SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
1
C
ouncilofInform
ation
Security
Getting closer to
BEGINNER’S SERIES – PART 1
BY MILAN
2
C
ouncilofInform
ation
Security
What’s the Agenda?
 Clearing our Basics
 Understanding AI ML DL
 There is more to it
 Setting up your Weapon
 Understand your Weapon
 Know the Libraries
 Run the Code
 What you want next?
3
C
ouncilofInform
ation
Security
Know your Trainer 4
Milan Singh Thakur
 Artificial Intelligence & Machine Learning Evangelist
 Executive Director – Future Technologies with CIS
 OWASP Mobile Project Global Leader
 International speaker, trainer, learner
C
ouncilofInform
ation
Security
What is the Confusion? 5
 Where to start from?
 Which course is better?
 Should I take online/offline training?
 Which direction will it take my career?
 Do I need to work with lot of math?
 Do I need to be a programmer?
 Will my colleagues understand what I am doing?
C
ouncilofInform
ation
Security
6
C
ouncilofInform
ation
Security
AI, ML and DL..??
Artificial
Intelligence
Machine
Learning
Deep Learning
7
C
ouncilofInform
ation
Security
Why to use ML now?
 Too much of data available
 Computational power is increasing
 Algorithmic research is breaking innovation barriers
 Increasing support and interest of industries
 ML + Cyber Security is, “The Endless Game”
 IoT and IIoT needs to be smarter
 Hackers have weaponized ML, when will you?
8
C
ouncilofInform
ation
Security
Applications of ML 9
C
ouncilofInform
ation
Security
10
C
ouncilofInform
ation
Security
Ex: Spam Filter using ML 11
C
ouncilofInform
ation
Security
Ex: Static Malware Analysis using ML 12
C
ouncilofInform
ation
Security
Check if you are “Still Awake” 13
 I want to calculate my share value. Which category?
 I want to understand what my customers are expecting in next
product?
 My defense system drone has to identify the enemy and execute?
 My bank detects ATM fraud very quickly, how?
 Face unlock on my mobile?
C
ouncilofInform
ation
Security
Leveraging ML in Industry
 Predictive maintenance
 Demand forecasting
 Workforce management
 Consumer buying patterns and recommendations
 Device monitoring, incident reporting, advanced analytics
 Airbus has launched “Factory of Future” – a Boeing creates nearly half
terabyte data during every flight
 Bentley uses it for quality vs customer satisfaction prediction
 IBM Watson is extensively used in Healthcare industry for patient data
analysis, diagnostics and help doctors for decision making
14
C
ouncilofInform
ation
Security
How you can get into Machine Learning?
 Get into basic courses by Andrew NG
 Install jupyter notebook – it has all you need (Yolo, PIL, pandas, sk-learn
& more)
 Run sample code: iris flower, object detection
 Understand you data
 Understand how labelling of data is done
 Look into how noise is removed
 Be wise to choose right algorithm
 Validate the output
15
C
ouncilofInform
ation
Security
Setting up you environment
 http://jupyter.org/install
 Download and install Anaconda with python3
 Download and install jupyter notebook
 Start the notebook server
 $Jupyter notebook
 Visit http://localhost:8888 for Notebook dashboard
16
C
ouncilofInform
ation
Security
Understanding Jupyter Notebook Dash
 Demo 
17
C
ouncilofInform
ation
Security
What Libraries to focus on?
 TensorFlow:
 Originally developed by researchers and engineers from the Google
Brain team within Google’s AI organization, it comes with strong support
for machine learning and deep learning and the flexible numerical
computation core is used across many other scientific domains.
 Numpy:
 Primarily used for scientific computing, has a powerful N-dimensional
array object, useful linear algebra, Fourier transform, and random
number capabilities
 OpenCV:
 Multi-core processing, hardware acceleration, real-time applications
Usage ranges from interactive art, to mines inspection, stitching maps
on the web or through advanced robotics
18
C
ouncilofInform
ation
Security
 Pandas:
 Library providing high-performance, easy-to-use data structures and
data analysis tools for the Python programming language
 PIL – Pilow
 The Python Imaging Library adds image processing capabilities to your
Python interpreter
 Yolo:
 You Only Look Once (YOLO), real-time object detection system based
on a Pascal Titan X it processes images at 30 FPS and has a mAP of
57.9% on COCO test-dev
 Scikit-learn:
 Simple and efficient tools for data mining and data analysis, Accessible
to everybody and reusable in various contexts. Built on NumPy, SciPy,
and matplotlib
 StatsModels
 matplotlib
19
C
ouncilofInform
ation
Security
What are my Algorithms? 20
Classification
SVM
Nearest
Neighbors
Random
Forest
Regression
SVR
Ridge
Regression
Clustering
K-Means
Spectral
Clustering
Mean shift
Dimensionality
Reduction
PCA
Feature
selection
Non-negative
matrix
factorization
Model
Selection
Grid search
Cross
validation
metrics
Preprocessing
Preprocessing
Feature
extraction
C
ouncilofInform
ation
Security
Run Run Run…!!
 Let’s run our first code of ML 
 See Object detection video using Yolo
21
C
ouncilofInform
ation
Security
What’s in Next Session (Part 2)…!!
 Jumping into Libraries
 Writing code for object detection
 Natural Language Processing (NLP)
 Neural Networks
 SVM
 Deep dive into Algorithms
 Decision Trees and Forests
22
C
ouncilofInform
ation
Security
“
”
A Vision to Secure the
Nation
COUNCIL OF INFORMATION SECURITY
Thank you for being part of this session. Your participation and feedback is
valuable for us.
Email us at: info@aimlglobal.org
23
C
ouncilofInform
ation
Security

Weitere ähnliche Inhalte

Was ist angesagt?

Smart Augmented Fields for Emergency Operations
Smart Augmented Fields for Emergency OperationsSmart Augmented Fields for Emergency Operations
Smart Augmented Fields for Emergency OperationsUniversity of Bologna
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AIObject Automation
 
ABSTRACTCONTENTABRIVIATION
ABSTRACTCONTENTABRIVIATIONABSTRACTCONTENTABRIVIATION
ABSTRACTCONTENTABRIVIATIONElsayed Muhammad
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
NIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCSNIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCSgeetachauhan
 
Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defenseDinesh More
 

Was ist angesagt? (6)

Smart Augmented Fields for Emergency Operations
Smart Augmented Fields for Emergency OperationsSmart Augmented Fields for Emergency Operations
Smart Augmented Fields for Emergency Operations
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AI
 
ABSTRACTCONTENTABRIVIATION
ABSTRACTCONTENTABRIVIATIONABSTRACTCONTENTABRIVIATION
ABSTRACTCONTENTABRIVIATION
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
NIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCSNIPS - Deep learning @ Edge using Intel's NCS
NIPS - Deep learning @ Edge using Intel's NCS
 
Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 

Ähnlich wie Getting Started with Machine Learning - Part 1

introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptx
introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptxintroductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptx
introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptxnaveedtariq21
 
Introduction to TinyML - Solomon Muhunyo Githu
Introduction to TinyML - Solomon Muhunyo GithuIntroduction to TinyML - Solomon Muhunyo Githu
Introduction to TinyML - Solomon Muhunyo GithuSolomon Githu
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecuritySmartlearningUK
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxVrindapareek5
 
Webinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para MicrocontroladoresWebinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para MicrocontroladoresEmbarcados
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET Journal
 
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerThe Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerM2M Alliance e.V.
 
M2M Summit 2016 - IBM Presentation Cognitive Manufacturing
M2M Summit 2016 - IBM Presentation Cognitive ManufacturingM2M Summit 2016 - IBM Presentation Cognitive Manufacturing
M2M Summit 2016 - IBM Presentation Cognitive ManufacturingThorsten Schroeer
 
Arduino in TinyML with Edge Impulse
Arduino in TinyML with Edge ImpulseArduino in TinyML with Edge Impulse
Arduino in TinyML with Edge ImpulseRobocraze
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYCynthia King
 
Artificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New VenturesArtificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New VenturesAMP New Ventures
 
Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro SofiaCarter4
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTMuralidhar Somisetty
 
Ai for life sciences - are we ready
Ai for life sciences  - are we readyAi for life sciences  - are we ready
Ai for life sciences - are we readyJack C Crawford
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationIBM Security
 
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ..."Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...Edge AI and Vision Alliance
 

Ähnlich wie Getting Started with Machine Learning - Part 1 (20)

introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptx
introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptxintroductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptx
introductiontotinyml-solomonmuhunyogithu-230608174720-8f1bc8e4.pptx
 
Introduction to TinyML - Solomon Muhunyo Githu
Introduction to TinyML - Solomon Muhunyo GithuIntroduction to TinyML - Solomon Muhunyo Githu
Introduction to TinyML - Solomon Muhunyo Githu
 
Artificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurityArtificial Intelligence in cybersecurity
Artificial Intelligence in cybersecurity
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptx
 
Webinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para MicrocontroladoresWebinar: Machine Learning para Microcontroladores
Webinar: Machine Learning para Microcontroladores
 
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdfIRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
IRJET-https://www.irjet.net/archives/V5/i3/IRJET-V5I377.pdf
 
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten SchroeerThe Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
The Cognitive Era in Manufacturing and Supply Chain by Thorsten Schroeer
 
M2M Summit 2016 - IBM Presentation Cognitive Manufacturing
M2M Summit 2016 - IBM Presentation Cognitive ManufacturingM2M Summit 2016 - IBM Presentation Cognitive Manufacturing
M2M Summit 2016 - IBM Presentation Cognitive Manufacturing
 
Arduino in TinyML with Edge Impulse
Arduino in TinyML with Edge ImpulseArduino in TinyML with Edge Impulse
Arduino in TinyML with Edge Impulse
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
Artificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New VenturesArtificial Intelligence (2016) - AMP New Ventures
Artificial Intelligence (2016) - AMP New Ventures
 
Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro
 
demo AI ML.pptx
demo AI ML.pptxdemo AI ML.pptx
demo AI ML.pptx
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoT
 
Ai for life sciences - are we ready
Ai for life sciences  - are we readyAi for life sciences  - are we ready
Ai for life sciences - are we ready
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ..."Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...
"Imaging + AI: Opportunities Inside the Car and Beyond," a Presentation from ...
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Kürzlich hochgeladen (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Getting Started with Machine Learning - Part 1

  • 2. Getting closer to BEGINNER’S SERIES – PART 1 BY MILAN 2 C ouncilofInform ation Security
  • 3. What’s the Agenda?  Clearing our Basics  Understanding AI ML DL  There is more to it  Setting up your Weapon  Understand your Weapon  Know the Libraries  Run the Code  What you want next? 3 C ouncilofInform ation Security
  • 4. Know your Trainer 4 Milan Singh Thakur  Artificial Intelligence & Machine Learning Evangelist  Executive Director – Future Technologies with CIS  OWASP Mobile Project Global Leader  International speaker, trainer, learner C ouncilofInform ation Security
  • 5. What is the Confusion? 5  Where to start from?  Which course is better?  Should I take online/offline training?  Which direction will it take my career?  Do I need to work with lot of math?  Do I need to be a programmer?  Will my colleagues understand what I am doing? C ouncilofInform ation Security
  • 7. AI, ML and DL..?? Artificial Intelligence Machine Learning Deep Learning 7 C ouncilofInform ation Security
  • 8. Why to use ML now?  Too much of data available  Computational power is increasing  Algorithmic research is breaking innovation barriers  Increasing support and interest of industries  ML + Cyber Security is, “The Endless Game”  IoT and IIoT needs to be smarter  Hackers have weaponized ML, when will you? 8 C ouncilofInform ation Security
  • 9. Applications of ML 9 C ouncilofInform ation Security
  • 11. Ex: Spam Filter using ML 11 C ouncilofInform ation Security
  • 12. Ex: Static Malware Analysis using ML 12 C ouncilofInform ation Security
  • 13. Check if you are “Still Awake” 13  I want to calculate my share value. Which category?  I want to understand what my customers are expecting in next product?  My defense system drone has to identify the enemy and execute?  My bank detects ATM fraud very quickly, how?  Face unlock on my mobile? C ouncilofInform ation Security
  • 14. Leveraging ML in Industry  Predictive maintenance  Demand forecasting  Workforce management  Consumer buying patterns and recommendations  Device monitoring, incident reporting, advanced analytics  Airbus has launched “Factory of Future” – a Boeing creates nearly half terabyte data during every flight  Bentley uses it for quality vs customer satisfaction prediction  IBM Watson is extensively used in Healthcare industry for patient data analysis, diagnostics and help doctors for decision making 14 C ouncilofInform ation Security
  • 15. How you can get into Machine Learning?  Get into basic courses by Andrew NG  Install jupyter notebook – it has all you need (Yolo, PIL, pandas, sk-learn & more)  Run sample code: iris flower, object detection  Understand you data  Understand how labelling of data is done  Look into how noise is removed  Be wise to choose right algorithm  Validate the output 15 C ouncilofInform ation Security
  • 16. Setting up you environment  http://jupyter.org/install  Download and install Anaconda with python3  Download and install jupyter notebook  Start the notebook server  $Jupyter notebook  Visit http://localhost:8888 for Notebook dashboard 16 C ouncilofInform ation Security
  • 17. Understanding Jupyter Notebook Dash  Demo  17 C ouncilofInform ation Security
  • 18. What Libraries to focus on?  TensorFlow:  Originally developed by researchers and engineers from the Google Brain team within Google’s AI organization, it comes with strong support for machine learning and deep learning and the flexible numerical computation core is used across many other scientific domains.  Numpy:  Primarily used for scientific computing, has a powerful N-dimensional array object, useful linear algebra, Fourier transform, and random number capabilities  OpenCV:  Multi-core processing, hardware acceleration, real-time applications Usage ranges from interactive art, to mines inspection, stitching maps on the web or through advanced robotics 18 C ouncilofInform ation Security
  • 19.  Pandas:  Library providing high-performance, easy-to-use data structures and data analysis tools for the Python programming language  PIL – Pilow  The Python Imaging Library adds image processing capabilities to your Python interpreter  Yolo:  You Only Look Once (YOLO), real-time object detection system based on a Pascal Titan X it processes images at 30 FPS and has a mAP of 57.9% on COCO test-dev  Scikit-learn:  Simple and efficient tools for data mining and data analysis, Accessible to everybody and reusable in various contexts. Built on NumPy, SciPy, and matplotlib  StatsModels  matplotlib 19 C ouncilofInform ation Security
  • 20. What are my Algorithms? 20 Classification SVM Nearest Neighbors Random Forest Regression SVR Ridge Regression Clustering K-Means Spectral Clustering Mean shift Dimensionality Reduction PCA Feature selection Non-negative matrix factorization Model Selection Grid search Cross validation metrics Preprocessing Preprocessing Feature extraction C ouncilofInform ation Security
  • 21. Run Run Run…!!  Let’s run our first code of ML   See Object detection video using Yolo 21 C ouncilofInform ation Security
  • 22. What’s in Next Session (Part 2)…!!  Jumping into Libraries  Writing code for object detection  Natural Language Processing (NLP)  Neural Networks  SVM  Deep dive into Algorithms  Decision Trees and Forests 22 C ouncilofInform ation Security
  • 23. “ ” A Vision to Secure the Nation COUNCIL OF INFORMATION SECURITY Thank you for being part of this session. Your participation and feedback is valuable for us. Email us at: info@aimlglobal.org 23 C ouncilofInform ation Security