Ai 9 SC
Ai 9 SC
ft *</>#
Communication
3^ *
w = S kills-I
INTRODUCTION
Communication simply means exchange of information through signs, signals,
speaking, writing or using some other medium. The word communication is derived
from the Latin word “ communicare” , which means to share. Communication
involves at least tw o people— a sender and a receiver. Communication is
successful only when there is a common understanding between the sender and
receiver.
Communication is something we all do on a daily basis without paying much
attention. It started hundreds of years ago and has evolved into writing, listening,
speaking and reading as four key components.
Elements of communication cycle:
(i) sender (ii) ideas (iii) encoding
(iv) communication channel (v) receiver (vi) decoding
(vii) feedback
When we start going to school, we start doing w ritten communication. Even when
we enter our professional careers, written and verbal communication remain the
most important aspects of our daily lives.
Cons
• Consumes time in preparation and documentation
• Non-confidentiality - anyone who has access to the document can read it unless
it is encoded
• No scope of clarification and is subject to possible misunderstanding
• Not useful in emergency situations
Cons
• Barrier to language and translation difficulties
• Difficult to convey long messages
• No option to recall or edit the message
• Subject to cultural misinterpretation
BODY LANGUAGE
Body language is an important aspect of non-verbal communication where physical
behaviour is used to convey a message or information.
Body language includes:
• Facial expressions • Posture
• Hand gestures • Touch
• Use of space • Eye movement
0
Grinning or smiling
in some cultures
could be interpreted
as being pushy.
Don't point with
your finger, it may
e considered rude.
Don'ts
• Avoid touching your face
• No leaning back and sitting casually
• Do not sit in cross-armed position
• Do not avoid making eye contact
• Hand movements/gestures are a no-no
VERBAL 35%
NON-VERBAL 65%
Facial Expressions
Tone of Voice
M ovem ent
A ppearance
Eye Contact
Gestures
Posture ^
Perspectives in Communication
Perspectives are various ideas or our ways of thinking. They can affect our
communication. For example, if you really like someone, you will most likely
ignore their silly acts but if you don’t like someone, you may exaggerate their
every little fault and think that they are doing something wrong. It is basic
human nature.
WRITING SKILLS
Parts of a Sentence
A complete sentence consists of two parts: a subject and a predicate. The subject is
what the sentence is about, while the predicate tells us something about the subject.
Subject
X
The manager has changed all of his staff recently
t
Predicate
Can you add the right punctuation marks to create the sentence category on the right.
Types of sentences-Recording Sheet
PARTS OF SPEECH
Parts of Speech Function
Nouns Naming people, places, things and ideas/concepts
Adjectives Describing nouns and pronouns
Adverbs Modifying verbs, adjectives and adverbs
Verbs Expressing a physical action or state
Prepositions Showing relationships of words and phrases
Pronouns Replacing nouns
Conjunctions Joining words, phrases and clauses
Interjections Showing strong emotions or feelings
ARTICLES : A/AN/THE
A/AN THE
w>
• Used for objects that are not specific or • Used for specific objects or objects that
one of several things of a similar type both the speaker and listener know
e.g., I need to buy a new phone. e.g., Please post the letter today.
Parts of Speech
Article Adjective Noun Verb Preposition
* ^ v '
>• ' ✓ - \
The old woman was sitting at
Article Noun Conjunction Adverb
/ •
✓ *x / /
' /
the railway station patiently
. .
\ ' /
waiting for ler train to arrive.
PHRASES
A phrase is a group of two or more words that work together to convey a meaning.
However, a phrase is not a complete sentence.
Writing Effective Paragraphs
_____________
Can you identify the four categories of sentences from the below paragraph:
Open Government Data Platform data.gov.in has a very robust policy of reviewing its content through
routine testing of the web pages and the content. Since this is a platform which boasts of data sets and
catalogue, the Project Management Unit (PMU) is frequently in the process of updating and reviewing the
data sets and catalogues in order to provide up-to-date data sets to its users. The feedback and engagement
policy with the users itself provides an effective measure of reviewing and checking the content on the
platform. Monitoring of platform is done on a regular basis. It is important for anyone using open data
to refer to this platform as it is the most authentic source of data available in the country. Do you know
it has more than 50,000 resources!
Whatever data requirements you may have for your next Al project, it can help you. Can you think of a
problem for which you were looking for a data set?
1. Which of these is a series of sentences that are organized, coherent and related to
one single topic?
(a) Essay (b) Sentence (c) Verb (d) Paragraph
2. What is known as the response of the receiver to the message?
(a) Encoding (b) Feedback (c) Decoding (d) Channel
3. Which of these is not an example of body language?
(a) Facial expressions (b) Posture
(c) Gestures (d) Verbal communication
4. Which of these is not a barrier to communication?
(a) Personal barriers (b) Language barriers
(c) Gender barriers (d) Financial barriers
5. Which of these is not a factor affecting communication at workplace?
(a) Group affiliations (b) Cultural diversity
(c) Misunderstanding (d) Financial differences
6. Which of these is not a type of sentence?
(a) Declarative (b) Imperative
(c) Normal (d) Interrogative
7. What form of communication is transmission of information and ideas using symbols
and imagery?
(a) Verbal (b) Visual
(c) Written (d) None of these
8. Which of these is the oldest form of communication?
(a) Written (b) Oral
(c) Email (d) WhatsApp
9. The process of communication involves a .......................... transmitting a message
through a ..........................to th e .............................
10. Communication is successful only when both sender and receiver have a common
understanding. (True/False)
S elf-Management
If 3 S kills-I
INTRODUCTION
Self-management refers to management of or by oneself. It means taking
responsibility for one’s own behaviour and wellness. It also means to manage people
around you and keeping healthy relationships with one’s own self and others around
us. It extends beyond family and looks at the greater good of society. A self-managed
person manages his/her life in a meaningful manner and supports the community.
Self-management is important because:
• All individuals should be self-sufficient and independent.
• It instils confidence in an individual that they can solve their problems on their
own.
• It helps in creating a framework for managing one’s life in an organized manner
without undue stress.
Self-management is a combination of our habits and behaviour.
Some of the good habits include:
• Maintaining body hygiene
• Eating a balanced diet
• Regular exercise
• Proper sleep and rest
• Meditation for mind management
Some of the good behaviour traits include being:
• Kind and friendly
• Respectful to others
• Considerate of others’ feelings
• Polite in conversations
• Of a caring and sharing nature
S elf -M anagement S kills - I ES.15
Fig. 2.1 : Exhibitors of Self-Management
/ \
Once you start using self-management techniques, you will realize the following
benefits:
• Managing tasks independently
• Ownership and accountability leading to self-confidence
• Self-monitoring and discipline
Self-management helps in improving our goal-setting and finding out ways to
achieve them. It also helps in defining metrics for achieving a goal and changing
methods if the desired results are not achieved. For example, if you are targeting
100% marks in Mathematics, you will define steps that you need to undertake to
reach this goal from your current skill level with defined milestones. In case your
approach is not working and you are not reaching 100%in defined timelines, you
will relook at your approach and improve upon it.
SELF-MANAGEMENT SKILLS
Following are the self-management skills that individuals need to develop:
Self-confidence: It means to trust one's capabilities and skills to achieve one's
goals. It means to not doubt in one’s abilities to lead a successful life. People with
self-confidence inspire others around them.
Starting a new initiative or working on an innovative project can build your confidence.
Stress Management: It means to manage any unforeseen situations or circumstances
which you cannot control directly with your actions. As a student, you may
experience stress because of change in class timetable or surprise tests. There
may be stress due to peer pressure and parental expectations.
Managing your time schedule and handling expectations through meditation and
communicating with your parents may help you in easing stress.
Independent Working: This refers to the skill of being able to work on one’s own
without constant guidance and supervision. This leads to confidence in one’s ability
to do tasks independently.
Preparing for a test, a competition or learning something new on your own shall
help enhance self-reliance.
Team Player: It is a person who actively contributes to their team to achieve a
common goal. While working on a common project, you develop interpersonal
and group management skills as well.
Time Management: It is the task of managing time at hand to increase productivity,
efficiency and effectiveness.
As a student, you need to juggle between studies, hobbies and extracurricular
activities. Time management becomes an important skill to keep a balance in life.
Self-Motivation: Motivation is defined as the key force which drives us to achieve
our goals. As a student, you need to keep yourself motivated to achieve good
scores and have a health balance in life.
Personality Management: Dressing properly, maintaining personal hygiene and
being a good conversationist create a positive impression on others. Your personality
is the first thing people observe when they see you.
STRESS STRESS
CAUSAL
Stress refers to a “ physical, mental or emotional AGENTS
strain or tension” .
Stress is one of the key reasons for decline in
physical and mental wellness. A little amount
^Social^- J Financial
Fi
Z z.
Getting enough sleep Take time to think about
0
Find activities or Exercise takes our mind It can be hard to manage
helps you grow and what you're good at hobbies that make off stress and releases stress alone. Talk to a
develop normally, stay and ways to do more you happy and chemicals in our brain parent, teacher or other
active throughout the of those things. By incorporate them into that make us feel better. trusted adults about your
day, and maintain overall focusing on and building your daily life. This can be anything problems and they may
health. For teens, this your strengths, you can from a stroll in the park, be able to help you find
means about 8-10 hours keep your stressors in to a downhill bike ride or ways to manage your
ot sleep each night. perspective. a basketball game stress
with friends.
Source: WIHFA.org/teens
There are apps which can help you in managing stress in a better way. One
such app is called Calm, which has natural sounds, guided meditation sessions
and sleep stories.
©Senses
To Help Manage Stress
Tune in to a nature soundtrack to hear the soothing Wrap up in your favourite blanket. Soak in
sound of running water. Listen to some uplifting a hot bath. Pet a dog or cat. Give yourself a
music. Sing along to your favourite number. neck or hand massage.
jESSBBT
Write and present a talk on “What I wish to become and what I do about it” . Let
your imagination run and discuss with your classmates.
v____________________________________ _____________________________________ )
Friendly Social Network Self-limitations
4*
Reduce the noise
Stress Management
B3BB30
Preparing a write-up or an essay on experiences during a holiday trip
If you have taken a school trip or fam ily trip recently, prepare an essay on your
experiences during the trip (day-wise). Include what all you did independently and
what you did with friends/fam ily. Share notes with your classmates.
V____________________________ _____________________________________________ /
Dreams Identity
Quality of
Life Talents
Human
Capital Potential
a
A 1' ICT S kills-
f
INTRODUCTION
ICT stands for Information and Communication Technology which deals with the
use of electronic devices such as computers, smartphones, etc., to manage data or
information. All the smart devices around us including Al and loT form part of ICT.
ICT at Home
Many of us have personal computers and smartphones at home which can be used to
play games, for listening to music, sending or receiving emails, online banking, etc.
ICT in Education
ICT in education includes development of technology around learning and
development processes. Using online education tools and mobile apps for learning
has become a mainstream methodology in education. It is referred to as Blended
Learning.
The concept of ‘flipped classroom’ is becoming popular where instructional content
is consumed by the students at home in the form of videos and classroom time can
be used for interactive activities, discussions and projects that illustrate the content.
ICT is also used in health care research which helps in checking the spread of
infections and undertaking vaccine trials.
Hospitals also use ICT to store patient data and other medical records. Through
simple apps and integration with wearables, doctors and patients can check their
vital information and historical data to assess onset of diseases proactively.
Computer-based machines are used for MRI, CT scan, etc., in diagnostic centres.
ICT in Governance
ICT is increasingly being used to improve efficiency of operations and transparency.
Many government services such as Passport, PAN, Aadhaar, etc., are now available
online. Electronic voting machines (EVM) are used during elections and all the data
is collated in electronic systems. Entire tax filing is online now. You can pay utility
bills online as well while sitting at home.
UDIN to r Audit F orm e/A udit certificates can be updated till 30th April, 2021. Last data fo r linking PAN with Aadhaar Is 30th Juns, 202
ICT in Business
ICT is used in businesses too for different purposes such as:
• Enterprise Resource Planning (ERP) for process management and compliance
• Financial Management
• Customer Database Management
• Online payments/Fintech
• Mobile apps and chatbots for customer communication
Mobile Phones
Mobile phones are lightweight and portable devices that you
can use to make calls, stay in touch with your friends and
relatives, any time, anywhere. Smartphones enable you to do
web search, send/receive emails and access a range of apps.
Tablets
Tablets are small computing devices with a touch screen. Tablets are
popularly used in many e-learning programs with pre-loaded content.
Radio
Radio is used for information broadcast and entertainment.
Nowadays, there are talk shows as well with RJs on radio.
TV
Tele means distance, vision means seeing. TV means seeing at
a distance. You can watch TV shows, music programs, movies,
etc., on TV.
Online Newspapers
Online newspapers are now available and all the news is at your fingertips.
T h e E conomic T im es
English Edition * | 08 April, 202110:24 AM 1ST | E-Paper
=E H om e Q ETPrime Markets N ew s Industry RISE Politics wealth MF Tech Tote Opinion NRI Panache ET N O W More - Q,
News Live' Markets Uve < Stock Screener MFScreener OM vs New Tax Regime Candlestick Screener Sunday ET Covid Updates ETSOO
V a c c in e s h o r t a g e s b e s e t 13ETPrime
Did Ambuja's veteran independent
fit
I n d ia 's fig h t a g a in s t a
directors ask the right questions?
seco n d v im s w a v e
9 m ins read * By N Sundaresha Subramanlan
Did RBI get it right in the first MPC of FY22?
How a retreating bull market can impact
Few takers for TLTRO despite deadline exlensi an IPO's quality
How RBI plans to fight the second wave How Tata Group is taking a leaf from an
old book to ace ed-tech
9 m ins read * By Jochelle Mendonca
• Sense* returns to Mt SOK led by bank. IT ttocks
Second w ave of coronavirus How govt can improve tire lending
hits IPL's out-of-home
7 stocks that analysts suggest lor solid returns discipline of state-run banks
ilSP
n
revenues for a six
Why MFfirat called for exiting Templeton funds
3 mins read * By Rama Bhushan
Computer Hardware
The physical components of a computer are known as hardware. A computer
basically consists of the following hardware parts:
• Input unit
• Processing unit
• Main Memory Unit
• Secondary Storage Unit (Auxiliary Storage)
Output unit
CPU
Memory Unit
Secondary
Storage Device
Examples:
Magnetic tape, Magnetic Disks, CDs, etc. /
t
Peripheral Devices
Control Unit
The control unit controls the data flow from the input devices to memory and
from memory to output devices. No processing is done here.
The interpretation of instructions happens in the control unit and then the signals
are sent to other components for necessary action.
R egisters
These are temporary storage areas found in the CPU section of a computer.
Software
Software is a set of computer programs and applications that performs a particular
task. The tw o types of Software are:
1. System Software
2. Application Software
System S o ftw a re
System software is simply a set of applications that are designed to control and
manage the running of a computer system. Examples of system software include
Operating Systems (OS) and Language Processors.
• Operating System: Operating System (OS) is the main program that runs the
computer. When we boot a computer, OS is loaded on to the computer’s
memory and starts the computer. Some of the popular OS are Windows, Mac,
OS, etc.
• Language Processors: As we know, a computer understands instructions in the
form of binary, i.e., 0 and 1. When we use a programming language, such as
Python, to write code, it is written in high-level language. This gets converted
into machine language in order to execute the commands and for machine to
interpret it. The program that converts instructions in high-level language to
machine-level language is called a language processor. The program which is
translated into machine-level language is called the object program.
Language processor can be of the following types:
■ Assembler: A program that translates an assembly language program into
machine language.
■ Compiler: A program that translates a high-level language program into
machine language, for example, C, C++ compiler.
■ Interpreter: A program that translates a high-level language into machine
language program line by line, fo r example, Python Interpreter.
Computer
Instruction
High Level
Language
Application Software
Application software is a program that is developed to do a particular set of tasks,
for example, a school management software that keeps a database of all students,
teachers and users in the school and maintains their records.
Application software can be classified as general-purpose application software and
specific-purpose application software. Examples of general-purpose application
software include MS Office, etc.
• Specific-Purpose Application Software: Specific-purpose application software
is a program that does a specific task. Examples of specific-purpose application
software are Payroll software, Call Centre software, Lead Management, Financial
Management, etc.
Utility Program
A utility program is used for maintenance work of the computer or its components.
Examples of utility program include file management programs, compression tools,
antivirus software, etc.
• File Management Tools: These tools help in storing, searching and managing
files and folders on the system, for example, Windows Explorer, etc.
• Compression Tools: These help in compression of large folders and files so that
they take less storage space and are easy to store and transfer, fo r example,
WinZip, etc.
• Antivirus Software: This program helps in scanning the system to check for virus
and vulnerabilities. It then helps in getting rid of them as well, for example,
McAfee virus scan.
ROM is called non-volatile memory as the contents of ROM are not lost when
power supply is switched off, e.g., PROM, EPROM, etc.
Secondary Memory
Secondary memory is used to store large amount of data & information permanently.
The Secondary memory is non-volatile and has larger storage capacity than
Primary memory. Secondary storage devices include CD, DVD, Pen Drive, etc.
V__________________________________________________________________________ T
Input Devices
Keyboard: A keyboard is an input device used to
enter data into the computer. Keyboard can be wired
or wireless. Nowadays, there are USB keyboards.
YOU KNOW?
Output Devices
Computer M onitor: A computer monitor is like a TV screen
and can display anything on the computer in real time. The
size of a computer monitor is measured in diagonal length of
the screen. Computer monitors are available in different sizes.
The monitor has a grid of tiny dots called pixels (We will know
more about pixels in Class X in Computer Vision).
The first computer monitors used Cathode Ray tubes. This was followed by LCD
(Liquid Crystal Display) monitors. Nowadays, LED (Light-Emitting Diode) monitors
are also available.
Touch screen monitors are becoming very popular these days. Have you seen them
in shopping malls and ATMs?
Printer: A printer is a device used to print physical copies of the documents stored
in the computer. The output produced on paper is called the hard copy.
Some commonly-used printers are:
Dot Matrix Printer: It is the most commonly used character
printer which means it can print one character at a time.
Dot matrix printers are also bidirectional, i.e., they print one
line of text from left to right and then the next line from right
to left.
Laser Printer: These printers print one page at a time and are
very fast. You may have seen them in various organizations and
shops where print volumes are high.
1 I
Braille Printer: A Braille printer produces patterns of raised dots
of computer files. It works with software that translates the text
to Braille.
2. When you turn on the computer, lights on the keyboard may blink for a while
and you may hear a sound. The monitor may display a message if a component
is not functioning.
3. The computer starts the operating system in a few minutes. This process of
bringing up the operating system is called booting. The instructions of booting
are built into a chip called BIOS (Basic Input/Output System).
4. When the operating system starts, Windows welcome screen appears. The first
screen that appears after OS is successfully loaded is called desktop.
OPERATING SYSTEM
You have been using a computer and are aware of its vast applications, right? It is
important to know that just like human body has brain and other body parts which
require rest and care, a computer also has CPU/motherboard and other parts which
require constant upkeep and maintenance to run properly. An operating system
is the heart of the machine.
So, what is this operating system?
An operating system is a software that serves as an interface between the user
and computer. An operating system does the following:
• Manages all components of the computer and their status
• Checks whether the components are functioning properly or not
• Controls resource allocation to various applications
• Manages the computer memory (hard disk) and its allocation
• Manages structure of the files and directories
• Manages files (add, edit, delete, move, etc.)
PO PP 44
Windows 7
ES.40 E ssentials of A rtificial Intelligence - IX
Let us revise the use of some of the commonly-used icons.
Taskbar: Taskbar is a long horizontal bar at the bottom of the screen. On the left
of the taskbar is the Start button and on the right appears Date/Time. There are
a few shortcuts as well.
Start Button: It is located on the left of the taskbar. By clicking the Start button, we get:
• Restart: Restart a computer
• Shut Down: Allows the user to turn off the computer
• All Programs: Access to all installed programs and applications. Simply click on
an application to start it.
• Search Box: Search a file or folder
• Control Panel: Change user settings
Sort by
•
Refresh
Pkfflf
Paw* ibcwts-irt
Undo Move CW.2
H r* *
j krw*n m o tutum
m Gadgets i
n
i ff Penonate Is |Ncvvfoldei|
11$ l
Creating a File
To create a new file:
1. Right click anywhere in the blank area on the screen.
2. In the Shortcut menu, click New and select the type of file you want to create.
View » I
Sort by ►I
Refresh
Paste
Paste shortcut
Graphics Properties...
Graphics Options ►I
$ Folder
SO Shortcut
1. Shortcut Menu:
1. Right click the file or folder you want to copy.
2. Select Copy option from the Shortcut menu.
3. Select the drive or the folder where you want to make a copy of the selected
file or folder.
Libraries
it Documents library Arrange by. Folder »
Name Date modified Type Size a pictures
0 Documents tot *mu.i/uz OICVIOJXI z.uo rm it c « ullage a,ia» ko
Copy —
Create shortcut
Delete
Rename
Properties
3. Using Keyboard:
1. Select the file or folder.
2. Press Ctrl+C to copy the file or the folder.
3. Open the new destination folder.
4. Press Ctrl+V to paste the copied file.
1. Shortcut Menu:
1. Right click the file or folder you want
to move.
2. Select Cut option from the Shortcut
menu.
3. Select the drive or the folder where
you want to move the selected file
or folder.
4 . Right click and select Paste option from the Shortcut menu.
3. U sing K eyboard:
1. Select the file or folder.
2. Press Ctrl+X to cut the file or folder.
3. Open the destination folder.
4. Press Ctrl+V to paste the copied file.
Or
1. Double click the Recycle Bin icon.
2. The Recycle Bin window appears.
3. Click Empty the Recycle Bin.
CDs and DVDs: Keep CD/DVD in a proper case to prevent damage. If there is some
dirt on the CD or DVD, it may not work at all. Finger prints and dirt can be removed
by lightly rubbing with a clean lint-free cotton cloth. If the dirt is hard to remove,
you can use special cleaning fluid. Put a drop of fluid on a swab of cotton and
gently rub it.
Besides, keep the computer away from water, drinks and food items. Also, keep
the system covered with a cloth when not in use.
P R O T E C T IN G C O M P U T E R A G A IN S T VIR U S ES
A computer virus is a software program that attaches itself to other programs and
alters their behaviour. A virus may or may not be destructive. Some viruses erase
data or corrupt programs on the computer.
v J
Virus can enter a computer system and multiply within by attaching to various
folders and files. Some viruses may get activated at a certain date and time.
A virus can spread in different ways— through an email or a pen drive. It may also
infect the whole network and spread from one computer to another.
A system can get infected with virus in some of these ways:
• Infected files on the system
• Infected pen drives/CD/DVD-ROMs
• Infected file attachment with emails
iS S E S D
1. Discuss the difference between human virus and computer virus.
2. Discuss various signs and symptoms that indicate that computer is infected with virus.
3. Discuss various ways in which computer may get infected with virus.
System is secure
o o o <3*
All Time Last 30 days Today
News
Can connected systems lead to the take-over of
y.<?u.r car?find wt{
PCTuner Scan Options
Show Al l
Scanning in progress...
E x t r a c tin g :
S ta tu s j A c tio n
Scanning status 5%
Other antiviruses like McAfee have a similar method to scan full computer system
for viruses and remove them.
Windows programs create a .TMP file as a temporary file. Temporary files are also
created by browsers to store your browsing history.
8. Click OK.
9. A confirmation message will appear.
10. Click Delete Files.
11. Windows will delete all the temporary files on the computer.
Qpen:
[~ OK ] \ Cancel Browse...
^Can you remove all the temporary files from your computer? Capture screenshots
and share with your classmates. Also note what the size of all the files was and how
much did it take to delete them. j
INTRODUCTION TO INTERNET
Internet consists of an integrated network of networks. It is a medium of
communication and exchange of information between different devices. When
we use internet for general browsing/searching, it is called web surfing.
https is the secured version of http. It has a security certificate as shown below:
Safari is using an ancryptad connection to www.googla.com.
Encryption with a digital certificate keeps information private as it's sent to or from the
https website www.google.com.
G3 GlobalSign
U S G TS CA 101
www.googla.com
Issued by: G TS CA 101
> T ru s t
> Details
? Hide Certificate
COPPIR . x
= M Gmail :H ^ E m ail C o n ta c ts
RECIPEINTS IN COPPER
Sarah Smith
t i l — IIHPTM...1—
©
RECIPIENTS NOT IN COPPER
N atalie H offm an
— I o M organ Lee
mloownewco.com
tH —
HUM
A Prianko Suth
ptute<v n*v#co com
Social Networking
Social networking helps to connect with our friends and family online.
E-shopping
You can do shopping online 24x7 with e-commerce websites and pay digitally.
d I? ■ f <S> N ew Delhi 110063 |
EE All Fresh Best Sellers Electronics Today's Deals Buy Again Amazon Pay KartIk's Amazon.in Mobiles Prime * Customer Service [ Shopping m ade easy | Download th e app
Dj
OnePlusGR50
S ta rtin g ■ '39,999
Prime Earty Access I Sale starts
14* April. 12PM ! 15"-April, 12PM
Hi, K artik Trending now cooling Top p icks fo r your home Sho p on the Am azon App
Customer since 2015
appliances | Up to 4 0 % off 1* Fast, convenient and secure |Over 17 crore
products In your pocket
Top links for you
9
Download the Amazon App
m
LAPTOPS
FROM TOP BRANDS
s»msm
Single doors |Starting Double doors |Starting
1f
<
Q.
India
Home Page: The first web page of a website is called the home page which is the
main page. Generally, clicking on home button on the website will take you to the
home page.
BENCHMARKS CU»£0 |(S#V—f NSfcGAINER-LARCECAP FEATU RED FU N D S AAAA A S Y R ETU RN
N ift y 14,683.50 T 4 5 .7 0 A d a n i P o r t * S E Z 835 55 T 93.30 ICICI Prudential L a r g e Tu js % [tHvs«Tnowl market watch v
K a rtik •
T h e E conomic T im e s QETPrim*
T h e m o m e n t w h e n In d ia n H N I s m in d s e t c h a n g e d
C o v id is h a u n t in g m a rk e ts o n c e ag a in
W h a t s h o u ld M F In v esto rs do?
N ig h t c u r f e w im p o s e d in D e lh i t i ll A p r il 3 0
O il c a n 't b e o n A t m a n ir b h a r list: b la m e
C a n y o u s u e i f y o u r M F d e v ia t e s fr o m s ta t e d plan ?
a g e in g w e lls , l a x d is c o v e ry
M e t a l p h a r m a s tk s h e lp S e n s e s e k e o u t g a in
From M eerut's narrow lanes H o w te ch n o log y, fr a u d -d e te c tio n m o d e ls
Email Accounts
You need to first have an email address to send an email.
Email Address: An email address has tw o main parts:
• User name
• Host name
These tw o parts are separated by @ symbol.
For example, see the email ID: [email protected]
In the given email address, kartik.sharma is the user name and dcodeai.com is the
host name.
Email Program: An email program enables you to send and receive email
messages.
Some of the popular email programs are:
• Gmail.com
• Yahoo.com
Welcome
£ ) shruti.sharma@ gmail.com v
.............. -I
0 Show password
= Gmail
|" Compose
□ In b o x 47,049
★ Starred
Q Snoozed
M Important
> Sent
B D ra fts 97
f lt Categories
S o c ia l 1,809
O U p d a te s 47.379
C| F o ru m s 23
To | Cc Bcc
Subject
Sans Serif * tT * B 7 U A ■
A » c-3 © a I fe ;
Blog
A blog is a website which is maintained by an individual. The person who creates
and maintains a blog is called a blogger.
|!} Sorting, se*rc> X j 0 Blogger.com X + — O X
Twitter
Twitter is a social networking service that allows you to send short messages
to communicate with your friends or followers. You can send short messages of
up to 140 characters, which are called tweets. Twitter is used by people to inform
others about the latest happenings in their lives.
Happening now
Join T w itte r to d a y .
m
About Help Center Terms of Service Privacy Policy Cookie Policy Ads info Blog Status Careers Brand Resources Advertising Marketing Twitter for Business Developers Directory Settings © 2021 Twitter, Inc ]
0 P Type here to search O Hi e § e> m 1*44
08-04-2021 %
Facebook
Facebook is the most popular social networking site. To use Facebook, you need
to first create an account and then add other users as friends. You can exchange
messages, pictures, etc., with your friends on Facebook.
Companies also set up their own Facebook pages to connect and communicate
with customers and clients.
EDSorting, X j fj Sign ut x □ X
New password
Date o f birth
8 v j Apr v ] 2021 v ®
Gender
S ig n U p
BESTOFYOUTUBE
© —
O Spon*
Q flaming
Q MOVlM
Q Nwi
0 FaihlOO S, Beauty
Q Learning
Q Spotlight
Q 360’ Video
O Stows* channels
MOREFROMYOUTUBE
WhatsApp
WhatsApp is a free messenger app for smartphones. WhatsApp uses internet to
send text messages, pictures, audio or videos. You can make an audio and video
call to any person having WhatsApp in their smartphone in any part of the world.
You don’t have to pay anything extra for sending messages or making calls. You
just pay for the internet connection.
-> C A digitalindia.gov.in
1 $
CYBERCRIME
Cybercrime refers to any crime done using computing devices with the internet.
Some examples of cybercrime include:
• Cyberbullying: It refers to harassing someone online by using offensive
and/or threatening language
• Cyber Stalking: It refers to mentally harassing an individual/organization. This
may include making false accusations, defaming, etc.
• Hacking: It means the act of illegally trying to access someone's software
and/or data. The person who is involved in hacking is called a hacker.
• Phishing: Phishing refers to someone trying to steal personal information or
access credentials.
• Spamming: Spam means large volumes of unsolicited emails sent to a large
number of users.
Cyberbullying in
social media
Share of social media platforms where
cyberbullying occurs the most: Instagram,
Facebook, Snapchat, WhatsApp, YouTube, and
Twitter
1 Instagram
2 Facebook
3 Snapchat
4 WhatsApp
5 YouTube
6 Twitter
9 "rsiste
Cyber Addiction: We all use internet for social media and e-commerce on a daily
basis, but many a time people get into the habit of overusing it.
Addiction is a mental health problem involving compulsive behaviour. Such a
problem associated with excessive use of internet is known as cyber addiction.
Factors Leading to Cyber Addiction
• Spending less time with family and friends
• Living alone
• Addiction to social media
• Watching movies and online TV shows
1. What are the different types of operating systems? Which one do you feel is the best
for personal use at home?
2. List down the steps of starting a computer.
3. What is the importance of ICT in personal life and at workplace?
4. Identify various input, output and storage devices.
5. What is a computer virus and why is it harmful?
6. What are peripheral devices? Explain with examples.
7. Explain the benefits of internet. Also, name the various internet browsers.
8. What are the external and internal components of a computer system?
9. What are temporary files and how are they created?
10. What is the use of social media for education?
1 ( I; A
Entrepreneurial
W 3 S kills-I
INTRODUCTION
Entrepreneurship has been there since ages but has been glamourized with the new
start-up ecosystem. In this chapter, we will learn the basics of entrepreneurship,
skills and characteristics of an entrepreneur as well as career options before an
entrepreneur. In fact, many myths and fears surround entrepreneurship which act as
a roadblock for many people to start up. We will also look at how entrepreneurship
positively impacts the society and has immense potential to bring about a change.
Entrepreneurship is the process of setting up one's own business as distinct
from pursuing any other economic activity, be it employment or practising some
profession. The person who sets up a business is called an entrepreneur. The output
of the process, that is the business unit, is called an enterprise.
It is interesting to note that the term “entrepreneurship" has French origins and
is derived from the verb “entreprende”, meaning “to u n d e rta k e ” , and was never
related to economics but to undertaking of military expeditions.
The term “entrepreneur" was first introduced in economics by the
early 18th century French economist Richard Cantillon. He formally
defined the entrepreneur as an “agent who buys means of production
at certain prices in order to sell the produce at uncertain prices in
the future." Richard Cantillon
t ............................................................. ........................................................................... ......................... ...................................................................... ................................................................................. .. ................................................... | H
M a n f liiw
■Prepare posters of business activities found in cities/villages, using pictures.
M TSMCT61
^Prepare a list of businesses that provide goods and services in exchange for money.
v _ .............. J
Entrepreneur Entrepreneurship
Person Process
Organizer Organization
Innovator Innovation
Risk-bearer Risk-bearing
Motivator Motivation
Creator Creation
Visualizer Vision
Leader Leadership
Imitator Imitation
(Source: Khanka, 2 0 12)
Innovative Imitative
Innovation + Innovation -
< >
Fabian Drone
R isk -
>r
ROLE OF ENTREPRENEURSHIP
Capital Formation: Entrepreneurship creates value and wealth in society as
entrepreneurs promote capital formation by channelizing financial resources of
the public.
Employment Generation: Entrepreneurship can generate large-scale employment
in society. The employment opportunities are at all levels— company employees,
vendors, partners, etc.
REWARDS OF ENTREPRENEURSHIP
Qualities of an Entrepreneur
Hard-working: Starting a business requires a lot of hard work and entrepreneurs
always push themselves to achieve more. They have a lot of energy to get things
done before time.
Optimistic: Entrepreneurship can be tough and overwhelming with lots of ups and
downs. Entrepreneurs need to remain positive and always motivated to achieve
success even when things are not going their way.
Independent: Successful entrepreneurs work independently and lead teams with
their vision and passion. They collaborate with teams but lead from the front.
Enthusiastic: Entrepreneurs are always high on energy and enthusiastic about
future prospects. They also like to spread positive energy around and motivate
their teams.
Confidence: An entrepreneur decides to build a product or enter a market in which
most of the times he/she is the first entrant. It requires a lot of self-belief and
confidence to be able to do that.
Perseverance: Many a time, the original idea of the start-up doesn’t work. So, the
entrepreneur needs to pivot and change his ideas to make it work. It requires a
lot of patience and a never-quit attitude.
Functions of an Entrepreneur
An entrepreneur needs to get a lot done in a day— from planning to fund-raising
to execution. Let us take a look at the various functions of an entrepreneur.
Why Entrepreneurship
Entrepreneurship as a career option: A lot of universities are now promoting
incubation centres and start-up accelerators to provide entrepreneurship as a
career option. Many students, fresh out of university, are opting for a start-up
rather than going for a regular job.
There is also the new gig and freelance economy wherein professionals don’t run
large enterprises but they work for themselves and are solopreneurs.
It is important to note that while being an entrepreneur can be a lucrative career
option, it is not for everyone and you need to make sure that you have the right
skills and financial support system to pursue it.
Develops confidence and independence: Entrepreneurship can help in developing
the skills of confidence, thinking out of the box and self-reliance. Entrepreneurs are
job creators and stimulate the economy. Some people say that entrepreneurship
is also the best education experience as one gets to learn. This includes learning
about core business areas such as finance, sales, marketing, management and
\ .... ..... y
«LTHiroiwasi
Collecting success stories of first generation and local entrepreneurs: Do you
have an entrepreneur in the family/relations? Discuss with them how they started
and their business plan. Write down at least three success stories.
L ---- —--------------------------------------------------------------------------------------------------------------J
H5885EP
^Listing entrepreneurial qualities— Analysis of strengths and weaknesses: What do you
think are the key entrepreneurial strengths and weaknesses? Can you list them down?
Remember a strength can also be a weakness, e.g., being optim istic is good but
being too dreamy is bad. Similarly, being hard-working is important but overwork
can stress you out. We will discuss about it in self-management.
^________________________________________________________________________________________
How will you develop those qualities that are currently missing in your personality?
Collect information and related data fo r a business: Let us say you are researching
a business idea for using Artificial Intelligence-powered chatbots in e-commerce
companies. Can you identify the sources from which you can collect the below-
given data?
• % of companies globally using Al chatbots
• Growth in chatbot adoption
• Pricing of chatbot solutions
• Industries with the highest use of chatbots
• Benefits of chatbots
Once you’ve identified the sources, please collect and document this data as well.
INTRODUCTION
The term "environment" is used in a broad way. To some people, it simply means
"nature", while for others it means the natural landscape together with all of its
non-human features, characteristics and processes.
These definitions have an underlying assumption that “environment" exists in some
kind of relation to humans. Humans and environment are in association with each
other and need to be in harmony to maintain ecological balance.
atm o sph eric C 0 2
co m b u stio n of
fo ssil fuels
assim ilatio n
by plants and
an im als
anim al
respiration
plant
respiration
assim ilatio n
assim ilatio n by phytoplankton
f Write a sh
short essay on hazards of deteriorating environment.
Environmental
Resource Management
Environmental Protection
Habitat Restoration & Preservation
............................................
A c c o rd in g to C ollins E nglish D ictio n a ry, ‘ E n viro n m e n t co n sists of n atu ral
s u rro u n d in g s in w hich we live o r exist in re la tio n to th e ir physical
c h a ra c te ris tic s ’ .
Every a ctio n has an equal and o p p o site re a ctio n . To a ccu m u la te w ealth
and p ro m o te g ro w th , we e x p lo it resources n atu re has given us, w hile
natu re reacts w ith glo b al w a rm in g , fo re s t fires, c lim a te change and o th e r
m a n -m a d e d isa ste rs. Hence, it m ay be co n clu d e d th a t both so cie ty and
e n v iro n m e n t have a c irc u la r re la tio n s h ip and one im p a c ts the other.
Wastes/poilutants
.A ir pollutant
• Water pollutant
• Soil pollutant
• Radioactive wastes
• Other toxic minerals
Prepare posters showing environment conservation and share with your classmates.
ECOLOGICAL IMBALANCE
Ecological imbalance is caused when natural or man-made disturbances affect the
natural balance of an ecosystem. Following are some of the man-made disruptions
that cause ecological imbalance: < A U
(i) Deforestation: Due to rising population, we needed to create more cities
and more housing structures which led to deforestation. With increasing
deforestation and climate change, many species of birds and animals are
on the verge of extinction.
(ii) Soil Erosion: Deforestation led to other related problems such as soil erosion
and degrading quality of land making it less fertile.
GREEN ECONOMY =
• Futures and
Scenarios
• Mining
G o ve rn a n ce
• R e n e w a b le
e n e rg y
• E n e rg y
e fficie n cy
• W ater
e fficie n cy
• Job creation • M o b ility Social justice
Other • Fair trade • In d u s try Income
• In n o va tio n
redistribution
Agriculture
* Prepare
Pranara a
anposter showing the importance of green economy with the help of newspaper/
magazine cuttings.
Chapter-2
1. (d) 2. (a)
3. (a), (b) & (c) 4. (d)
5. (d) 6. (d)
7. Stress 8. Time management
9. True 10. True ^
Chapter-3
1. (b) 2. (d)
3. (a), (b) & (c) 4. (a)
5. (d) 6. (a) & (b)
7. (c) 8. Cookies
9. Social media 10. True
Chapter-4
1. (d) 2. (c)
3. (d) 4. (d)
5. (d) 6. (a), (b) & (c)
7. True 8. True
9. True 10. True
Chapter-5
1. (d) 2. (a)
3. (d) 4. (a)
5. (d) 6. (a) & (c)
7. (a), (b) & (c) 8. (a)
9. True 10. True
Learning Objectives
B a c k g r o u n d a n d C o n t e x t
“The future is already here— it’s just not very evenly distributed.”
— William Gibson
You use Google for searching things but it gives you auto suggestions on what
you might be looking for. You have probably used Siri or Google Assistant on
your phone as well. You shop at Amazon and it gives you recommendations on
purchases based on what you previously bought. You get bored and ask Alexa to
play songs for you. Browse through Amazon Prime or Netflix and it understands
your viewing patterns and gives you recommendations as to what you might like.
Check Facebook or Instagram and it gives you relevant posts and stories on what
you might be interested in. All of these experiences have an underlying technology
at heart— Artificial Intelligence or Al in short.
Fig. 1.1 : The term AI was first coined during the 1956 Dartmouth Conference
2 E ssen tia ls of A r t if ic ia l In t e l l ig e n c e - I X
IMPORTANCE OF ARTIFICIAL INTELLIGENCE
According to Google CEO Sundar Pichai, Al will have a bigger impact on humanity
than some of the other well-known innovations.
Al has managed to disrupt the conventional functioning of most of the work sectors
and continues to expand its influence over the remaining ones. The most interesting
aspect of Al is that it enables algorithms to handle situations and solve problems
on their own without human supervision, and learn and improve over time using
Machine Learning. Sounds amazing, isn’t it?
are num erous possibilities o f A I in our daily life. From (#
self-d riv in g cars in the US to traffic m anagem ent robots in Dubai,
A I is all set to revolutionize the w o rld in w ay s w e just can’t even
im agine. According to the W all Street Journal, quoting an industry
source, more than 50,000 job opportunities in data science, A rtificial
Intelligence and M achine L earn in g are still vacant due to shortage o f
qualified trained m anpower, w hile globally, alm ost 40% jobs in A I are
lying vacant for lack o f trained people. The average sa la ry o f a
Data Scientist w ith M achine Learn ing skills is ? 874,691 per year.
(So urce : PayScaie)
The future will not be about AI vs non-AI but people who know AI vs
those who don’t, and guess who will win!
■Summarize a list of daily activities that you do which you believe m ight involve
Artificial Intelligence.
~ ......
* Make a list of the devices that you use which m ight involve Al technology. Also write
the manner of Al involvement.
v___________________________________________________________________________V
■m
NETFUX m U
N
■:•••lam GAINS
MJUUN ~ REQUESTS
VIDEOS
2018
L T L 'I'U 473,400
12,986,111
TEXTS SEN T
w w ir n /m m
r USERS MATCH / PROCESSrt ise ?S TAM: \ s’ ' lA M ic v t' \ — USE—
L e a rn m o r e a t d o m o .c o m
GLOBAL INTERNET POPULATION GROWTH 2012-2017
(IN B IL L IO N S )
SOURCES: STATISTA, LINKEDIN, INTERNET LIVE STATS, EXPANDED RAMBLINGS, SLASH FILM, RIAA, BUSINESS OF APPS,
INTERNATIONAL TELECOMMUNICATIONS UNION, INTERNATIONAL DATA CORPORATION
From the above chart, you can see the sheer amount of data and content we are
generating per minute on the internet. It is amazing to see all this data getting
built up on the internet. Imagine the possibilities of using this data for analytics
and personalization of user experience.
This chart shows you how Al has evolved over the years and how it is not a new
technology at all. From science fiction in the 1940s, when Al first captured human
imagination, to the 1956 Dartmouth Conference and then Turing Test, to chatbots
and IBM Watson now, Al has taken over six decades of research to reach where
it is today.
INDUSTRY 1.0
M e c h a n iz a t io n , s t e a m M a s s p r o d u c t io n , A u tom ation, c o m p u te rs Cyber Physical System s,
p o w e r , w e a v in g loom a s s e m b ly lin e , e le c t r ic a l and e lectronics internet of th ings,
Broad AI: Broad AI systems are capable of executing various tasks across
various fields. Imagine a robot which can do your laundry, understand
your voice commands for reading emails, managing calls and scheduling
appointments—all at once. Broad AI would truly replicate human
intelligence and help us leverage true power of AI.
Narrow AI: Narrow AI systems are very good at one specific task that they
are designed to do. They can’t execute any task outside their scope. Imagine
an image recognition system that is designed to distinguish between
humans and animals but cannot tell the difference between dog and cat
unless it is so designed.
It is estimated that in 2020, 1.7MB of data was created every second for
every person on the Earth.
Types of Al
As we have seen, with the rise in the number of devices, apps and connectivity, we
are moving more and more towards a Generic Al or General Al which can handle
multiple tasks at the same time.
There is also merit in having a few independent narrow Al systems and then
bundling them into a larger broad Al system. A perfect example of it is a driverless
car. There are so many sub-systems at play such as (indicative, not exhaustive):
• Image recognition (seeing objects around the car)
• Speech recognition (voice commands from user)
Wireless Communication
Paik Assistance
Sufround View
R « r Collision
Warning , Surround View
Long-Range Radar
Camera LIDAR
Ultra Sound"
(Source: h ttp s://w w w . la n d m a rk d iv id e n d . c o m )
Fig. 1. 5: H o w a d r iv e r le s s c a r w o r k s
Another perfect example of such a broad Al system could be smart home systems.
Do you know that Bill Gates’ house in Washington has many interesting
gadgets to optimize energy consumption and enhance visitor experience.
A small example is that when a guest arrives, they are given a pin
(a simple gadget that can be held or put on their clothes) that interacts
with all different sensors in the house and the guest can enter their
temperature and lighting preferences which change as they move from
room to room. Music also keeps following you as you navigate the house
and adapts to temperament. Even the artworks on the walls can
be changed through touch sensors. Sounds amazing! Doesn’t it?
EVOLUTION OF AI
Artificial Intelligence (AI) Trends
Independent of Application
N a rro w A I - AI designed to execute a single task better than a ???
human
U b e r B o t - Bots capable of answering any structured query in
conversational style of a human Superintelligence
E n h a n c e d N a rro w A I - Narrow AI capable of more than one task
N a rro w A I C l u s t e r - An assem bly of Narrow AI system s to
achieve greater capabilities
N a rro w A I S u p e r c l u s t e r - An assem bly of Narrow AI Clusters ' General AI Acceleration
C G e n e ra l A I - AI with full cognitive capabilities mimicking a human (with or without
<O
c S u p e r in te llig e n c e - AI well beyond human cognitive capabilities
consciousness)
Possible
<
Q_
o
........................................................................ ' - ........................................... ............................... M |i
Narrow AI
/
Superclusters
< *
00
Narrow AI
Clusters Convergences Driving Acceleration
oo .c f • Internet of Things
Enhanced • Next-Gen Chips (Moore’s Law 2.0)
Narrow AI • Supercomputers
• Sensors
UberBots • Robotics
(“Al-first”) • Cloud
Narrow AI
Deep Learning (imagery, language,
etc.) Bots (conversational, search, etc.)
2016 2017- 2018 ???
2018 FutureGrasp, LLC
Fig. 1.6 : Evolution of Artificial Intelligence
The focus of future research is increasingly on building machines that can truly
think like humans as well as coordinate and collaborate with them. This would be
termed as General Al wherein machines can autonomously think and create new
solutions for unknown situations or scenarios, just like humans!
“Al can have two purposes. One is to use the power of computers to augment
human thinking, just as we use motors to augment human or horsepower.
Robotics and expert systems are major branches of that. The other is to
use a computer’s artificial intelligence to understand how humans think. In
a humanoid way. If you test your programs not merely by what they can
accomplish, but how they accomplish it, then you’re really doing cognitive M
science; you’re using Al to understand the human mind.” !■
-Herb Simon ,
Humans have always tried to see how machines can think more and more like us
as our brain is fascinating in the way it works. Earlier, we only thought of machines
to help us with labour-intensive work or hard tasks, but increasingly with Al, we
are looking at machines to truly replicate our thinking process. In such a world,
humans and machines could really collaborate with each other.
Currently
Technology ■*
is here
• See how Google Duplex came close to passing the Turing Test
In 1966, ELIZA was the first natural language programming (NLP)-based conversation
program described by Joseph Weizenbaum.
The original program was implemented on IBM 7094 of Project MAC time-sharing
system at MIT and was written in MAD-SLIP AI language.
ELIZA > (PLEASE TVPE IN ALL CAPS} WHAT'S VOUR NAME DEAR ?
AMTT
ELIZA > HI. I ’M ELIZA. WHAT DO VGA WANT 10 TALK ABOUT ?
AMI I > CON I TALK ABOUT MV PROBLEM ?
ELIZA > SURE... '
OMIT > DUE TO ON GOING EXAMS IN COLLEGE, I MOVE 0 LOI OF STRESS.
ELIZA > PLEASE RELAX 0 LITTLE. SLEEP WELL.
OM.LI > 1HONKS LOR VOUR ADVICE.
ELIZA > NO MFNTIQN.
OMIT > BVE
ELIZA > BVE AND KEEP IN TOUCH...
Fast forward to 2019. We are now surrounded by chatbots or bots in general— from
Alexa to Siri to Google Assistant.
Chatbots are essentially assistants that communicate with humans through text
or voice. They are virtual companions that seamlessly integrate into websites,
applications and even instant messengers, and help businesses get closer to their
users.
Chatbots are something every business should consider. Apart from just getting
rid of routine tasks and processing multiple queries at once, chatbots also go a
long way in gaining customer loyalty.
• Curiosity: People are always curious about trying something new. And the
novelty of chatbots sparks amazing curiosity.
With all those benefits and more, users find it amazing to get assisted by a chatbot.
There is no denying that as these bots get more sophisticated, more and more
businesses will embrace them.
Do you know that Sophia was the first robot that was
recently offered citizenship by the Kingdom of Saudi Arabia.
. ..... chatbots
Find out chatbots on the internet and interact with them to understand and appreciate
how they use NLP to have an engaging conversation with the users.
J
For most people globally, their first encounter with AI was with IBM Watson—
the computer system developed to answer questions on the famous quiz show
Jeopardy!* (a US-based reality show) and, in 2011, the Watson computer system
competed on Jeopardy! against legendary champions Brad Rutter and Ken Jennings,
winning the first place prize of $1 million!
Underlying Watson was 16 terabytes of RAM through which it could process 500
gigabytes (1 million books) per second. Content was stored in Watson’s RAM rather
than in memory for easy access and it cost about $3 million.
• Divides these texts into different keywords and fragments and searches for the
intent from texts (signal classification from noise).
• As more and more algorithms look for the same answer, it boosts Watson’s
confidence and helps it to make the right response/guess.
• The show features a quiz competition in which contestants are presented with general knowledge
clues in the form of answers, and they are required to phrase their responses in the form of questions.
Prime Minister Narendra Modi said in 2018 that the evolution of technology has
to be rooted in the ethics of “Sab ka saath, Sab ka vikas”. (We need to make AI
in India and it should work for India.) He also said that IT + IT = IT, which means
that India's Talent + Information Technology = India Tomorrow and AI sits at the
heart of this national technology strategy.
NITI Aayog set up a #AlforAII hashtag and came up with a discussion paper on
National AI Strategy. In a country as diverse as ours with limited infrastructural
capabilities and suboptimal efficiencies, AI could be a real boon in improving access
to and quality of all e-governance services.
FUTURE OF AI
AI as a technology is evolving with each passing day and we are seeing newer
applications in all sectors such as health care, education, banking, logistics and
retail among others.
Another way Al will evolve is its use in conjunction with our brains. Augmentation
is a hot topic and its future looks promising, especially when coupled with Artificial
Intelligence. Researches are extremely positive when it comes to Al augmentation
in the future.
Hazardous jobs, too, will be a thing of the past— well, for the most part. Al will be
able to handle many of them as it doesn’t understand the concept of pain and can
be reassembled if destroyed. This opens a lot of possibilities such as bomb defusing.
Al can also be used to overcome several problems associated with our environment
today. Al, in congruence with big data and other technologies, can help solve
problems relating to climate change, natural calamities prediction, etc. Even though
there is a fair bit of time before we reach that stage, the possibilities are endless.
As Al evolves and becomes smarter, the sky will be the limit. All we know for sure
is that Al will overhaul every possible domain’s operations in times to come.
Since we are in the midst of the Fourth Industrial Revolution, it is time to start
preparing for future work skills. With Al coming into being, the nature of skills
requirements will also change and evolve. With fast-paced technological innovations,
most of us would soon be sharing our workplaces with artificial intelligence tools
and bots. This means machines will be able to do our work better, faster with
more efficiency. Humans and machines will be able to complement each other
and machines may even go beyond human limits.
Now, the apprehension that the future will witness huge layoffs or
that there will be a workforce sans humans is being unrealistic. It is
true that some occupations will lose steam, but then there are
others that will grow, and many more will emerge. So,
how can we be future ready?
1. Creativity: We all will need to be creative enough to work hand in hand with
technology to fully tap the potential benefits. Al is not intended to compete
with humans; rather we have to design better systems to take on higher order
cognitive tasks. The future workplace will have both humans and machines
working together.
2. Emotional Intelligence Quotient (EQ): Emotional Intelligence means having
empathy towards others, high integrity and collaborating with others. Machines
cannot replace our ability to connect with other people and that is why people
with higher EQ will be in demand. Therefore, jobs requiring emotional intelligence,
like nursing, will be more relevant in future.
3. Analytical Thinking: A person who can come up with innovative solutions and ideas,
solve complex problems using reasoning, evaluate arguments and analyze the flow
of information from various resources while keeping in mind the constraints is
least likely to be overpowered by Al and automation. People with strong analytical
thinking will be needed to navigate the human/machine division of labour.
4 . Active Learning: One needs to be on the lookout for new learning needs and be
adept at acquiring these skills. Gone are the days of passively reading books and
1. Can machines ever surpass human intelligence? Explain your thoughts in support of
your argument.
2. Is Al a recent technology? If no, explain why it has gained prominence only recently.
3. Do you think Al is good for humanity or do you foresee problems with the technology?
__________________
Quick Activity
j ____ i____ i____ i____ i____ i____ i____ i____ i____ i____ i____ i____ i____ i____ i____ i____ i____ i
Think and plan a small presentation on how Al could be used in classrooms. Which subjects could be taught
through Al and how would teaching be different in an Al-enabled classroom?
• Play Rock, Paper, Scissors and list down how you think it works and what are the underlying principles.•
• Try playing with QuickDraw. See how fast it predicts after trying a few times. Understand how it works
and discuss with your peers.
D omains of Al
W (D ata, CV and NLP)
Learning Objectives
Ip | Understand and identify the three key domains of Al
Ip | Learn to apply these domains in Al-led problem-solving
Just like any other technology, Al in its true sense will support humans in doing
their work better. The positive side of Al is that it can support humans in higher
cognitive abilities-led tasks as well which was not possible earlier.
It is interesting to learn how Al is able to carry out such complex tasks and what
are its underlying capabilities. Al has three underlying domains: Data, Computer
Vision (CV) and Natural Language Processing (NLP). We will now look into details
of each of these and then interpret them together in action as well.
D omains of Al 23
project requirements. For example, if you are to make a weather prediction model
using Al, you need to identify what parameters define weather such as temperature,
humidity, etc., and all the underlying patterns that impact weather. We need to
then define the sensors from which this data can be collected and so on.
The key to data collection is to structure the data in such a format that one can run
analytics and pattern recognition models on top of this data. From those patterns,
one can build predictive models using machine learning algorithms that look for
trends and predict the future.
BID
Al-Enabled Duet
Scan QR code or visit:
https://experiments. with google, com/ai-duet
This experiment lets you play a duet with the computer. Just play some notes and
the computer will respond to your melody. You don’t even have to know how to play
the piano— it’s fun to just press some keys and listen to what comes back. You can
click on the keyboard, use your computer keys, or even plug in a MIDI keyboard.
It’s just one example of how machine learning can inspire people to be creative.
For example, in the above instance, if you are to predict weather data for a city
(say Mumbai, which is coastal), getting data sets for a different city whose weather
is very different from the city in question (say Udaipur, which has a semi-arid
climate) will not serve much purpose.
It starts with having basic hardware, sensors and devices in places to capture the
data required for our Al model. We need to ensure right data, right formats and
quality of data at this stage.
Next is having the right storage systems which means having IT infrastructure
(servers, cloud storage, etc.) and systems such as ERP, MIS, which can keep
this data.
We then need to do data cleaning to ensure that right data in correct format
(structured data) is available to run any analytics or data science models on it.
D omains of Al 25
The next step is to run data visualization models, classification of data, data
labelling and defining some analytics metrics for the identified set of data.
The interesting thing about creating data sets in your respective industry
is that you can use it for competitive advantage and create solutions around
it. Companies like Google, Amazon and Facebook are dominating their
industries because they were the first to begin building data sets. Their data
sets have become so large and complicated and their data collection and
analysis is so sophisticated that they are able to grow it to their competitive
advantage.
Adopting Al and ML is a journey and not a magic wand to produce results instantly.
It begins with gathering data into statistical processes and simple visualizations
that allow you to better interpret your data and get your processes under control.
From there, you,ll progress through increasingly advanced analytical capabilities
until you achieve that utopian goal of self-learning algorithms that optimize your
process on their own without human intervention.
AI is the next logical step to SQL-based search. Organizations need to combine the
power of human intuition with machine intelligence to augment these technologies
— to create what is called Augmented Intelligence. More specifically, an AI system
needs to learn from data as well as from humans in order to be able to fulfil its
function.
AI is becoming a circular and ongoing process with Big Data. First, data needs to be
into the AI engine, making AI smarter with underlying machine learning algorithms.
With smarter AI, lesser human intervention is needed for the AI to run properly.
And finally, the less AI needs outside involvement to run, the closer the society
comes to realizing the full potential of this ongoing Al/Big Data cycle.
(Source: M a ry v ille U n iv e rs ity )
You can use the following data sets available on Google Research for
your AI projects.
Scan QR code or visit:
http://research.google/tools/da tasets/
D omains of AI 27
Maslow's Hierarchy of Needs: Maslow’s hierarchy of needs is a theory
in psychology proposed by Abraham Maslow in his 1943 paper "A Theory
of Human Motivation” in P sych o lo g ica l Review. It attempts to create a
classification system to reflect the universal needs of society as its base
and then proceeding to more acquired emotions.
Computer Vision (CV) has been around for over 50 years. Its development began
in the 1950s, around the same time when Artificial Intelligence gained prominence.
But like Al, it is only recently that CV has started gaining importance. Some CV
applications include self-driving cars, facial recognition-based tracking systems with
vision cameras and Amazon Go.
Interesting Read
Amazon Go is a new kind of store with no checkout
required. With the Just Walk Out Shopping experience,
simply use the Amazon Go app to enter the store,
take the products you want, and go! No lines, no
checkout. (Source: Amazon)
D omains of Al 29
You can use the open source Computer Vision framework called
Open CV for your AI projects.
Evolution of CV
In the summer of 1966, Seymour Papert and Marvin Minsky at MIT Artificial
Intelligence group started a project titled Summer Vision Project. The main aim
of this project was to build a system that could analyze a picture and identify all
objects in the image. It is interesting to note that even now CV is a complicated
area with thousands of researchers across the globe trying to perfect it but it was
started by two undergraduates who dared to solve it way back in the 1960s.
In the 1970s, David Marr, a neuroscientist at MIT, taking cue from brain studies including
cerebellum, hippocampus and cortex for human perception, set up the building blocks
of modern Computer Vision. He is known as the father of modern Computer Vision.
Majority of his research ideas are summarized in his book titled VISION.
Since 2012, Deep Learning, which is a subset of Artificial Intelligence, has gained
prominence. It focuses on Artificial Neural Networks (ANNs) which have been
covered in detail in Chapter 6. ANNs are designed on the lines of how neuron
networks work in our brain, so algorithms learn on their own from huge amounts
of structured or unstructured data.
Deep Learning can work hand in hand with CV creating powerful systems such as
searching images in Google, tagging of friends on social media, apps which can
create an aged version of your face, speech-to-text translation, intrusion detection
systems, etc.
Web: From traditional text searches, we have moved onto image search, face
recognition, object recognition, scene recognition, geolocalization from vision,
image tagging on social media, Google maps aerial imaging, YouTube (content
categorization)
Bowl, Orange,
Banana, Peach,
Mango, Apple
Bowl, Orange,
Banana, Peach,
Mango, Apple
D omains of Al 31
Challenges
One would think that with so much advancement in technology, Computer Vision
is superior to human vision and can surpass it on all use cases. But this is not the
case. There are still lots of constraints in CV capabilities. When compared to human
vision in situations like simple face recognition under varying circumstances of
lighting, expression, additional objects/clothing on face, CV output is sometimes
not correct.
As per a recent report, the Computer Vision market was valued at USD 2.37 billion
in 2017 and is projected to reach USD 25.32 billion by 2023 at a Compound Annual
Growth Rate (CAGR) of 47.54%. (Source: M a rke tw a tch )
All the above data sets give us a huge opportunity to apply Computer Vision to
derive patterns and analyze this data and develop useful applications out of it.
It must be pointed out that in spite of all these advancements in CV, Al and the
field of Computer Vision still need to tackle certain basic problems such as ethics,
bias, risk unawareness and lack of explainability.
D omains of Al 33
jLTzmmM
'Teachable Snake is an interactive web game powered by the beta version of Teachable
Machine 2 and React.js, inspired by Webcam Pacman project.
The idea is that instead of using physical buttons to control the game, the user can
draw a black arrow on a piece of white paper as controller and move the snake by
turning the paper in different directions in front of the webcam.
To recognize the paper controller pointing at different directions, the model is pre
trained with 500 photos in each arrow direction (up, down, right and left) and stored in
cloud with the beta version of Teachable Machine 2. With the API endpoint published,
the model can be applied in the React.js app.
Scan QR code or visit:
https://experiments. with google, com/teachable-snake
V, J
Useful Resource
Full list of CV applications
Scan QR code or visit:
https://www.cs. ubc. ca/~!o we/vision. htm l
The reason for this growth in images and videos is because of smartphones which
have cameras, and so taking a photo or video and sharing it has never been easier.
In fact, smartphones have overtaken cameras as the largest manufacturer of camera
lens. Earlier, when we used conventional cameras, each picture was worth money
and so people used their camera film judiciously. Now, if we don’t like a picture,
we can simply delete it or just add a filter to enhance it.
We all know that YouTube is essentially the second largest search engine with
hundreds of hours of videos uploaded every minute and billions of videos being
watched daily.
82% cat
__________ ________ ^ . 15% dog
image classification 2 % hat
1% mug
The internet consists of text, images and videos. We have been able to index and
search text for many years now and algorithmically also, it is fairly straightforward.
But for images in particular, we need to analyze what they contain and for that
we need Computer Vision. Over the years, meta tags and descriptions have proved
to be the best way to describe images but with CV, it is now possible to literally
“ see” and “ interpret” images and know what they contain.
This may sound complicated from a computer standpoint but it comes very naturally
to humans, even children.
Let us see the process of how we typically visualize and interpret vision:
• We can describe the contents of an image we see once.
• We can summarize an image or video that we have seen only once without any
prior training.
• We can recognize a face that we have seen before.
This is the bare minimum that we expect from Computer Vision as well. Doesn’t
sound very difficult, right?
D omains of Al 35
Image Processing is defined as
OUTPUT
the process of creating a new
INPUT
image from an already existing IMAGE DESCRIPTION
one, either simplifying or
enhancing the content in some IMAGE DIGITAL IMAGE
COMPUTER VISION
PROCESSING
way. It is basically a type of
digital signal processing and is
COMPUTER ARTIFICIAL
not concerned with interpreting DESCRIPTION
GRAPHICS INTELLIGENCE
the content of an image.
A given CV system may require Image Processing to be applied to its raw input,
e.g., pre-processing images.
Some instances of pre-processing of images include:
• Adjusting photometric properties of the image such as brightness or colour
• Cropping an image to centre an object in a photograph
• Reducing digital noise from an image such as extracting content from low light
levels
As you can see, very little automation is involved here and the cost of recognition
would be very high as the database becomes larger, not to mention constraints
on capabilities due to lighting, angle, foreign objects in the images, etc.
D omains of Al 37
Facial Recognition Applications
Social m edia tagging, phone unlocking using face ID and attendance biom etric
system s using face— all of these use face recognition w hich is built on top of CV.
Law enforcem ent agencies are now increasingly using face recognition to identify
crim inals w ho change their facial features to go incognito. Passport agencies and
im m igration authorities use Face ID fo r visa purposes and border transit access.
Self-Driving Cars
It is not only technology com panies that are m aking use of CV, even the autom otive
industry is catching up. Self-driving cars about w hich we read in Chapter 1
fundam entally use CV to m ake sense of their surroundings. They have a 360-degree
cam era that captures the surroundings from different angles and then im ages are
pre-processed. This input is then fed into the CV console application which recognizes
the objects around, type of object, its distance, traffic signs, lane departure, etc.
Al algorithm s run on top of this CV console to provide trig ger to driving dynam ics
in order to control steering, speed and brakes. This helps drive carefully and
autonom ously w ithout hitting any objects or breaking any traffic rules.
Health Care
CV can analyze health records, lab reports,
X-ray im ages and prescription data/clinical
inform ation m uch faster than the doctors. It
can then run algorithm s against m illions of
em pirical records and do prognosis effectively.
An exam ple of CV applications in health care
is O rlando Health W innie Palm er Hospital for
W om en and Babies, w hich taps Com puter Vision through an artificial intelligence
tool that m easures blood loss during childbirth.
The key issue w as that post-partum (post giving birth) haem orrhaging w as one of
the biggest causes of m ortality during childbirth. The Al technology uses pictures
taken w ith an iPad device and analyzes im ages of surgical sponges and suction
canisters.
Since im plem enting Al at the hospital, w here 14 ,0 0 0 babies a year are delivered,
doctors have learned that they often overestim ate how m uch blood a w om an
loses during delivery. W ith Com puter Vision, they can understand the am ount m ore
accurately, allow ing them to treat w om en appropriately.
You m ust have seen Google Glass, Virtual Reality (VR) headsets and A ugm ented
Reality (AR) apps (look at the Fun Tim e section below ). These applications use CV
to em pow er a m ixed reality experience. They are used in education fo r learning,
in tourism industry fo r creating VR tours, and in oil m ining industries to capture
offsite areas w hich are difficult to reach or are unsafe fo r hum an beings.
A machine (NeuralCandy) that dispenses candy when the user displays the
requested image in front of the trained image model.
NeuralCandy combines image classifier and sugar
highs in one delicious Android Things project. ro Ht
NeuralCandy uses the TensorFlow Lite inference library for Android to locally classify
the captured image against the pre-trained ImageNet model. This model is good at
recognizing categories that it was trained with. You can use a smartphone to search on
Google for the requested target image and put it in front of the Pi camera. The Raspberry
Pi 3 model B will handle the image processing and the motor for the candy release.
' Scan QR code or visit:
https://experiments. with go ogle, com/neuralcandy
D omains of Al 39
Teachable Machine is a web tool that makes it fast and easy to create machine
learning models for your projects, no coding required. Train a computer to recognize
your images, sounds and poses, then export your model for your sites, apps, and
more.
NLP is all about algorithm s to understand and interpret speech and text w hich is
natural language data. Be it any language, sentence or paragraph, NLP can scrape
through it and m ake sense. Traditionally, hum ans interact with each other in natural
language but w hen it com es to interacting w ith m achines, we use program m ing
languages and softw are codes.
• Docum ent Processors such as M icrosoft W ord and G ram m arly that em ploy NLP
to check fo r gram m atical, sem antic errors and plagiarism to check accuracy of
texts
You can use the Apache Open source framework Apache OpenNLP for
your AI projects.
Every new technology com es with its pros and cons. NLP is no different. There are
constraints to NLP as w ell. As sentences becom e longer, and as we use slangs and
incorrect gram m ar or m ultiple languages in the sam e content, the intent becom es
hard to extract and classify. This leads to errors in interpretation. A hum orous
exam ple of such a fallacy is:
In 1950s, English to Russian translation w as m uch sought after due to Cold W ar.
Here is a biblical sentence that required translation: “The spirit is w illing, but the
flesh is w e ak.”
D omains of AI 41
SYNTACTIC ANALYSIS— GRAMMAR
sentence
Here is the result w hen the sentence w as translated into Russian and back into
English: “ The d rin k is g o o d , b u t th e m ea t is r o tte n .”
(Source: N e w Y o r k T im e s )
NLP at its heart uses two underlying logics: Syntax-based analysis and Semantic analysis.
1. Syntax
Syntax m eans how the w ords are organized in a sentence in the proper order and
using correct gram m ar so that they m ake sense.
NLP needs to understand the structure of the sentence and breaks it dow n into
m ultiple objects to feed into the sem antic analysis engine.
Let us take an exam ple text:
Ashish w o rk s a t A g n itio . Ashish is an A rtific ia l In te llige n ce P ra ctitio n e r. He s tu d ie d a t
th e Indian In s titu te o f Technology and w o rk e d a t Nestle.
Som e of the com m on syntax-based analyses are:
• Sentence Segm entation: This m eans to sim ply break a paragraph into sentences.
Each sentence represents a separate idea or concept.
From the above exam ple, we get:
“ Ashish w o rk s a t A g n itio .”
“ Ashish is an A rtific ia l In te llig e n ce P ra c titio n e r.”
“ He s tu d ie d a t th e Indian In s titu te o f Technology and w o rk e d a t N estle.”
• W ord To ken izatio n : This m eans breaking the sentence into w ords.
From the above exam ple, we get:
“ A shish ” “ w o rk s ” “ a t” “ A g n itio ”
Just split the w ords w hich have spaces betw een them . Easy!
“a t” “A g n itio ”
• Text Lem m atization: This m eans to figure out the basic lem m a of a w ord.
For exam ple,
I have one baby
I have tw o babies
These are tw o separate w ords but their lem m a is sam e and one is basically the
plural of another. •
• Id e n tifyin g Stop W ords: There are lot of w ords like “T h e ”, “an d ”, “ is” in the
English language w hich are filler w ords and NLP engines need to have a m odel
to filte r them out.
Google has developed a tool to empower computer systems to read and understand human language in
order to process it in intelligent ways. Google decided to share the findings with the community by releasing
SyntaxNet, an open-source neural network framework for TensorFlow that provides a foundation for Natural
Language Understanding (NLU) systems.
D omains of Al 43
2. Semantics
Sem antics m eans trying to understand the core intent of the sentence in order to
reply appropriately. It involves applying com puter algorithm s to understand the
m eaning and interpretation of w ords and how sentences are structured.
• Play with SpaCy, the leading open-source library for advanced NLP, and Prodigy, an annotation tool for
radically efficient machine teaching.
D omains of Al 45
6. Breaking sentence into words in NLP is called .....................................
7 ....................................means trying to understand the core intent of the sentence in
order to reply appropriately.
8 ....................................is the first step in order to do data visualization.
1 . What do you think are the possible challenges with using Computer Vision in
E-Governance?
2 . Describe how you could use Natural Language Processing in subjective assessments
in school.
3 . Describe how you will build a chatbot that uses NLP and can talk to mental health
patients and make them feel better.
4 . Do you think Al and Big Data are related and dependent on each other? How?
5 . Imagine you are running a call centre. You are facing a major problem—your staff is
not in their seats most of the time with the result a lot of calls remain unanswered.
How will you use CV, NLP and Data together to solve this problem?
6. A lot of data is generated at your school every day. Classify this data into various
categories and think what kind of data visualizations can you run on it?
7 . Will it be possible to use NLP in future for teaching? What would be its limitations
and possible areas it can be used for?
• 8. Think of examples where Data, CV and NLP are integrated in common-life applications.
^ ^ ^ u i c k Activity
i i i i i i i
Le t t e r to Fu t u r e S elf
Put on your reflective cap and write a letter to your future self. What do you want to tell yourself or remind
yourself about?
Imagine the world in 2030 and write a letter to your future self. Be sure to mention things that you think
your future self would probably be doing and experiencing in daily life.
Place........................................
Date........................................
Dear Future Self,
It feels a little weird to write to you but I want to share how life is now so that you can relate to it in the
future.
Hope this letter brings back old memories...
Sincerely
D omains of Al 47
Spen d Tim e w it h G o o g le St o ry Speaker
Build an interactive story with Google Story Speaker and discuss with your friends.
• Install Story Speaker extension for Story Speaker:
S&HKB
jg K jg Scan QR code or visit:
https://chrom e. google, com /w ebstore/detail/storyspeaker/ohfibfhhfbhknfdkipjdopbnegkbkjpj
The Story Speaker extension can be accessed with docs.google.com. After signing in on Google and opening
Google Docs, go to Add-Ons and choose Story Speaker. A dialog will open. Click on Basic Template and work
on the same after understanding how it works.
(Source: C B S E h a n d b o o k )
Using your Floor Plan (Chapter 1, Activity 4) as a base for your story, use the Story Speaker extension in
Google Docs and write the story. Ensure that you give/write specific instructions in the story to enable the
storyteller to respond.
Now it is your turn to create a story using the Google Extension of Story Speaker for Google Docs.
START HERE
Link for the basic template of Story Speaker:
“ ...Climate change is a massive problem across nearly every sector and measure of
human development. To address it at the speed and scale that current conditions require,
we will need to take a more data-driven approach— one that harnesses the full power
of Artificial Intelligence and other advanced technologies to accelerate discovery and
innovation at a truly planetary scale.”
— Lucas Joppa, Chief Environmental Scientist, Microsoft
From creating the perfect crop to early stage prognosis of diseases to inclusive
quality education fo r all, Al can actually help in solving global internally developed
M illennium Sustainable D evelopm ent Goals (SDGs).
In 2017, after the passage of Hurricane Harvey, m any streets in dow ntow n Houston
w ere flooded and im passable— but others w eren't. An Al application that used
satellite-based im agery w ith object detection and identification algorithm enabled
the rescue team to identify safer escape routes fo r those trapped by the rising
w ater levels.
These are just tw o small exam ples of Al being used fo r social good— and we have
scratched the surface on the possibilities of A l. Although Artificial Intelligence is
not a panacea, it could help in solving som e of the w orld's m ost challenging social
problem s such as curing cancer and climate issues. Al doesn't always require scientific
breakthroughs; it can add to existing efforts in both developed and developing
econom ies which are experiencing significant societal challenges or crises and often
live beyond the reach of traditional solutions that w orked in the past.
A l AND SDGs
In 2 0 15 ,19 3 countries of the w orld agreed to the United Nations (UN) 2030 Agenda
fo r Sustainable D evelopm ent to set up goals fo r the betterm ent of the w orld.
These countries identified 17 global goals to end poverty, protect the planet and
ensure peace and prosperity for people, now and in the future. These 17 Sustainable
D evelopm ent Goals (SD Gs) are defined fo r joint global cooperation betw een the
developed and developing countries.
1 NO QUALITY GENDER
1 POVERTY 2 ZERO
HUNGER
HUNC
GOOD HEALTH
AND WELL-BEING 4 EDUCATION EQUALITY
CLEAN WATER
AND SANITATION
• • •
I V* I III I f I 9
•i
' 1' t t i ® OO
U LIFE LIFE 1 c PEACE, JUSTICE PARTNERSHIPS
14 BELL
BELOW WATER ON LAND 10 AND STRONG FOR THE GOALS
INSTITUTIONS
K
Fig. 3.3 : UN’s 17 Sustainable Development Goals (SDGs) (Source: im t.o rg )
In Decem ber 2017, the 203oVision published its first report: U niting to Deliver
Technology fo r the Global Goals. In this report, role of digital technology— big
data, robotics, internet of things, Al and other technologies— w as identified in
achieving SDGs. In this chapter, we will discuss how Al can be an effective tool in
accom plishing alm ost all of these SDGs.
SDG 1: NO POVERTY
To identify the m ost needy individuals, groups and regions, im ages taken by
satellites on a continuous stream can help identify global activities that reflect
poor and rich regions. For exam ple, geographic areas w ith a high light density at
night-tim e tend to be typically w ealthier than those w hich are dark w ith little or
no access to electricity at night. A team of researchers from Stanford U niversity
used satellite im ages of areas in daylight and night-tim e im ages to identify the
m ost poverty-stricken regions of Africa. They w ere able to predict poverty w ith an
81-99% accuracy as com pared to the household survey data. Al can help identify
areas w hich are badly in need of help.
Rather than “sp ray-an d -p ray” approach to herbicide application, Al can be used to
distinguish betw een a w eed and a sprout of a plant based on learning from m ore
than a m illion im ages of young plants. W hen it identifies a w eed, it can spray on
it directly. This can cut losses by up to 90%.
Al can help identify the areas w hich are at an increased risk of food shortages due
to lack of w ater, rising food prices and crop failure. Such a system has already been
deployed in Colom bia to w arn the farm ers of a potential drought and suggest them
to skip the planting season. The farm ers w ho heeded the advice and skipped the
planting season, saved on planting costs w hen the drought occurred.
Integrating Al into health care ecosystem has m any benefits including autom ating
tasks and analyzing big patient data sets to deliver better health care faster and
Al can pull tog ether patient insights leading to a predictive analysis. It can also
help in obtaining patient insights to discover key areas of patient care that require
im provem ent.
W earable health care technology using Al helps serve patients better. Algorithm that
uses A l, like FitBits and sm artw atches, can analyze health data and the underlying
patterns to alert the users and their health care providers on potential health risks
in future. A ssessing o n e ’s own health through technology eases the w orkload of
professionals and prevents unnecessary hospital visits or rem issions.
Personalized Learning
How ever, w ith the introduction of Al, teachers can offer personalized assistance
to each student based on their learning needs and the kind of learners they are
(text, audio, video, action-oriented). Al can custom ize hom ew ork assignm ents as
well as final exam s, ensuring that students get the best possible personalized
assistance.
Smart Content
Al can produce sm art content of superior quality w hich includes virtual content
like vid eoconferencing and video lectures. Textbooks are already taking a new
turn. Al system s can create custom ized textbooks. As a result, textbooks are being
digitized and new learning interfaces are being created to help students of all
academ ic grades and ages.
Al in Education
Problems Al Solutions
Standardized curriculum does not cater to Personalized learning
----------- ►
individual needs
Limited one-to-one tutor time available for Personal virtual tutors
university students
Grading and assessment is time-consuming, Al can assess open-ended questions— and in
with an over-reliance on multiple choice real time
Large class sizes in K-12 schools means Virtual classroom assistants
----------- ►
children’s questions often go unanswered
Personalized communication is almost Chatbots can answer administrative questions
impossible due to scale from parents, staff and students on the fly
Selecting the best students from a large Al can shortlist candidates based on multiple
application pool “ 1* data points
Increasing drop-out rates at universities ------------ ► Al sentiment analysis
The need to effectively combat plagiarism and Natural language processing can identify
ensuring authorship patterns and source facts
Fig. 3.7: Al in Education (Source: E d u T e c h A sia )
...but low attendance in college/university. in just 60% of countries studied, women have
as much access to financial services as men.
e
much access to land ownership as men.
34 % of men women spend double the time men do on
housework and other upaid activities in the
and 20% of women are illiterate in 44 countries. 29 countries for which data are available.
Al workforce distribution
Women make up 22 per cent of Al workers, but the gender gap varies Share of Remaining
professionals with gender gap
by industry. Al skills by gender (female/male)
In d u s try (g e n d e r g a p )
S o f t w a r e a n d IT S e r v ic e s ( . 2 3 ) f f f j f l l 7 .4 % 3 2 .5 %
•► 70%
E d u c a t io n ( . 3 3 ) W H W W M W W W W t W t 4 .6 % 1 3 .9 %
F in a n c e ( .2 4 ) fttW 1 .4 % 5 .7 %
o
C o r p o r a t e s e r v ic e s ( .3 0 ) m 1 .0 % 3 .5 %
H a r d w a r e a n d n e t w o r k i n g ( .2 3 ) tut 0 .8 % 3 .6 % F e m a le M a le
84%
H e a lth c a r e ( .3 4 ) Iff 0.9% 2 6 . %
Germany
I______ I______ I______ I-------- 1-------- 1
10 20 30 40 50
■ M a le ■ F e m a le
S h a r e o f A l t a l e n t p o o l (% )
• Insights into the causes behind these gaps, based on data and academ ic
expertise from the backend.
W ith the use of A l, com panies can address the problem of salary-based inequalities
and, for exam ple, identify discrepancies which could arise from less obvious factors
like leave travel allow ances, m aternity benefits, housing and car allow ances, etc.
U sing this inform ation, com panies can zero in on w hich functions or at w hich
levels real gaps exist and use data-driven approach to take decisions to create
real actionable change.
A rtificial Intelligence can be used fo r m ore effective w ater treatm ent processes as
well as fo r detecting problem s and assuring an early allocation of efforts. Al can
offer accurate and tim ely inform ation about the kinds of pollutants in w ater and
m ake recom m endations fo r their treatm ent.
There have also been calls for making emission norms more
stringent in the automotive industry and factories globally.
On the other hand, renew able energy is rapidly being accepted as a reliable
alternative to fossil fuels. Look at the grow th of electric vehicles around us.
These resources are m uch safer and cleaner than conventional sources like petrol,
diesel, etc. W ith the advancem ents in technology, renew able energy sector has
m ade significant progress in the last decade especially in term s of its reliability,
production, efficiency and cost.
SUSTAINABLE
DEVELOPMENT
G O ALS
ENSURE ACCESS TO
AFFORDABLE, RELIABLE,
SUSTAINABLE AND MODERN
ENERGY FOR ALL □
G LO B A LLY
-----------
12.6%
STILL LACK ACCESS TO
MODERN ELECTRICITY
ENERGY ACCOUNTS
FO R RO UG HLY
2/3
OF GLOBAL GREENHOUSE
GAS EMISSIONS
Fig. 3.9 : Access to Clean and Affordable Energy (Source: U n ite d N a tio n s, In d ia )
W hen com bined w ith the pow er of A l, this data can give new insights to the grid
operators for better control over operations by offering flexibility to the energy
suppliers to sm artly adjust supply w ith dem and. Advanced control system s such
as industrial furnaces, boilers or large air conditioning units, can be installed with
equipm ent w hich can autom atically sw itch off w hen pow er supply is low or certain
scenarios are achieved. Intelligent storage units can also be optim ized based on the
flow of supply. Al m achines and sensors can m ake w eather and load predictions.
This will im prove overall integration and efficiency of renew able energy.
Al can m anage irregularity in the energy sector and also offer im proved safety,
efficiency and reliability. It can trace energy consum ption patterns, identify energy
leakage and m onitor health of the devices. For exam ple, in production units, the A l-
powered predictive analysis can collect data to m onitor w ear and tear, m onitor overall
health of the equipm ent and alert the operator when the m aintenance is needed.
A l-pow ered system s can provide insights into energy consum ption by analyzing data
on energy collection. This w ould help suppliers optim ize existing services, launch
new service m odels and help retail suppliers to target new consum er m arkets.
Sm art Grid w ith Intelligent Energy Storage (IES) can analyze a vast am ount of data
captured from several loT sensors and m ake tim ely decisions on energy allocation,
helping m icrogrids to efficiently m anage local energy needs while continuing pow er
exchange w ith the m ain grid.
Globally, tw o billion people lack access to form al financial services such as banking,
transactions, investm ents, etc. W hen people from underprivileged backgrounds
gain access to basic financial services (e.g., savings, investm ent), they take the
first step tow ards greater security. Al can analyze data to identify people in need
of loan or those w ho are unable to access it. Al can also identify good and bad
debtors based on previous transaction data. How ever, those looking to start a
new business, lack of credit history can be a barrier.
Landscape Designing
As we have learnt in the previous tw o chapters, autonom ous vehicles and equipm ent
can use CV to identify objects in front of them and take appropriate action according
to the object type. Using A l, it can learn and understand to identify the typical
behaviour of other users of cars such as direction, distance and speed of approach
and take appropriate steps to avoid it.
Waste Management
Al can also be used for w aste m anagem ent, a problem staring into our faces.
Intelligent trash can, equipped w ith Al program s, RFID tags, loT sensors, is a
revolutionary concept in the w aste m anagem ent sector. This can be used to
m easure w aste levels of the garbage throw n inside them and send data to the
main disposal system for processing. The system identifies the type of the garbage,
the quantity of each type of garbage and the respective w aste disposal m ethod.
G arbage dum ps have started deploying w aste-sorting robots w hich can sort tons
of garbage tirelessly in a day.
Smart Recycling
Al-pow ered sm art bins can think for them selves while sorting and sending garbage.
W hen garbage is put into the bin, it uses sensors to study trash and decides by itself
w hat needs to be done w ith the garbage. It sends the garbage to the appropriate
disposal system , be it a dum ping ground or a recycling factory. This way, there
can be a significant decrease in the w aste generated globally.
+25% Top 5%
_10 % ------------------------------------------------------------------------
2000 2018
Fig. 3.11: Growing Income Inequalities (Source: E c o n o m ic P o lic y in stitu te )
Tailored Technology
Tailored technology products and services to serve the needs of low -incom e and
vulnerable groups can be a significant m ove to address inequalities. The goal is to
m ake them m ore affordable and accessible fo r rem ote populations w hich can be
achieved w ith Al such as by creating m obile tariffs and service bundles focused
on increasing affordability.
Such platform s can encourage participation and inclusive engagem ent. Social
netw orks can support positive activism and cam paigns aim ed at solving critical
social challenges. Com m unities can report problem s such as dam aged roads and
graffiti, prom ote participative design of solutions to social needs such as schools
and infrastructure.
Creating Accessibility
New education opp ortunities are popping up every day, m any of w hich are free
or low -cost and provide equal training fo r this constantly developing industry.
These low -cost options rem ove entry barriers created by private (or even public)
institutions allow ing low -incom e or underprivileged people access these benefits.
Al can help in m anaging urban governance, fo r exam ple, w hen green spaces are
converted into built-up structures. Al system can look for satellite im ages to quickly
reveal how the city developm ent aligns with original planning and zoning layouts
or w hich com m unities are m ost prone to flooding or natural disasters. Al can also
help detect and m ap different types of land cover, land use and type across space
and tim e, and generate im portant insights, analytics and data visualizations.
Precision Recycling
Use of RFID (Radio Frequency Identification Device) and other loT sensors
can provide sophisticated tracking of m aterials to optim ize planning and m ovem ent
of the m aterial in the supply chain. Al can go through all the data and predict
various stages of disposal and lim it illegal disposal of hazardous m aterials and
w aste.
3D Printing
It can im prove the efficiency of m aterials by sim plifying the processes and avoiding
w aste that com es w ith m ass production. It prom ises longer life span of products
by m aking it possible to produce replacem ent parts on dem and.
Climate Study
By analyzing data from sensors, gauges and monitors, machines can spot patterns
quickly, accurately and automatically. The more accurate our current climate stats
are, the better climate models can be designed. We can also identify our biggest
vulnerabilities and risk zones.
Artificial Intelligence can help climate researchers and innovators to test theories
and solutions as well as “ what-if” scenarios that involve environment-friendly
measures. By using data provided by machine learning algorithms, organizations
have been able to cut the amount of energy used or reduce their carbon
footprint.
Green Initiatives
The easier we make green initiatives for people while making them feel responsible,
the higher is the adoption rate. Artificial Intelligence and machine learning algorithms
can help curate products and services that are easy to adopt. There are several Al
devices such as smart thermostats and smart irrigation systems that help conserve
energy resources. If we all do our individual contribution, our planet will be greener
very soon.
Intelligent systems using motion sensors, GPS and cameras can increase
accountability in the fishing industry by detecting anomalies and make it more
efficient for regulators and boat owners to review footage.
Tracking and monitoring of species will be easier and efficient with digital tools
like facial or species-recognition software. RFID and barcode scanners in supply
chains can help prevent sale of endangered or vulnerable species.
Smart Aquaculture
With the growing demand for fish protein, reliance on aquaculture to become
smarter will increase. Expanding wild fish stocks is no solution. Aquaculture
presents an opportunity to track fish and seafood from “ farm to plate" with the
help of intelligent tracking systems and loT sensors. This can inform the market
about limiting or increasing fish stocks based on demand and help in reducing
seafood fraud which is widespread. Sensors can also detect and optimize water
quality parameters and streamline feeding protocols.
loT sensors can collect data on temperature, salinity and pH which can be developed
into usable information using machine learning algorithms. This will help in planning
and balancing the needs of fishermen, transport and ocean conservation. Tools
can be used to monitor fish, track conservation progress and make well-informed
decisions like limiting the capture of unwanted marine lives.
Ocean Cleaning
Al can also be used in ocean cleaning. Satellite imaging can be used to detect
polluted patches; sensors can be used to identify the type of pollution— oil spills,
plastic, etc. Using smart systems, this waste can be suitably treated or recycled.
Preventing Wildfires
Climate change threatens to increase the number and size of wildfires. Al algorithms
can help in early detection, help firefighters combat blazes and aid in recovery.
Al can trace the pattern of climatic or anthropogenic events, eventually leading
to wildfire.
Checking Deforestation
Foot patrolling and drone-based surveillance have not been effective in preventing
poaching. These efforts are labour-intensive and costly. Al-based methods have got
some initial success in combating poachers. This method uses image classification and
object detection to find animals and poachers on infrared video captured by a drone.
Artificial Intelligence can be deployed to catch wildlife poachers.
Six steps from offline training of Al model to online detection
3. User interface
A neural network is trained on Drones are flown over wildlife Video and still images are
70 videos containing animals sanctuaries, capturing thermal transmitted via radio waves
and poachers, which have been infrared images. to a computer.
labelled. The model is tested
with other videos.
K
still face prolonged armed conflicts and a large population I D ANDSTRONG
is living under security threat. Various forms of violence INSTITUTIONS
against children, human trafficking, bribery, etc., persist ^ s'/.
worldwide. Steps need to be taken to make transparent
and traceable supply chains, improve effectiveness and
transparency in governance, create safer communities,
promote freedom of expression and opposition, reduce
cybercrimes and economic espionage, etc. Digital technology will play a key role
in handling these challenges.
Blockchain
It is an emerging tool that promises great trust and traceability. Blockchain can
solve problems such as blood diamonds, forced labour and ivory poaching. It can
be used to track the origin of products ranging from coffee beans to cotton.
Blockchain may also eliminate fraud and misappropriation of resources in areas
where governance is weak and corruption rampant.
Intelligent Cybersecurity
Al can be used to address the increasing risk of cyber attacks. Products with
adaptive algorithms that can study large data sets to better anticipate and predict
threats learn from previous attacks to give real-time response to attacks.
Automating Processes
Al deployment in processes such as tax collection, welfare distribution and
designation of land rights, etc., where information is recorded electronically on a
distributed ledger technology (such as Blockchain) and with access controls in place
so that it can be accessed only by those who need it, will lower the risk of corruption.
E-Governance
App-based platforms and chatbots can help citizens connect and engage with
governments and provide transparency and better accountability of government.
Access to information, contacting local politicians, tracing people, companies and
assets across the globe are a few things that can be achieved with Al.
loT and Al will enable measurement and tracking of progress towards the goals
which is crucial for improved decision-making. Al is also expected to improve
analytical abilities and guide us in decision-making in a smart and sustainable
manner keeping in mind data security, personal and emotional needs of the citizens
and safety of the planet.
Applications of Al at Present
Although a lot remains to be done, Al has already been applied for non-commercial
purposes by various companies and organizations.
Planet Labs, an earth-imaging Silicon Valley startup, partnered with Paul Allen
(co-founder of Microsoft), a few philanthropists and leading research scientists
to create a map of shallow water coral reefs by applying object detection to
satellite imagery in correlation to geospatial data. The map is used to monitor
reef ecosystems that are under threat.
A South Korean city, Songdo, deploys RFID tags to classify garbage categories.
A pressurized garbage disposal system can read this tag from a distance and an
appropriate method to dispose of total waste generated is decided dynamically.
Smartfin is another great example of an innovative surfboard fin with ocean health
sensors and a community initiative intended to galvanize communities to become
custodians of coastal ecosystems. It integrates temperature, motion and GPS
sensors into performance surfboard fins so that surfers can collect data simply
by doing what they love. Sounds amazing, no?
There are fintech startups such as ZestFinance and Lenddo that capture data
by device, browser and social media trail to generate a predictive model of
creditworthiness through various parameters. M-Shwari banking, which leverages the
M-Pesa mobile money system in Kenya, incorporates history of telecommunications
in its assessment of credit risk. One in five adults in Kenya is currently an active user
of the service, and M-Shwari is regarded as one of the most successful solutions
for financial inclusion. Besides, its SMS and internet-based interface, predictive
algorithms leverage several Al capabilities to analyze social and telecom data and
assess their creditworthiness. The information is then processed in minutes and
produces a credit score, which determines the size of the loan to be sanctioned.
Challenges Before AI
Scaling up AI use for social good will require overcoming some significant bottlenecks
like data accessibility as, in many cases, such data capturing may not be commercially
viable or data may be unstructured. Hence, data is not readily accessible to social or
non-governmental organizations. Bureaucratic inertia keeps useful data locked up
with government agencies. In other cases, the required data has never been collected.
AI capabilities need to be continuously improved but availability of talent with
high-level expertise in AI is in short supply. In other cases, implementation and
program management becomes a challenge as well. Non-profit organizations may
lack skilled resources such as data scientists and NLP engines needed to address
the AI tools and techniques. Sometimes, these tools may be prone to misuse by
authorities and others having access to them.
Therefore, the principles for their use need to be established. Human bias may
be embedded in AI models or data sets that could amplify existing inequalities.
Data privacy needs to be protected to prevent sensitive personal information from
being made public. AI applications need to be safe for human use and must comply
with law and social norms. Social acceptance, transparency and quality checks still
remain areas of concern.
r '
_________ * L _________ __ __________________
*
Quick Activity r~
If you could design an Al system, which social problem will you target? How will this system function? Are
there any negative impacts of this technology?
Table Format:
What are the names of the organizations in our country Write briefly what they
working around this theme? do.
What kind of skill-sets (look at both soft skills and technical skills) do they look for
in their new hires?
Would the skill-sets required today still be the same after 10 years?
Soft Skills (Today) Technical Skills (Today)
Soft Skills (10 years later) Technical Skills (10 years later)
Topic Examples
Once we have completed this activity, we have to prepare a Job Advertisement for
2031— 10 years from now!
V_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _________________________________________
' © - E t h ic s in Al
f S
Learning Objectives:
Ip | Understand and appreciate ethical concerns around Al.
Ip | Critically think about the cost and benefits of Al technology.
“ In this era of profound digital transformation, it’s important to remember that business, as
well as government, has a role to play in creating shared prosperity— not just prosperity.
After all, the same technologies that can be used to concentrate wealth and power can
also be used to distribute it more widely and empower more people.”
— Erik Brynjolfsson, Director of the MIT Initiative on the Digital Economy
E thics in Al 85
'W a tc h the video: Al for Good
jgSfl&p Scan QR code or visit:
httpsV/www.youtube. com/watch ?v=vgUWKXVv09Q
Rallnnn Debate:
Balloon nr
Divide yourselves into groups of four. Two groups will be
given a theme related to advantages and disadvantages of
various Al applications in different industries you researched
about. One team will speak in favour of Al applications while
the other will speak against it. The debate will go theme by
theme and each member of both the teams will get a minute
to speak. The chance to speak will alternate between the favouring
and rebuttal team. Finally, only one team will remain in the balloon
depending upon how convincing their points are. If any speaker speaks
for more than a minute, their team will get disqualified. Each member will get 15
minutes to prepare. And your time starts now!
Imagine there are two families of four people out for a ride in a
hot air balloon. Suddenly, the balloon starts moving towards the
earth instead of staying airborne. To stabilize it, one fam ily needs
to take the parachute and go out of the balloon or else, it will come
crashing down.
Who should be thrown out of the hot air balloon? *•
• How will human beings ensure that they stay ahead of Artificial Intelligence?
U s e f u l T ip :
“The important thing to remember is the consequences of your actions while applying A l.”
Do you know Al can even help predict text and you can write complete stories
using Al? Maybe this book itself is written using Al! Whether we recognize it or
not, Al has already made its way into our lives. Predictive searches on Google,
‘recommended’ videos on platforms like YouTube or a software designed to prompt
and correct text while typing, are all examples of Artificial Intelligence. Generating
human-like outputs is one aspect of Al we have gained enough control over. Now,
the natural question is, can Al also make human-like decisions?
Do you know that a machine learning algorithm OpenAPs GPT - 2 language model is
trained to predict text? It takes months of training over tons of data on expensive
computers but once that is done, it is easy to use.
Recently, Al systems have been developed to analyze images to distinguish between
a benign skin lesion and melanoma cancer, matching the accuracy of 21 certified
dermatologists. This will not only make up for the lack of dermatologists but also
make their task simple and more efficient.
This example shows that Al can make good decisions, even better than humans.
One thing to notice, however, is that an algorithm is more likely to label an image
as cancer if there is a ruler in the image. Dermatologists use a ruler in the photo
to measure the size of a skin lesion. Another issue is that with algorithms like this
in place, people might not even consider seeing a dermatologist and may click a
picture of the skin lesion using mobile phones and find out if it is anything to be
worried about. However, the problem is that these photos are likely to differ from
those of a dermatologist in terms of lighting, photo quality, zoom, etc. Simple
factors like skin colour or how hairy one’s arm is can put the algorithm outside its
original training conditions. And it is well known that when algorithms are given
data that is different from
what they were trained
with, they can behave
unpredictably.
So, if Al and machines are to take over in future, how can we make their decision
making reliable? How can we make their decisions predictable and convincing
under all circumstances? What will make these autonomous, self-improving,
independent machines and software trustworthy?
This is where ethics come into the picture. Ethics are a loosely-defined set of moral
principles about right and wrong guiding actions of an individual or a group. Since
technology itself does not possess moral or ethical qualities, it needs to be fed with
human ethics. When designed and tested well, it arrives at predictable outputs for
predictable inputs via such a set of rules or decision paths.
But here are two challenges. First, how does the team of developers determine
what is a good or right outcome and for whom? Is this outcome universally good or
is it good only for some? Is this outcome good under certain contexts or situations
and not under other conditions? Is it good against certain standards but not good
against others? These discussions, questions and answers ‘chosen’ by the team
are critical. The second challenge is that Al is an autonomous, self-learning and
self-improving technology. This means that it cannot be fed and does most of its
decision-making itself based on its own analysis of data.
Actions of Al:
1. Safety
2. Human-AI Interaction
3. Cybersecurity and Wrong Intentional Use
4 . Data Privacy and Control
E thics in Al 89
Impact of AI:
A fundamental debate is underway that AI will change the way our society works
and it is very important to plan fo r such a society in advance before AI gets too
involved in our lives.
DRAWINGSofDOGS.com
At the core of these two challenges lies the problem of existing human biases which
will enter AI systems through both the developers and data. In the very process of
its creation, technology becomes inherently biased against the people who create
it. It exhibits the opinions, understanding and ethical stand of its creators. Thus,
ethics of a technology start with the ethics of its creators.
Housing Discrimination
Differential Access to
E.g., Landlord relies on search results E.g., Matching algorithm less likely to
Housing
suggesting criminal history by race provide suitable housing for minorities
Education Discrimination
Differential Access to
E.g., Denial of opportunity for a student E.g., Presenting only ads on for-profit
Education
in a certain ability category colleges to low-income individuals
Economic Loss
Credit Discrimination
Differential Access to
E.g., Denying credit to all residents in E.g., Not presenting certain credit offers
Credit
specified neighbourhoods (redlining) to members of certain groups
Differential Pricing of Goods and Services
Differential Access to
E.g., Raising online prices based on E.g., Presenting product discounts based
Goods and Services
membership in a protected class on “ethnic affinity”
Narrowing of Choice Narrowing of Choice
E.g., P resen tin g ad s based so lely on past “clicks” for Groups
Social Detriment
Network Bubbles Filter Bubbles
E.g., Varied exposure to opportunity or E.g., Algorithms that promote only
evaluation base on “who you know” familiar news and information
Loss of Liberty
Constraints of Suspicion Increased Surveillance
E.g., Emotional, dignitary and social E.g., Use of ‘predictive policing' to police
impacts of increased surveillance minority neighbourhoods more
E thics in Al 91
There are 104 cognitive biases that affect human decision-making. And, hence,
the Al we build. Al can amplify human biases by virtue of how it learns and the
feedback it gets. Such biased algorithmic systems can lead to undesirable and unfair
outcomes, unequal and unjust consequences. And the intensity of these implications
can be very severe depending on the type and number of people it affects.
Understanding bias in Al starts with tracing its sources and then identifying which
of those can be countered with technology. Bias can be of tw o types— Model bias,
which means the model is able to adequately represent the data set accurately
enough, and the other bias being Prejudice bias, where the creator’s stand on
certain issues is embedded intentionally or unintentionally in the algorithm.
Let us understand this with a simple activity. Grab a sheet of paper and plot some
points on it. Now, try to draw a line through this random distribution of points.
More widely spread apart the points, curvier the line. If you continue to add more
points, the line no longer fits all the points. Now you start looking for the “ best
possible” curve fit. In Mathematics, your line can be represented by one equation
(or function) and “ the best possible” calculation by another function. This is the
fundamental idea behind machine learning model.
Fig. 4.5 : What is a neural network looking for and how is it attributing what it sees?
(Source: https://distill.pub/2018/building-blocks/)
Ethics in Al 93
As you can observe, historical bias already exists in data. Depending on how the
data set is created, Representation Bias and Measurement Bias also creep in.
Evaluation and Aggregation biases come into play depending upon the model
we deploy.
E thics in Al 95
ANTI-BULLYING WITH AI
Bullying is something that many of us might have encountered at some point in our
life or at least read about. You should never bully anyone, help others who might
be bullied and support an anti-bullying environment in your school at all times.
https://mycomputerbrain.net/php/experiments/ai.experiment1 9 b.php
The instructions are on the right side of the menu and help you to:
• Create the training data
• Train the Artificial Neural Network (ANN) through the Start Learning button
(it will say Learning Completed when finished)
• Test the ANN by entering short sentences and phrases
On entering the inputs, ANN will be constructed in real time so you can analyze
how AI is giving the output in real life.
Note: Your input is not stored. When the browser window is refreshed, the
experiment is reset. So you can play with it as many times as you want.
Discuss your learning with your friends and come up with your own training data
to test it further.
Kind things £
Kind Things Mean Things
I like you You smell
Your hair looks nice 1hate you
I think you are great That's dumb
You have a great smile Your hair looks terrible
You are so clever What an idiot
I love your outfit Slimeball
Mean things
slimeball
Input Layer Hidden Layer 1 O utput Layer
This is an example table with expressions that most people would consider either
“ kind” (left-hand column) or “ mean” (right-hand column).
The grey boxes in the input, hidden and output la^er are called ‘perceptrons’. We will
learn more about perceptron model in Chapter 6 when we study Neural Networks.
A perceptron is a model or program that simulates human brain intelligence. On
the left-hand side of the ANN, we see all words and expressions in the table. They
are provided to the ANN as training data. The ANN calculates whether to classify
them into the “ Kind things” or the “ Mean things” category based upon user data.
Discuss with your friends how you can use such a tool while you are writing mails or
using social media. Did it help you understand what is considered as bullying behaviour?
E thics in Al 97
: Objective Type Questions :
E thics in Al 99
7. Some experts say robots for military combats will be more efficient. However, others
challenge it on ethical grounds. What are the ethical challenges to it?
8. Human values are simple at its core. However, factors like culture, law, religion,
etc., make them complex. This complexity is at the core of ethics of Al. Discuss with
examples.
9. Do you consider it ethical to incorporate the use of Al for various jobs, given that it
takes away human jobs and magnifies human bias?
10. How do you think income would be shared if Al is used in place of human workforce?
11. Al will probably bring with it many health benefits and learning opportunities. How
will these benefits be made accessible and available to all the people in the society?
12. Al is a powerful tool in various fields; however, depending on how it is used, it can
either be a blessing or a curse. Discuss with an example.
13. How can learning opportunities for Al be extended to all?
14. How will human beings ensure that they stay ahead of Artificial Intelligence?
Imagine a major landslide occurs in a landslide-prone area in which around 20,000 people are trapped,
including pilgrims, tourists and other locals. The trapped population comprises women, children, senior
citizens, patients in hospitals, political leaders, prisoners in jail, etc. If you get to design an Al system to aid
and rescue in such scenarios, what priority order will you set for the rescue operation?
What do you think about the role of such an institute? Can you think of something like this in India? Prepare
a presentation for such an institute and explain how it will work.
0 Project Cycle
(Problem Scoping, Data Acquisition, Data Exploration and Modelling)
Learning Objectives:
Ip I To understand how Al projects are designed
\p I To apply learnings to work on Al projects
B ackground a n d C ontext
“ Much has been written about A l’s potential to reflect both the best and the worst of
humanity. For example, we have seen Al providing conversation and com fort to the lonely;
we have also seen Al engaging in racial discrimination. Yet the biggest harm that Al is
likely to do to individuals in the short term is job displacement, as the amount of work
we can automate with Al is vastly bigger than before. As leaders, it is incumbent on all
of us to make sure we are building a world in which every individual has an opportunity
to thrive.”
— Andrew Ng
Imagine that we have come to know from our intelligence agency (it is called
Research and Analysis Wing or RAW for your reference) that there is a potential threat
to a very powerful politician (these threats are very common to political leaders)
You are the Chief Security Intelligence Officer at the politician's house!
Sta rt w ith listin g do w n all th e fa c to rs w hich you need to co n sid e r w hile fra m in g
a secu rity system .
While finalizing the aim of this system, you scope the problem which you wish to
solve with the help of your project. This is Problem Scoping.
First you have to define the list of people who are allowed to enter the politician’s
house and which designated areas they are allowed to go to and for how long.
Certain key officials, VIPs, etc., may have access to any area within the premises
but this would be a defined list. The focus is to ensure that no unauthorized person
is entering the premises.
1. Profiles of authorized people and tag with their designated areas where they
are allowed
2. Get photographs of people who are a possible threat to the politician (this list
you can have from the intelligence agency)
3. Get photographs of all the visitors to the premises at the entry gate
After acquiring the required data, you realize that it is not readily usable. Some
images are low resolution, small in size, while others are better. Some images are
missing and GPS coordinates are wrong. Now you need to do Data Cleaning as
under:
• Create a database and put the names of the designated people whose profiles
you have.
• At this stage, you try to interpret some useful information out of the data you
have acquired. For this, you explore the data and try to put it uniformly for a
better understanding. This is known as Data Exploration.
After exploring the data, you now know that you need to develop a system which
detects the face of the person entering the premises and matches it with the image
data in your system to check whether this person is authorized or not. For this,
you put all your data into an Al-enabled model and train it in such a way that it
alerts the officials if an unknown person tries to enter the premises. To implement
this, you need to define the variables or parameters you need.
To implement your idea, you now look at different Al-enabled algorithms which
work on Computer Vision (since you are working on visual data). You go through
several models and select the one that matches your requirement. After choosing
the model, you implement it. This is known as the Modelling stage.
Your surveillance system is now complete! You test it by passing a mix of authorized
and unauthorized images through the model. You notice that the results are 80%
correct. After evaluating this model, you work on other shortlisted Al algorithms.
Some Al algorithms are: Minimax trees, Alpha-beta pruning, AO trees, Informed and
uninformed search algorithms like A*, Hill Climbing, Simulated Annealing, Genetic
algorithms, Optimization algorithms like anthill, etc. Do read about them!
Let us recap the main points to understand how the entire project is executed.
Starting with Problem Scoping, you first set the goal fo r your Al project by stating
the problem you wish to resolve.
• You need to acquire data which will become the base of your project as it will
help you in understanding what the parameters that are related to the problem
are scoping.
• You go for data acquisition by collecting data from various reliable and authentic
sources which are traceable and auditable.
• Since the data you collect would be in large quantities, you can try to give it a
visual image of different types of representations like graphs, databases, flow
charts, maps, etc. This makes it easier for you to interpret the patterns in which
your acquired data follows.
• You can test the selected models to figure out which is the most efficient.
• The most efficient model is now the base of your Al project and you can develop
your algorithm around it.
• Once the modelling is complete, you now need to test your model on some
newly-fetched data. The results will help you in evaluating your model and,
hence, improving it.
• Finally, after evaluation, the project cycle is complete and what you get is your
Al project.
Do It Y ourself
Now, it is your turn to describe what you have learnt. Explain the concept of Al project
cycle with the help of a suitable example and discuss with your peers in the class. Take
as an example how you could use the entire project cycle for the following project:
Let us say you are in charge o f your school lab. From the timetable, you know which
class and students need to be in the lab and at what time. How can you ensure that
only authorized students enter the lab as per their timetable?
Let us now look at each stage of the Al project cycle in greater detail.
PROBLEM SCOPING
The causes are plotted through analysis, brainstorming sessions, and are grouped
into categories on the main branches of the fishbone. To help structure the approach,
the categories are often selected from one of the common models shown below
but may emerge as something unique to the application in a specific case.
The beauty of this tool is that it can be applied to any situation to find out the
reasons. Let us try to apply it in the case of an organization where employees
come late. See how Ishikawa diagram can help:
Measurement
Environment I Materials
Fig. 5.3: Ishikawa diagram (So u rce : Squawkpoint)
These problems will now be very specific as they have been narrowed down from
a broader perspective. Select the root cause and make it the goal of your project.
You can either select any one out of these or you can think of one on your own.
For more options, you can also refer to the 17 Sustainable Development Goals in
Chapter 3 .
You can see that there are lots of interesting problems which can be solved using
Al. To set up the Goal of your project, you can select one problem out of the ones
listed above which you want to solve using your Al understanding. This problem
now becomes the target of your Al project and helps you get a clear vision of
what is to be achieved.
Now, you need to make the selected problem a goal. For example, a goal can
be stated as to how you can increase the production of a certain crop without
additional inputs. Even try to quantify increase in production by 20% using the
same set of inputs. Goals should always be SMART— specific, measurable, agreed
upon, realistic and time-based.
Who
The “ Who” block helps us in analyzing the people who are getting affected directly
or indirectly by it. Stakeholders are people who face this problem and would be
benefited from the solution.
Who are the stakeholders? Are these the people of the organization?
What do you know about them and their needs?
What
Under the “ What” section, you need to look into what is the actual problem
you have on hand. At this stage, you need to determine the exact nature of the
problem. What is the problem and how do you know that it is really a problem for
your stakeholders? Supporting evidence to show that this problem exists, could
be print media, TV news, government reports, etc.
Now that you know who is affected by the problem and what the problem actually
is, you need to focus on th e c o n te xt/lo ca tio n /fre q u e n cy, etc., o f th e problem . This
section will help you look into the problem with some specificity and move you
closer to th e solution.
Why
After we have figured out who is affected, know the exact nature of the problem
and where it is located, we need to understand where the solution to the problem
be deployed. Think of the benefits of this solution to the stakeholders and society
at large.
This is a problem statement template. It is used to frame the 4WS into a consolidated
template to define the problem and its location, stakeholders and how the problem
is solved.
Problem Statement Template helps us summarize all the key points in one single
template so that in future, whenever there is a need to look back at the basis of the
problem, we can have a look at the Problem Statement Template and understand
its key elements.
[stakeholder(s)]
[context, situation]
when/
while where
(Source: CBSE)
DATA ACQUISITION
We have learnt how to scope a problem and set a goal for the project. After setting
the goal, we list down all the necessary elements which are directly/indirectly
related to our problem. This is done using the 4Ws problem canvas. The 4Ws are:
1. Who
1. Who are the stakeholders?
2. What do we know about them?
2 . What
1. What is the problem?
2. How do we know that it is a problem? (Is there an evidence?)
3 . Where
1. What is the context/situation/frequency of the problem?
2. Where is the problem located?
As we move ahead in the Al Project Cycle, we come across the second element
which is called Data Acquisition. Data can be a piece of information or facts
collected together for reference or analysis. Whenever we want an Al project to
be able to predict an output, we need to train it first using data-training data set.
For example, suppose you want to make an Al-powered system which, based on
historical data, can predict whether an employee will come late the next day or
not. This is the data with which the machine can be trained. Once it is ready, it will
efficiently predict whether the employee will come late or not. The previous salary
data here is known as historical data or training data while the next late-coming
prediction data set is known as the testing data.
Try to identify the data features required for your problem statement:
It is very important to find reliable data as data is the foundation of all Al projects.
After finding out the data features, we now need to acquire the same. There exist
various sources from which data can be acquired. Do all the sources have authentic
data? What if we do not get appropriate data?
After mentioning the data features, we get to know what sort of data is to be
collected. Now, the question arises: From where can we get this data? There can
be various ways in which we can collect data. Some of them are:
• Surveys • Web Scraping • Sensors
• Cameras • Observations • APIs
Sometimes we use the internet and try to acquire data for our project from some
random website. Such data might not be authentic as its accuracy cannot be proved
unless proper sources are mentioned. Thus, it becomes necessary to find a reliable
source from where authentic information can be taken. Extracting private data can
be an offence. Europe has a strict law against it called General Data Protection Rights
(GDPR). One of the most reliable and authentic sources of information is the open-
sourced websites hosted by the government. These government portals have general
information collected in suitable format which can be downloaded and used wisely.
SYSTEM MAPS
A System Map helps us in finding relationships between different elements of
the problem which we have scoped. It helps us in strategizing the solution for
achieving the goal of our project. Here is an example of a system very familiar to
Resources
You can make system maps online using an animated tool:
Scan QR code or visit:
https://ncase.me/loopy/
We use system maps to understand complex issues with multiple factors that affect
each other. In a system, every element is interconnected. In a system map, we try
to represent that relationship using arrows. Within a system map, we identify loops.
These loops are important because they represent a specific chain of causes and
effects. A system typically has several chains of causes and effects. You may notice
that some arrows are longer than the others. A longer arrow represents a longer
time for a change to happen. We also call this time delay. To change the outcome
of a system, as a change-maker, we have tw o options— change the elements in a
system or change the relationship between elements. It is usually more effective to
change the relationship between elements. You may also notice the use of V signs
and signs. These are an indicator of the nature of relationship between elements.
A system map shows the components and boundaries of a system and the
components of the environment at a specific point of time. With the help of system
maps, one can easily define a relationship between different elements which come
under a system. The goal of our project becomes a system whose elements are
the data features mentioned above. Any change in these elements changes the
system outcome too.
The concept of water cycle is very simple to understand and is known to us all.
Water is in rivers; it is steam and in clouds as well. It explains how water completes
its cycle transforming from one form to another (liquid, solid and gas).
Let us draw the System Map for the Water Cycle now.
In this system map, all the elements of the water cycle are put in circles. The map
here shows cause and effect relationship of elements with each other with the
help of arrows. The arrow head depicts the direction of the effect and the sign
(+ or -) shows their relationship. If the arrow goes from X to Y with a + sign, it
means that both are directly related to each other. That is, if X increases, Y also
increases and vice versa. On the other hand, if the arrow goes from X to Y with a
- sign, it means that both the elements are inversely related to each other, which
means if X increases, Y will decrease and vice versa.
D A T A E X P L O R A T IO N
Why do you think we need to explore and visualize data before jumping to the Al
model? When we pick up a library book, we tend to look at the book cover, read
the back cover and skim through the content of the book prior to choosing it as
it helps us understand if this book is appropriate for our needs and interests.
Similarly, when we get a data set in our hands, spending time to explore it will
help us get a sense of the trends, relationships and patterns present in the data.
It will also help us better decide which model/models to use in the subsequent
Al Project Cycle stage. We use data visualization as a method because it is much
easier to comprehend information quickly and communicate the story to others.
In the previous modules, you set the goal of your project and also found ways to
acquire data. While acquiring data, you must have noticed that the data consists
of numbers, words, media, etc. For example, if you go to a library and pick up a
m r n m t ------------------------------------------------------------------------
^L ist down 5 new data visualization techniques which you have learnt
Scan QR code or visit:
https://datavizcatalogue.com/
SKETCHY GRAPHS
In this activity, we are going to sketch graphs! Now that you have explored various
types of graphs and have already chosen the best ones to plot your data features,
do this activity in groups. Select any tw o data features and plot their graphs on a
chart paper. Make sure that you are able to relate this graph to the goal of your
project.
Let us now look at the scoped problem statement and the data features identified
for achieving the goal of your project. Try looking for data required for your project
from reliable and authentic sources. If you are not able to find data online, try
using other methods of acquiring data (as discussed in the Data Acquisition section
earlier).
Let us start drawing visual representations for all the data features extracted and
try to find a pattern or a trend from it.
For example, if the problem statement is: How can we predict whether a song will
make it to the top 10 in a famous countdown?
We would require data features like: Current trends of music, genre, style, duration
of song, popularity of the movie or singer, etc.
KPI Dashboard .• M Z . ■»•).
§1)
New Paoe
9 3 .1 3 % $ 1 9 2 .1 3 M 1 0 ,7 1 9 $ 1 ,0 6 1 M
Previous
79.82
%Change
+14.29
Trend Previous
$183.61M
%Change
+4 43%
Trend Previous
11,918
% Change
-11.21%
Trend
▼
Previous
S906M
%Change
+14.61%
Trend
^
■ Accessories
H Camcorder
■ Computers
a
■
■
Media Player
Stereo Systems
Televisions IH IIH Ii H 1
■ Video Production
■ This Year ■ Last Year
szsasszssSiS
Sales by Country P ro d u c ts
Sales by Count]y ▼ Stores Customers Comments
Headphones
S25.819.242
S24.523.024
■
warn
■ $4,954.243
S3,516,913
112,169.618
79.703,501
S81.396.140
S51,663.564
244,199
228.349
(Source: W e b F O C U S )
Now, to analyze a pattern, we can say that the popularity of the actor will have
a direct bearing on the output of the system. So, we will plot a graph showing
the popularity of various singers and the one who is most popular and has the
pBsjjjr
r Take a chart paper and start representing your data features in various types of
graphs. After completing this exercise, present your work to your friends in the class
and explain to them the trends and patterns that you have observed.
Now list down the trends that you have observed in your representation.
v____________________________________ _____________________________________
M o d e l l in g
In the previous module of Data Exploration, you explored the data you had
acquired at the Data Acquisition stage for the problem you scoped at the Problem
Scoping stage. Now you have visualized some trends and patterns out of the data
which would help you develop a strategy for your project. To build an Al-based
project, you need to work around models or algorithms to predict the output
given a set of inputs. This could be done either by designing your own model or
by using the pre-existing Al models. Before jumping to modelling, let us clarify
the definitions of Artificial Intelligence (Al), Machine Learning (ML) and Deep
Learning (DL):
Artificial Intelligence is the umbrella term which holds both Deep Learning as well
as Machine Learning. Deep Learning, on the other hand, is a very specific learning
approach which is a subset of Machine Learning as it comprises multiple Machine
Learning algorithms.
As you have been progressing towards building Al readiness, you must have come
across a very common dilemma between Al and ML. Many a time, these terms
are used interchangeably but are they the same? Is there no difference between
Machine Learning and Artificial Intelligence? Is Deep Learning also Artificial
Intelligence? What exactly is Deep Learning?
ARTIFICIAL
INTELLIGENCE
A program that can sense, reason,
act and adapt
MACHINE LEARNING
Algorithms whose performance
improves as they are exposed to
more data over time
DEEP
LEARNING
Subset of machine
learning in which
multilayered neural
networks learn from
vast amounts
.. of data
As you can see in the above diagram, Artificial Intelligence is the umbrella term
which covers both machine and deep learning. Deep Learning comes under Machine
Learning. It is a funnel-type approach where there are a lot of applications of Al, out
of which a few are those which come under ML and out of those, very few go into DL.
Al Modelling refers to developing algorithms which can be trained to get intelligent
outputs which we can define as y=f(x).
We have seen various types of graphical representations and data visualization
techniques which can be used for representing different parameters of data.
The graphical representation makes the data understandable for humans as we
can discover trends and patterns in it. But when it comes to machine accessing
and analyzing data, it needs the data in the most basic form of numbers
DECISION TREE
Do you remember the Story Speaker activity we did in Chapter 2? We had set up
certain conditions and outcomes to guide our friends around our smart home.
Decision trees are similar to that. They are an example of a rule-based approach.
The basic structure of a decision tree starts from the root. From there, the tree
diverges into multiple directions with the help of arrows called branches. These
branches depict the condition because of which the tree diverges. In the end, the
final decision is where the tree ends. These decisions are termed as the leaves of the
tree. If you look carefully, you will realize that this looks like an upside-down tree.
While making a decision tree, ask the students to look at the data carefully. Ask
them to figure out which out of the whole data would be the root and the leaves.
After this, they should analyze the data and find out if there is some redundant
data which might not be necessary while making the decision tree.
In the Chapter, you developed an interactive story using the Google Docs
extension called Story S p e a k e r . W rite the story below:
In the above example, the decision tree starts with the question ‘Am I hungry?’
The starting point of any decision tree is known as its Root. It then branches into
tw o different ways or conditions: Yes or No. The forks or diversions are known as
branches of the tree. The branches either lead to another question, or they lead
to a decision like ‘Go to sleep’ which is known as the leaf. If you look closely at
the image above, you will notice that it looks like an inverted tree with root above
and the leaves below. That’s why it is called a Decision Tree!
Decision trees are made on the basis of the data set we have and change according
to the parameters which we take into consideration for modelling. Many a time, the
data set might have redundant data, that is, some data might not hold importance
while developing a decision tree. For this, one needs to visualize the relation
between all the parameters given in the data and then formulate the model.
Things to Remember
• Ensure that you understand the data set properly before you start making a Decision
Tree. Try selecting any one output and, on its basis, find out the common links
which all the sim ilar outputs have and create branches.
• Many a time, the data set m ight contain redundant data which does not hold
any value while creating a decision tree. It is important to note which are the
parameters that affect the output directly and only those should be used while
creating a decision tree.
• There m ight be multiple decision trees which lead to correct prediction for a single
data set. The one which is the simplest is considered the best.
V )
1 2
2 3
3 4
4 5
5 6
6 7
Write an uppercase alphabet on this matrix. The height of the alphabet should be
equal to the height of this matrix. In other words, it should start from the bottom line
of the matrix till the top line. You can write any capital alphabet in any handwriting.
Cut out horizontal stripes of the matrix such that it goes from 1-2, 2-3, 3-4, 4-5,
5-6 and 6-7.
1 2 3
Paste all these stripes together to form a single paper string. Make sure that the
last block is neither over the first block of next line nor is there any gap between
the first and the last blocks.
L m 11 i i
0341001430
Pixel It! activity is an example of how computers see images, pre-process, process
and classify them. This kind of Machine Learning approach is commonly used in
Computer Vision-related applications which we learnt in Chapter 2. Every image
which is fed into the computer is divided into pixels (smallest unit of an image).
The computer analyzes each pixel and if it has to compare tw o pictures to check
if they are similar or not, a pixel-wise comparison takes place. If all the pixels are
identical, this means that the images are exactly the same.
In this activity, you created your own intelligent model which can identify if an
alphabet is similar to the data trained or not. Here, you divided your alphabet into
36 blocks and then processed it. Also, to train the model, you used data sets of
the same alphabet but in different handwritings. Now, when you go for testing
it, the model would see if the coloured blocks are aligned or not. If majority of
the blocks are aligned, there exists maximum probability that the alphabet is the
same. Else, the alphabet is different, ■
(so u rc e . c b s e )
In the Decision Tree activity, we tried a rule-based approach and in the Pixel It!
activity, we tried the machine learning approach. In machine learning, what you
want to accomplish is for the machine to produce the model for you. What you
will provide is the training data and the machine will undergo a training process
and produce the model.
Clustering: This is a machine learning model where the machine generates its own
rules or algorithms unlike a rule-based model. The data fed into such a model is
usually unlabelled or random.
We need to devise our algorithms in a way that they are generated on their own
based on the data set. Machine needs to derive patterns or trends from the
training data set to cluster the ones which follow the same pattern (See Fig. 5.10).
For example, if you have a random data of students in your school, and you are
unable to find out to which class or age group they belong, you will feed their
data into the clustering algorithm. The algorithm would then analyze the data and
divide them into clusters according to their similarities of variables or behaviours
exhibited and derive patterns based on the trends noticed. Clustering works on
discrete data set.
EVALUATION
After you have completed all the cycles of the Al project cycle, it is very important
to keep evaluating your model to ensure that the results are working well with
the new data. If there are variances between the training data set and test data
set, keep iterating on the model to improve.
5 . In classification, the algorithm is able to determine which points in the data set belong
to either side of the classification function represented by t h e ..............................
6. Al algorithms are trained on data which is called ..............................
7 . Data acquired in the project should be ............................, ............................ and
1 . Explain how you think system maps are useful in defining the workflow in Al projects.
2 . Do you think Data visualization is important in defining Al projects? If yes, explain
how.
3 . What are the key differences between the Rule-based and Learning-based Al?
Quick Activity
i
V W w w w w
Check out Harvard's article on how to make Al projects successful:
List down your learnings from this and explain how you will make your Al projects done in the Chapter
taking care of these learnings.
Read how Al devices work and the thought process behind the design. This is how you should think when
the end result of your Al project is a product or device.
B ac kg r o u n d a n d C ontext
“ I think the brain is essentially a computer and consciousness is like a computer
program. It will cease to run when the computer is turned off. Theoretically, it could be
recreated on a neural network, but that would be very difficult, as it would require all
one’s memories.”
— Stephen Hawking
Each node of these hidden layers has its own machine learning algorithm which it
executes on the data received from the input layer. The processed output is then
fed into the subsequent hidden layer of the network. There can be multiple hidden
layers in a neural network system and their number depends on the complexity
of the function for which the network has been configured. Also, the number of
nodes in each layer can vary accordingly. The last hidden layer passes the final
processed data to the output layer, which then gives it to the user as the final
output. Similar to the input layer, output layer too does not process data which
it acquires. It is meant for user interface.
impulses carried
towards cell body
hranrhps
Dendrites Axon
terminals
Nucleus
Cell Body
Fig. 6.2 : How Neurons Work
Given above are the images of a human neuron and its relation with the Neural
Network. The axon from a neuron sends an impulse to the synapse of another
neuron. The impulse received is then sent to the cell body (nucleus) through
dendrites. The cell body performs an activation function on the impulse received
and then gives it to the output axon which passes the same to the next neuron in
the system. Now, as we relate this process with an Artificial Neural Network, we
can see that the input layer gets data which is passed on to the nodes in the hidden
layer. The nodes perform specific actions on the data and pass the processed
information to the next layer. In the end, the final processed data reaches the
output of the system.
20 W atts
BRAIN 5 0 -1 0 0 WATTS
~85 billion neurons DESKTOP
1 quadrillion synapses COMPUTER
CHIP
Runs vastly slower
SPINNAKER than biological
Variable num ber of neural networks
artificial neurons,
LIGHT BULB
typically ~ 1 ,000
Uses ~20 watts
1 million synapses per
1,000 neurons
Runs at speed of biological
neural networks
' ■ BRAINSCALES
,WATT
5 12 artificial neurons
128,000 synapses
LASER IN 10,000x faster than biological neural networks
CD/DVD
PLAYER
TENS OF MILLIWATTS
Uses
-5 -1 0 milliwatts LOIHI
-13 0 ,0 0 0 artificial neurons
130 m illion synapses
Runs at speed of biological neural networks
TENS OF MILLIWATTS
IBM'S TRUE NORTH
~ 1 million artificial neurons
256 m illion synapses
Runs at speed of biological neural networks
| HEARING AID
Uses less than 1 milliwatt
The above figure depicts a neuron connected with n other neurons and receives
n inputs (xlf x2, ..... , xn). This standard configuration is known as a Perceptron.
It contains the inputs {xv x2, ....., xn) and weights w2, , wn) which are real
numbers and can be positive or negative.
All inputs are individually weighted, then added together and passed onto the
activation function. There are many types of activation functions but the simplest
of all would be step function.
A step function is binary in nature, so it will typically output a 1 if the input is higher
than a certain defined threshold, otherwise its output will be 0.
Remember when you were young and your parents taught you how to identify
a dog on the street. You were told a couple of times that a dog looks like this,
a dog barks like this and pretty soon you could recognize a dog on your own on
the street. Right? When you saw other animals fo r the first time, you could clearly
differentiate between them and a dog.
Note: The full equation is F(i) = F(i) + l*g ’(sum of all inputs)*(T-0 )*N(i), where g’
is the derivative of the activation function.
Here, F is the weight vector, N is the input vector, T is the target output that the
perceptron should have known and O is the output provided by the perceptron.
The perceptron is said to have learnt completely when an entire set of inputs is
passed through all training vectors and output is provided without any error.
At this time, if an input vector N (already in the data set used in training) is given
to the perceptron, it will output the correct value as required. If N is not in the
training set, the network will respond with an output similar to other training
vectors close to N.
The perceptron adds all the inputs and separates them into tw o broad
categories— those that cause it to fire (above the threshold) and those that
don't. In this sense, it attempts to draw a line:
n1x1 + n2x2 = t, where t is the threshold. The line divides the points on either side
making tw o distinct categories. As the weights and thresholds can be valued, this
would make a line across the two-dimensional input space. (An example is shown
in the next section). (Source: Medium)
Not every set of inputs can be divided by a line like this. Those that can be divided
are called linearly separable (See Fig. 6.5(A)). If the vectors are not linearly separable,
learning will never reach a point where all vectors are classified properly. The most
famous example of the perceptron’s inability to solve problems with linearly non-
separable vectors is the famous Boolean XOR problem.
Bjaj& B To learn more about this problem,
Scan QR code or visit:
HoiSte https://www.youtube.com/watch?v=Fp33mf3L6AE
Fig. 6.6: Linearly separable and non-separable data (Source: Sebastian Raschka)
REINFORCEMENT LEARNING
In Reinforcement Learning, algorithm learns from its interaction with the
environment. It is a type of dynamic training that trains algorithms using a system
of reward and punishment.
As an example, let us say that during input data training with a given set of inputs
is presented to the Neural Network, the corresponding Output is 0.55, while the
target output was expected to be 1.2 (The output calculation is done as per the
formulae defined in perceptron training model on the previous page.).
In this case, the error (1.2 - 0.55) is used fo r training ("w rong by 0.65” ). This is
called punishing the algorithm. In case there are tw o outputs, then the total error
is summed up to give a single number (typically sum of squared errors).
The algorithm improves with more and more data points to move closer to the
target value. The idea is to minimise the error function.
It is interesting to note that we only need to know how much we are wrong but
not in which direction. It is like if you have to go from Delhi to Mumbai, which is
approximately 1500 km, you are going from North to South. Let us say you went
200 km in the wrong direction and you ended up in Punjab, which is north of Delhi.
The algorithm tells you that you are 200 km wrong or 1700 km away from Mumbai
but doesn’t tell you in which direction.
Untrained neural network models are much like new-born babies: They are ignorant
of the world (if considering tabula rasa epistemological theory), and it is only through
exposure to the world, i.e., a posteriori knowledge, that their ignorance is slowly
revised. Algorithms experience the world through data— by training a neural network
on a relevant data set, we seek to decrease its ignorance. The way we measure
progress is by monitoring the error produced by the network.
• •
• •
--------------------►
(a) Yes (b) No
5. The number of nodes in the input layer is 6 and the hidden layer is 10. The maximum
number of connections from the input layer to the hidden layer is:
(a) 16 (b) 60 (c) 30 (d) 0.6
6. Assume a simple neural model with 3 neurons and inputs = 1,2,3. The weights to the
input neurons are 2, 4 and 6 respectively. Assume the activation function is a linear
constant value of 5. What will be the output?
(a) 80 (b) 140 (c) 28 (d) 72
7. Which function decides if the neuron should be activated or not?
(a) Bias Function (b) Trigger Function
(c) Activation Function (d) Start Function
1. Explain the benefits of Backpropagation and how it can improve the learning algorithms.
2. What is the key difference between Supervised and Unsupervised Learning?
3. How do you think Artificial Neural Networks vary from Human Brain?
4. Do you think Perceptron Model has any constraints? If yes, explain.
5. Describe the application of neural networks in object classification in a self-driving car.
6. Think of examples where Neural Networks can be applied in you school, fo r example,
in school library. What would be the use case and how would you apply it?
7. What is the significance of loss function in the context of neural network training?
8. What are the different parts of the multilayer perceptron model?
M .
Quick Activity
Watch how neural networks see images:
Play with a real neural network in the browser. Learn more about it as you play with the input variables.
Learning Objectives:
[p I Acquire introductory Python programming skills
|p | Understand how Al projects can be run using Python
“ Python has been an important part of Google since the beginning, and remains so as
the system grows and evolves. Today dozens of Google engineers use Python, and we’re
looking for more people with skills in this language.”
— Peter Norvig, Director of Search Quality at Google, Inc.
You can understand and appreciate the importance of Python as a language and
how much it is in demand globally. If you are well equipped in Python, a host
of opportunities open up for you and employability increases significantly. For
designing and implementing Artificial Intelligence and Machine Learning projects,
Python programming is a critical skill and you must master it.
We will start with the basics of Python language and explore how it can be
implemented in AI/ML projects.
wp# .....................................
Programming Language is a language to write programs. It is a set of
instructions that produces various outputs.
fl
Basics of Python for use in Al P rojects 147
WHAT IS PYTHON
Python Programming Language is a high-level programming language created by
Guido van Rossum in 1989. It resulted in a great general-purpose language capable
of creating anything from desktop software to web applications and frameworks.
These frameworks are very handy when it comes to simplifying tasks related
to content management and configuration, accessing a database, and handling
network protocols like HTTP, SMTP, FTP and POP.
As you have read in Chapter 1, Data Scientists are in so much demand globally
that 40% vacancies are still lying vacant in AI/ML jobs. Pattern Recognition using
sophisticated algorithms and making sense of data are hot skills in demand
today. Python makes it extremely easy to get started with readymade libraries
and large community support.
It has tools and models for web scraping, data cleaning and standard algorithms.
Writing code in Python is so intuitive and easy that you do not feel that it is a
lengthy process. You also do not have to remember complicated syntax. It is also
easy to apply in Al and ML applications as well. Some of the other reasons why
you should learn Python are:
• Non-restrictive Syntax
Python can be easily understood by someone who does not know programming
very well. It is a readable and intuitive language which lets you focus on problem
solving and does not involve complicated syntax or structures.
Let us consider an example of calculating Simple Interest on a given Amount,
Principal and Rate of Interest (%):
Fig. 7.1: Python as the fastest growing programming language (Source: stackoverfiow)
Python is easy to learn and code. Python programming language runs on a variety
of platforms like Windows, Linux, Macintosh, Solaris, etc.
PYTHON
PYTHON INTERPRETER
Python uses an interpreter which is a computer program that executes as per
program. It performs instructions as written in a programming or scripting language,
without requiring them to be compiled into a machine language program. So, unlike
Java, Python uses an interpreter.
PROGRAMMING ENVIRONMENT
A programming environment is the computer you work on and all the software
applications that are installed on your system which help you write, debug and
run programs. Some environments are better for programming than others but
the best system to learn on is probably the one you are using right now. Let us
see how we can set up our environment on a system.
OVERVIEW
Our goal is to help you get Python up and running on your computer so that you
can write and run your own programs. To do this, we want to:
• Install a text editor that will make it easy to run your first program.
• Help you enter and run Hello World, your first Python program.
1. Go to www.python.org/downloads/
| *5* Download Python | Python.org X
Co to python.org/downloads/ * — r Q ft PythonSMfrwaw! Te u walM iew jUS) j [h ttp s /w w w -pyth on .org/d ov. nlcads, |
■|| Apps (<$) Computer Science pujamcsdwariai - Cl Q MiNDSTCRMS for T CBSE, Class XI Comp (3
2. A fter the application file is downloaded, we can install it by opening it. This
will open the Python 3 .7 .0 ( 3 2 -bit) Setup window as shown below. Put check
on “ Add Python 3.7 to PATH” .
Python 3.7.0 (32-bit) Setup O
# Install Now
Click on Install Now** C:\Users\preeti\AppData\locar\Pfcgrams\Python\Python37-32
python
y : lr s t .ll l.ir r s r h .. < n r a ll . . c a r t f r » r - r s m r r r . Q r i ^ t
3.7 to PATH’
Fig. 7.4 : Install Python
5. As you will see, the computer interface, IDLE (Python 3.7 32-bit), gets installed
(as shown in the figure below) and is ready to use now. You can now write
Python code in the newly installed Python Shell (Editor) or Script window.
A p p S by name v
Python 3.7
iger (M
rrv m
OpenOffice Draw Ql IDLE (Python 3.7 32-bit) n ew
rz?m
Wizard -j OpenOffice Impress Python 3.7 (32-bit)
Ksm l
— OpenOffice Writer Python 3.7 Module Docs (3 new
ln:1 Col: 0
In : 5 Col: 4
It will act as though you have started a fresh instance Restart Shell ^ F6
of Python IDLE. The shell will forget about everything Interrupt Execution
from its previous state.
PYTHON FUNDAMENTALS
To understand the basics of Python, we will cover:
a. Python Variables b. Python Data Types
c. Python Operators d. Python Conditional Statements
e. Python Loops f. Python Functions
To run your code and check for improvement ideas, have a look at:
VARIABLES IN PYTHON
Variables reserve memory locations to store values. What this essentially means
is that when you create a variable, you reserve some space in memory. Unlike in
languages like Java, C, etc., in Python, there is no need to declare variables before
using them. The declaration happens automatically when a value is assigned to a
variable. The (=) sign is used to assign values to variables. For example,
S = 15
print (S)
This will assign value ‘15’ to the variable ‘S’ and will print it.
Useful Resource
The Python Package Index (PyPI) is a repository of software for the Python
programming language.
DATA TYPES
In Python, all data values are represented by objects. Each object or value has a
data type. Python supports various data types such as numeric, list, tuple, string,
set, dictionary. These data types define the operations possible on the variables
and their storage method. The different kinds of data types are shared for your
reference in the toolbox.
Let us discuss each data type in detail.
It stores numeric values. They are immutable which means that their value cannot
be changed. Python supports three Numeric data types:
Integer type: It can hold all the integer values, i.e., all the positive and negative
whole numbers, for example, 11.
Float type: It holds real numbers. It is represented by decimal and sometimes
scientific notations with E or e, indicating the power of 10 (3-5e2 = 3.5 x 102 = 357),
for example, 6.24.
Complex type: These are of the form x + aj, where x and y are floats and j represents
the square root of -1 (which is an imaginary number), for example, 10 + 6j.
It is easy to convert the integer value to a float value and vice versa using Python.
Let us look at an example below:
A = 11
# Convert it into float type
B = float(A)
print(B)
This code will convert an integer value to a float type. Following is an example of
converting float to integer type:
A = 11.56
# Convert it into int type
B = int(A)
print(B)
List
Lists in Python are like Arrays in C. But in a Python List, you can store elements of
different types whereas in an Array, all the elements should be of the same type.
List is actually the most versatile data type available in Python. It can be written
as a list of comma-separated values between square brackets.
Consider the example below.
States = ['Punjab', 'Haryana', 'Rajasthan', 28]
print(States)
Notice that the States list contains both words and numbers.
You must be wondering what the need of Tuples is when we have Lists. This is
because Tuples are faster than Lists. If a constant set of values is to be defined
which we just want to iterate, then Tuple is used instead of List. Tuple is like List,
but you cannot update, delete or add an element to a Tuple.
Things to Remember
Python is a case-sensitive language. This means that Variable and variable are not
the same. Always name identifiers that make sense and are unique. While c = 5 is
valid, w riting count = 5 would make more sense and it would be easier to figure out
what it does even when you look at your code after a long time. Multiple words can
be separated using an underscore— this_is_a_long_variable.
Strings
Strings are the most popular data types in Python. They are created by simply
enclosing characters in quotes. Python treats single and double quotes equally.
Consider the example given below:
S = 'Welcome to Agnitio'
D = "Agnitio"
Set
A Set is a collection of items without any specific order. Every element in a set
is unique. A set is typically created by placing all the items inside curly braces {},
separated by commas. For example,
Set_l = {4,5,6}
In a Set, every element has to be unique. Try printing the code given below:
Set_2 = {4,5,6,6}
Here, 6 is repeated twice but it will print only once.
Union: Union of X and Y is a set of all the elements from both the sets. Union is
performed using | operator. Consider the example given below:
X = {10, 11, 12, 13}
Y = {12, 13, 14, 15}
print(X|Y)
Output:
{10, 11, 12, 13, 14, 15}
Output:
{12, 13}
Output:
{ 10, 11, 12}
Output:
{16, 17, 18, 11, 12, 13}
Dictionaries contain these 'Key Value’ pairs enclosed within curly braces and Keys
and Values are separated by Consider this example:
Output:
Kartik
Output:
{'Name': 'Kartik', 'Age': 30, 'Address': 'Delhi'}
OPERATORS IN PYTHON
Operators are the tools which can change the values of the variables. Consider the
expression 7 + 3 = 10; here 7 and 3 are operands and + is an operator.
Arithmetic Operators
These operators are used to do simple mathematical operations like addition,
subtraction, etc. Assume that A = 100 and B = 200 for the table given on the
next page:
Output:
18
2
80
1.25
2
16
These operators compare the values on either side of their function and then
decide the possible relation among them.
A = 100
B = 80
if (A == B) :
print ("A is equal to B")
else:
print ("A is not equal to B")
if (A != B) :
print ("A is not equal to B")
else:
print ("A is equal to B")
if (A < B) :
print ("A is less than B")
if (A > B) :
print ("A is greater than B")
else:
print ("A is not greater than B")
A = 5
B = 20
if (A <= B) :
print ("A is either less than or equal to B")
else :
print ("A is neither less than nor equal to B")
if (A >= B) :
print("A is either greater than or equal to B")
else:
print("A is neither greater than nor equal to B")
Output:
A is not equal to B
A is not equal to B
A is not less than B
A is greater than B
A is either less than or equal to B
A is neither greater than nor equal to B
In the above example, conditional statements (if, else) are used. It means if the
condition is true, then execute the print statement, if not, then execute the print
statement inside else.
Assignment Operators
Logical Operators
X = True
Y -- False
print ('X and Y is ', X and Y)
printf'X or Y is', X or Y)
print ('not X is' , not X)
Output:
X and Y is False
X or Y is True
not X is False
Membership Operators
These operators are used to test whether a variable is found in a sequence (Lists,
Tuples, Sets, Strings, Dictionaries) or not. The following are the types of Membership
Operators:
Operator_____________________Description Example
in True, if value/variable is found in the sequence 5 in x
n o tin True, if value/variable is not found in the sequence 5 not in x
Output:
True
False
Identity Operators
These operators are used to check if two variables are located on the same part
of the memory. Two variables that are equal does not mean that they are
identical.
Following are the Identity Operators in Python:
Output:
True
False
True
False
Statements a
Statements c
X = 10
Y = 12
if X < Y:
print ('X is less than Y ' )
elif X > Y :
print ('X is greater than Y' )
else:
p r in t ('X and Y are equal')
Output:
X is less than Y
In the above diagram, first the program will check the condition. If it is true, then
the program will move inside the loop and execute the statements. Next, the
program will again check the condition to see if it is still true, then again it will
execute the statements inside the loop. This process will keep on repeating itself
until the condition becomes false. Once the condition becomes false, the program
control will move out of the loop.
«jf^There are two types of loops:.*- :
• Infinite: When the condition will never become false
• Finite: At one point, the condition will become false and the program control
will move out of the loop
In Python, there are three loops:
• while
• for
• Nested
while Loop
In while loop, first the condition is checked and if it is true, control will move inside
the loop and execute the statements until the condition becomes false. This loop
is used when we are not sure of the number of times the part of code needs to
be executed or when we are unsure about the number of iterations.
6
7
8
9
Thank You !
for Loop
Just like the while loop, for loop also allows a part of the code to be repeated a
certain number of times. In for loop, the number of iterations is defined, unlike
the while loop.
Output:
Brinj al
Carrot
Onion
Nested Loops
A Nested loop basically means a loop within a loop. It can be a for loop inside a
while loop or the other way round. Even a for loop can be inside a for loop or a
while loop inside a while loop. All such possibilities are there.
Python Functions
Functions are an easy way to divide your code into useful blocks, making the code
in order, more readable, reusable and efficient. Uses of functions are:
1. Code reusability— any developer can take a code and use it in other applications
2. Code Organization and Documentation
3. Abstraction
4. Extensibility and Scalability
Less Code
Pre-built Libraries
Python has pre-built libraries to implement various Machine Learning and Deep
Learning algorithms. So, every time you want to run an algorithm on a data set,
you just need to install and load necessary packages with a single command. Some
of these pre-built libraries are NumPy, Keras, Tensorflow, Pytorch, etc.
Platform-Independent
Python can run on multiple platforms including Windows, MacOS, Linux, Unix,
and so on. While transferring code from one platform to the other, you can make
use of packages such as Pylnstaller that will take care of any dependency issues.
Python has a huge community of users which is always helpful when we encounter
coding errors. Python has multiple communities, groups and forums where
programmers post their errors and help each other.
Broad Investment
Since tech giants such as Google, Amazon, Netflix and Facebook have started
investing in Artificial Intelligence, it is gaining popularity leading to a rise in demand
for Al-based systems.
Problem Statement
Imagine if we were to build a Machine Learning model which will predict whether
AQI (Air Quality Index) will be in the ‘harmful’ category or not the following day.
AQI is a key indicator of air quality and clean air. It has been displaying a lot of
variance in our country as well depending on various factors such as vehicular
pollution, industrial waste, crop burning, industrial pollution, etc.
Target Definition
Let us say we define AQI more than 100 as harmful.
How to go about it
We need to create a model to predict the target variable, which is “AQIHarmful”.
This target variable (AQIHarmful) will store two values:
1 . Yes: Denotes that AQI will be in the harmful category tomorrow
2. No: Denotes that AQI will not be in the harmful category tomorrow
Therefore, this is clearly a classification problem. The Machine Learning model will
classify the output into two classes, either Yes or No.
Algorithm
To build Classification models in order to predict whether or not AQI will be higher
than 100 based on the underlying model.
Problem Statement
To study credit card data in a bank to know whether a customer will default on
their outstanding credit card bill for the month.
Target Definition
Let us define the target variable as “Carddefault” which will let us know if the
user will default on his bill payment or not.
Data Collection
We need to collect data set of all the users for the last three years and their
repayment history as well along with CIBIL score and other underlying parameters.
How to go about it
We need to create a model to predict the target variable, which is “Carddefault”.
This target variable (Carddefault) will store two values:
1. Yes: Denotes that the card user will default
2. No: Denotes that the card user will not default
Algorithm
To build a Neural Network that can classify a user as defaulter or not.
There are some libraries available for Python and its use in AI:
1. Tensorflow: This is developed by Google and is very popular among
Machine Learning developers.
2. Scikit-Learn: Scikit-Learn is a Python library associated with NumPy
and SciPy. It is considered good for working on complex problems.
3. NumPy: NumPy is a Python library specifically used for computing
scientific/mathematical data.
4. Theano: Theano is a functional library that effectively calculates and
computes mathematical expressions involving multi-dimensional arrays.
5. Keras: This library simplifies the implementation of Neural Networks.
It also has the best functionalities for computing models, evaluating
data sets, visualizing graphs and much more.
6. NLTK: NLTK or Natural Language TooIKit is an open-source Python
library specifically built for Natural Language Processing, text analysis
and text mining.
CodeCombat:
You will play games here and use commands to execute your moves in the
game.
For example, see below how you are given the option to make moves with your
character in the form of Python commands. Discuss with your friends and play
together:
You can see some examples of common code snippets which can be used in your projects easily:
• PyCon https://us.pycon.org/2020/
The Python Conference (PyCon) is an incredible event and the community
welcomes new programmers. These events happen all over the world,
throughout the year. If you can make your way to one of these conferences,
you will learn a great deal and meet some really interesting people.
• PyLadies https://www.pyladies.com
Women and minorities are still under-represented in most technology
fields, and the programming world is no different. That said, the Python
community may well be the most welcoming and supportive programming
community for women and minorities. There are a number of groups
dedicated to bringing women and minorities together around programming
in Python, and there are a number of explicit Codes of Conduct for Python-
related events.
You can compete on the leaderboard and collaborate on AI projects with your classmates
and share your AI journeys in class.
(!)
Python
Basics
to P yth o n S trin gs In te g e rs C o m p le x
P ro g ra m m in g N u m b e rs
i.. ilil ii. i $■■1 ]
Community
Projects |
{ Modules
EXPERIMENT 1 • % % f ir !
Inclusive Al project i
T h e re is no d o u b t th a t G o o g le H o m e and G o o g le A s s is ta n t are h e lp in g pe op le w ith d is a b ilitie s
fu lfil ta s k s and b e c o m e m o re and m o re in d e p e n d e n t in th e ir d a ily a c tiv itie s .
B u t to in te ra c t w ith th e A s s is ta n t, y o u need to have g o o d s p e a k in g s k ills . T he A s s is ta n t is
n o t a c c e s s ib le to p e o p le w ith lim ite d o r no s p e a k in g s k ills .
The idea is to create de vice s to let use rs c o n fig u re p h y s ic a l o b je c ts (b u tto n s , RFID/NFC tag s,
o b je c ts de tected by an M L m o d e l, ...) to trig g e r c o m m a n d s to the A s s is ta n t.
W ith th is s o lu tio n , pe o p le w ith d is a b ilitie s w ill be able to in te ra c t w ith th e d e vice s and se rvice s
u s in g th e s ta n d a rd c o n s u m e r p ro d u c t c h a in , a d a p tin g th e “ la s t m ile ” to th e s p e c ia l a b ility
each on e o f us has. T h is m ake s th e s o lu tio n n o t o n ly a c c e s s ib le b u t a lso in c lu s iv e . P eople
w o n ’t be d iffe re n t in te ra c tin g w ith th e A s s is ta n t E c o s y s te m .
EXPERIMENT 2
Al as Puppetmaster i
A l is n o t o n ly fo r g e ttin g ta s k s d o n e b u t can even be used in th e fie ld o f A rts . Le t us lo o k
a t an e x a m p le here:
C reate s h a d o w p u p p e ts w ith y o u r h a n d s in fro n t o f y o u r la p to p o r p h o n e cam e ra. The p u p p e ts
c o rre s p o n d to one o f th e lu n a r c y c le ’s 12 zo d ia c s y m b o ls and a T e n s o rF lo w m o d e l id e n tifie s
w h ic h a n im a l y o u r h a n d s are fo rm in g . G et it rig h t w ith in th e tim e lim it and y o u ’re g ive n th e
n e x t z o d ia c s y m b o l to try , w ith th e u ltim a te go al o f c o m p le tin g all th e 12 s y m b o ls .
As you have seen, there are various applications of Artificial Intelligence. Al impacts
almost every walk of life and can even solve really big global problems. If we
keep advancing at this pace in Al development, how do you think some of these
experiments you have seen would advance or humans and machines would interact
15 years from now?
Al in the Future
Take a fe w e x a m p le s o f h o w A l is im p a c tin g o u r live s to d a y and im a g in e h o w it w ill im p a c t the
sam e s itu a tio n /p ro b le m 15 ye a rs fro m n o w . For exa m ple, to d a y , N e tflix g ive s you pe rso n a lize d
re c o m m e n d a tio n s based on w h a t yo u have w a tc h e d u s in g A l re c o m m e n d a tio n e n g in e s and
even ch a n g e s th e c o v e r o f th e title based on w h a t y o u like to see. H o w th is c o u ld e vo lve in
th e n e x t 15 y e a rs!
H o w w ill e a rly disea se d e te c tio n u s in g A l e vo lve in th e n e x t 15 ye a rs ?
P rep are fiv e use case s in th is m a n n e r.
V
Al P rojects for C o-C urricular W ork 187
Al in Making Attendance Management Smart at School
E x p lo re h o w y o u can use o p e n -s o u rc e C o m p u te r V is io n lib ra rie s and P y th o n to cre a te an
a tte n d a n c e m a n a g e m e n t s o lu tio n fo r y o u r cla ss. Y ou s h o u ld be able to c a p tu re th e a tte n d a n ce
o f th e s tu d e n ts by th e ir fa ce s w ith o u t th e need fo r a m a n u a l ro ll c a ll. C a lcu la te th e s a v in g s ,
tim e lo s t du e to d is e n g a g e m e n t o f s tu d e n ts an d p ro d u c tiv ity im p ro v e m e n t fo r th e te a c h e r.
Use th e e n tire A l p ro je c t life c y c le a p p ro a c h and c le a rly id e n tify th e s co p e . H o w w ill yo u
c o lle c t data, m o d e l an d e v a lu a tio n p a ra m e te rs ?
A ls o , keep in m in d s itu a tio n s like eve ry y e a r y o u r fa ce e vo lve s, so h o w w ill y o u keep u p d a tin g
th e tra in in g data. N ew s tu d e n ts w ill jo in and s o m e m a y leave. H o w w ill th is im p a c t a tte n d a n c e
m a n a g e m e n t?
Create a Project template
V
You can check various AI/ML project ideas contributed by the community
here. You can also add your projects here to get feedback from the
community. In today’s connected world, it is very important to be part
of like-minded communities and build on each other's work and share
knowledge. Curation of knowledge and building things together for the
greater good of the society should be your focus area.
Scan QR code or visit:
h t t p s :/ / w w w .h a c k s t e r .io / M L / p r o je c t s
Al Tackles Crime
T a c k lin g c rim e is a b ig p ro b le m th e s e d a ys e v e ry w h e re in
th e w o rld . G o v e rn m e n ts have been p u ttin g in s u rv e illa n c e
s y s te m s an d CCTVs e v e ry w h e re . T h e re has been an
in cre a se in p o lic e p a tro l va n s, SOS and h e lp lin e n u m b e rs .
T hese are all v e ry re a ctive a p p ro a ch e s. Can yo u th in k o f w a ys
in w h ic h A l can help in p ro a c tiv e m o n ito rin g and in te rv e n tio n
to p re d ic t th e lik e lih o o d o f a c rim e and h e lp so lv e it?
Use th e e n tire A l p ro je c t life c y c le a p p ro a c h and c le a rly id e n tify th e s c o p e , h o w y o u w ill
c o lle c t data, m o d e l and e v a lu a tio n p a ra m e te rs .
A ls o , keep in m in d s itu a tio n s like c rim e at n ig h t tim e , c o n s tra in ts o f lin e o f v ie w o f ca m e ra s,
an d w h a t if c rim in a ls are w e a rin g m a sks, etc. A lw a y s th in k o f e x c e p tio n h a n d lin g s c e n a rio s .
L a s t b u t n o t th e le ast, keep in m in d th e b ro a d e c o n o m ic s o f th e p ro je c t as w e ll, o th e rw is e
it m a y n o t be fe a s ib le in th e p ra c tic a l w o rld . A t th is stag e, y o u are e xp e cte d to a p p re c ia te
h o w to d e s ig n and ru n A l p ro je c ts in re a l-life s c e n a rio s .
Create a Project template
V
Al P rojects for C o-C urricular W ork 189
Al Can Make Money!
A lo t o f p e o p le in v e s t m o n e y in s to c k m a rk e ts to gain
re tu rn s in th e s h o rt te rm as w e ll as lo n g p e rio d s o f tim e
th ro u g h s tru c tu re d m u tu a l fu n d s . A ll th e s to c k m a rk e t data
is ava ilable o n lin e on th e N a tion al S to c k E xchange w e b site .
Even th e h is to ric a l d a ta is in p u b lic d o m a in . Im a g in e th a t
you are a P o rtfo lio M a n a g e r o f a large in v e s tm e n t firm and
have th e re s p o n s ib ility to p ic k s to c k s an d p re d ic t re tu rn s
on in v e s tm e n t. H o w w ill y o u go a b o u t it?
Use th e e n tire A l p ro je c t life c y c le a p p ro a c h and c le a rly
id e n tify th e s c o p e , h o w yo u w ill c o lle c t data, m o d e l and
e v a lu a tio n p a ra m e te rs .
A ls o , keep in m in d s itu a tio n s like d iv id e n d s , s to c k s p lit and fre s h is s u e s o f s h a re s. R esearch
s o m e o f th e s e te c h n ic a l te rm s o n lin e and see h o w th e y im p a c t th e s to c k p ric e s . T h is c o u ld
be a b illio n d o lla r s ta rtu p idea as w e ll!
Create a Project template
V
190 E ssentials of A rtificial Intelligence - I X
Al Chatbot for E-Governance
T here are th o u s a n d s o f q u e rie s th a t a g o v e rn m e n t d e p a rtm e n t
has to ta ke care of, w h e th e r it is fro m lo ca l o ffic ia ls o r th e
g e n e ra l p u b lic . A s y o u k n o w , c u rre n tly th e a d m in is tra tiv e s ta ff
is re s p o n s ib le fo r h a n d lin g all th o s e q u e rie s and it is n o t th e
m o s t e ffic ie n t w a y as it leads to s lo w re sp o n se tim e . T h in k h o w
an A l-e n a b le d c h a tb o t can be used to h a n d le all th e s e q u e rie s
in te llig e n tly and use b o th te x t and v o ic e -e n a b le d in p u ts .
Use th e e n tire A l p ro je c t life c y c le a p p ro a c h and c le a rly id e n tify th e s co p e , h o w yo u w ill
c o lle c t data, m o d e l and e v a lu a tio n p a ra m e te rs .
A ls o , keep in m in d s itu a tio n s like m u ltip le la n g u a g e s and a c c e n ts o f p e o p le , v o ic e -to -s p e e c h
tra n s la to rs , h o w to p ro g ra m N a tu ra l L a n g u a g e P ro c e s s in g to take care o f m ix e d -la n g u a g e
c o m m u n ic a tio n s , s la n g s , h a lf s e n te n c e s , etc.
A lw a y s th in k h o w A l can be used fo r n a tio n -b u ild in g and fo r th e g re a te r g o o d o f s o c ie ty .
T h is c o u ld be y o u r c o n trib u tio n to e -g o v e rn a n c e .
Create a Project template
V
Making magic mirror with Tensorflow Machine Learning framework. Watch the introductory video:
v
192 E ssentials of A rtificial Intelligence - I X
A s m o re and m o re ne w te c h n o lo g ie s s u ch
as A l and lo T c o m e in to play, ris k s w ill ge t
m o re c o n c e n tra te d in to a c o m m o n n e tw o rk .
C y b e rs e c u rity b e c o m e s e x tre m e ly c o m p lic a te d
in s u c h s c e n a rio s an d go e s b e yo n d w h ite lis ts ,
b la c k lis ts and fire w a lls an d m o re to w a rd s
d e te c tin g u n u s u a l a c tiv ity and p a tte rn s in c lu d in g
th e m o v e m e n t o f d a ta p a cke ts. T h in k h o w A l
a lg o rith m s can sc ra p e th ro u g h v a s t a m o u n ts o f
lo g s to id e n tify s u s c e p tib le u s e r b e h a v io u r.
Use th e e n tire A l p ro je c t life c y c le a p p ro a c h and
c le a rly id e n tify th e s c o p e , h o w y o u w ill c o lle c t
data, m o d e l and e v a lu a tio n p a ra m e te rs .
A ls o , keep in m in d s itu a tio n s like U se r and E n tity B e h a v io u ra l A n a ly tic s (U E B A ) w h ic h re lie s
on deep le a rn in g m e th o d s and b lo c k c h a in m e th o d s .
Create a Project template
V
Google AIY Voice Kit
The AIY Voice Kit from Google lets you build your own natural language
processor and connect it to the Google Assistant or Cloud Speech-to-Text
service, thus allowing you to ask questions and issue voice commands to
your programs. All this fits into a handy little cardboard cube, powered by
a Raspberry Pi.
Everything you need is provided in the kit, including the Raspberry Pi.
Scan QR code or visit:
https://aiyprojects.withgoogle.eom/voice#project-overview
V
Al P rojects for C o-C urricular W ork 195
Fake News Detection using Al
Fake n e w s is b e c o m in g a big m en ace . P eople are u s in g s o c ia l
m e d ia p la tfo rm s s u c h as F aceb oo k, T w itte r, W h a ts A p p , etc., to
spread ru m o u rs and fake ne w s w h ic h leads to w ro n g p e rc e p tio n s
and u n in te n d e d c o n s e q u e n c e s in s o c ie ty . T h in k a b o u t h o w A l
can be used to d e te c t w h e th e r th e n e w s is fake o r real.
Use th e e n tire A l p ro je c t life c y c le a p p ro a c h and c le a rly id e n tify th e sco p e , h o w y o u w ill c o lle c t
data, m o d e l and e v a lu a tio n p a ra m e te rs . O ne can a ls o cre a te d e e p fa ke s n o w and im p e rs o n a te
a n y c e le b rity to v a lid a te a n e w s ite m .
A ls o , keep in m in d s itu a tio n s like re g io n a l la n g u a g e s, v o ic e and te x t ne w s, co d e d la n g u a g e
w ith e m b e d d e d h y p e rlin k s . T h in k h o w p a tte rn re c o g n itio n and N LP can be used here.
A lw a y s th in k h o w A l can be used fo r n a tio n -b u ild in g and fo r th e g re a te r g o o d o f s o c ie ty .
T h is c o u ld be y o u r c o n trib u tio n to e -g o v e rn a n c e .
V
We have now understood how Al knowledge can be applied in real-life projects and,
most importantly, the fundamentals and approach behind project design. We also
took note of exception handling, having a business case and constraints. We must
always look for issues of ethics and bias in whatever Al project we undertake. Last
but not the least, Al is a tool which will empower you and lead towards not only
significant personal growth and career advancement but also help you contribute
to nation-building and e-governance.