SlideShare a Scribd company logo
Done By :-
Facebook : Fahd .Allebdi
Twitter : @fahdalharbi13
Email : alking@hotmail.de
Artificial intelligence is a part of computer science that tries to make
computers more intelligent. One of the basic requirements for any
intelligent behavior is learning. Therefore, machine learning is one of
major branches of artificial intelligence and, indeed, it is one of the most
rapidly developing subfields of AI research.
So in this report we will discover The definition of it, history , types and
some real application in real world used.
Machine Learning is the domain of Artificial Intelligence which is
concerned with building adaptive computer systems that are able to
improve their competence and/or efficiency through learning from input
data or from their own problem solving experience.
Machine Learning is arguably the greatest export from computing to
other scientific fields.
Early enthusiasm (1955 - 1965):
• Learning without knowledge;
• Neural modeling (self-organizing systems and decision space techniques);
• Evolutionary learning;
• Rote learning (Samuel Checker’s player).
Dark ages (1962 - 1976):
• To acquire knowledge one needs knowledge;
• Realization of the difficulty of the learning process and of the limitations of the
explored methods (e.g. the perceptron cannot learn the XOR function);
• Symbolic concept learning (Winston’s influential thesis, 1972).
Renaissance (1976 - 1988):
• Exploration of different strategies (EBL, CBR, GA, NN, Abduction, Analogy, etc.);
• Knowledge-intensive learning;
• Successful applications;
• Machine Learning conferences/workshops worldwide.
Maturity (1988 - present):
• Experimental comparisons;
• Revival of non-symbolic methods;
• Computational learning theory;
• Multistrategy learning;
• Integration of machine learning and knowledge acquisition;
Types Of Machine Learning :-
1. Supervised learning is fairly common in classification problems
because the goal is often to get the computer to learn a
classification system that we have created. Digit recognition,
once again, is a common example of classification learning
It is the most common technique for training neural networks and
decision trees. Both of these techniques are highly dependent on the
information given by the pre-determined classifications
Types Of Machine Learning :-
a learning paradigm concerned withislearningsupervised-Semi.2
the study of how computers and natural systems such as humans
learn in the presence of both labeled and unlabeled data
supervised learning is to understand how-of semigoalThe
combining labeled and unlabeled data may change the learning
behavior, and design algorithms that take advantage of such a
combination
Types Of Machine Learning :-
3. Unsupervised learning seems much harder :
the goal is to have the computer learn how to do Something
that we don't tell it how to do! There are actually two
approaches to unsupervised learning.
However, in the few last years due to various technological advances and
research efforts (e.g. evolution of the Web). Some of these modern
applications are learning from biological sequences, learning from
email data, and learning in complex environments such as Web.
People are sending and receiving many messages per day,
communicating with partners and friends, or exchanging files and
information. Unfortunately, the phenomenon of email overload has
grown over the past years becoming a personal headache for users
and a financial issue for companies.
› Automatic Answering :
› Automatic Mail Organization into Folders :
› Email and Thread Summarization :
› Spam Filtering :
› Dynamic Feature Space and Incremental Feature Selection for Email Classification :
 Automatic Answering :
Large companies usually maintain email centers (call centers) with employees
committed to answer incoming messages. Those messages usually come from
company clients and partners and many times address the same problems
and queries .
Automatic email answering is an effort to build email centers or
personalized software that will be able to analyze an incoming message
and then propose or even send an applicable answer.
 Automatic Mail Organization into Folders
The growth of email usage has forced users to find ways to organize archive
and manage their emails more efficiently. Many of them are organizing
incoming messages into separate folders. Folders can be topic-oriented like
“work”, ”personal” and ”funny”.
many users create manually some so-called rules to classify their email
Machine learning provide this task is the automatic classification of incoming
email by observing past and current classifications made by the user Thus,
the user does not need to create the rules by himself.
A lot of research has been recorded in the field and lots of those ideas
have been implemented into useful email tools .
 Email and Thread Summarization :
 email users that receive hundreds of messages per day. Some of them
are newsletters , colleagues, appointment arrangements etc.
It would be extremely useful for them if they could avoid reading all of
those messages and instead read only the most important and necessary
parts
Data mining techniques are explored in order to build trainable tools for
summarization .
 Spam Filtering :
 A spam filter is a program that is used to detect unsolicited and
unwanted email and prevent those messages from getting to a user's
inbox.
 Many different machine learning classifiers have been tested in the
bibliography including Naïve Bayes , Support Vector Machines , Stacking
Classifiers and some of them have proved to be particularly accurate.
 1.5 Dynamic Feature Space and Incremental Feature Selection for Email Classification
 In this section we present a computationally undemanding method that tackles with
this problem . Our approach uses two components in conjunction:
a) an incremental feature ranking method.
b) an incremental learning algorithm that can consider a subset of the features during
prediction.
Such methods evaluate each word based on cumulative statistics
concerning the number of times that it appears in each different
class of documents
Figure 1 . presents
algorithm Update for
the incremental update
of our approach .
There are also other interesting topics that were not discussed
in this report. Some of them are applications on MRI data,
astronomical data, robotics, video games, music data etc.

More Related Content

What's hot

SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN BASHA
 
Machine learning
Machine learningMachine learning
Machine learning
Hemanth Balaraju
 
Technology Choices for Enterprise Integration
Technology Choices for Enterprise IntegrationTechnology Choices for Enterprise Integration
Technology Choices for Enterprise Integration
Sandeep Purao
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
 
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
A Model for Fuzzy Logic Based Machine Learning Approach for  Spam FilteringA Model for Fuzzy Logic Based Machine Learning Approach for  Spam Filtering
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
IOSR Journals
 
IRJET - Chat-Bot for College Information System using AI
IRJET -  	  Chat-Bot for College Information System using AIIRJET -  	  Chat-Bot for College Information System using AI
IRJET - Chat-Bot for College Information System using AI
IRJET Journal
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
IRJET Journal
 
Data scientist enablement dse 400 week 3 roadmap
Data scientist enablement   dse 400   week 3 roadmapData scientist enablement   dse 400   week 3 roadmap
Data scientist enablement dse 400 week 3 roadmapDr. Mohan K. Bavirisetty
 
Module ict society
Module ict societyModule ict society
Module ict societyKak Yong
 
IRJET - Chat-Bot Utilization for Health Consultancy
IRJET - 	  Chat-Bot Utilization for Health ConsultancyIRJET - 	  Chat-Bot Utilization for Health Consultancy
IRJET - Chat-Bot Utilization for Health Consultancy
IRJET Journal
 
Introduction to machine learning
Introduction to machine learningIntroduction to machine learning
Introduction to machine learning
MoTechInc
 
An Intelligent Career Counselling Bot A System for Counselling
An Intelligent Career Counselling Bot A System for CounsellingAn Intelligent Career Counselling Bot A System for Counselling
An Intelligent Career Counselling Bot A System for Counselling
IRJET Journal
 
Information technology (part 1)
Information technology (part  1)Information technology (part  1)
Information technology (part 1)
smumbahelp
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
IRJET Journal
 
Sentiment analysis of comments in social media
Sentiment analysis of comments in social media Sentiment analysis of comments in social media
Sentiment analysis of comments in social media
IJECEIAES
 
Machine learning
Machine learningMachine learning
Machine learning
Prabhakar Gupta
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
Ashish Arora
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
Chano Alfornon
 

What's hot (20)

SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG coursesSULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
 
Machine learning
Machine learningMachine learning
Machine learning
 
Technology Choices for Enterprise Integration
Technology Choices for Enterprise IntegrationTechnology Choices for Enterprise Integration
Technology Choices for Enterprise Integration
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
A Model for Fuzzy Logic Based Machine Learning Approach for  Spam FilteringA Model for Fuzzy Logic Based Machine Learning Approach for  Spam Filtering
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
 
IRJET - Chat-Bot for College Information System using AI
IRJET -  	  Chat-Bot for College Information System using AIIRJET -  	  Chat-Bot for College Information System using AI
IRJET - Chat-Bot for College Information System using AI
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
Data scientist enablement dse 400 week 3 roadmap
Data scientist enablement   dse 400   week 3 roadmapData scientist enablement   dse 400   week 3 roadmap
Data scientist enablement dse 400 week 3 roadmap
 
Module ict society
Module ict societyModule ict society
Module ict society
 
IRJET - Chat-Bot Utilization for Health Consultancy
IRJET - 	  Chat-Bot Utilization for Health ConsultancyIRJET - 	  Chat-Bot Utilization for Health Consultancy
IRJET - Chat-Bot Utilization for Health Consultancy
 
Chat bot in_pythion
Chat bot in_pythionChat bot in_pythion
Chat bot in_pythion
 
Introduction to machine learning
Introduction to machine learningIntroduction to machine learning
Introduction to machine learning
 
An Intelligent Career Counselling Bot A System for Counselling
An Intelligent Career Counselling Bot A System for CounsellingAn Intelligent Career Counselling Bot A System for Counselling
An Intelligent Career Counselling Bot A System for Counselling
 
Information technology (part 1)
Information technology (part  1)Information technology (part  1)
Information technology (part 1)
 
igbo tochukwu CV
igbo tochukwu CVigbo tochukwu CV
igbo tochukwu CV
 
IRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking MethodsIRJET- Different Implemented Captchas and Breaking Methods
IRJET- Different Implemented Captchas and Breaking Methods
 
Sentiment analysis of comments in social media
Sentiment analysis of comments in social media Sentiment analysis of comments in social media
Sentiment analysis of comments in social media
 
Machine learning
Machine learningMachine learning
Machine learning
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 

Viewers also liked

10remarkableentrepreneurshipthoughts 131008125313-phpapp01
10remarkableentrepreneurshipthoughts 131008125313-phpapp0110remarkableentrepreneurshipthoughts 131008125313-phpapp01
10remarkableentrepreneurshipthoughts 131008125313-phpapp01Gina Gu
 
36kr no.94
36kr no.9436kr no.94
36kr no.94Gina Gu
 
Strenthening   students' language skills through technology
Strenthening   students' language skills through  technologyStrenthening   students' language skills through  technology
Strenthening   students' language skills through technologyTelly J Hajny
 
10remarkableentrepreneurshipthoughts 131008125313-phpapp01
10remarkableentrepreneurshipthoughts 131008125313-phpapp0110remarkableentrepreneurshipthoughts 131008125313-phpapp01
10remarkableentrepreneurshipthoughts 131008125313-phpapp01Gina Gu
 
DLIS Versión Final SLSH
DLIS Versión Final SLSHDLIS Versión Final SLSH
DLIS Versión Final SLSH
ElKanahán Rodríguez
 
Sexual health & protective behaviours
Sexual health & protective behavioursSexual health & protective behaviours
Sexual health & protective behaviours
PhilNield
 
Primero april corporate presentation finalv3
Primero april corporate presentation finalv3Primero april corporate presentation finalv3
Primero april corporate presentation finalv3primero_mining
 
Young people project ppt
Young people project pptYoung people project ppt
Young people project pptsvhughes1028
 
Primero corporate presentation may 2014 v2
Primero corporate presentation may 2014 v2Primero corporate presentation may 2014 v2
Primero corporate presentation may 2014 v2primero_mining
 
Social Media and Business
Social Media and BusinessSocial Media and Business
Social Media and Business
Ganapathi M
 
Java coding-conventions
Java coding-conventionsJava coding-conventions
Java coding-conventionsVenky Racha
 
NGSS Assessment: Identifying and Integrating Effective Technologies
NGSS Assessment: Identifying and Integrating Effective TechnologiesNGSS Assessment: Identifying and Integrating Effective Technologies
NGSS Assessment: Identifying and Integrating Effective Technologies
Dermot Donnelly
 
Handelsbeleid in steden en gemeenten (UNIZO Burgemeestersonbijt 16/01/14)
Handelsbeleid in steden en gemeenten (UNIZO Burgemeestersonbijt 16/01/14)Handelsbeleid in steden en gemeenten (UNIZO Burgemeestersonbijt 16/01/14)
Handelsbeleid in steden en gemeenten (UNIZO Burgemeestersonbijt 16/01/14)
Bert Serneels
 
UDL at Sovereign Avenue
UDL at Sovereign AvenueUDL at Sovereign Avenue
UDL at Sovereign Avenuecj serdy
 
Primero november corporate presentation v2
Primero november corporate presentation v2Primero november corporate presentation v2
Primero november corporate presentation v2primero_mining
 
36kr no.94
36kr no.9436kr no.94
36kr no.94Gina Gu
 
Džošua Bel
Džošua BelDžošua Bel
Džošua Belnekonesto
 

Viewers also liked (20)

10remarkableentrepreneurshipthoughts 131008125313-phpapp01
10remarkableentrepreneurshipthoughts 131008125313-phpapp0110remarkableentrepreneurshipthoughts 131008125313-phpapp01
10remarkableentrepreneurshipthoughts 131008125313-phpapp01
 
36kr no.94
36kr no.9436kr no.94
36kr no.94
 
Strenthening   students' language skills through technology
Strenthening   students' language skills through  technologyStrenthening   students' language skills through  technology
Strenthening   students' language skills through technology
 
10remarkableentrepreneurshipthoughts 131008125313-phpapp01
10remarkableentrepreneurshipthoughts 131008125313-phpapp0110remarkableentrepreneurshipthoughts 131008125313-phpapp01
10remarkableentrepreneurshipthoughts 131008125313-phpapp01
 
SKPD 1033 DST Project
SKPD 1033 DST ProjectSKPD 1033 DST Project
SKPD 1033 DST Project
 
DLIS Versión Final SLSH
DLIS Versión Final SLSHDLIS Versión Final SLSH
DLIS Versión Final SLSH
 
Sexual health & protective behaviours
Sexual health & protective behavioursSexual health & protective behaviours
Sexual health & protective behaviours
 
Primero april corporate presentation finalv3
Primero april corporate presentation finalv3Primero april corporate presentation finalv3
Primero april corporate presentation finalv3
 
Young people project ppt
Young people project pptYoung people project ppt
Young people project ppt
 
Primero corporate presentation may 2014 v2
Primero corporate presentation may 2014 v2Primero corporate presentation may 2014 v2
Primero corporate presentation may 2014 v2
 
Social Media and Business
Social Media and BusinessSocial Media and Business
Social Media and Business
 
Motivational
MotivationalMotivational
Motivational
 
Java coding-conventions
Java coding-conventionsJava coding-conventions
Java coding-conventions
 
NGSS Assessment: Identifying and Integrating Effective Technologies
NGSS Assessment: Identifying and Integrating Effective TechnologiesNGSS Assessment: Identifying and Integrating Effective Technologies
NGSS Assessment: Identifying and Integrating Effective Technologies
 
Handelsbeleid in steden en gemeenten (UNIZO Burgemeestersonbijt 16/01/14)
Handelsbeleid in steden en gemeenten (UNIZO Burgemeestersonbijt 16/01/14)Handelsbeleid in steden en gemeenten (UNIZO Burgemeestersonbijt 16/01/14)
Handelsbeleid in steden en gemeenten (UNIZO Burgemeestersonbijt 16/01/14)
 
UDL at Sovereign Avenue
UDL at Sovereign AvenueUDL at Sovereign Avenue
UDL at Sovereign Avenue
 
Primero november corporate presentation v2
Primero november corporate presentation v2Primero november corporate presentation v2
Primero november corporate presentation v2
 
36kr no.94
36kr no.9436kr no.94
36kr no.94
 
Džošua Bel
Džošua BelDžošua Bel
Džošua Bel
 
Powerofwords1
Powerofwords1Powerofwords1
Powerofwords1
 

Similar to Machine learning

Machine learning
Machine learningMachine learning
Machine learning
osman ansari
 
what-is-machine-learning-and-its-importance-in-todays-world.pdf
what-is-machine-learning-and-its-importance-in-todays-world.pdfwhat-is-machine-learning-and-its-importance-in-todays-world.pdf
what-is-machine-learning-and-its-importance-in-todays-world.pdf
Temok IT Services
 
Machine Learning Landscape
Machine Learning LandscapeMachine Learning Landscape
Machine Learning Landscape
Eng Teong Cheah
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
Chandrakant Divate
 
Training_Report_on_Machine_Learning.docx
Training_Report_on_Machine_Learning.docxTraining_Report_on_Machine_Learning.docx
Training_Report_on_Machine_Learning.docx
ShubhamBishnoi14
 
MACHINE LEARNING PRESENTATION (ARTIFICIAL INTELLIGENCE)
MACHINE LEARNING PRESENTATION (ARTIFICIAL INTELLIGENCE)MACHINE LEARNING PRESENTATION (ARTIFICIAL INTELLIGENCE)
MACHINE LEARNING PRESENTATION (ARTIFICIAL INTELLIGENCE)
MAHIRA
 
Intro/Overview on Machine Learning Presentation -2
Intro/Overview on Machine Learning Presentation -2Intro/Overview on Machine Learning Presentation -2
Intro/Overview on Machine Learning Presentation -2
Ankit Gupta
 
introduction to machine learning
introduction to machine learningintroduction to machine learning
introduction to machine learning
Johnson Ubah
 
Machine learning
Machine learningMachine learning
Machine learning
Tushar Nikam
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
eswaralaldevadoss
 
Unit I and II Machine Learning MCA CREC.pptx
Unit I and II Machine Learning MCA CREC.pptxUnit I and II Machine Learning MCA CREC.pptx
Unit I and II Machine Learning MCA CREC.pptx
trishipaul
 
chalenges and apportunity of deep learning for big data analysis f
 chalenges and apportunity of deep learning for big data analysis f chalenges and apportunity of deep learning for big data analysis f
chalenges and apportunity of deep learning for big data analysis f
maru kindeneh
 
machine learning.docx
machine learning.docxmachine learning.docx
machine learning.docx
JadhavArjun2
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
Darshan Ambhaikar
 
Machine Learning SPPU Unit 1
Machine Learning SPPU Unit 1Machine Learning SPPU Unit 1
Machine Learning SPPU Unit 1
Amruta Aphale
 
source1
source1source1
source1butest
 
Machine Learning Tutorial for Beginners
Machine Learning Tutorial for BeginnersMachine Learning Tutorial for Beginners
Machine Learning Tutorial for Beginners
grinu
 
BIG DATA AND MACHINE LEARNING
BIG DATA AND MACHINE LEARNINGBIG DATA AND MACHINE LEARNING
BIG DATA AND MACHINE LEARNING
Umair Shafique
 
CodeLess Machine Learning
CodeLess Machine LearningCodeLess Machine Learning
CodeLess Machine Learning
Sharjeel Imtiaz
 
An Introduction to Machine Learning
An Introduction to Machine LearningAn Introduction to Machine Learning
An Introduction to Machine Learning
Vedaj Padman
 

Similar to Machine learning (20)

Machine learning
Machine learningMachine learning
Machine learning
 
what-is-machine-learning-and-its-importance-in-todays-world.pdf
what-is-machine-learning-and-its-importance-in-todays-world.pdfwhat-is-machine-learning-and-its-importance-in-todays-world.pdf
what-is-machine-learning-and-its-importance-in-todays-world.pdf
 
Machine Learning Landscape
Machine Learning LandscapeMachine Learning Landscape
Machine Learning Landscape
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Training_Report_on_Machine_Learning.docx
Training_Report_on_Machine_Learning.docxTraining_Report_on_Machine_Learning.docx
Training_Report_on_Machine_Learning.docx
 
MACHINE LEARNING PRESENTATION (ARTIFICIAL INTELLIGENCE)
MACHINE LEARNING PRESENTATION (ARTIFICIAL INTELLIGENCE)MACHINE LEARNING PRESENTATION (ARTIFICIAL INTELLIGENCE)
MACHINE LEARNING PRESENTATION (ARTIFICIAL INTELLIGENCE)
 
Intro/Overview on Machine Learning Presentation -2
Intro/Overview on Machine Learning Presentation -2Intro/Overview on Machine Learning Presentation -2
Intro/Overview on Machine Learning Presentation -2
 
introduction to machine learning
introduction to machine learningintroduction to machine learning
introduction to machine learning
 
Machine learning
Machine learningMachine learning
Machine learning
 
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
Unlocking the Potential of Artificial Intelligence_ Machine Learning in Pract...
 
Unit I and II Machine Learning MCA CREC.pptx
Unit I and II Machine Learning MCA CREC.pptxUnit I and II Machine Learning MCA CREC.pptx
Unit I and II Machine Learning MCA CREC.pptx
 
chalenges and apportunity of deep learning for big data analysis f
 chalenges and apportunity of deep learning for big data analysis f chalenges and apportunity of deep learning for big data analysis f
chalenges and apportunity of deep learning for big data analysis f
 
machine learning.docx
machine learning.docxmachine learning.docx
machine learning.docx
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
Machine Learning SPPU Unit 1
Machine Learning SPPU Unit 1Machine Learning SPPU Unit 1
Machine Learning SPPU Unit 1
 
source1
source1source1
source1
 
Machine Learning Tutorial for Beginners
Machine Learning Tutorial for BeginnersMachine Learning Tutorial for Beginners
Machine Learning Tutorial for Beginners
 
BIG DATA AND MACHINE LEARNING
BIG DATA AND MACHINE LEARNINGBIG DATA AND MACHINE LEARNING
BIG DATA AND MACHINE LEARNING
 
CodeLess Machine Learning
CodeLess Machine LearningCodeLess Machine Learning
CodeLess Machine Learning
 
An Introduction to Machine Learning
An Introduction to Machine LearningAn Introduction to Machine Learning
An Introduction to Machine Learning
 

More from Fahd Allebdi

ترتيل - جمعية تحفيظ القرآن الكريم بخليص
ترتيل - جمعية تحفيظ القرآن الكريم بخليصترتيل - جمعية تحفيظ القرآن الكريم بخليص
ترتيل - جمعية تحفيظ القرآن الكريم بخليص
Fahd Allebdi
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
Fahd Allebdi
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
Fahd Allebdi
 
تعليم اللغة الانجليزية
تعليم اللغة الانجليزيةتعليم اللغة الانجليزية
تعليم اللغة الانجليزيةFahd Allebdi
 
كنوز من أقوال العلماء
كنوز من أقوال العلماءكنوز من أقوال العلماء
كنوز من أقوال العلماءFahd Allebdi
 
Doubly linked list
Doubly linked listDoubly linked list
Doubly linked list
Fahd Allebdi
 

More from Fahd Allebdi (6)

ترتيل - جمعية تحفيظ القرآن الكريم بخليص
ترتيل - جمعية تحفيظ القرآن الكريم بخليصترتيل - جمعية تحفيظ القرآن الكريم بخليص
ترتيل - جمعية تحفيظ القرآن الكريم بخليص
 
twitter hacking causes and protection
twitter hacking causes and protectiontwitter hacking causes and protection
twitter hacking causes and protection
 
Wireless routers Presentation
Wireless routers PresentationWireless routers Presentation
Wireless routers Presentation
 
تعليم اللغة الانجليزية
تعليم اللغة الانجليزيةتعليم اللغة الانجليزية
تعليم اللغة الانجليزية
 
كنوز من أقوال العلماء
كنوز من أقوال العلماءكنوز من أقوال العلماء
كنوز من أقوال العلماء
 
Doubly linked list
Doubly linked listDoubly linked list
Doubly linked list
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Machine learning

  • 1. Done By :- Facebook : Fahd .Allebdi Twitter : @fahdalharbi13 Email : alking@hotmail.de
  • 2. Artificial intelligence is a part of computer science that tries to make computers more intelligent. One of the basic requirements for any intelligent behavior is learning. Therefore, machine learning is one of major branches of artificial intelligence and, indeed, it is one of the most rapidly developing subfields of AI research. So in this report we will discover The definition of it, history , types and some real application in real world used.
  • 3. Machine Learning is the domain of Artificial Intelligence which is concerned with building adaptive computer systems that are able to improve their competence and/or efficiency through learning from input data or from their own problem solving experience. Machine Learning is arguably the greatest export from computing to other scientific fields.
  • 4. Early enthusiasm (1955 - 1965): • Learning without knowledge; • Neural modeling (self-organizing systems and decision space techniques); • Evolutionary learning; • Rote learning (Samuel Checker’s player).
  • 5. Dark ages (1962 - 1976): • To acquire knowledge one needs knowledge; • Realization of the difficulty of the learning process and of the limitations of the explored methods (e.g. the perceptron cannot learn the XOR function); • Symbolic concept learning (Winston’s influential thesis, 1972).
  • 6. Renaissance (1976 - 1988): • Exploration of different strategies (EBL, CBR, GA, NN, Abduction, Analogy, etc.); • Knowledge-intensive learning; • Successful applications; • Machine Learning conferences/workshops worldwide.
  • 7. Maturity (1988 - present): • Experimental comparisons; • Revival of non-symbolic methods; • Computational learning theory; • Multistrategy learning; • Integration of machine learning and knowledge acquisition;
  • 8. Types Of Machine Learning :- 1. Supervised learning is fairly common in classification problems because the goal is often to get the computer to learn a classification system that we have created. Digit recognition, once again, is a common example of classification learning It is the most common technique for training neural networks and decision trees. Both of these techniques are highly dependent on the information given by the pre-determined classifications
  • 9. Types Of Machine Learning :- a learning paradigm concerned withislearningsupervised-Semi.2 the study of how computers and natural systems such as humans learn in the presence of both labeled and unlabeled data supervised learning is to understand how-of semigoalThe combining labeled and unlabeled data may change the learning behavior, and design algorithms that take advantage of such a combination
  • 10. Types Of Machine Learning :- 3. Unsupervised learning seems much harder : the goal is to have the computer learn how to do Something that we don't tell it how to do! There are actually two approaches to unsupervised learning.
  • 11. However, in the few last years due to various technological advances and research efforts (e.g. evolution of the Web). Some of these modern applications are learning from biological sequences, learning from email data, and learning in complex environments such as Web.
  • 12. People are sending and receiving many messages per day, communicating with partners and friends, or exchanging files and information. Unfortunately, the phenomenon of email overload has grown over the past years becoming a personal headache for users and a financial issue for companies. › Automatic Answering : › Automatic Mail Organization into Folders : › Email and Thread Summarization : › Spam Filtering : › Dynamic Feature Space and Incremental Feature Selection for Email Classification :
  • 13.  Automatic Answering : Large companies usually maintain email centers (call centers) with employees committed to answer incoming messages. Those messages usually come from company clients and partners and many times address the same problems and queries . Automatic email answering is an effort to build email centers or personalized software that will be able to analyze an incoming message and then propose or even send an applicable answer.
  • 14.  Automatic Mail Organization into Folders The growth of email usage has forced users to find ways to organize archive and manage their emails more efficiently. Many of them are organizing incoming messages into separate folders. Folders can be topic-oriented like “work”, ”personal” and ”funny”. many users create manually some so-called rules to classify their email Machine learning provide this task is the automatic classification of incoming email by observing past and current classifications made by the user Thus, the user does not need to create the rules by himself. A lot of research has been recorded in the field and lots of those ideas have been implemented into useful email tools .
  • 15.  Email and Thread Summarization :  email users that receive hundreds of messages per day. Some of them are newsletters , colleagues, appointment arrangements etc. It would be extremely useful for them if they could avoid reading all of those messages and instead read only the most important and necessary parts Data mining techniques are explored in order to build trainable tools for summarization .
  • 16.  Spam Filtering :  A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.  Many different machine learning classifiers have been tested in the bibliography including Naïve Bayes , Support Vector Machines , Stacking Classifiers and some of them have proved to be particularly accurate.
  • 17.  1.5 Dynamic Feature Space and Incremental Feature Selection for Email Classification  In this section we present a computationally undemanding method that tackles with this problem . Our approach uses two components in conjunction: a) an incremental feature ranking method. b) an incremental learning algorithm that can consider a subset of the features during prediction.
  • 18. Such methods evaluate each word based on cumulative statistics concerning the number of times that it appears in each different class of documents
  • 19. Figure 1 . presents algorithm Update for the incremental update of our approach .
  • 20. There are also other interesting topics that were not discussed in this report. Some of them are applications on MRI data, astronomical data, robotics, video games, music data etc.