP wrapped pipe is the lowest,” summarizes L. Shaktivell the cost efficiency of AI and blockchain application through optimized maintenance operations.
Past projects of AI inspections and preventive maintenance applications have also been in solar panels, marine structures, aircraft.
A Fortune Global 500 company, Bharat Petroleum is India’s second largest oil marketing company and one of the leading integrated energy companies in India.
Santanu Purohit presented the lack of cyber security and the thread of hackers. The gap between IT and OT networks is shrinking as software-based connectivity increases. Assets that were once monitored by handheld devices and standalone sensors are now being integrated into the connected enterprise network to gain valuable insights from machine data. The increased reliance on web-based communication and technology has opened the door to cybersecurity threats. These threats are prevalent in industries such as healthcare, banking and financial services, government and defense, education, and energy and utilities.
In India’s oil and gas industry, the storage and supply chain is currently automated using MODBUS and OPCDA protocols. And there are significantly fewer layers of security available in the protocols. With the increasing digitization and narrowing of the IT-OT gap, the MODBUS protocol needs to be upgraded with security layers. See the case study below:
Attackers gather information about the target’s supply chain, identifying key suppliers, software vendors, and third-party service providers. They analyze network and system architectures, looking for connections that rely on SCADA and MODBUS communications.
Attackers infiltrate less secure elements of the supply chain. This can include inserting malicious code into software updates. The malware performs predefined tasks such as opening backdoors, collecting sensitive data, or waiting for further commands. It can remain dormant until triggered externally, reducing the chance of detection.
Attackers can steal sensitive operational data, manipulate industrial processes, or lay the groundwork for a major disruption. Alternatively, attackers could use ransomware to lock down systems and demand payment to restore access.
The solution is to choose a more secure, more functional network such as OPCUA.
An OPCUA gateway adds a robust layer of security to existing MODBUS systems. By centralizing security management, it reduces the need for multiple upgrades to legacy systems, significantly reducing costs. The gateway enables secure, encrypted communications. Monitoring increases the overall network’s resilience to external threats. The gateway minimizes the risk of disruptions and breaches, providing cost-effective, long-term protection.
In order to give you a better service GTEC uses cookies. Please agree to our use of cookies.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.