SlideShare a Scribd company logo
Artificial Intelligence
Malicious Use System
BY:
VAIBHAV MISHRA
KRITI LABHANIYA
TRUBA INSTITUTE OF ENGINEERING AND
INFORMATION TECHNOLOGY
BHOPAL, MP
Content
Definitions
Capabilities
The Problems
Solutions
Some More Solutions
Results
What is Artificial Intelligence?
Artificial Intelligence is the study of mental faculties through the use of
computational models.
Artificial Intelligence is a way of making a computer, a computer-
controlled robot, or a software think intelligently, in the similar manner
the intelligent humans think.
Artificial Intelligence is the best field for dreamers to play around. It
must be evolved from the thought that making a human-machine is
possible.
Artificial Intelligence Capabilities
Why AI is Important?
• AI automates repetitive learning and discovery through data.
• AI adds intelligence to existing products.
• AI analyzes more and deeper data using neural networks that
have many hidden layers.
• AI achieves incredible accuracy though deep neural networks –
which was previously impossible.
How AI works?
AI works by combining large amounts of data with fast, iterative
processing and intelligent algorithms, allowing the software to learn
automatically from patterns or features in the data. AI is a broad field
of study that includes many theories, methods and technologies, as
well as the following major subfields:
Machine Learning Neural Network
Deep Learning Cognitive Computing
Computer Vision Neural Language Processing (NLP)
Machine Learning
Machine Learning automates analytical model building. It uses
methods from neural networks, statistics, operations research and
physics to find hidden insights in data without explicitly being
programmed for where to look or what to conclude.
Neural Network
In information technology (IT), a neural network is a system of
hardware and/or software patterned after the operation of neurons in
the human brain. Neural networks -- also called artificial neural
networks -- are a variety of deep learning technology, which also falls
under the umbrella of artificial intelligence, or AI.
Deep Learning
Deep learning (also known as deep structured learning or
hierarchical learning) is part of a broader family of machine learning
methods based on learning data representations, as opposed to
task-specific algorithms. Learning can be supervised, semi-
supervised or unsupervised.
Cognitive Computing
In general, the term cognitive computing has been used to refer to
new hardware and/or software that mimics the functioning of the
human brain and helps to improve human decision-making. In this
sense, CC is a new type of computing with the goal of more accurate
models of how the human brain/mind senses, reasons, and responds
to stimulus. CC applications link data analysis and adaptive page
displays (AUI) to adjust content for a particular type of audience. As
such, CC hardware and applications strive to be more affective and
more influential by design.
Computer Vision
Computer vision is an interdisciplinary field that deals with how
computers can be made for gaining high-level understanding from
digital images or videos. From the perspective of engineering, it
seeks to automate tasks that the human visual system can do.
Neural Language Processing
Natural language processing (NLP) is an area of computer science
and artificial intelligence concerned with the interactions between
computers and human (natural) languages, in particular how to
program computers to process and analyze large amounts of natural
language data.
The Problems
Cybersecurity Vulnerability
Cybersecurity, computer security or IT
security is the protection of computer
systems from the theft and damage to their
hardware, software or information, as well
as from disruption or misdirection of the
services they provide.
Vulnerability is a cyber-security term that
refers to a flaw in a system that can leave it
open to attack. A vulnerability may also refer
to any type of weakness in a computer
system itself, in a set of procedures, or in
anything that leaves information security
exposed to a threat.
Solutions
 Policy makers should work closely to researchers to
investigate, prevent and mitigate risks malicious uses
of AI.
 Researchers and engineers in artificial intelligence
should take the dual-use nature of their work, allowing
misuse considerations to influence research priorities
and standards, and to proactively reach interested
party’s harmful applications are predictable.
Solutions
 Best practices should be identified in research areas
with more than proven methods to solve dual-use of
problems, such as computer security in the of case AI.
 Actively seek to expand the range of stakeholders and
domain experts involved in discussions on these
challenges.
Other-Solutions
 Learn from and with the cybersecurity
community
 Explore different opening models (Dual
Purpose nature of AI and ML)
 Promote a culture of responsibility
 Develop technological and political solutions
Results
Data Protection
Data protection is the process of safeguarding important
information from corruption, compromise or loss. The
importance of data protection increases as the amount
of data created and stored continues to grow at
unprecedented rates.
Results
Vulnerability can be stopped
Vulnerability is the state of being exposed to the possibility
of being attacking or harming the machine. Recently a
processor vulnerability occurred in Intel, AMD and ARM
CPUs and as we know most of the processors are from
these companies. So, if vulnerability occurs again it will be
a global technical crisis.
Thank you for
your Patience

More Related Content

What's hot

Knowledge based systems -- introduction
Knowledge based systems -- introductionKnowledge based systems -- introduction
Knowledge based systems -- introduction
jkmaster
 

What's hot (20)

Cognitive Computing
Cognitive ComputingCognitive Computing
Cognitive Computing
 
Cognitive computing
Cognitive computingCognitive computing
Cognitive computing
 
Machine learning seminar presentation
Machine learning seminar presentationMachine learning seminar presentation
Machine learning seminar presentation
 
Cognitive computing
Cognitive computing Cognitive computing
Cognitive computing
 
Thought-powered typing
Thought-powered typing Thought-powered typing
Thought-powered typing
 
Knowledge based systems -- introduction
Knowledge based systems -- introductionKnowledge based systems -- introduction
Knowledge based systems -- introduction
 
Cognitive computing 2016
Cognitive computing 2016Cognitive computing 2016
Cognitive computing 2016
 
Artificial Intelligence And Its Applications
Artificial Intelligence And Its ApplicationsArtificial Intelligence And Its Applications
Artificial Intelligence And Its Applications
 
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...
Machine Learning: Inteligencia Artificial no es sólo un tema de Ciencia Ficci...
 
Computational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using AthenaComputational Intelligence: concepts and applications using Athena
Computational Intelligence: concepts and applications using Athena
 
Fundamentals of Artificial Intelligence — QU AIO Leadership in AI
Fundamentals of Artificial Intelligence — QU AIO Leadership in AIFundamentals of Artificial Intelligence — QU AIO Leadership in AI
Fundamentals of Artificial Intelligence — QU AIO Leadership in AI
 
COGNITIVE COMPUTING
COGNITIVE COMPUTINGCOGNITIVE COMPUTING
COGNITIVE COMPUTING
 
Cognitive computing ppt.
Cognitive computing ppt.Cognitive computing ppt.
Cognitive computing ppt.
 
ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE
 
Cognitive computing
Cognitive computing Cognitive computing
Cognitive computing
 
Cognitive Technology
Cognitive TechnologyCognitive Technology
Cognitive Technology
 
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...
Ajit Jaokar, Data Science for IoT professor at Oxford University “Enterprise ...
 
Introduction to Computational Intelligent
Introduction to Computational IntelligentIntroduction to Computational Intelligent
Introduction to Computational Intelligent
 
Machine learning presentation
Machine learning presentationMachine learning presentation
Machine learning presentation
 
Data science dec ppt
Data science dec pptData science dec ppt
Data science dec ppt
 

Similar to Every thing about Artificial Intelligence

Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
eswaralaldevadoss
 
The upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applicationsThe upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applications
IJECEIAES
 
Comparison Between Artificial Intelligence, Machine Learning, and Deep Learning
Comparison Between Artificial Intelligence, Machine Learning, and Deep LearningComparison Between Artificial Intelligence, Machine Learning, and Deep Learning
Comparison Between Artificial Intelligence, Machine Learning, and Deep Learning
ZaranTech LLC
 

Similar to Every thing about Artificial Intelligence (20)

What is Artificial Intelligence and Machine Learning (1).pptx
What is Artificial Intelligence and Machine Learning (1).pptxWhat is Artificial Intelligence and Machine Learning (1).pptx
What is Artificial Intelligence and Machine Learning (1).pptx
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSISUNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
UNCOVERING FAKE NEWS BY MEANS OF SOCIAL NETWORK ANALYSIS
 
Top And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AITop And Best Digital Marketing Agency With AI
Top And Best Digital Marketing Agency With AI
 
Applications of AI
Applications of AIApplications of AI
Applications of AI
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
 
A Study On Artificial Intelligence Technologies And Its Applications
A Study On Artificial Intelligence Technologies And Its ApplicationsA Study On Artificial Intelligence Technologies And Its Applications
A Study On Artificial Intelligence Technologies And Its Applications
 
The upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applicationsThe upsurge of deep learning for computer vision applications
The upsurge of deep learning for computer vision applications
 
A quick guide to artificial intelligence working - Techahead
A quick guide to artificial intelligence working - TechaheadA quick guide to artificial intelligence working - Techahead
A quick guide to artificial intelligence working - Techahead
 
Artificial intelligence ( AI ) | Guide
Artificial intelligence ( AI )  |  GuideArtificial intelligence ( AI )  |  Guide
Artificial intelligence ( AI ) | Guide
 
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITYARTIFICIAL INTELLIGENCE IN CYBER SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER SECURITY
 
Machine learning
Machine learningMachine learning
Machine learning
 
The A_Z of Artificial Intelligence Types and Principles_1687569150.pdf
The  A_Z of Artificial Intelligence Types and Principles_1687569150.pdfThe  A_Z of Artificial Intelligence Types and Principles_1687569150.pdf
The A_Z of Artificial Intelligence Types and Principles_1687569150.pdf
 
Artificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docxArtificial Intelligence and Machine Learning.docx
Artificial Intelligence and Machine Learning.docx
 
What is Artificial Intelligence.docx
What is Artificial Intelligence.docxWhat is Artificial Intelligence.docx
What is Artificial Intelligence.docx
 
Building an AI App: A Comprehensive Guide for Beginners
Building an AI App: A Comprehensive Guide for BeginnersBuilding an AI App: A Comprehensive Guide for Beginners
Building an AI App: A Comprehensive Guide for Beginners
 
Comparison Between Artificial Intelligence, Machine Learning, and Deep Learning
Comparison Between Artificial Intelligence, Machine Learning, and Deep LearningComparison Between Artificial Intelligence, Machine Learning, and Deep Learning
Comparison Between Artificial Intelligence, Machine Learning, and Deep Learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
Deep learning vs. machine learning what business leaders need to know
Deep learning vs. machine learning what business leaders need to knowDeep learning vs. machine learning what business leaders need to know
Deep learning vs. machine learning what business leaders need to know
 
leewayhertz.com-How to build an AI app.pdf
leewayhertz.com-How to build an AI app.pdfleewayhertz.com-How to build an AI app.pdf
leewayhertz.com-How to build an AI app.pdf
 

Recently uploaded

Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
Kamal Acharya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
Atif Razi
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 

Recently uploaded (20)

NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdfDanfoss NeoCharge Technology -A Revolution in 2024.pdf
Danfoss NeoCharge Technology -A Revolution in 2024.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 

Every thing about Artificial Intelligence

  • 1. Artificial Intelligence Malicious Use System BY: VAIBHAV MISHRA KRITI LABHANIYA TRUBA INSTITUTE OF ENGINEERING AND INFORMATION TECHNOLOGY BHOPAL, MP
  • 3. What is Artificial Intelligence? Artificial Intelligence is the study of mental faculties through the use of computational models. Artificial Intelligence is a way of making a computer, a computer- controlled robot, or a software think intelligently, in the similar manner the intelligent humans think. Artificial Intelligence is the best field for dreamers to play around. It must be evolved from the thought that making a human-machine is possible.
  • 5. Why AI is Important? • AI automates repetitive learning and discovery through data. • AI adds intelligence to existing products. • AI analyzes more and deeper data using neural networks that have many hidden layers. • AI achieves incredible accuracy though deep neural networks – which was previously impossible.
  • 6. How AI works? AI works by combining large amounts of data with fast, iterative processing and intelligent algorithms, allowing the software to learn automatically from patterns or features in the data. AI is a broad field of study that includes many theories, methods and technologies, as well as the following major subfields: Machine Learning Neural Network Deep Learning Cognitive Computing Computer Vision Neural Language Processing (NLP)
  • 7. Machine Learning Machine Learning automates analytical model building. It uses methods from neural networks, statistics, operations research and physics to find hidden insights in data without explicitly being programmed for where to look or what to conclude.
  • 8. Neural Network In information technology (IT), a neural network is a system of hardware and/or software patterned after the operation of neurons in the human brain. Neural networks -- also called artificial neural networks -- are a variety of deep learning technology, which also falls under the umbrella of artificial intelligence, or AI.
  • 9.
  • 10. Deep Learning Deep learning (also known as deep structured learning or hierarchical learning) is part of a broader family of machine learning methods based on learning data representations, as opposed to task-specific algorithms. Learning can be supervised, semi- supervised or unsupervised.
  • 11. Cognitive Computing In general, the term cognitive computing has been used to refer to new hardware and/or software that mimics the functioning of the human brain and helps to improve human decision-making. In this sense, CC is a new type of computing with the goal of more accurate models of how the human brain/mind senses, reasons, and responds to stimulus. CC applications link data analysis and adaptive page displays (AUI) to adjust content for a particular type of audience. As such, CC hardware and applications strive to be more affective and more influential by design.
  • 12. Computer Vision Computer vision is an interdisciplinary field that deals with how computers can be made for gaining high-level understanding from digital images or videos. From the perspective of engineering, it seeks to automate tasks that the human visual system can do.
  • 13. Neural Language Processing Natural language processing (NLP) is an area of computer science and artificial intelligence concerned with the interactions between computers and human (natural) languages, in particular how to program computers to process and analyze large amounts of natural language data.
  • 14. The Problems Cybersecurity Vulnerability Cybersecurity, computer security or IT security is the protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack. A vulnerability may also refer to any type of weakness in a computer system itself, in a set of procedures, or in anything that leaves information security exposed to a threat.
  • 15. Solutions  Policy makers should work closely to researchers to investigate, prevent and mitigate risks malicious uses of AI.  Researchers and engineers in artificial intelligence should take the dual-use nature of their work, allowing misuse considerations to influence research priorities and standards, and to proactively reach interested party’s harmful applications are predictable.
  • 16. Solutions  Best practices should be identified in research areas with more than proven methods to solve dual-use of problems, such as computer security in the of case AI.  Actively seek to expand the range of stakeholders and domain experts involved in discussions on these challenges.
  • 17. Other-Solutions  Learn from and with the cybersecurity community  Explore different opening models (Dual Purpose nature of AI and ML)  Promote a culture of responsibility  Develop technological and political solutions
  • 18. Results Data Protection Data protection is the process of safeguarding important information from corruption, compromise or loss. The importance of data protection increases as the amount of data created and stored continues to grow at unprecedented rates.
  • 19. Results Vulnerability can be stopped Vulnerability is the state of being exposed to the possibility of being attacking or harming the machine. Recently a processor vulnerability occurred in Intel, AMD and ARM CPUs and as we know most of the processors are from these companies. So, if vulnerability occurs again it will be a global technical crisis.
  • 20. Thank you for your Patience

Editor's Notes

  1. Computer vision is an interdisciplinary field that deals with how computers can be made for gaining high-level understanding from digital images or videos. From the perspective of engineering, it seeks to automate tasks that the human visual system can do. "Computer vision is concerned with the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. It involves the development of a theoretical and algorithmic basis to achieve automatic visual understanding." As a scientific discipline, computer vision is concerned with the theory behind artificial systems that extract information from images. The image data can take many forms, such as video sequences, views from multiple cameras, or multi-dimensional data from a medical scanner. As a technological discipline, computer vision seeks to apply its theories and models for the construction of computer vision systems.