You are on page 1of 89

1

2
3
Figure a is a crow, tracked and photoed by researchers in Japan. The crow is wild. It must live
independently relying on its own observation, perception, cognition, learning, reasoning, execution. If you
think of it as a robot, it will survive in our real life. But if you think of it as a tramp in a city, it must cope
with urban management officers in the city so that it can survive.

First of all, the crow must look for food. It finds nuts (how to find the nut flesh is in another example) and
needs to crush them, but this task is beyond its physical ability. Other animals, such as gorillas, use tools
to find a few stones, a large cushion under the bottom, and a medium to crush in hand. The crow tries
every possible ways such as throwing the nut towards the sky but fails to crush it. In this process, it finds
a trick to put the nut on the road and let the car roll over (Figure b), which is the "crow-machine
interaction". Later, it finds that although nuts were crushed, it is dangerous to eat in the middle of the
road. It would be crushed by vehicles on the road anytime. I would like to emphasize that this process
does not involve big data training or supervised learning. The crow does not have a second life. This is a
completely different mechanism from many machine learning mechanisms, especially deep learning.

Then the crow began to observe again, as shown in Figure c. It finds that cars and people sometimes
stop at intersections near the traffic lights. At this point, it must further understand the complex
relationships among traffic lights, pedestrian crossing, crosswalk lights, car stopping, and people
stopping, and even in which directions and for what objects the light of a specific color takes effects.
After that, the crow chooses a wire just above pedestrian crossing and crouches down (Figure d). Here I
want to emphasize another point, perhaps it is observing and learning another place where it can crouch
down, but that place does not meet the conditions for it to crouch down. It must believe that the same
relationship can be applied to the current place. Many machine learning methods do not support this
mechanism at present. For example, some enhanced learning methods allow robots to grab objects at
fixed locations, such as building blocks; the AI algorithm used in electronic games has to start learning
again when the image changes.

It throws the nut onto the pedestrian crossing, waits for the car to roll over the nut, and wait until the
crosswalk light is on (Figure e). At this time, the car stops outside the pedestrian crossing. The crow
finally walks securely to the place where the nut flesh resides.

4
5
Fast computing and memory storage capabilities. The development of technologies
involved in AI is unbalanced. At present, computers have distinct advantages in
computing and storage capabilities. In 1996, an IBM computer called Deep Blue
defeated the reigning world chess champion, Garry Kasparov. Since then, humans
have never beat machines in computational intensive games.

Visual, auditory, and tactile perception capabilities. Humans and animals are able to
interact with nature through various intelligent sensing abilities. Driverless vehicles
intelligently perceive things by AI algorithms and sensing devices such as laser radar.
Machines are more advantageous than humans in perceiving the world. Humans
passively perceive the world, but machines can actively perceive the world through
devices such as laser radar, microwave radar, and infrared radar. Any machine using
DNN and big data techniques, a sensing robot such as Big Dog or a driverless
vehicle, is more and more close to humans in perception intelligence.

The name Big Dog was obtained because the robot resembles a mechanical dog.
The Boston Dynamics designed and created this robot for US military. It can not only
climb mountains, but also carry heavy loads of goods, and may run faster than
humans. The "Big Dog" robot is equipped with a computer that can adjust the posture
according to the changes in the environment. It can travel along the preset simple
route and can be remotely controlled. The "Big Dog" robot is called "the most
advanced robot in the world to adapt to the rugged terrain".

6
7
The Internet of Things (IoT) has multiple eyes, noses, tongues, ears, and skins that are
sensing. Big data is sensory information obtained by various sensing organs. Cloud
computing provides memory and storage. AI is cognition and decision-making. The
essence of IT and DT technology development is personalization and intelligence. There is
no doubt that the intelligent era will come.

8
9
Knowledge aggregation aggregate dispersed knowledge based on the external and
intrinsic characteristics of knowledge units to discover the association between
knowledge units. It aims to find the relationship between knowledge nodes by using
network-based and subject-based methods.
Semantic network is a branch of knowledge management. Knowledge map aims to
describe the various entities or concepts that exist in the real world. Each entity or
concept is identified by a globally unique ID, which is called an identifier. Each
attribute/value pair is used to describe the intrinsic characteristics of an entity, and the
relationship is used to connect two entities and describe the association between
them.
Ontology model is a real model based on the concepts in real life, the relationship
between concepts, the characteristics (attributes) of concepts, and the concept
instances. For example, in the computer field, concepts such as computer, CPU,
memory, and computer accessories can be abstracted, while computer and CPU bear
a relationship of inclusion, that is, is_partOf, and a computer have the hasCPU
attribute. You can create an ontology model that can be used for reasoning and
semantic query, etc.
Ontology is actually a formal expression of a set of concepts and their relationships in
a specific field, which is applicable to the use of polysemy and synonyms.

10
Individual (instance): Base or underlying object.
Class: Sets, concepts, object types, or type of things.
Attribute: Attributes, features, functions, characteristics, and parameters of an object
(or class).
Relationship: The way a class is associated with an individual.
Function term: In a declarative statement, a complex structure that can be used to
replace specific relationships with specific terms.
Constraint: A description of a situation that must be set up to accept an assertion as
an input, as declared in a formalized manner.
Rule: A declaration that describes the logical inference that can be derived from an
assertion in a particular form, in the form of an if-then statement.
Axiom: Assertions (including rules) in a specific logical form constitute the whole
theory of its ontology described in the corresponding application field. This definition
is different from the "axiom" in the generation of grammatical and formal logic. Among
these disciplines, axioms only include statements that are asserted as transcendental
knowledge. The axiom also includes the theory derived from an axiom statement.
Event (philosophy): A change in an attribute or relationship.
Because the emotional analysis of a sentence cannot be separated from the emotion
of a sentence, the method is divided into three categories: (1) analysis method based
on the knowledge base (2) network-based analysis method (3) corpus-based analysis
method [2].
A time sequence refers to a data sequence that is observed and sorted in the order of
time. A spatio-temporal sequence is an extension of a time sequence in a space, and
is a set of multiple correlated time sequences in a space. Check whether there are
stationarity, randomness, stability, and white noises. There are many applications in
geography, drought, and waterlogging.
Ontology-based reasoning: Explore invisible experience, extend semantic
relationships, determine design parameters, etc.

11
In the underlying infrastructure construction, enterprises such as Tencent, Alibaba,
Baidu, and Huawei provide basic resource support for companies in the industry
chain based on their advantages in data, algorithms, technologies, and servers. They
also transform their advantages into research in general and professional application
fields. In this way, a closed loop of the AI industry chain within the ecosystem is
formed.

In terms of the application in general scenarios, enterprises represented by Iflytek


(002230), DeepGlint, Merged Reality, and Face++ focus on the development of
computer vision and speech recognition and provide general solutions for security,
education, and finance industries.

The field of development of dedicated applications concentrates most hardware and


startups, including smart home solution vendors represented by Xiaomi and
Broadlink, as well as differentiated application providers such as Mobvoi, Linkface,
and UBTECH.

12
13
14
In China's AI enterprises, the top three fields of the highest financing ratio are
computer vision and image, natural language processing, and autonomous/auxiliary
driving.

In the US AI enterprises, the top three fields of the highest financing ratio are are
chipsets/processors, machine learning application, and natural language processing.

15
DMTK: Distributed Machine Learning Toolkit
Caffe was created by Jia Yangqing at the University of California, Berkeley. It is a
deep learning framework based on expression architecture and extensible code. It is
managed by Berkeley's Vision and Learning Center (BVLC) and is funded by
companies like NVIDIA and Amazon to support its development.

16
17
18
19
20
21
22
Natural Language Processing (NLP)

23
24
25
26
Optical Character Recognition (OCR) converts text content on pictures and
photos into editable text.

27
28
29
30
31
32
33
The analysis and decision-making steps have been changed. At first, decision-
making and analysis are performed manually; later, based on collected data, the
automated script is executed for decision-making and analysis; finally, the machine
learning method is used for decision-making and analysis.
Tool
Provides multiple IT O&M tools to implement monitoring and routine O&M
management.
Search
All O&M data can be searched globally through a platform. Association analysis
is not supported.
Analysis
Association analysis of all O&M data is supported to identify the cause.
Problems cannot be prevented in advance.
Prevention
Fault prevention is implemented based on all historical O&M data. Prediction is
not supported through indicator association.
Intelligence
Prediction is performed after multiple indicators are associated and analyzed.
Machines continuously learn and accumulate experience.

34
35
36
37
According to Gartner Report, the technical industry related to intelligent O&M is on
the rise. In 2016, the deployment rate of AIOps was lower than 5%. Gartner predicted
that the global deployment rate of AIOps will reach 25% in 2019. By 2022, 40% of
large enterprises will replace their traditional O&M monitoring, service desk, and
automated processes with big data and machine learning functions.

Future trend:

Unified platform and data association

On the basis of the platform-based O&M system, using interfaces to


integrate multiple systems and services is far from enough. In addition, in-
depth data association is required to establish a closer relationship
between the service system and the O&M platform.

In-depth fault detection

More powerful fault detection capabilities are required to support in-


depth service fault mining, service running data query, service running
status analysis, focusing on key service nodes to quickly identify faults,

38
send notifications to O&M personnel, and trigger emergency plans in a timely
manner.

Refined, real-time, and intelligent fault emergency plan

A fault emergency plan can be automatically or manually executed in


various scenarios such as risk, exception, alarm, and fault detection as
well as and prediction.

When an emergency plan fails, big data support can be provided to


analyze the root cause and potential risks of the fault in real time and
provide quick and correct fault identification. Automatic learning is also
provided, which records the current fault scenario to generate a new
emergency plan or solution.

Closed-loop management of key nodes based on processes

Under the assistance of processes, the entire O&M event can be closed.
Key nodes such as event recording, tracing, processing, and feedback
can be provided to ensure efficient operation of O&M.

39
40
41
42
In the actual production environment, the pain point of the exception detection system
is the selection of the exception detection algorithm and the adjustment of the
algorithm parameters. This process consumes a lot of manpower and time, but the
result cannot meet the expectation. The Opprentice is mainly designed for this kind of
problem, by converting exception detection problems into supervised machine
learning problems, the automatic selection of exception detection algorithms and the
automatic adjustment of algorithm parameters are realized.

O&M personnel mark exceptions on the historical KPI curve, and then the Opprentice
uses dozens of different types of detectors to extract hundreds of exception features.
In this case, manually marked data and abnormal features can be used to convert
exception detection problems into supervised classification problems in machine
learning, the extracted features are used as the input of the machine learning
algorithm. The points on the KPI curve are classified into normal and abnormal by
using the classification algorithm. In this way, the exception detection is implemented.

43
44
Key technology: Cause-and-effect analysis method (Bayesian network analysis):

Man-machine combination: The domain experts determine the node variables in the
Bayesian network, specify all or part of the network structure through expert
knowledge, and then learn the network parameters from the data by using the
machine learning algorithm to calculate the probability of each alarm as the root
alarm.

45
46
47
Internet of Things (IoT)

Internet of Services (IoS)

48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
NHTSA: National Highway Traffic Safety Administration

SAE: Society of Automotive Engineers

L1 is characterized by a single function. Drivers need to perform operations at


the same time.

L2 drivers do not need to perform operations in certain environments.


L3 drivers perform operations in emergencies.

63
64
The algorithm end reads meaningful information from original data of the
sensor to understand the situation and make decisions as the environment
changes. The cloud platform provides offline computing and storage functions
for driverless vehicles and can be used to train algorithms and update
precision map training to effectively identify, track, and make decision models.

65
IMU: Inertial measurement unit. The options are as follows: Accelerometer,
three-axis acceleration value. Gyroscope: The positioning is calculated by
fixing the tilt angle of the flywheel. Magnetometers are tilted according to the
magnetic vector of the earth and parallel to the ground. The barometer is used
to calculate the altitude by tracking the atmospheric pressure value.
The GPS update frequency is only 10 Hz. The update frequency of IMU is 200
Hz.

The existing driverless vehicle usually has 8 cameras around the body. The
camera can work around 60 Hz. Multiple cameras generate 1.8 GB data per
second.

In addition, there is radar and sonar. If there is any obstacle in front, the
emergency brake works.

66
Kalman filtering. IMU updates data once every 5 ms, but the error is
accumulated.

The GPS obtains data every 100 ms to correct the accumulated error of the
IMU. The GPS has multiple paths and will introduce new errors. In addition,
the GPS needs to be deployed in a non-closed environment. The tunnel is not
applicable.

67
68
ROS robot OS

69
70
Transportation as a Service (TaaS), TaaS1.0 for people driving, and TaaS2.0
for autonomous driving.

71
Due to the installation of cameras, radars, laser radars, and artificial
intelligence, the initial cost of a driverless vehicle is high, and it is most likely to
be accepted by the enterprise and early consumer groups, such as cars,
buses, taxes, express cars and some industrial applications or provide
services for the elderly and the disabled.

A study from the University of Texas at Austin (SAV) shows that a driverless
vehicle can replace 11 conventional vehicles and increase operating mileage
by over 10%. This greatly reduces traffic congestion and environmental
deterioration.

72
73
74
75
The proportion of the total service volume of AliMe (total service volume =
intelligent service volume + online manual service volume + telephone service
volume) reaches 95%, which is the absolute main force for services during the
“Double 11” shopping carnival.

76
77
The word segmentation method based on the (dictionary) string matching is also called the mechanical
word segmentation method. It is used to match the Chinese string to be analyzed with a "fully large"
machine dictionary according to a certain strategy. If a string is found in the dictionary, the matching is
successful (a word is identified). According to different scanning directions, the string matching method
can be classified into positive matching and reverse matching. According to the priority matching of
different lengths, the matching can be classified into maximum (longest) matching and minimum
(shortest) matching. According to the principle whether the string is combined with the lexical annotation
process, it can be divided into a simple word segmentation method and an integrated method combining
participle and lexical annotation.
The word segmentation method based on (rule) understanding is used to simulate people's
understanding of sentences to achieve the effect of identifying words. The basic idea is to perform
syntactic and semantic analysis at the same time of word segmentation, and use syntactic information
and semantic information to deal with ambiguity. It usually consists of three parts: word segmentation
subsystem, syntactic and semantic subsystem, and master control part. Under the coordination of the
master control part, the word segmentation subsystem can obtain the syntactic and semantic information
about words and sentences to judge the ambiguity. That is, it simulates the process of understanding the
sentence. This method of word segmentation requires a lot of language knowledge and information.
The statistics-based word segmentation method is to use the statistical machine learning model to learn
the rule of word segmentation (referred to as training) in the premise of given a large number of participle
text, to realize the segmentation of unknown texts. For example, a maximum probability word
segmentation method and a maximum entropy word segmentation method. With the establishment of
large-scale corpus and the research and development of statistical machine learning methods, statistics-
based Chinese word segmentation has become a mainstream method.
Lexical annotation: R refers to pronouns, v refers to verbs, m refers to numbers, n refers to nouns.

78
79
80
81
82
83
84
85
86
87
88
89

You might also like