SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Artificial Intelligence
Malicious Use System
BY:
VAIBHAV MISHRA
KRITI LABHANIYA
TRUBA INSTITUTE OF ENGINEERING AND
INFORMATION TECHNOLOGY
BHOPAL, MP
Content
Definitions
Capabilities
The Problems
Solutions
Some More Solutions
Results
What is Artificial Intelligence?
Artificial Intelligence is the study of mental faculties through the use of
computational models.
Artificial Intelligence is a way of making a computer, a computer-
controlled robot, or a software think intelligently, in the similar manner
the intelligent humans think.
Artificial Intelligence is the best field for dreamers to play around. It
must be evolved from the thought that making a human-machine is
possible.
Artificial Intelligence Capabilities
Why AI is Important?
• AI automates repetitive learning and discovery through data.
• AI adds intelligence to existing products.
• AI analyzes more and deeper data using neural networks that
have many hidden layers.
• AI achieves incredible accuracy though deep neural networks –
which was previously impossible.
How AI works?
AI works by combining large amounts of data with fast, iterative
processing and intelligent algorithms, allowing the software to learn
automatically from patterns or features in the data. AI is a broad field
of study that includes many theories, methods and technologies, as
well as the following major subfields:
Machine Learning Neural Network
Deep Learning Cognitive Computing
Computer Vision Neural Language Processing (NLP)
Machine Learning
Machine Learning automates analytical model building. It uses
methods from neural networks, statistics, operations research and
physics to find hidden insights in data without explicitly being
programmed for where to look or what to conclude.
Neural Network
In information technology (IT), a neural network is a system of
hardware and/or software patterned after the operation of neurons in
the human brain. Neural networks -- also called artificial neural
networks -- are a variety of deep learning technology, which also falls
under the umbrella of artificial intelligence, or AI.
Deep Learning
Deep learning (also known as deep structured learning or
hierarchical learning) is part of a broader family of machine learning
methods based on learning data representations, as opposed to
task-specific algorithms. Learning can be supervised, semi-
supervised or unsupervised.
Cognitive Computing
In general, the term cognitive computing has been used to refer to
new hardware and/or software that mimics the functioning of the
human brain and helps to improve human decision-making. In this
sense, CC is a new type of computing with the goal of more accurate
models of how the human brain/mind senses, reasons, and responds
to stimulus. CC applications link data analysis and adaptive page
displays (AUI) to adjust content for a particular type of audience. As
such, CC hardware and applications strive to be more affective and
more influential by design.
Computer Vision
Computer vision is an interdisciplinary field that deals with how
computers can be made for gaining high-level understanding from
digital images or videos. From the perspective of engineering, it
seeks to automate tasks that the human visual system can do.
Neural Language Processing
Natural language processing (NLP) is an area of computer science
and artificial intelligence concerned with the interactions between
computers and human (natural) languages, in particular how to
program computers to process and analyze large amounts of natural
language data.
The Problems
Cybersecurity Vulnerability
Cybersecurity, computer security or IT
security is the protection of computer
systems from the theft and damage to their
hardware, software or information, as well
as from disruption or misdirection of the
services they provide.
Vulnerability is a cyber-security term that
refers to a flaw in a system that can leave it
open to attack. A vulnerability may also refer
to any type of weakness in a computer
system itself, in a set of procedures, or in
anything that leaves information security
exposed to a threat.
Solutions
 Policy makers should work closely to researchers to
investigate, prevent and mitigate risks malicious uses
of AI.
 Researchers and engineers in artificial intelligence
should take the dual-use nature of their work, allowing
misuse considerations to influence research priorities
and standards, and to proactively reach interested
party’s harmful applications are predictable.
Solutions
 Best practices should be identified in research areas
with more than proven methods to solve dual-use of
problems, such as computer security in the of case AI.
 Actively seek to expand the range of stakeholders and
domain experts involved in discussions on these
challenges.
Other-Solutions
 Learn from and with the cybersecurity
community
 Explore different opening models (Dual
Purpose nature of AI and ML)
 Promote a culture of responsibility
 Develop technological and political solutions
Results
Data Protection
Data protection is the process of safeguarding important
information from corruption, compromise or loss. The
importance of data protection increases as the amount
of data created and stored continues to grow at
unprecedented rates.
Results
Vulnerability can be stopped
Vulnerability is the state of being exposed to the possibility
of being attacking or harming the machine. Recently a
processor vulnerability occurred in Intel, AMD and ARM
CPUs and as we know most of the processors are from
these companies. So, if vulnerability occurs again it will be
a global technical crisis.
Thank you for
your Patience

Weitere ähnliche Inhalte

Was ist angesagt?

Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentationsweety seth
 
Knowledge based systems -- introduction
Knowledge based systems -- introductionKnowledge based systems -- introduction
Knowledge based systems -- introductionjkmaster
 
Artificial Intelligence And Its Applications
Artificial Intelligence And Its ApplicationsArtificial Intelligence And Its Applications
Artificial Intelligence And Its ApplicationsKnoldus Inc.
 
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci....NET Conf UY
 
Computational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using AthenaComputational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using AthenaPedro Almir
 
Fundamentals of Artificial Intelligence — QU AIO Leadership in AI
Fundamentals of Artificial Intelligence — QU AIO Leadership in AIFundamentals of Artificial Intelligence — QU AIO Leadership in AI
Fundamentals of Artificial Intelligence — QU AIO Leadership in AIJunaid Qadir
 
COGNITIVE COMPUTING
COGNITIVE COMPUTINGCOGNITIVE COMPUTING
COGNITIVE COMPUTINGmitali singh
 
Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.KRIPAPIOUS
 
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...Dataconomy Media
 
Introduction to Computational Intelligent
Introduction to Computational IntelligentIntroduction to Computational Intelligent
Introduction to Computational IntelligentKent State University
 
Machine learning presentation
Machine learning presentationMachine learning presentation
Machine learning presentationSaurav Prasad
 
Data science dec ppt
Data science dec pptData science dec ppt
Data science dec pptsterlingit
 

Was ist angesagt? (20)

Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Cognitive computing
Cognitive computingCognitive computing
Cognitive computing
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentation
 
Cognitive computing
Cognitive computing Cognitive computing
Cognitive computing
 
Thought-powered typing
Thought-powered typing Thought-powered typing
Thought-powered typing
 
Knowledge based systems -- introduction
Knowledge based systems -- introductionKnowledge based systems -- introduction
Knowledge based systems -- introduction
 
Cognitive computing 2016
Cognitive computing 2016Cognitive computing 2016
Cognitive computing 2016
 
Artificial Intelligence And Its Applications
Artificial Intelligence And Its ApplicationsArtificial Intelligence And Its Applications
Artificial Intelligence And Its Applications
 
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...
 
Computational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using AthenaComputational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using Athena
 
Fundamentals of Artificial Intelligence — QU AIO Leadership in AI
Fundamentals of Artificial Intelligence — QU AIO Leadership in AIFundamentals of Artificial Intelligence — QU AIO Leadership in AI
Fundamentals of Artificial Intelligence — QU AIO Leadership in AI
 
COGNITIVE COMPUTING
COGNITIVE COMPUTINGCOGNITIVE COMPUTING
COGNITIVE COMPUTING
 
Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.
 
ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE
 
Cognitive computing
Cognitive computing Cognitive computing
Cognitive computing
 
Cognitive Technology
Cognitive TechnologyCognitive Technology
Cognitive Technology
 
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...
 
Introduction to Computational Intelligent
Introduction to Computational IntelligentIntroduction to Computational Intelligent
Introduction to Computational Intelligent
 
Machine learning presentation
Machine learning presentationMachine learning presentation
Machine learning presentation
 
Data science dec ppt
Data science dec pptData science dec ppt
Data science dec ppt
 

Ähnlich wie Every thing about Artificial Intelligence

What is Artificial Intelligence and Machine Learning (1).pptx
What is Artificial Intelligence and Machine Learning (1).pptxWhat is Artificial Intelligence and Machine Learning (1).pptx
What is Artificial Intelligence and Machine Learning (1).pptxprasadishana669
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISpijans
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AIamdigitalmark15
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...eswaralaldevadoss
 
A Study On Artificial Intelligence Technologies And Its Applications
A Study On Artificial Intelligence Technologies And Its ApplicationsA Study On Artificial Intelligence Technologies And Its Applications
A Study On Artificial Intelligence Technologies And Its ApplicationsJeff Nelson
 
The upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applicationsThe upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applicationsIJECEIAES
 
A quick guide to artificial intelligence working - Techahead
A quick guide to artificial intelligence working - TechaheadA quick guide to artificial intelligence working - Techahead
A quick guide to artificial intelligence working - TechaheadJatin Sapra
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYCynthia King
 
The A_Z of Artificial Intelligence Types and Principles_1687569150.pdf
The  A_Z of Artificial Intelligence Types and Principles_1687569150.pdfThe  A_Z of Artificial Intelligence Types and Principles_1687569150.pdf
The A_Z of Artificial Intelligence Types and Principles_1687569150.pdfssuseredfe14
 
Artificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxArtificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxNetiApps
 
What is Artificial Intelligence.docx
What is Artificial Intelligence.docxWhat is Artificial Intelligence.docx
What is Artificial Intelligence.docxAliParsa22
 
Building an AI App: A Comprehensive Guide for Beginners
Building an AI App: A Comprehensive Guide for BeginnersBuilding an AI App: A Comprehensive Guide for Beginners
Building an AI App: A Comprehensive Guide for BeginnersChristopherTHyatt
 
Comparison Between Artificial Intelligence, Machine Learning, and Deep Learning
Comparison Between Artificial Intelligence, Machine Learning, and Deep LearningComparison Between Artificial Intelligence, Machine Learning, and Deep Learning
Comparison Between Artificial Intelligence, Machine Learning, and Deep LearningZaranTech LLC
 
Deep learning vs. machine learning what business leaders need to know
Deep learning vs. machine learning what business leaders need to knowDeep learning vs. machine learning what business leaders need to know
Deep learning vs. machine learning what business leaders need to knowSameerShaik43
 
leewayhertz.com-How to build an AI app.pdf
leewayhertz.com-How to build an AI app.pdfleewayhertz.com-How to build an AI app.pdf
leewayhertz.com-How to build an AI app.pdfrobertsamuel23
 
what-is-machine-learning-and-its-importance-in-todays-world.pdf
what-is-machine-learning-and-its-importance-in-todays-world.pdfwhat-is-machine-learning-and-its-importance-in-todays-world.pdf
what-is-machine-learning-and-its-importance-in-todays-world.pdfTemok IT Services
 

Ähnlich wie Every thing about Artificial Intelligence (20)

What is Artificial Intelligence and Machine Learning (1).pptx
What is Artificial Intelligence and Machine Learning (1).pptxWhat is Artificial Intelligence and Machine Learning (1).pptx
What is Artificial Intelligence and Machine Learning (1).pptx
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
 
Applications of AI
Applications of AIApplications of AI
Applications of AI
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
 
A Study On Artificial Intelligence Technologies And Its Applications
A Study On Artificial Intelligence Technologies And Its ApplicationsA Study On Artificial Intelligence Technologies And Its Applications
A Study On Artificial Intelligence Technologies And Its Applications
 
The upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applicationsThe upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applications
 
A quick guide to artificial intelligence working - Techahead
A quick guide to artificial intelligence working - TechaheadA quick guide to artificial intelligence working - Techahead
A quick guide to artificial intelligence working - Techahead
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
Machine learning
Machine learningMachine learning
Machine learning
 
The A_Z of Artificial Intelligence Types and Principles_1687569150.pdf
The  A_Z of Artificial Intelligence Types and Principles_1687569150.pdfThe  A_Z of Artificial Intelligence Types and Principles_1687569150.pdf
The A_Z of Artificial Intelligence Types and Principles_1687569150.pdf
 
Artificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxArtificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docx
 
What is Artificial Intelligence.docx
What is Artificial Intelligence.docxWhat is Artificial Intelligence.docx
What is Artificial Intelligence.docx
 
Building an AI App: A Comprehensive Guide for Beginners
Building an AI App: A Comprehensive Guide for BeginnersBuilding an AI App: A Comprehensive Guide for Beginners
Building an AI App: A Comprehensive Guide for Beginners
 
Comparison Between Artificial Intelligence, Machine Learning, and Deep Learning
Comparison Between Artificial Intelligence, Machine Learning, and Deep LearningComparison Between Artificial Intelligence, Machine Learning, and Deep Learning
Comparison Between Artificial Intelligence, Machine Learning, and Deep Learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
Deep learning vs. machine learning what business leaders need to know
Deep learning vs. machine learning what business leaders need to knowDeep learning vs. machine learning what business leaders need to know
Deep learning vs. machine learning what business leaders need to know
 
leewayhertz.com-How to build an AI app.pdf
leewayhertz.com-How to build an AI app.pdfleewayhertz.com-How to build an AI app.pdf
leewayhertz.com-How to build an AI app.pdf
 
what-is-machine-learning-and-its-importance-in-todays-world.pdf
what-is-machine-learning-and-its-importance-in-todays-world.pdfwhat-is-machine-learning-and-its-importance-in-todays-world.pdf
what-is-machine-learning-and-its-importance-in-todays-world.pdf
 

Kürzlich hochgeladen

Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 

Kürzlich hochgeladen (20)

Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 

Every thing about Artificial Intelligence

  • 1. Artificial Intelligence Malicious Use System BY: VAIBHAV MISHRA KRITI LABHANIYA TRUBA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY BHOPAL, MP
  • 3. What is Artificial Intelligence? Artificial Intelligence is the study of mental faculties through the use of computational models. Artificial Intelligence is a way of making a computer, a computer- controlled robot, or a software think intelligently, in the similar manner the intelligent humans think. Artificial Intelligence is the best field for dreamers to play around. It must be evolved from the thought that making a human-machine is possible.
  • 5. Why AI is Important? • AI automates repetitive learning and discovery through data. • AI adds intelligence to existing products. • AI analyzes more and deeper data using neural networks that have many hidden layers. • AI achieves incredible accuracy though deep neural networks – which was previously impossible.
  • 6. How AI works? AI works by combining large amounts of data with fast, iterative processing and intelligent algorithms, allowing the software to learn automatically from patterns or features in the data. AI is a broad field of study that includes many theories, methods and technologies, as well as the following major subfields: Machine Learning Neural Network Deep Learning Cognitive Computing Computer Vision Neural Language Processing (NLP)
  • 7. Machine Learning Machine Learning automates analytical model building. It uses methods from neural networks, statistics, operations research and physics to find hidden insights in data without explicitly being programmed for where to look or what to conclude.
  • 8. Neural Network In information technology (IT), a neural network is a system of hardware and/or software patterned after the operation of neurons in the human brain. Neural networks -- also called artificial neural networks -- are a variety of deep learning technology, which also falls under the umbrella of artificial intelligence, or AI.
  • 9.
  • 10. Deep Learning Deep learning (also known as deep structured learning or hierarchical learning) is part of a broader family of machine learning methods based on learning data representations, as opposed to task-specific algorithms. Learning can be supervised, semi- supervised or unsupervised.
  • 11. Cognitive Computing In general, the term cognitive computing has been used to refer to new hardware and/or software that mimics the functioning of the human brain and helps to improve human decision-making. In this sense, CC is a new type of computing with the goal of more accurate models of how the human brain/mind senses, reasons, and responds to stimulus. CC applications link data analysis and adaptive page displays (AUI) to adjust content for a particular type of audience. As such, CC hardware and applications strive to be more affective and more influential by design.
  • 12. Computer Vision Computer vision is an interdisciplinary field that deals with how computers can be made for gaining high-level understanding from digital images or videos. From the perspective of engineering, it seeks to automate tasks that the human visual system can do.
  • 13. Neural Language Processing Natural language processing (NLP) is an area of computer science and artificial intelligence concerned with the interactions between computers and human (natural) languages, in particular how to program computers to process and analyze large amounts of natural language data.
  • 14. The Problems Cybersecurity Vulnerability Cybersecurity, computer security or IT security is the protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.
  • 15. Solutions  Policy makers should work closely to researchers to investigate, prevent and mitigate risks malicious uses of AI.  Researchers and engineers in artificial intelligence should take the dual-use nature of their work, allowing misuse considerations to influence research priorities and standards, and to proactively reach interested party’s harmful applications are predictable.
  • 16. Solutions  Best practices should be identified in research areas with more than proven methods to solve dual-use of problems, such as computer security in the of case AI.  Actively seek to expand the range of stakeholders and domain experts involved in discussions on these challenges.
  • 17. Other-Solutions  Learn from and with the cybersecurity community  Explore different opening models (Dual Purpose nature of AI and ML)  Promote a culture of responsibility  Develop technological and political solutions
  • 18. Results Data Protection Data protection is the process of safeguarding important information from corruption, compromise or loss. The importance of data protection increases as the amount of data created and stored continues to grow at unprecedented rates.
  • 19. Results Vulnerability can be stopped Vulnerability is the state of being exposed to the possibility of being attacking or harming the machine. Recently a processor vulnerability occurred in Intel, AMD and ARM CPUs and as we know most of the processors are from these companies. So, if vulnerability occurs again it will be a global technical crisis.
  • 20. Thank you for your Patience

Hinweis der Redaktion

  1. Computer vision is an interdisciplinary field that deals with how computers can be made for gaining high-level understanding from digital images or videos. From the perspective of engineering, it seeks to automate tasks that the human visual system can do. "Computer vision is concerned with the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. It involves the development of a theoretical and algorithmic basis to achieve automatic visual understanding." As a scientific discipline, computer vision is concerned with the theory behind artificial systems that extract information from images. The image data can take many forms, such as video sequences, views from multiple cameras, or multi-dimensional data from a medical scanner. As a technological discipline, computer vision seeks to apply its theories and models for the construction of computer vision systems.