Artificial Intelligence Or Deep Learning? What's The Difference?

Artificial Intelligence (AI), machine learning, and deep learning have been playing a ground-breaking role in the development of security and defense systems for the last few years, in fields such as robotics and unmanned systems, video analytics, intelligence, etc. 

However, these terms often overlap and are easily confused. 

AI means getting a computer to mimic human behavior in some way.

Machine learning is a subset of AI, and it consists of the techniques that enable computers to figure things out from the data and deliver AI applications.

Deep learning, meanwhile, is a subset of machine learning that enables computers to solve more complex problems.

Artificial intelligence as an academic discipline was founded in 1956. The goal then, as now, was to get computers to perform tasks regarded as uniquely human: things that required intelligence. Initially, researchers worked on problems like playing checkers and solving logic problems.

Artificial intelligence refers to the output of a computer. The computer is doing something intelligent, so it’s exhibiting intelligence that is artificial.

In the 1980s, a new category of AI techniques started becoming more widely used is machine learning: Mimicking how humans learn. Feed an algorithm (as opposed to your brain) a lot of data and let it figure things out. 

As these algorithms developed, they could tackle many problems. But some things that humans found easy (like speech or handwriting recognition) were still hard for machines. However, if machine learning is about mimicking how humans learn, why not go all the way and try to mimic the human brain? That’s the idea behind neural networks.

The idea of using artificial neurons had been around for a while. Neurons, connected by synapses, are the major elements in your brain. And, neural networks simulated in software started being used for certain problems. 

They showed a lot of promise and could solve some complex problems that other algorithms couldn’t tackle. 

However, simple neural networks with 100s or even 1000s of neurons, connected in a relatively simple manner, just couldn’t duplicate what the human brain could do. It shouldn’t be a surprise if you think about it; human brains have around 86 billion neurons and very complex inter-connectivity.

Deep learning is all about using neural networks with more neurons, layers, and inter-connectivity. How does it work? If I give you images of horses, you recognise them as horses, even if you’ve never seen that image before. 

You can recognise a horse because you know about the various elements that define a horse: shape of its muzzle, number and placement of legs, and so on.

Deep learning can do this. And it’s important for many things including autonomous vehicles. Before a car can determine its next action, it needs to know what’s around it. 

It must be able to recognise people, bikes, other vehicles, road signs, and more. And do so in challenging visual circumstances. Standard machine learning techniques can’t do that.

To conclude, AI refers to devices exhibiting human-like intelligence in some way. There are many techniques for AI, but one subset of that bigger list is machine learning, let the algorithms learn from the data. 

Finally, deep learning is a subset of machine learning, using many-layered neural networks to solve the hardest (for computers) problems.

iHLS:

You Might Also Read:

From Machine Learning To Machine Reasoning

« Surveillance Spyware Targeted At Journalists In Mexico
Fake Facebook Pages Account For 60% Of Social Network Phishing »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

GTB Technologies

GTB Technologies

GTB Technologies is a cyber security company that focuses on providing enterprise class data protection and data loss prevention solutions.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

ActiveNav

ActiveNav

ActiveNav provide dark data discovery solutions for compliance and information governance.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Moonlock

Moonlock

Cybersecurity tech for humans. At Moonlock, we make software that seamlessly protects you and has your back as you live your life.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Insane Cyber

Insane Cyber

Insane Cyber make cybersecurity easier to manage through automated, easy-to-use software and expert support and partnership.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.

GlitchSecure

GlitchSecure

GlitchSecure helps companies secure their products and infrastructure through real-time continuous security testing.

M2 Recovery

M2 Recovery

M2 Recovery are Crypto legal recovery specialists.