Why do you think google funds a lab like google

Assignment Help Management Information Sys
Reference no: EM131427119

Deep Learning at Google [x]

Google [x] is Google's secret lab, set up in 2010 to take scientific and engineering risks, just to see what mi9ght happen. ‘Google [x]' is genuinely how they spell the name and it's seen as a secret lab because it doesn't have a webpage, something unusual at Google. Google [x]'s name most famous product is probably Google Glass, the Internet connected spectacles. A lesser-known project is Google Brian.

Early on in the lab's history, its researchers asked whether it is possible for a computer to learn to detect faces using only unlabelled images. In other words, can a computer be shown a series of images, figure out on its own which are human, and which are not? To re-state the problem: the computer will be shown images and told to classify (or group) them. The question is, will do the classifications bring together all of the pictures of humans in one group. This is a tricky problem which has been worked since the 1950s. To answer it, the Google team used an approach called Deep Learning.

Deep Learning systems draw their inspiration form what we know of the human brain. Our brain are made up of millions of neurons with billions of interconnections between them. Goggle Brian is a series of 1000 computers programmed to simulate about 1 million neurons with 1 billion connections between them. Each neuron is a block of computer code that accepts input signals from the neurons that connect into it. Each signal is essentially a number. A neuron takes all the numbers sent to it and performs a calculation on them and sends the results out to the other neurons that it is connected into. The calculation that a neuron performs involves multiplying its input by numbers called weights. Learning occurs by setting values for what these weights should be. For example, if a particular input is very unimportant its weight might be close to zero. If it is important, its weight will be set to be high.

A deep learning strategy calls for the neurons to be organized into several layers. When looking at [pictures, the first layer of the learning might be to classify dark and light pixels (a pixel is the smallest element in a computerized image). This classification gets passed to the next layer which might distinguish edges in the picture. This then gets passed to the next layer which might recognize features such as eyes.

The Google [x] researchers took 10 million still images from YouTube and fed them into Google Brain. After three days studying them, the system learned to accurately identify certain categorises: human faces, human bodies and cats, achieving a 70 per cent relative improvement over the previous state-of-the-art techniques. (The cat category reflects the fact that YouTube is full of videos of cats.)
When Google adopted deep-learning-based speech recognition in its Android smartphone operating system, it achieved a 25 per cent reduction in word errors. ‘That's the kind of drop you expect to take ten years to achieve,' says computer scientist Geoffrey Hinton of the University of Toronto in Canada

- a reflection of just how difficult it has been to make progress in this area. ‘That's like ten breakthrough all together.'

Questions:

1. Why do you think Google funds a lab like Google [x]?

2. Many problems can be re-stated as classification tasks. Telling the difference between humans and cats is one. Can you describe how speech recognition is a classification task? Can language translation be stated as classification task? What others can you think of?

3. Use a search engine to find as much information as you can on Google [x]. Imagine you were their chief research scientist -what problems would you set your team to work on next?

4. Do you think artificial intelligence researcher should look to biology (the human brain) for inspiration or might there be a better metaphor for computer intelligence?

Reference no: EM131427119

Questions Cloud

Find the expected counts for each cell : Write appropriate null hypotheses.- Find the expected counts for each cell, and explain why the chi-square procedures are not appropriate for this table.
Cloud services provider receives a call from customer : A new help desk employee at a cloud services provider receives a call from a customer. The customer is unable to log into the provider's web application. The help desk employee is unable to find the customer's user account in the directory service..
Executing on a corporate server : A company wants to ensure that all software executing on a corporate server has been authorized to do so by a central control point. Which of the following can be implemented to enable such control?
Calculate the mean median mode and standard deviation : EDUC 606- Calculate the mean, median, mode, standard deviation, and range for the following sets of measurements: 9, 7, 6, 6, 2 6-6-6-1.939-7, 12, 10, 9, 8, 6-9-9-nm-2-6 and 82, 82, 82, 82, 82-82-82-0-0.
Why do you think google funds a lab like google : Why do you think Google funds a lab like Google [x] and many problems can be re-stated as classification tasks. Telling the difference between humans and cats is one. Can you describe how speech recognition is a classification task? Can language tr..
Will you test goodness of fit or homogeneity : Is this a survey, a retrospective study, a prospective study, or an experiment? Explain.- Will you test goodness-of-fit, homogeneity, or independence?
Specific responsibilities of communication protocol : Define what a protocol is and identify the specific responsibilities of the communication protocol. What is the purpose of communication protocols? Needs to be 150 words
Different types of wireless encryption : Identify the four different types of wireless encryption, and indicate which ones provide the best security. Provide a brief explanation of each. Needs to be 150 words
Should a property owner be allowed to use a bobby trap : Contrary to common law, today, in most, if not all states, a person cannot use deadly force in the defense of their property. Do you agree with this challenge. Should a property owner be allowed to use a bobby trap as long as notice, by use of sig..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Define what a knowledge management system

Define what a knowledge management system is and what it is used for. 2. Compare the features and benefits of each system

  Compare dsl-cable internet connections based on availability

From the second e-Activity, examine the major pros and cons of a DSL and a cable Internet connection. Compare DSL and cable Internet connections based on availability, consistent high speed, reliability, security, and price. Determine the Internet..

  Supply chain management questiondetails canbide managers

supply chain management questiondetails canbide managers and directors came up with some topics that you are required

  Implement the unsigned multiplication subroutine unsmul

Implement the unsigned multiplication subroutine UNSMUL. The algorithm requires double-word shifts: ShiftRight(ACC:MPR). You must solve a bit carry-over problem since the double-words are stored as two single words.

  Important information about enterprise resource planning

Important information about Enterprise Resource Planning - Give examples of the quality tools you plan to use for identifying and reducing process variability.

  Paper about information technology in online shopping

Write term paper about Information Technology in Online Shopping

  Which one is costly data or voice transmissionbased on

which one is costly data or voice transmissionbased on todays technologies is data and voice the same thing? support

  List at least three major categories of cyber terrorism

List at least three major categories of cyber terrorism and / or information warfare. Among the chosen categories, determine the one that should be the top priority for the federal government to address.

  Discuss documents that need to be included in recovery

Discuss documents that need to be included in recovery documentation.

  Why impact extends beyond the technology lifespan

Why Impact Extends Beyond the Technology Lifespan - Impact on business after that time period?

  What the role of an internal it audit group in organization

What is the role of an internal IT audit group in an organization? Why is having such a group important for an organization and why should it report outside the normal IT reporting channels

  What are the business benefits of telepresence

What are the business benefits of TelePresence described in these videos? What is the benefit of a hologram? What kinds of limitations do you see for users of TelePresence

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd