SlideShare a Scribd company logo
Artificial Intelligence
A Practical Approach
Who am I?
Software & Machine Learning
Engineer;
City.AI Ambassador;
IBM Watson AI XPRIZE contestant;
Kaggler;
Guest attendee at AI for
Good Global Summit at the UN;
X-Men geek;
family man and father of 5 (3
kids and 2 cats).
@wilderrodrigues
Machine Learning
without a Ph.D.
What is it About?
Source: World Wide Web Foundation, June 2017
Points to Focus On
Number and Types of Layers;
Initialisation;
Regularisation;
Cost Functions;
Optimisation;
Data Augmentation.
Shallow Neural Networks
Random Initialisation
Mean Squared Error
Stochastic Gradient Descent
Sigmoid
Initialisation and Loss Function
Zero initialisation ☹
W1 = np.zeros((layers_dims[l],
layers_dims[l - 1]))
Random initialisation 😐
W1 =
np.random.randn(layers_di
ms[l], layers_dims[l - 1])
* 10
Mean Squared Error ☹
1/m.sum(Y_hat, Y)**2
Xavier Glorot
L2 regularisation
Cross Entropy
Adam
Tanh
Intermediate Neural Networks
Initialisation and Loss Function
Xavier Glorot 😄
W1 = np.random.randn(layers[l], layers[l - 1]) *
np.sqrt(2 / (layers[l - 1] + layers[l]))
L2 regularisation ☺
(ƛ/2.m).sum(W**2)
Adam
Exponentially Weighted Averages
Vt = βVt-1 + (1 - β)𝛳t
RMSProp
Cross Entropy 😄
1/m.sum(Y.log(a)+(1-Y).log(1-a))
Deep Neural Networks
He
Cross Entropy
Dropout
Adam
ReLU
Initialisation and Cost Function
He 😄
W1 = np.random.randn(layers[l],
layers[l - 1]) * np.sqrt(2 / layers[l - 1])
Dropout 😄
❌
✅
Convolutional Networks
Xavier Glorot
Layers:
Convolutional Layers
Max Pooling Layers
Fully Connected Layers
Cross Entropy
Dropout
Adam
ReLU
Convolutional Networks
* =
6x6x3
3x3x16
4x4x16
4x4x16
2x2x16 2x2x16
* =
Residual Networks
Xavier Glorot
Layers:
Convolutional Layers
Bottleneck Layers
Max Pooling Layers
Fully Connected Layers
Cross Entropy
Dropout
Adam
ReLU
Residual Networks using Inception
5x5
Same
32
28x28x192 28x28x32
28x28x192 * 5x5x32 = 120m
1x1
16
1x1x192
28x28x192
28x28x16
5x5
Same
32
28x28x32
28x28x16 * 192 = 2.4m 28x28x32 * 5x5x16 = 10m
Capsule Networks
The is no pose
(translational and
rotational) relationship
between simpler features.
Successive convolutional or
max pooling layers to
reduce spacial size.
Capsule Networks
Resources and References
https://github.com/ekholabs/DLinK
Machine Learning: Andrew Ng, Stanford University, Coursera.
Neural Networks for Machine Learning: Geoffrey Hinton, University of Toronto, Coursera.
Computational Neuroscience: Rajesh Rao & Adrienne Fairhall, Washington University, Coursera.
Neural Networks and Deep Learning: Andrew Ng, DeepLearning.ai, Coursera.
Structuring Machine Learning Projects: Andrew Ng, DeepLearning.ai, Coursera.
Improving Deep Neural Networks with Hyperparameter Tuning, Regularisation and Optimisation: Andrew
Ng, DeepLearning.ai, Coursera.
Convolutional Neural Networks: Andrew Ng, DeepLearning.ai, Coursera.
Calculus I: Jim Fowler, Ohio State University, Coursera.
Thank you!

More Related Content

PPTX
Future of Artificial Intelligence and Machine Learning by Siddhesh Wagle
PPTX
Introduction-to-Artificial Intelligence.pptx.pptx
PDF
Neo4j GraphDay Seattle- Sept19- graphs are ai
PDF
Generative adversarial networks
PDF
Machine Learning for dummies!
PDF
How Credential Stuffing is Evolving - PasswordsCon 2019
PPTX
Hacking with Skynet - How AI is Empowering Adversaries
PPTX
Baisc Deep Learning HandsOn
Future of Artificial Intelligence and Machine Learning by Siddhesh Wagle
Introduction-to-Artificial Intelligence.pptx.pptx
Neo4j GraphDay Seattle- Sept19- graphs are ai
Generative adversarial networks
Machine Learning for dummies!
How Credential Stuffing is Evolving - PasswordsCon 2019
Hacking with Skynet - How AI is Empowering Adversaries
Baisc Deep Learning HandsOn

Similar to Ai - A Practical Approach (20)

PDF
machine learning a gentle introduction 2018 (edited)
PPTX
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
PPTX
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
PPTX
المحاضرة_اولى_الذكاء_الاصطناعي_عملي.pptx
PPTX
Raise of deep learning
PDF
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
PPT
Machine Learning ICS 273A
PPT
Machine Learning ICS 273A
PDF
Hands-on Tutorial of Deep Learning
PDF
[系列活動] 手把手的深度學習實務
PPTX
GAN Deep Learning Approaches to Image Processing Applications (1).pptx
PDF
AI Is Changing The Way We Look At Data Science
 
PDF
What is a GAN Generative Adversarial Networks Guide.pdf
PPTX
Say "Hi!" to Your New Boss
PDF
Weakly supervised learning
PDF
APT - Hunting 0Day Malware
PDF
Harnessing the Power of Generative AI for your Business By Siddharth.pdf
PDF
Security in the age of Artificial Intelligence
PDF
1_intro2AI.pdf
PDF
San Francisco Hacker News - Machine Learning for Hackers
machine learning a gentle introduction 2018 (edited)
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
المحاضرة_اولى_الذكاء_الاصطناعي_عملي.pptx
Raise of deep learning
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
Machine Learning ICS 273A
Machine Learning ICS 273A
Hands-on Tutorial of Deep Learning
[系列活動] 手把手的深度學習實務
GAN Deep Learning Approaches to Image Processing Applications (1).pptx
AI Is Changing The Way We Look At Data Science
 
What is a GAN Generative Adversarial Networks Guide.pdf
Say "Hi!" to Your New Boss
Weakly supervised learning
APT - Hunting 0Day Malware
Harnessing the Power of Generative AI for your Business By Siddharth.pdf
Security in the age of Artificial Intelligence
1_intro2AI.pdf
San Francisco Hacker News - Machine Learning for Hackers
Ad

More from Wilder Rodrigues (7)

PDF
Improving Machine Learning
 Workflows: Training, Packaging and Serving.
PDF
Neutralising bias on word embeddings
PDF
Deep Learning for Natural Language Processing
PDF
Java 9: Jigsaw Project
PDF
Microservices with Spring Cloud
PDF
Machine intelligence
PDF
Embracing Reactive Streams with Java 9 and Spring 5
Improving Machine Learning
 Workflows: Training, Packaging and Serving.
Neutralising bias on word embeddings
Deep Learning for Natural Language Processing
Java 9: Jigsaw Project
Microservices with Spring Cloud
Machine intelligence
Embracing Reactive Streams with Java 9 and Spring 5
Ad

Recently uploaded (20)

PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Big Data Technologies - Introduction.pptx
PDF
Electronic commerce courselecture one. Pdf
PPTX
Cloud computing and distributed systems.
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Encapsulation_ Review paper, used for researhc scholars
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Big Data Technologies - Introduction.pptx
Electronic commerce courselecture one. Pdf
Cloud computing and distributed systems.
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Understanding_Digital_Forensics_Presentation.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Encapsulation_ Review paper, used for researhc scholars

Ai - A Practical Approach