SlideShare a Scribd company logo
1 of 6
356 Part II • Predictive Analytics/Machine Learning
Face recognition, although seemingly similar to image
recognition, is a much more complicated undertaking.
The goal of face recognition is to identify the individ-
ual as opposed to the class it belongs to (human), and
this identification task needs to be performed on a
nonstatic (i.e., moving person) 3D environment. Face
recognition has been an active research field in AI
for many decades with limited success until recently.
Thanks to the new generation of algorithms (i.e., deep
learning) coupled with large data sets and computa-
tional power, face recognition technology is starting to
make a significant impact on real-world applications.
From security to marketing, face recognition and the
variety of applications/use cases of this technology
are increasing at an astounding pace.
Some of the premier examples of face recogni-
tion (both in advancements in technology and in the
creative use of the technology perspectives) come
from China. Today in China, face recognition is a
very hot topic both from business development and
from application development perspectives. Face
recognition has become a fruitful ecosystem with
hundreds of start-ups in China. In personal and/or
business settings, people in China are widely using
and relying on devices whose security is based on
automatic recognition of their faces.
As perhaps the largest scale practical applica-
tion case of deep learning and face recognition in
the world today, the Chinese government recently
started a project known as “Sharp Eyes” that aims at
establishing a nationwide surveillance system based
on face recognition. The project plans to integrate
security cameras already installed in public places
with private cameras on buildings and to utilize AI
and deep learning to analyze the videos from those
cameras. With millions of cameras and billions of
lines of code, China is building a high-tech authori-
tarian future. With this system, cameras in some cit-
ies can scan train and bus stations as well as airports
to identify and catch China’s most wanted suspected
criminals. Billboard-size displays can show the faces
of jaywalkers and list the names and pictures of peo-
ple who do not pay their debts. Facial recognition
scanners guard the entrances to housing complexes.
An interesting example of this surveillance
system is the “shame game” (Mozur, 2018). An
intersection south of Changhong Bridge in the city of
Xiangyang previously was a nightmare. Cars drove
fast, and jaywalkers darted into the street. Then,
in the summer of 2017, the police put up cameras
linked to facial recognition technology and a big out-
door screen. Photos of lawbreakers were displayed
alongside their names and government identifica-
tion numbers. People were initially excited to see
their faces on the screen until propaganda outlets
told them that this was a form of punishment. Using
this, citizens not only became a subject of this shame
game but also were assigned negative citizenship
points. Conversely, on the positive side, if people are
caught on camera showing good behavior, like pick-
ing up a piece of trash from the road and putting it
into a trash can or helping an elderly person cross an
intersection, they get positive citizenship points that
can be used for a variety of small awards.
China already has an estimated 200 million sur-
veillance cameras—four times as many as the United
States. The system is mainly intended to be used for
tracking suspects, spotting suspicious behavior, and
predicting crimes. For instance, to find a criminal, the
image of a suspect can be uploaded to the system,
matching it against millions of faces recognized from
videos of millions of active security cameras across
the country. This can find individuals with a high
degree of similarity. The system also is merged with
a huge database of information on medical records,
travel bookings, online purchases, and even social
media activities of every citizen and can monitor
practically everyone in the country (with 1.4 billion
people), tracking where they are and what they are
doing each moment (Denyer, 2018). Going beyond
narrowly defined security purposes, the govern-
ment expects Sharp Eyes to ultimately assign every
individual in the country a “social credit score” that
specifies to what extent she or he is trustworthy.
While such an unrestricted application of deep
learning (i.e., spying on citizens) is against the privacy
and ethical norms and regulations of many western
countries, including the United States, it is becoming
a common practice in countries with less restrictive
privacy laws and concerns as in China. Even western
countries have begun to plan on employing similar
technologies in limited scales only for security and
Application Case 6.6 From Image Recognition to Face
Recognition
Chapter 6 • Deep Learning and Cognitive Computing 357
Text Processing Using Convolutional Networks
In addition to image processing, which was in fact the main
reason for the popularity
and development of convolutional networks, they have been
shown to be useful in some
large-scale text mining tasks as well. Especially since 2013,
when Google published its
word2vec project (Mikolov et al., 2013; Mikolov, Sutskever,
Chen, Corrado, and Dean,
2013), the applications of deep learning for text mining have
increased remarkably.
Word2vec is a two-layer neural network that gets a large text
corpus as the input
and converts each word in the corpus to a numeric vector of any
given size (typically
ranging from 100 to 1,000) with very interesting features.
Although word2vec itself is not
a deep learning algorithm, its outputs (word vectors also known
as word embeddings)
already have been widely used in many deep learning research
and commercial projects
as inputs.
One of the most interesting properties of word vectors created
by the word2vec
algorithm is maintaining the words’ relative associations. For
example, vector operations
vector (‘King’) - vector (‘Man’) + vector (‘Woman’)
and
vector (‘London’) - vector (‘England’) + vector (‘France’)
will result in a vector very close to vector (‘Queen’) and vector
(‘Paris’), respectively.
Figure 6.29 shows a simple vector representation of the first
example in a two-dimensional
vector space.
Moreover, the vectors are specified in such a way that those of a
similar context are
placed very close to each other in the n-dimensional vector
space. For instance, in the
word2vec model pretrained by Google using a corpus including
about 100 billion words
(taken from Google News), the closest vectors to the vector
(‘Sweden’) in terms of cosine
distance, as shown in Table 6.2, identify European country
names near the Scandinavian
region, the same region in which Sweden is located.
Additionally, since word2vec takes into account the contexts in
which a word has
been used and the frequency of using it in each context in
guessing the meaning of the
word, it enables us to represent each term with its semantic
context instead of just the
syntactic/symbolic term itself. As a result, word2vec addresses
several word variation
issues that used to be problematic in traditional text mining
activities. In other words,
crime prevention purposes. The FBI’s Next Generation
Identification System, for instance, is a lawful appli-
cation of facial recognition and deep learning that
compares images from crime scenes with a national
database of mug shots to identify potential suspects.
Questions for Case 6.6
1. What are the technical challenges in face
recognition?
2. Beyond security and surveillance purposes, where
else do you think face recognition can be used?
3. What are the foreseeable social and cultural
problems with developing and using face recog-
nition technology?
Sources: Mozur, P. (2018, June 8). “Inside China’s Dystopian
Dreams: A.I., Shame and Lots of Cameras.” The New York
Times.
https://www.nytimes.com/2018/07/08/business/china-
surveillance-technology.html; Denyer, S. (2018, January).
“Beijing Bets on Facial Recognition in a Big Drive for Total
Surveillance.” The Washington Post. https://www.washing-
tonpost.com/news/world/wp/2018/01/07/feature/in-
china-facial-recognition-is-sharp-end-of-a-drive-for-total-
surveillance/?noredirect=on&utm_term=.e73091681b31.

More Related Content

Similar to 356 Part II • Predictive AnalyticsMachine LearningFace re.docx

Understand the Idea of Big Data and in Present Scenario
Understand the Idea of Big Data and in Present ScenarioUnderstand the Idea of Big Data and in Present Scenario
Understand the Idea of Big Data and in Present ScenarioAI Publications
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
2007 Forecast on the Future of Surveillance Technologies
2007 Forecast on the Future of Surveillance Technologies2007 Forecast on the Future of Surveillance Technologies
2007 Forecast on the Future of Surveillance TechnologiesEric Garland
 
201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014Francisco Calzado
 
The Robos Are Coming - How AI will revolutionize Insurance 0117
The Robos Are Coming - How AI will revolutionize Insurance 0117The Robos Are Coming - How AI will revolutionize Insurance 0117
The Robos Are Coming - How AI will revolutionize Insurance 0117Graham Clark
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Maurice Dawson
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 Brian Pichman
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...CSEIJJournal
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...CSEIJJournal
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detectionStudentRocks
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
JIMS Rohini IT Flash Monthly Newsletter - October Issue
JIMS Rohini IT Flash Monthly Newsletter  - October IssueJIMS Rohini IT Flash Monthly Newsletter  - October Issue
JIMS Rohini IT Flash Monthly Newsletter - October IssueJIMS Rohini Sector 5
 
What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.Techugo
 
Idc the digital universe in 2020
Idc the digital universe in 2020Idc the digital universe in 2020
Idc the digital universe in 2020Jyrki Määttä
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemIRJET Journal
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
This startup
This startupThis startup
This startupAfcherMia
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 

Similar to 356 Part II • Predictive AnalyticsMachine LearningFace re.docx (20)

Understand the Idea of Big Data and in Present Scenario
Understand the Idea of Big Data and in Present ScenarioUnderstand the Idea of Big Data and in Present Scenario
Understand the Idea of Big Data and in Present Scenario
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
2007 Forecast on the Future of Surveillance Technologies
2007 Forecast on the Future of Surveillance Technologies2007 Forecast on the Future of Surveillance Technologies
2007 Forecast on the Future of Surveillance Technologies
 
201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
The Robos Are Coming - How AI will revolutionize Insurance 0117
The Robos Are Coming - How AI will revolutionize Insurance 0117The Robos Are Coming - How AI will revolutionize Insurance 0117
The Robos Are Coming - How AI will revolutionize Insurance 0117
 
Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...Exploring Secure Computing for the Internet of Things, Internet of Everything...
Exploring Secure Computing for the Internet of Things, Internet of Everything...
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023 What's on the Technology Horizon for 2023
What's on the Technology Horizon for 2023
 
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
Exploratory Data Analysis and Feature Selection for Social Media Hackers Pred...
 
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
EXPLORATORY DATA ANALYSIS AND FEATURE SELECTION FOR SOCIAL MEDIA HACKERS PRED...
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
JIMS Rohini IT Flash Monthly Newsletter - October Issue
JIMS Rohini IT Flash Monthly Newsletter  - October IssueJIMS Rohini IT Flash Monthly Newsletter  - October Issue
JIMS Rohini IT Flash Monthly Newsletter - October Issue
 
What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.What is the Future of Android App Development for 2023 & Beyond.
What is the Future of Android App Development for 2023 & Beyond.
 
Idc the digital universe in 2020
Idc the digital universe in 2020Idc the digital universe in 2020
Idc the digital universe in 2020
 
Review on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection SystemReview on Arduino-Based Face Mask Detection System
Review on Arduino-Based Face Mask Detection System
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
This startup
This startupThis startup
This startup
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 

More from domenicacullison

5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docxdomenicacullison
 
5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docxdomenicacullison
 
5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docxdomenicacullison
 
4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docxdomenicacullison
 
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docxdomenicacullison
 
5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docxdomenicacullison
 
4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docxdomenicacullison
 
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docxdomenicacullison
 
4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docxdomenicacullison
 
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docxdomenicacullison
 
4To Replace with name Comment by Sharon Rose Use down ar.docx
4To  Replace with name Comment by Sharon Rose Use down ar.docx4To  Replace with name Comment by Sharon Rose Use down ar.docx
4To Replace with name Comment by Sharon Rose Use down ar.docxdomenicacullison
 
5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docxdomenicacullison
 
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docxdomenicacullison
 
5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docxdomenicacullison
 
5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docxdomenicacullison
 
5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docxdomenicacullison
 
465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docxdomenicacullison
 
450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docxdomenicacullison
 
459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docxdomenicacullison
 
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docxdomenicacullison
 

More from domenicacullison (20)

5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx5 to 8  sentence each 1. Declining marriage rates have led many .docx
5 to 8  sentence each 1. Declining marriage rates have led many .docx
 
5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx5-7 PagesYou will craft individual essays in response to the pro.docx
5-7 PagesYou will craft individual essays in response to the pro.docx
 
5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx5.1 Assignment Reading and RemediationGetting Start.docx
5.1 Assignment Reading and RemediationGetting Start.docx
 
4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx4TH EDITIONManaging and UsingInformation Systems.docx
4TH EDITIONManaging and UsingInformation Systems.docx
 
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
5. The Holy Trinity is central to Catholic beliefs about God. We acc.docx
 
5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx5.1 Provide a brief definition of network access control.5.2 W.docx
5.1 Provide a brief definition of network access control.5.2 W.docx
 
4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx4Discussion 6 Review of Four Indiana State Policies.docx
4Discussion 6 Review of Four Indiana State Policies.docx
 
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx492020 Print Previewhttpsng.cengage.comstaticnbui.docx
492020 Print Previewhttpsng.cengage.comstaticnbui.docx
 
4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx4pagesone is assginmentthe other 3 essays are related wo.docx
4pagesone is assginmentthe other 3 essays are related wo.docx
 
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx47PATIENT FILEThe Case The sleepy woman with anxiety.docx
47PATIENT FILEThe Case The sleepy woman with anxiety.docx
 
4To Replace with name Comment by Sharon Rose Use down ar.docx
4To  Replace with name Comment by Sharon Rose Use down ar.docx4To  Replace with name Comment by Sharon Rose Use down ar.docx
4To Replace with name Comment by Sharon Rose Use down ar.docx
 
5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx5 pages in length (not including title page or references)This.docx
5 pages in length (not including title page or references)This.docx
 
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx5 to 7 DAY EXERCISE LOG Exercise Log  Name___Hejin Lin__.docx
5 to 7 DAY EXERCISE LOG Exercise Log Name___Hejin Lin__.docx
 
5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx5 Pages 1. Should nonprofit organizations be viewed principally .docx
5 Pages 1. Should nonprofit organizations be viewed principally .docx
 
5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx5 pagesResearch either a wildfire and mass movement (one tha.docx
5 pagesResearch either a wildfire and mass movement (one tha.docx
 
5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx5 Establishing Organizational ObjectivesiStockThinkstock.docx
5 Establishing Organizational ObjectivesiStockThinkstock.docx
 
465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx465 Current Procedural Terminology © 2015 American Medical A.docx
465 Current Procedural Terminology © 2015 American Medical A.docx
 
450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx450+ WordsDiscussion Questions What are the main tenants of.docx
450+ WordsDiscussion Questions What are the main tenants of.docx
 
459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx459- Provide a substantive response to at least two of your pe.docx
459- Provide a substantive response to at least two of your pe.docx
 
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
4th Grade Science-A Discussion of how Students Learn to Self Assess.docx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

356 Part II • Predictive AnalyticsMachine LearningFace re.docx

  • 1. 356 Part II • Predictive Analytics/Machine Learning Face recognition, although seemingly similar to image recognition, is a much more complicated undertaking. The goal of face recognition is to identify the individ- ual as opposed to the class it belongs to (human), and this identification task needs to be performed on a nonstatic (i.e., moving person) 3D environment. Face recognition has been an active research field in AI for many decades with limited success until recently. Thanks to the new generation of algorithms (i.e., deep learning) coupled with large data sets and computa- tional power, face recognition technology is starting to make a significant impact on real-world applications. From security to marketing, face recognition and the variety of applications/use cases of this technology are increasing at an astounding pace. Some of the premier examples of face recogni- tion (both in advancements in technology and in the creative use of the technology perspectives) come from China. Today in China, face recognition is a very hot topic both from business development and from application development perspectives. Face recognition has become a fruitful ecosystem with hundreds of start-ups in China. In personal and/or business settings, people in China are widely using and relying on devices whose security is based on automatic recognition of their faces. As perhaps the largest scale practical applica- tion case of deep learning and face recognition in
  • 2. the world today, the Chinese government recently started a project known as “Sharp Eyes” that aims at establishing a nationwide surveillance system based on face recognition. The project plans to integrate security cameras already installed in public places with private cameras on buildings and to utilize AI and deep learning to analyze the videos from those cameras. With millions of cameras and billions of lines of code, China is building a high-tech authori- tarian future. With this system, cameras in some cit- ies can scan train and bus stations as well as airports to identify and catch China’s most wanted suspected criminals. Billboard-size displays can show the faces of jaywalkers and list the names and pictures of peo- ple who do not pay their debts. Facial recognition scanners guard the entrances to housing complexes. An interesting example of this surveillance system is the “shame game” (Mozur, 2018). An intersection south of Changhong Bridge in the city of Xiangyang previously was a nightmare. Cars drove fast, and jaywalkers darted into the street. Then, in the summer of 2017, the police put up cameras linked to facial recognition technology and a big out- door screen. Photos of lawbreakers were displayed alongside their names and government identifica- tion numbers. People were initially excited to see their faces on the screen until propaganda outlets told them that this was a form of punishment. Using this, citizens not only became a subject of this shame game but also were assigned negative citizenship points. Conversely, on the positive side, if people are caught on camera showing good behavior, like pick- ing up a piece of trash from the road and putting it into a trash can or helping an elderly person cross an
  • 3. intersection, they get positive citizenship points that can be used for a variety of small awards. China already has an estimated 200 million sur- veillance cameras—four times as many as the United States. The system is mainly intended to be used for tracking suspects, spotting suspicious behavior, and predicting crimes. For instance, to find a criminal, the image of a suspect can be uploaded to the system, matching it against millions of faces recognized from videos of millions of active security cameras across the country. This can find individuals with a high degree of similarity. The system also is merged with a huge database of information on medical records, travel bookings, online purchases, and even social media activities of every citizen and can monitor practically everyone in the country (with 1.4 billion people), tracking where they are and what they are doing each moment (Denyer, 2018). Going beyond narrowly defined security purposes, the govern- ment expects Sharp Eyes to ultimately assign every individual in the country a “social credit score” that specifies to what extent she or he is trustworthy. While such an unrestricted application of deep learning (i.e., spying on citizens) is against the privacy and ethical norms and regulations of many western countries, including the United States, it is becoming a common practice in countries with less restrictive privacy laws and concerns as in China. Even western countries have begun to plan on employing similar technologies in limited scales only for security and Application Case 6.6 From Image Recognition to Face Recognition
  • 4. Chapter 6 • Deep Learning and Cognitive Computing 357 Text Processing Using Convolutional Networks In addition to image processing, which was in fact the main reason for the popularity and development of convolutional networks, they have been shown to be useful in some large-scale text mining tasks as well. Especially since 2013, when Google published its word2vec project (Mikolov et al., 2013; Mikolov, Sutskever, Chen, Corrado, and Dean, 2013), the applications of deep learning for text mining have increased remarkably. Word2vec is a two-layer neural network that gets a large text corpus as the input and converts each word in the corpus to a numeric vector of any given size (typically ranging from 100 to 1,000) with very interesting features. Although word2vec itself is not a deep learning algorithm, its outputs (word vectors also known as word embeddings) already have been widely used in many deep learning research and commercial projects as inputs. One of the most interesting properties of word vectors created by the word2vec algorithm is maintaining the words’ relative associations. For example, vector operations vector (‘King’) - vector (‘Man’) + vector (‘Woman’)
  • 5. and vector (‘London’) - vector (‘England’) + vector (‘France’) will result in a vector very close to vector (‘Queen’) and vector (‘Paris’), respectively. Figure 6.29 shows a simple vector representation of the first example in a two-dimensional vector space. Moreover, the vectors are specified in such a way that those of a similar context are placed very close to each other in the n-dimensional vector space. For instance, in the word2vec model pretrained by Google using a corpus including about 100 billion words (taken from Google News), the closest vectors to the vector (‘Sweden’) in terms of cosine distance, as shown in Table 6.2, identify European country names near the Scandinavian region, the same region in which Sweden is located. Additionally, since word2vec takes into account the contexts in which a word has been used and the frequency of using it in each context in guessing the meaning of the word, it enables us to represent each term with its semantic context instead of just the syntactic/symbolic term itself. As a result, word2vec addresses several word variation issues that used to be problematic in traditional text mining activities. In other words, crime prevention purposes. The FBI’s Next Generation Identification System, for instance, is a lawful appli- cation of facial recognition and deep learning that
  • 6. compares images from crime scenes with a national database of mug shots to identify potential suspects. Questions for Case 6.6 1. What are the technical challenges in face recognition? 2. Beyond security and surveillance purposes, where else do you think face recognition can be used? 3. What are the foreseeable social and cultural problems with developing and using face recog- nition technology? Sources: Mozur, P. (2018, June 8). “Inside China’s Dystopian Dreams: A.I., Shame and Lots of Cameras.” The New York Times. https://www.nytimes.com/2018/07/08/business/china- surveillance-technology.html; Denyer, S. (2018, January). “Beijing Bets on Facial Recognition in a Big Drive for Total Surveillance.” The Washington Post. https://www.washing- tonpost.com/news/world/wp/2018/01/07/feature/in- china-facial-recognition-is-sharp-end-of-a-drive-for-total- surveillance/?noredirect=on&utm_term=.e73091681b31.