Why do you think google funds a lab like google

Assignment Help Management Information Sys
Reference no: EM131427119

Deep Learning at Google [x]

Google [x] is Google's secret lab, set up in 2010 to take scientific and engineering risks, just to see what mi9ght happen. ‘Google [x]' is genuinely how they spell the name and it's seen as a secret lab because it doesn't have a webpage, something unusual at Google. Google [x]'s name most famous product is probably Google Glass, the Internet connected spectacles. A lesser-known project is Google Brian.

Early on in the lab's history, its researchers asked whether it is possible for a computer to learn to detect faces using only unlabelled images. In other words, can a computer be shown a series of images, figure out on its own which are human, and which are not? To re-state the problem: the computer will be shown images and told to classify (or group) them. The question is, will do the classifications bring together all of the pictures of humans in one group. This is a tricky problem which has been worked since the 1950s. To answer it, the Google team used an approach called Deep Learning.

Deep Learning systems draw their inspiration form what we know of the human brain. Our brain are made up of millions of neurons with billions of interconnections between them. Goggle Brian is a series of 1000 computers programmed to simulate about 1 million neurons with 1 billion connections between them. Each neuron is a block of computer code that accepts input signals from the neurons that connect into it. Each signal is essentially a number. A neuron takes all the numbers sent to it and performs a calculation on them and sends the results out to the other neurons that it is connected into. The calculation that a neuron performs involves multiplying its input by numbers called weights. Learning occurs by setting values for what these weights should be. For example, if a particular input is very unimportant its weight might be close to zero. If it is important, its weight will be set to be high.

A deep learning strategy calls for the neurons to be organized into several layers. When looking at [pictures, the first layer of the learning might be to classify dark and light pixels (a pixel is the smallest element in a computerized image). This classification gets passed to the next layer which might distinguish edges in the picture. This then gets passed to the next layer which might recognize features such as eyes.

The Google [x] researchers took 10 million still images from YouTube and fed them into Google Brain. After three days studying them, the system learned to accurately identify certain categorises: human faces, human bodies and cats, achieving a 70 per cent relative improvement over the previous state-of-the-art techniques. (The cat category reflects the fact that YouTube is full of videos of cats.)
When Google adopted deep-learning-based speech recognition in its Android smartphone operating system, it achieved a 25 per cent reduction in word errors. ‘That's the kind of drop you expect to take ten years to achieve,' says computer scientist Geoffrey Hinton of the University of Toronto in Canada

- a reflection of just how difficult it has been to make progress in this area. ‘That's like ten breakthrough all together.'

Questions:

1. Why do you think Google funds a lab like Google [x]?

2. Many problems can be re-stated as classification tasks. Telling the difference between humans and cats is one. Can you describe how speech recognition is a classification task? Can language translation be stated as classification task? What others can you think of?

3. Use a search engine to find as much information as you can on Google [x]. Imagine you were their chief research scientist -what problems would you set your team to work on next?

4. Do you think artificial intelligence researcher should look to biology (the human brain) for inspiration or might there be a better metaphor for computer intelligence?

Reference no: EM131427119

Questions Cloud

Find the expected counts for each cell : Write appropriate null hypotheses.- Find the expected counts for each cell, and explain why the chi-square procedures are not appropriate for this table.
Cloud services provider receives a call from customer : A new help desk employee at a cloud services provider receives a call from a customer. The customer is unable to log into the provider's web application. The help desk employee is unable to find the customer's user account in the directory service..
Executing on a corporate server : A company wants to ensure that all software executing on a corporate server has been authorized to do so by a central control point. Which of the following can be implemented to enable such control?
Calculate the mean median mode and standard deviation : EDUC 606- Calculate the mean, median, mode, standard deviation, and range for the following sets of measurements: 9, 7, 6, 6, 2 6-6-6-1.939-7, 12, 10, 9, 8, 6-9-9-nm-2-6 and 82, 82, 82, 82, 82-82-82-0-0.
Why do you think google funds a lab like google : Why do you think Google funds a lab like Google [x] and many problems can be re-stated as classification tasks. Telling the difference between humans and cats is one. Can you describe how speech recognition is a classification task? Can language tr..
Will you test goodness of fit or homogeneity : Is this a survey, a retrospective study, a prospective study, or an experiment? Explain.- Will you test goodness-of-fit, homogeneity, or independence?
Specific responsibilities of communication protocol : Define what a protocol is and identify the specific responsibilities of the communication protocol. What is the purpose of communication protocols? Needs to be 150 words
Different types of wireless encryption : Identify the four different types of wireless encryption, and indicate which ones provide the best security. Provide a brief explanation of each. Needs to be 150 words
Should a property owner be allowed to use a bobby trap : Contrary to common law, today, in most, if not all states, a person cannot use deadly force in the defense of their property. Do you agree with this challenge. Should a property owner be allowed to use a bobby trap as long as notice, by use of sig..

Reviews

Write a Review

Management Information Sys Questions & Answers

  How secure is your data- information and information system

How Secure Is Your Data- Information and Information System

  Outline differences between first and third party cookies

In two or three paragraphs, outline the differences between first-party cookies and third party cookies. In one or two paragraphs, explain what a Web bug is, what it accomplishes, and who might use one.

  Examine the major pros and cons of a dsl

From the second e-Activity, examine the major pros and cons of a DSL and a cable Internet connection. Compare DSL and cable Internet connections based on availability, consistent high speed, reliability, security, and price. Determine the Internet..

  How the submission engine plan will handle submissions

Explain how the submission engine plan will handle submissions in other languages, including Portuguese and Mandarin. Explain how you will use technologies to help alleviate the concerns that the content is biased toward technology professionals and..

  Write essay about flowcharting but rather to draw flowchart

You aren't being asked to write an essay about flowcharting, but rather to draw a flowchart. If your Case write-up doesn't contain a flowchart, then it's incomplete.

  The use of data miningdata mining what is data mining

the use of data miningdata mining what is data mining? compare data warehouses data marts and data mining. how can they

  Design a systematic network architecture plan

You are a small network design company called Wide-IP that is looking for that big break. As the CTO of the Wide-IP company, you recently made a persuasive presentation of your company's approach to designing networks at a large industry event. Th..

  Distinguish between vertical and horizontal integration

Advantages and Disadvantages of Vertical and Horizontal Integration - Define and distinguish between vertical and horizontal integration.

  Discuss the mass media impacts

Discuss the mass media impacts that are related to your chosen product and the advertising campaign. Examine the campaign from at least 2 theories, research approaches, or perspectives.

  What operating system does your computer use

What operating system does your computer use? What are some examples of applications residing in your personal computer? Do you use any apps or websites now that you think are cloud-based?

  Design a information systems security plan for organization

Write a 2,450- to 3,500-word paper in which you design a physical, personal, and information systems security plan for your organization (GOOGLE) from the Risk and Threat Assessment assignment.

  Limitations or dangers you see in the use of ai technologies

What are some of the limitations or dangers you see in the use of AI technologies such as expert systems, virtual reality, and intelligent agents? What could be done to minimize such effects

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd