0% found this document useful (0 votes)
2 views

1.Machine Learning and its Applications (2)

The document provides an overview of Machine Learning (ML) as a subset of Artificial Intelligence (AI), detailing its capabilities, definitions, and various flavors such as supervised, unsupervised, and reinforcement learning. It highlights numerous applications of ML, particularly in Natural Language Processing and Computer Vision, including tasks like automated essay grading, speech recognition, and image classification. The content emphasizes the importance of ML in mimicking human behavior and improving accuracy through experience.

Uploaded by

hajak12646
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

1.Machine Learning and its Applications (2)

The document provides an overview of Machine Learning (ML) as a subset of Artificial Intelligence (AI), detailing its capabilities, definitions, and various flavors such as supervised, unsupervised, and reinforcement learning. It highlights numerous applications of ML, particularly in Natural Language Processing and Computer Vision, including tasks like automated essay grading, speech recognition, and image classification. The content emphasizes the importance of ML in mimicking human behavior and improving accuracy through experience.

Uploaded by

hajak12646
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 75

Machine Learning and its

Applications
Introduction
➢ AI, ML and DL

10
Introduction
➢ AI, ML and DL : Artificial Intelligence (AI) is the branch of
computer science, which is used to create intelligent
machines. Artificial intelligence refers to human intelligence
or mimics human behavior by machines.
➢ Machine learning (ML) is referred to as a subset of Artificial
intelligence (AI). It allows a computer to handle situations via
training, analysis, observation, and experience. All the
machine learning counts as Artificial intelligence, but all AI
does not count as machine learning. It is considered one of
the best tools of artificial intelligence that is suitable for
business.
➢ Deep learning (DL) is referred to as the subset of machine
learning. It is generally referred to as a deep artificial neural
network, and these are the algorithm sets that are
extremely accurate for problems like sound recognition,
image recognition, etc. Deep learning is also defined as it
enables a computer to learn without being programmed to do
so.
Introduction
➢ What is Machine Learning (ML)?
• Machine learning is a subfield of artificial intelligence, which
is broadly defined as the capability of a machine to imitate
intelligent human behavior. Artificial intelligence systems are
used to perform complex tasks in a way that is similar to how
humans solve problems.

• Machine learning (ML) is a branch of artificial intelligence


(AI) and computer science that focuses on the using data and
algorithms to enable AI to imitate the way that humans learn,
gradually improving its accuracy.

• Tom Mitchell provides a more modern definition: “A computer


program is said to learn from experience E with respect to
some class of tasks T and performance measure P, if its
performance at tasks in T, as measured by P, improves with
experience E.” Example : I will make a simple example to
understand better .
Introduction
➢ What is Machine Learning (ML)?
• Machine learning is a subfield of artificial intelligence, which is
broadly defined as the capability of a machine to imitate intelligent
human behavior. Artificial intelligence systems are used to perform
complex tasks in a way that is similar to how humans solve
problems.

• Machine learning (ML) is a branch of artificial intelligence (AI) and


computer science that focuses on the using data and algorithms to
enable AI to imitate the way that humans learn, gradually improving
its accuracy.

• Tom Mitchell provides a more modern definition: “A computer


program is said to learn from experience E with respect to some
class of tasks T and performance measure P, if its performance at
tasks in T, as measured by P, improves with experience E.” Example :
I will make a simple example to understand better .
Introduction
➢ Flavors of Machine Learning
Introduction
➢ Flavors of Machine Learning
➢ Supervised Learning
➢ Unsupervised Learning
➢ Semi Supervised Learning
➢ Reinforcement Learning
Introduction
➢ Have you already been benefitted by ML?
➢ Google search and ranked pages
➢ Spam E-mail
➢ Recommendations on Amazon, Flipkart, Movielens
➢ Related advertisements on websites
Applications
➢ Natural Language Processing
➢ Autonomous Tagging of Stackoverflow Questions
➢ Make a multi-label classification system that
automatically assigns tags for questions posted on a
forum such as StackOverflow or Quora.
➢ Dataset: StackLite or 10% sample
Applications
➢ Natural Language Processing
➢ Autonomous Tagging of Stackoverflow Questions
➢ Make a multi-label classification system that
automatically assigns tags for questions posted on a
forum such as StackOverflow or Quora.
➢ Dataset: StackLite or 10% sample

➢ Automated essay grading


➢ The purpose of this project is to implement and train
machine learning algorithms to automatically assess
and grade essay responses.
➢ Dataset: Essays with human graded scores
Applications
➢ Natural Language Processing
➢ Autonomous Tagging of Stackoverflow Questions
➢ Make a multi-label classification system that
automatically assigns tags for questions posted on a
forum such as StackOverflow or Quora.
➢ Dataset: StackLite or 10% sample

➢ Automated essay grading


➢ The purpose of this project is to implement and train
machine learning algorithms to automatically assess
and grade essay responses.
➢ Dataset: Essays with human graded scores

➢ Sentence to Sentence semantic similarity


➢ Can you identify question pairs that have the same
intent or meaning?
➢ Dataset: Quora question pairs with similar questions
marked
Applications
➢ Natural Language Processing
➢ Fight online abuse
➢ Can you confidently and accurately tell whether a particular
comment is abusive?
➢ Dataset: Toxic comments on Kaggle
Applications
➢ Natural Language Processing
➢ Fight online abuse
➢ Can you confidently and accurately tell whether a particular
comment is abusive?
➢ Dataset: Toxic comments on Kaggle

➢ Open Domain question answering


➢ Can you build a bot which answers questions according to the
student's age or her curriculum?
➢ Facebook's FAIR is built in a similar way for Wikipedia.
➢ Dataset: NCERT books for K-12/school students in India,
NarrativeQA by Google DeepMind and SQuAD by Stanford
Applications
➢ Natural Language Processing
➢ Fight online abuse
➢ Can you confidently and accurately tell whether a particular
comment is abusive?
➢ Dataset: Toxic comments on Kaggle

➢ Open Domain question answering


➢ Can you build a bot which answers questions according to the
student's age or her curriculum?
➢ Facebook's FAIR is built in a similar way for Wikipedia.
➢ Dataset: NCERT books for K-12/school students in India,
NarrativeQA by Google DeepMind and SQuAD by Stanford

➢ Social Chat/Conversational Bots


➢ Can you build a bot which talks to you just like people talk on
social networking sites?
➢ Reference: Chat-bot architecture
➢ Dataset: Reddit Dataset
Applications
➢ Natural Language Processing
➢ Copy-cat Bot
➢ Generate plausible new text which looks like some
other text
➢ Obama Speeches? For instance, you can create a bot
which writes some new speeches in Obama's style
➢ Trump Bot? Or a Twitter bot which mimics
@realDonaldTrump
➢ Narendra Modi bot saying "doston"? Start by
scrapping off his Hindi speeches from his personal
website
➢ Example Dataset: English Transcript of Modi speeches
Applications
➢ Applications that can’t be programmed by hand
➢ Handwriting Recognition
Applications
➢ Applications that can’t be programmed by hand
➢ Natural Language Processing
➢ Machine Translation
Applications
➢ Applications that can’t be programmed by hand
➢ Handwriting Recognition
➢ Natural Language Processing
➢ Machine Translation
➢ Word Sense Disambiguation
➢ "I am taking aspirin for my cold" the disease sense is
intended
➢ "Let's go inside, I'm cold" the temperature sensation sense is
meant
➢ "It's cold today, only 2 degrees", implies the environmental
condition sense.
Applications
➢ Applications that can’t be programmed by hand
➢ Handwriting Recognition
➢ Natural Language Processing
➢ Machine Translation
➢ Word Sense Disambiguation
➢ "I am taking aspirin for my cold" the disease sense is
intended
➢ "Let's go inside, I'm cold" the temperature sensation sense is
meant
➢ "It's cold today, only 2 degrees", implies the environmental
condition sense.
➢ Part-of-Speech Tagging
➢ “And now for something completely different”
➢ [('And', 'CC'), ('now', 'RB'), ('for', 'IN'), ('something',
'NN'), ('completely', 'RB'), ('different', 'JJ')]
➢ Here we see that and is CC, a coordinating conjunction; now
and completely are RB, or adverbs; for is IN, a preposition;
something is NN, a noun; and different is JJ, an adjective.
Applications
➢ Applications that can’t be programmed by hand
➢ Handwriting Recognition
➢ Natural Language Processing
➢ Machine Translation
➢ Word Sense Disambiguation
➢ "I am taking aspirin for my cold" the disease sense is
intended
➢ "Let's go inside, I'm cold" the temperature sensation sense is
meant
➢ "It's cold today, only 2 degrees", implies the environmental
condition sense.
➢ Part-of-Speech Tagging
➢ “And now for something completely different”
➢ [('And', 'CC'), ('now', 'RB'), ('for', 'IN'), ('something',
'NN'), ('completely', 'RB'), ('different', 'JJ')]
➢ Here we see that and is CC, a coordinating conjunction; now
and completely are RB, or adverbs; for is IN, a preposition;
something is NN, a noun; and different is JJ, an adjective.
➢ Sentiment Analysis
Applications
➢ Applications that can’t be programmed by hand
➢ Natural Language Processing
➢ Named-Entity Recognition
➢ Teddy Roosevelt was a great president
➢ Teddy bears are on sale
Applications
➢ Applications that can’t be programmed by hand
➢ Natural Language Processing
➢ Named-Entity Recognition
➢ Teddy Roosevelt was a great president
➢ Teddy bears are on sale
➢ Chatbot
Applications
➢ Applications that can’t be programmed by hand
➢ Natural Language Processing
➢ Named-Entity Recognition
➢ Teddy Roosevelt was a great president
➢ Teddy bears are on sale
➢ Chatbot
➢ Speech Recognition, etc.
➢ Speech recognition is the ability of a machine or program to
identify words and phrases in spoken language and convert
them to a machine-readable format.
➢ The most frequent applications of speech recognition include
voice dialling and voice search.
Applications
➢ Applications that can’t be programmed by hand
➢ Natural Language Processing
➢ Named-Entity Recognition
➢ Teddy Roosevelt was a great president
➢ Teddy bears are on sale
➢ Chatbot
➢ Speech Recognition, etc.
➢ Speech recognition is the ability of a machine or program to
identify words and phrases in spoken language and convert
them to a machine-readable format.
➢ The most frequent applications of speech recognition include
voice dialling and voice search.
➢ Text Summarization
➢ Extractive Summarization
➢ Abstractive Summarization
Celebrities [2]

33
Celebrities [2]

34
Pose Guided Person Image Generation [3]

35
Pose Guided Person Image Generation [3]

36
CycleGAN [4]

37
Text to Image [5]

38
Image Inpainting [6]

39
DiscoGAN [7]

40
Pix2Pix [8]

41
Face aging (Age-cGAN) [9]

42
Unsupervised Domain Adaptation by Backpropagation [10, 11]

➢ Learning a discriminative classifier or other predictor in the


presence of a shift between training and test distributions
is known as domain adaptation (DA).
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
➢ Image Classification (ImageNet Large Scale Visual
Recognition Competition (ILSVRC))
Semantic Segmentation

5.p2
Instance Segmentation

5.p3
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
➢ Image Classification (ImageNet Large Scale Visual
Recognition Competition (ILSVRC))
➢ Object Detection
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
➢ Image Classification (ImageNet Large Scale Visual
Recognition Competition (ILSVRC))
➢ Object Detection
➢ Semantic Segmentation
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
➢ Image Classification (ImageNet Large Scale Visual
Recognition Competition (ILSVRC))
➢ Object Detection
➢ Semantic Segmentation
➢ Instance Segmentation
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
➢ Image Classification (ImageNet Large Scale Visual
Recognition Competition (ILSVRC))
➢ Object Detection
➢ Semantic Segmentation
➢ Instance Segmentation
➢ Image and Video Captioning
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
➢ Image Classification (ImageNet Large Scale Visual
Recognition Competition (ILSVRC))
➢ Object Detection
➢ Semantic Segmentation
➢ Instance Segmentation
➢ Image and Video Captioning
➢ Video Summarization
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
➢ Image Classification (ImageNet Large Scale Visual
Recognition Competition (ILSVRC))
➢ Object Detection
➢ Semantic Segmentation
➢ Instance Segmentation
➢ Image and Video Captioning
➢ Video Summarization
➢ CBIR (three variants)
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Security and Surveillance
➢ Age Invariant Face Recognition
➢ Gesture Analysis
➢ Autonomous Vehicle
➢ Gender Recognition
➢ Emotion Recognition
➢ Age Prediction
➢ Image Classification (ImageNet Large Scale Visual
Recognition Competition (ILSVRC))
➢ Object Detection
➢ Semantic Segmentation
➢ Instance Segmentation
➢ Image and Video Captioning
➢ Video Summarization
➢ CBIR (three variants)
➢ Driver’s Drowsiness Detection
Applications
➢ Applications that can’t be programmed by hand
➢ Computer Vision
➢ Emojinator (Emoji Classifier)
Applications
➢ Personalized Websites
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Lung Cancer Detection (Nodules form CT Scan Images)
➢ Bone X-ray
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
➢ Tag Recommendation
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
➢ Tag Recommendation
➢ Solar Intensity Prediction
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
➢ Tag Recommendation
➢ Solar Intensity Prediction
➢ Weather Prediction
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
➢ Tag Recommendation
➢ Solar Intensity Prediction
➢ Weather Prediction
➢ Soil Moisture Estimation
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
➢ Tag Recommendation
➢ Solar Intensity Prediction
➢ Weather Prediction
➢ Soil Moisture Estimation
➢ Oil Spill Detection
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
➢ Tag Recommendation
➢ Solar Intensity Prediction
➢ Weather Prediction
➢ Soil Moisture Estimation
➢ Oil Spill Detection
➢ Land use Land Cover Classification
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
➢ Tag Recommendation
➢ Solar Intensity Prediction
➢ Weather Prediction
➢ Soil Moisture Estimation
➢ Oil Spill Detection
➢ Land use Land Cover Classification
➢ Cyclone Path Prediction
Applications
➢ Personalized Websites
➢ Medical Domain
➢ Finance
➢ Intrusion Detection System
➢ Optimized Routing in IP Networks
➢ Wireless Sensor Network
➢ Friend Recommendation
➢ Tag Recommendation
➢ Solar Intensity Prediction
➢ Weather Prediction
➢ Soil Moisture Estimation
➢ Oil Spill Detection
➢ Land use Land Cover Classification
➢ Cyclone Path Prediction
➢ Robotics
Applications
➢ Music Recommender System
Applications
➢ Music Recommender System
➢ LipNet
Applications
➢ Music Recommender System
➢ LipNet
➢ Image Enlarging
Applications
➢ Music Recommender System
➢ LipNet
➢ Image Enlarging
➢ Image Outpainting
➢ Imagine you have a half image of a scene and you wanted
the full scenery, well that’s what image outpainting can do
Applications
➢ Music Recommender System
➢ LipNet
➢ Image Enlarging
➢ Image Outpainting
➢ Audio Visual Scene Aware Dialog (DSTC)
➢ The goal is to generate a complete and natural response
to a question about a scene, given video and audio of the
scene and the history of previous turns in the dialog.
➢ To answer successfully, agents must ground concepts
from the question in the video while leveraging
contextual cues from the dialog history.
References
1.https://towardsdatascience.com/the-10-deep-learning-methods-ai-
practitioners-need-to-apply-885259f402c1
2.Progressive Growing of GANs for Improved Quality, Stability, and
Variation
3.Ma, Liqian, et al. "Pose guided person image generation." Advances in
Neural Information Processing Systems. 2017.
4. https://github.com/junyanz/CycleGAN
5. https://github.com/hanzhanggit/StackGAN
6. https://github.com/pathak22/context-encoder
7. https://github.com/carpedm20/DiscoGAN-pytorch
8. https://github.com/phillipi/pix2pix
9.Antipov, Grigory, Moez Baccouche, and Jean-Luc Dugelay. "Face aging
with conditional generative adversarial networks." Image Processing (ICIP),
2017 IEEE International Conference on. IEEE, 2017.
10.https://pdfs.semanticscholar.org/presentation/f4af/de757b9dfc697
d149 e 95cb193aa4749530e2.pdf
11. Ganin, Yaroslav, and Victor Lempitsky. "Unsupervised domain adaptation
by backpropagation." arXiv preprint arXiv:1409.7495 (2014).
Disclaimer
➢ Content of this presentation is not original and it
has been prepared from various sources for
teaching purpose.

You might also like