Skip to main content

Learning in AI

What is learning? 

We define learning as the transformative process of taking in information that—when internalized and mixed with what we have experienced—changes what we know and builds on what we do. It’s based on input, process, and reflection. It is what changes us.

–From The New Social Learning by Tony Bingham and Marcia Conner


 


It is the activity of gaining knowledge or skill by studying, practicing, being taught, or experiencing something. Learning enhances the awareness of the subjects of the study. The ability of learning is possessed by humans, some animals, and AI-enabled systems. Learning is categorized as: 
  •  Auditory Learning: It is learning by listening and hearing. For example, students listening to recorded audio lectures. 
  • Episodic Learning: To learn by remembering sequences of events that one has witnessed or experienced. This is linear and orderly. 
  • Motor Learning: It is learning by the precise movement of muscles. For example, picking objects, Writing, etc. 
  • Observational Learning: To learn by watching and imitating others. For example, the child tries to learn by mimicking her parent.
  •  Perceptual Learning: It is learning to recognize stimuli that one has seen before. For example, identifying and classifying objects and situations. 
  • Relational Learning: It involves learning to differentiate among various stimuli on the basis of relational properties, rather than absolute properties. For Example, Adding ‘little less’ salt at the time of cooking potatoes that came up salty last time, when cooked with adding say a tablespoon of salt. 
  • Spatial Learning: It is learning through visual stimuli such as images, colors, maps, etc. For Example, A person can create a roadmap in mind before actually following the road. 
  • Stimulus-Response Learning: It is learning to perform a particular behavior when a certain stimulus is present. For example, a dog raises its ear on the hearing doorbell.

Types of Learning: 

1. Rote learning

Rote learning is the memorization of information based on repetition.

Examples of rote learning include memorizing the alphabet, numbers, and multiplication tables. Some consider rote learning to be a necessary step in learning certain subjects. Memorization isn’t the most effective way to learn, but it’s a method many students and teachers still use. A common rote learning technique is preparing quickly for a test, also known as cramming. 
For example: When a learner learns a poem or song by reciting or repeating it, without knowing the actual meaning of the poem or song. 


Advantages of Rote Learning 

  •  Ability to quickly recall basic facts 
  • Helps develop foundational knowledge 
Disadvantages of Rote Learning 
  • Can be repetitive 
  • Easy to lose focus 
  • Doesn’t allow for a deeper understanding of a subject 
  • Doesn’t encourage the use of social skills 
  • No connection between new and previous knowledge 
  • May result in the wrong impression or understanding a concept While being able to quickly recall pieces of information is helpful, to understand information on a deeper level students must use a different method of learning: meaningful learning.

2. Learning From Example:

Induction learning is carried out on the basis of supervised learning. In this learning process, a general rule is induced by the system from a set of observed instances. However, class definitions can be constructed with the help of a classification method. 

Supervised learning, in the context of artificial intelligence (AI) and machine learning, is a type of system in which both input and desired output data are provided. Input and output data are labeled for classification to provide a learning basis for future data processing. Supervised learning systems are mostly associated with retrieval-based AI but they may also be capable of using a generative learning model. 

Training data for supervised learning includes a set of examples with paired input subjects and the desired output (which is also referred to as the supervisory signal). In supervised learning for image processing, for example, an AI system might be provided with labeled pictures of vehicles in categories such as cars and trucks. After a sufficient amount of observation, the system should be able to distinguish between and categorize unlabeled images, at which time training can be said to be complete.

 Supervised learning models have some advantages over the unsupervised approach, but they also have limitations. The systems are more likely to make judgments that humans can relate to, for example, because humans have provided the basis for decisions. However, in the case of a retrieval-based method, supervised learning systems have trouble dealing with new information. If a system with categories for cars and trucks is presented with a bicycle, for example, it would have to be incorrectly lumped in one category or the other. If the AI system was generative, however, it may not know what the bicycle is but would be able to recognize it as belonging to a separate category.

3. Explanation Based Learning
4. Learning By Analogy

Comments

Post a Comment

Express your opinion

Popular posts from this blog

Are you Hacked ? A Cozy Guide to Online Security - Must Know

Imagine your online life like a cozy house you’ve built on the internet. You store personal items (emails, photos, bank details) inside it, invite friends and family to visit (social media), and even shop for new items right from your living room (e-commerce). The problem? Hackers are lurking around, trying to sneak in when you’re not looking! Just like you’d lock your front door and install a security camera, you can take simple steps to protect your digital home. In this blog, we’ll walk through some friendly, easy-to-understand methods to keep hackers at bay.  Let’s get started! 1. Check If Your Information Is Out There What This Means Have you ever wondered if someone has your password? Or if your email was part of a major data breach? Tools like Have I Been Pwned , Pentester   can instantly check if your email address or password has been leaked during a hack. Why It’s Important If your credentials are floating around the internet, you’ll want to change those passwords im...

Quantum Computing Trends - 2023

 Introduction Quantum computing stands on the brink of a revolution. This emerging technology, harnessing the principles of quantum mechanics, promises to transform computation by performing complex tasks much faster than current classical computers. In 2023, we witness quantum computing evolving from theoretical constructs to practical, scalable technologies with broad applications in various sectors. Background Study The study of quantum computing has been marked by significant milestones. Initially dominated by theoretical studies and small-scale experimental setups, the field has seen rapid advancements in hardware, software, and algorithm development. Major tech companies and research institutions have been key players in driving these innovations, leading to an increasingly diverse and competitive landscape. Current State and Trends in Quantum Computing IBM's Pioneering Efforts: IBM has been instrumental in advancing superconducting qubits technology. After unveiling a 127-qu...

Beyond the Hype: The Struggles of Breaking into Cybersecurity

  Introduction In today's digital age, cybersecurity is important to protecting sensitive information and infrastructure from ever-changing cyber attacks. With high-profile hacks making news and businesses scrambling to strengthen their defenses, one might think that cybersecurity professionals are in high demand. The facts, however, reveal a different narrative. In their pursuit of a career in cybersecurity, aspiring professionals may encounter a range of difficult obstacles. Despite the industry's rapid growth and ongoing concerns about a shortage of skilled workers, getting a cybersecurity job can be incredibly tough. This article delves into the hard realities that lay beneath the excitement, shedding light on job seekers' hardships and the true nature of the cybersecurity job market. Background According to CISCO, cybersecurity involves protecting systems, networks, and programs from digital attacks. IBM defines it as any technology, measure, or practice aimed at preve...