SlideShare une entreprise Scribd logo
1  sur  129
Télécharger pour lire hors ligne
Gogolook Confidential
Gogolook Confidential 
How Started?
Gogolook Confidential 
How Started?
Gogolook Confidential 
How Started?
Gogolook Confidential 
The Best App 
For 
identifying and blocking calls 
The Best App –LINE whoscall
Gogolook Confidential
Gogolook Confidential 
KeyFeatures
Gogolook Confidential 
★Instant Caller Identification 
LINE whoscallidentifies background information of incoming unknown calls in seconds through tags reported by other users, Internet search results, and our comprehensive global database. 
Instant Caller Identification
Gogolook Confidential 
★Database with 
over 600Million 
Phone Numbers 
LINE whoscallboasts an online database with over 600 million phone numbers. The database of LINE whoscallcovers yellow pages, spammers, telemarketers, costumer services...,etc. with numerous community tags contributed by users and comments based on real users’ experiences. 
Database & Number Details
Gogolook Confidential 
Incoming Call Dialogue 
Incoming Call Dialogue 
Fraud Call 
Business 
Corporation 
Restaurant
Gogolook Confidential 
★Community Tag 
★Block unwanted calls & SMSs 
Contributions from the global user community has always been the pillar of LINE whoscall’sservice. LINE whoscalluser can tag aphone number and share it with others, which creates an integrated phone number database and a reliable communication network for everyone. 
Block calls and SMSs intelligently to ensure a harassment-free calling experience. 
Tag & Block
Gogolook Confidential 
★World’s Largest 
Yellow Page Database 
★Offline Database 
Available for Free 
LINEwhoscallowns one of the world’s largest onlinephonenumber database in the world, which covers most of numbers of businesses and service providers essential to you daily lives. 
The free database is not only available online but also offline. And they are completely free! The unlimited usage of database with over 600 million phone numbers is only on LINE whoscall. 
Database Usage
Gogolook Confidential 
3 of every 5 strangers’ calls can be identified by LINE whoscall 
Over 400 million phone calls 
are identified 
by LINE whoscallevery month. 
3000 spammer numbers 
are reported 
by LINE whoscalluser every day. 
Number Identification 
–2014.07 
–2014.07
Gogolook Confidential 
Market
Gogolook Confidential 
Honors
Gogolook Confidential 
What we will be…
Gogolook Confidential 
Vision
Gogolook Confidential 
資料科學在whoscall的應用 
GOGOLOOK資料科學家高義銘
Gogolook Confidential 
★日常生活經常會遇到的問題
Gogolook Confidential 
★人面對未知的事物就會有一種… 
我有一種不祥的預感!
Gogolook Confidential 
★坊間流傳著許多解決此問題的APPs 
小熊來電通知
Gogolook Confidential 
★坊間流傳著許多解決此問題的APPs 
小熊來電通知
Gogolook Confidential 
★Why whoscall? 
因為…他是連Google執行長都說讚的軟體! 
唉呦,讚喔
Gogolook Confidential 
whoscall是如何解決未知來電 的問題咧?
Gogolook Confidential 
★Technologies adopted 
1. Yellow pages: 
HiPage, Yelp, 
Zenrin… 
2. Google search 
3. Other sources 
Technologies adopted
Gogolook Confidential 
★Technologies adopted 
Technologies adopted 
4. 使用者回報與標記
Gogolook Confidential 
★Technologies adopted 
Technologies adopted 
4. 使用者回報與標記
Gogolook Confidential 
★whoscall, I have a problem… 
如果一個未知號碼,我們無 法從這些sources 去取得任 何資訊,那就GG 了嗎?
Gogolook Confidential 
★whoscall, I have a problem… 
如果一個未知號碼,我們無 法從這些sources 去取得任 何資訊,那就GG 了嗎? 
是的,GG然後洗洗睡…
Gogolook Confidential 
當然不能洗洗睡,要不然我站 在這邊幹嘛?
Gogolook Confidential 
★Problem we want to solve 
For an unknown phone number: 
• 
No google result 
• 
No user tag / report 
• 
Not a whoscalluser 
Problem we want to solve
Gogolook Confidential 
★Problem we want to solve 
For an unknown phone number: 
• 
No google result 
• 
No user tag / report 
• 
Not a whoscalluser 
Can we determine if it’s a spamnumber? 
Problem we want to solve
Gogolook Confidential 
★Problem we want to solve 
For an unknown phone number: 
• 
No google result 
• 
No user tag / report 
• 
Not a whoscalluser 
Can we determine if it’s a spam number? 
推銷電話? 
Problem we want to solve
Gogolook Confidential 
★Problem we want to solve 
For an unknown phone number: 
• 
No google result 
• 
No user tag / report 
• 
Not a whoscalluser 
Can we determine if it’s a spam number? 
推銷電話? 詐騙電話? 
騷擾電話? 
Problem we want to solve
Gogolook Confidential 
★Problem we want to solve 
For an unknown phone number: 
• 
No google result 
• 
No user tag / report 
• 
Not a whoscalluser 
Can we determine if it’s a spam number? 
推銷電話? 詐騙電話? 
騷擾電話? 
打錯電話? 
Problem we want to solve
Gogolook Confidential 
★Problem we want to solve 
For an unknown phone number: 
• 
No google result 
• 
No user tag / report 
• 
Not a whoscalluser 
Can we determine if it’s a spam number? 
推銷電話? 詐騙電話? 
騷擾電話? 
打錯電話? 
Problem we want to solve 
(我又不是神!!)
Gogolook Confidential 
★Scenario 
Scenario 
OO推銷 
小明 
小明妹 
小明哥 
?
Gogolook Confidential 
★We think it should work because… 
whoscalluserbase( = potential sensors) 
• 
> 10 million installations 
• 
> 10 thousands tags (daily) 
• 
> 30 million phone calls (daily)
Gogolook Confidential 
Analysis procedures 
Analysis procedures 
1. 
Collect call logs 
2. 
Compare with user tags 
3. 
Explore call behaviors 
4. 
Extract features 
5. 
Classify unknown numbers using machine learning techniques
Gogolook Confidential 
★Collect call logs 
• 
Recruit a group of voluntary whoscallusers as our sensors. 
• 
Collect phone call logs from these sensors for a month. 
Collect call logs
Gogolook Confidential 
★User privacy 
 
User privacy is kept in the highest priority. 
 
Phone numbers are stored as one-way hash codes. (therefore unable to be reversed) 
User privacy
Gogolook Confidential 
Analysis procedures 
Analysis procedures 
1. 
Collect call logs 
2. 
Compare with user tags 
3. 
Explore call behaviors 
4. 
Extract features 
5. 
Classify unknown numbers using machine learning techniques
Gogolook Confidential 
★List of user tags 
List of user tags 
一接就掛斷 
一打來就掛掉 
一接對方馬上掛斷 
一接就掛電話 
一接起來就掛斷電話 
一接起來,就說打錯 
一直傳廣告簡訊 
一直打錯電話 
一直收到沒顯示的 APP 
一直狂打錯電話 
一聲 
一聲不響,就掛掉, 有問題 
一聲就掛 
一聲掛斷 
一聽收線 
嚴重騷擾 
國外莫名來電 
國際電話偽裝台北碼??? 
地下錢莊 
地下錢莊推銷 
地下非法期公司 
地產 
垃圾 
垃圾簡訊 
垃圾訊息 
基隆美髮 
壽險 
外勞 
夜半打給不認識的在亂 
色情交友 
色情交友電話 
色情人肉市場 
色情垃圾簡訊 
色情外送 
色情妹妹電話 
色情干擾 
色情廣告簡訊 
色情拉客妹 
色情按摩 
色情推銷 
色情推銷電話 
色情援交外送 
色情敗類 
摩門 
撥了馬上掛掉 
擾亂電話 
收數率調查 
收視率調查 
放款簡訊 
政府宣導 
敲一聲而已 
整人電話 
新光保全 
星展借貸 
星展推消 
星展銀行 
淫媒仲介
Gogolook Confidential 
★Compare with user tags 
• 
Compare these phone numbers with user reports from whoscalldatabase (封鎖記錄) 
Compare with user tags 
Normal numbers 
0987-991-XXX 
0986-225-XXX 
02-2675-XXXX 
03-862-XXXX 
... 
02-2543-XXXX 
03-556-XXXX 
886-XXXX 
… 
推銷電話 
02-2783-XXXX 
886-903-XXXX 
0800-000-XXX 
… 
惡意電話
Gogolook Confidential 
★Data summary 
Data summary 
推銷電話 
民調中心 
騷擾電話 
詐騙電話 
70% 
1% 
5% 
24% 
# Samples: 7854 
Normal: 4000 
Spam: 3854
Gogolook Confidential 
Analysis procedures 
Analysis procedures 
1. 
Collect call logs 
2. 
Compare with user tags 
3. 
Explore call behaviors 
4. 
Extract features 
5. 
Classify unknown numbers using machine learning techniques
Gogolook Confidential 
Normal numbers 
0 
5 
10 
15 
20 
Calls =195 (in 66, out 129) 
Opponents = 72 (in 21, out 58) 
★Normal numbers
Gogolook Confidential 
★Spam numbers 
Spam numbers 
0 
10 
20 
30 
Calls =471 (in 15, out 456) 
Opponents = 186 (in 11, out 183) 
XX信用卡行銷(7) 
OOO,XXXX行銷(6) 
電話行銷(3)
Gogolook Confidential 
Analysis procedures 
Analysis procedures 
1. 
Collect call logs 
2. 
Compare with user tags 
3. 
Explore call behaviors 
4. 
Extract features 
5. 
Classify unknown numbers using machine learning techniques
Gogolook Confidential 
★What is a feature? 
What is a feature? 
“Feature”is a measurable property of a phenomenon being observed.
Gogolook Confidential 
Example 
Or, we want to analyze a company, we can look at features: 
公司人數 
★Example
Gogolook Confidential 
Example 
Or, we want to analyze a company, we can look at features: 
工程師人數 
★Example
Gogolook Confidential 
Example 
Or, we want to analyze a company, we might look at features: 
公司裡面 Python工程師 的比例 
★Example
Gogolook Confidential 
Example 
Or, we want to analyze a company, we might look at features: 
公司向心力 
★Example
Gogolook Confidential 
Example 
Or, we want to analyze a company, we might look at features: 
CEO帥氣程度 
★Example
Gogolook Confidential 
Features for call patterns 
Ratio of out calls 
0.8 
0.6 
0.4 
0.2 
0.0 
Fraud 
Marketing 
Normal
Gogolook Confidential 
Features for call patterns 
Ratio of recurring opponents 
Fraud 
Marketing 
Normal 
0 
0.1 
0.2 
0.3 
0.4 
0.5 
0.6 
0.7
Gogolook Confidential 
Features for call patterns 
Ratio of missed out calls 
Fraud 
Marketing 
Normal 
0.6 
0.5 
0.4 
0.3 
0.2 
0.1 
0
Gogolook Confidential 
Features for call patterns 
Ratio of working time calls 
Fraud 
Marketing 
Normal 
0.6 
0.5 
0.4 
0.3 
0.2 
0.1 
0 
0.7
Gogolook Confidential 
Features for call patterns 
Median of call durations 
Fraud 
Marketing 
Normal 
50 
40 
30 
20 
10 
0 
60 
seconds
Gogolook Confidential 
Features for call patterns 
Ratio of out calls in contact book 
Fraud 
Marketing 
Normal 
0.10 
0 
0.25 
0.30 
0.35 
0.20 
0.15 
0.05
Gogolook Confidential 
Analysis procedures 
Analysis procedures 
1. 
Collect call logs 
2. 
Compare with user tags 
3. 
Explore call behaviors 
4. 
Extract features 
5. 
Classify unknown numbers using machine learning techniques
Gogolook Confidential 
Ratio of recurring components is less than 40% 
Ratio of out calls is more than 60% 
Ratio of in calls is less than 20% 
Then we claim the number is a spam number 
Intuitively, we can determine an unknown number by rules such as if 
★Naïve method
Gogolook Confidential 
★Problem 1 
Too many features…
Gogolook Confidential 
★Problem 2 
How to determine the rule?
Gogolook Confidential 
Machine learning 
★Solution
Gogolook Confidential 
Machine learning 
★Solution 
Let the machine learn from the data
Gogolook Confidential 
What is machine learning? 
★What is machine learning? 
機器學習是一種從過去的資料或經驗當中,構造一 個模型(Model),而學習(Learning)這件事就是讓 這個模型以程式的方式執行,等到學習到一定的程 度後,就可以做預測(猜),這個「猜」是有根據的, 且命中率高的。
Gogolook Confidential 
Machine learningtechniques for classification 
★Machine learning techniques for classification 
Support vector machine 
Logistic regression 
Decision tree 
Neural networks 
Naïve Bayes 
Nonparametric Bayesian method
Gogolook Confidential 
Support vector machine for binary classification 
★Support vector machine for binary classification
Gogolook Confidential 
Support vector machine for binary classification 
★Support vector machine for binary classification
Gogolook Confidential 
Support vector machine for binary classification 
★Support vector machine for binary classification
Gogolook Confidential 
Support vector machine for binary classification 
★Support vector machine for binary classification
Gogolook Confidential 
Support vector machine for binary classification 
★Support vector machine for binary classification
Gogolook Confidential 
Support vector machine for binary classification 
★Support vector machine for binary classification
Gogolook Confidential 
Support vector machine for binary classification 
★Support vector machine for binary classification
Gogolook Confidential 
Support vector machine for binary classification 
★Support vector machine for binary classification
Gogolook Confidential 
這樣就夠了嗎?
Gogolook Confidential 
Real-life scenario 
★Real-life scenario 
When will we require a spam number prediction? 
Ans: The time a phone call reaches a whoscalluser 
We want to predict whether a number is spam as EARLYas possible in order to prevent further victims…
Gogolook Confidential 
Real-life scenario 
Time 
#recent calls 
Victim 1 
Victim 2 
Victim 3 
XX推銷 
★Real-life scenario 
推銷電話
Gogolook Confidential 
Let’s look at the performances of SVM under different numbers of recent calls
Gogolook Confidential 
SVM for binary classification 
★SVM for binary classification 
0.8 
0.85 
0.9 
0.95 
1.0 
3 
4 
5 
6 
7 
8 
9 
10 
# recent calls 
Accuracy
Gogolook Confidential 
嗯…表現的不錯,但是… 
可以再快一點嗎?
Gogolook Confidential 
Reduce the number of features 
★Reduce the number of features 
Features computation is time-consuming. So we want to reduce the number of features before we do classification.
Gogolook Confidential 
Reduce the number of features 
★Reduce the number of features 
Features computation is time-consuming. So we want to reduce the number of features before we do classification. 
當然我們不是用手去選…
Gogolook Confidential 
Reduce the number of features 
★Reduce the number of features 
Features computation is time-consuming. So we want to reduce the number of features before we do classification. 
Feature selection methods: 
Regularization methods 
Backward, forward, and stepwise methods 
Bayesian feature selection 
Random forest method
Gogolook Confidential 
Feature selection results 
★Feature selection results 
10 
15 
20 
25 
30 
3recent calls 
5recent calls 
10 recent calls 
0.8 
0.85 
0.9 
0.95 
1.0 
# features 
Accuracy
Gogolook Confidential 
Feature selection results 
★Feature selection results 
10 
15 
20 
25 
30 
3recent calls 
5recent calls 
10 recent calls 
0.8 
0.85 
0.9 
0.95 
1.0 
# features 
Accuracy
Gogolook Confidential 
Feature selection results 
★Feature selection results 
10 
15 
20 
25 
30 
3recent calls 
5recent calls 
10 recent calls 
0.8 
0.85 
0.9 
0.95 
1.0 
# features 
Accuracy
Gogolook Confidential 
Ratio of out calls 
Rate of out calls 
Ratio of out calls in contact book 
Ratio of reciprocal opponents 
Ratio of recurring opponents 
Median call duration of in calls 
Ring duration of answered calls 
and more… 
★Selected features 
Ratio of missed calls 
Rate of new opponents 
Ratio of in calls in contact book
Gogolook Confidential 
★Comparison of w/ and w/o feature selection 
0.8 
0.85 
0.9 
0.95 
1.0 
3 
4 
5 
6 
7 
8 
9 
10 
# recent calls 
Accuracy
Gogolook Confidential 
Done? 
阿不就好棒棒?
Gogolook Confidential 
What is power? 
★What is power? 
Power of class A: The probability of accurately classify a class A sampleto class A.
Gogolook Confidential 
What is power? 
★What is power? 
Power of class A: The probability of accurately classify a class A sampleto class A. 
性別 Classifier 
97.5% this is a male
Gogolook Confidential 
What is power? 
★What is power? 
Power of class A: The probability of accurately classify a class A sampleto class A. 
性別 Classifier 
97.5% this is a male
Gogolook Confidential 
Power of our classifier 
★Power of our classifier 
0.8 
0.85 
0.9 
0.95 
1.0 
3 
4 
5 
6 
7 
8 
9 
10 
#recent calls 
Power
Gogolook Confidential 
義銘, 
加油好嗎?
Gogolook Confidential 
★Data summary 
Data summary 
推銷電話 
民調中心 
騷擾電話 
詐騙電話 
70% 
1% 
5% 
24% 
# Samples: 7854 
Normal: 4000 
Spam: 3854
Gogolook Confidential 
★Data summary 
Data summary 
推銷電話 
民調中心 
騷擾電話 
詐騙電話 
70% 
1% 
5% 
24% 
# Samples: 7854 
Normal: 4000 
Spam: 3854
Gogolook Confidential 
Marketing numbers vs. normal numbers 
★Marketing numbers vs. normal numbers 
0.8 
0.85 
0.9 
0.95 
1.0 
3 
4 
5 
6 
7 
8 
9 
10 
#recent calls 
Accuracy
Gogolook Confidential 
Fraud numbers vs. normal numbers 
★Fraud numbers vs. normal numbers 
0.8 
0.85 
0.9 
0.95 
1.0 
3 
4 
5 
6 
7 
8 
9 
10 
#recent calls 
Accuracy
Gogolook Confidential 
一種 
摻在一起做撒尿牛丸的概念…
Gogolook Confidential 
Power of SVMfor multi-classification 
★Power of SVM for multi-classification 
0.8 
0.85 
0.9 
0.95 
1.0 
3 
4 
5 
6 
7 
8 
9 
10 
#recent calls 
Power
Gogolook Confidential 
Power of SVM for binary classification 
★Power of SVM for binary classification 
0.8 
0.85 
0.9 
0.95 
1.0 
3 
4 
5 
6 
7 
8 
9 
10 
#recent calls 
Power
Gogolook Confidential 
What is type I error rate? 
★What is type I error rate? 
Type I error: The probability of misclassify a class B sampleto class A. 
性別 Classifier 
5% this is a male
Gogolook Confidential 
What is type I error rate? 
★What is type I error rate? 
Type I error: The probability of misclassify a class B sampleto class A. 
性別 Classifier 
5% this is a male
Gogolook Confidential 
Type I error comparison 
★Type I error comparison 
0 
0.05 
0.1 
0.15 
0.3 
3 
4 
5 
6 
7 
8 
9 
10 
#recent calls 
Type I error 
0.2 
0.25
Gogolook Confidential 
這點小成果讓我稍稍放鬆地去逛街,突然電 話響一聲,我開心地接了起來…
Gogolook Confidential 
結果,對方掛斷了
Gogolook Confidential 
響一聲掛斷的惡意電話 
★響一聲掛斷的惡意電話 
 
“響一聲掛斷”(one-ring call) 是一種引誘接電話 者回撥的惡意電話,通常伴隨著高額付款電話。 
 
於是我們先觀察“響一聲掛斷”這類型電話號碼 的call patterns。
Gogolook Confidential 
Call patterns of one-ring calls 
★Call patterns of one-ring calls 
Numbers 
Mean duration of ringing(seconds) 
Mean duration ofout calls (seconds) 
0982-415-XXX 
1.6 
0 
0982-420-XXX 
3.6 
0 
0982-495-XXX 
5.2 
1.25 
04-3-704-XXXX 
0.9 
0 
0923-931-XXX 
6.7 
2.6
Gogolook Confidential 
Feature comparison 
Ratio of new opponents 
Fraud 
Marketing 
Normal 
One-ring 
0 
0.2 
0.4 
0.6 
0.8
Gogolook Confidential 
Feature comparison 
Ratio of in calls 
0 
0.1 
0.2 
0.3 
0.4 
0.5 
Fraud 
Marketing 
Normal 
One-ring
Gogolook Confidential 
Feature comparison 
Ratio of missed calls 
0 
0.2 
0.4 
0.6 
0.8 
Fraud 
Marketing 
Normal 
One-ring
Gogolook Confidential 
★Naïve method 
Similarly, without machine learning we can design rules such as:
Gogolook Confidential 
★Naïve method 
Similarly, without machine learning we can design rules such as: 
Rule1: The mean of the ringing duration is less then 7 seconds. 
and 
Rule 2: The mean of the outcall duration is less than 3 seconds. 
Then we claim that it is a one-ring spam call.
Gogolook Confidential 
★Problems 
1. 
Too many features… 
2. 
How to determine the rule? 
3. 
New observations.
Gogolook Confidential 
★Problem 3 
Numbers 
Mean duration of ringing(seconds) 
Mean duration ofout calls (seconds) 
0982-415-XXX 
1.6 
0 
0982-420-XXX 
3.6 
0 
0982-495-XXX 
5.2 
1.25 
04-3-704-XXXX 
0.9 
0 
0923-931-XXX 
6.7 
2.6
Gogolook Confidential 
Numbers 
Mean duration of ringing(seconds) 
Mean duration ofout calls (seconds) 
0982-415-XXX 
1.6 
0 
0982-420-XXX 
3.6 
0 
0982-495-XXX 
5.2 
1.25 
04-3-704-XXXX 
0.9 
0 
0923-931-XXX 
6.7 
2.6 
04-2-676-XXXX 
15.7 
1.4 
★Problem 3 
New observation
Gogolook Confidential 
Numbers 
Mean duration of ringing(seconds) 
Mean duration ofout calls (seconds) 
0982-415-XXX 
1.6 
0 
0982-420-XXX 
3.6 
0 
0982-495-XXX 
5.2 
1.25 
04-3-704-XXXX 
0.9 
0 
0923-931-XXX 
6.7 
2.6 
04-2-676-XXXX 
15.7 (S.D.=10.7) 
1.4 
★Problem 3
Gogolook Confidential 
Machine learning can efficiently “learn” from new data and create rules for us.
Gogolook Confidential 
Power of SVM for multi-classification 
★Power of SVM for multi-classification 
0.8 
0.85 
0.9 
0.95 
1.0 
3 
4 
5 
6 
7 
8 
9 
10 
#recent calls 
Power
Gogolook Confidential 
Accuracy comparison 
★Accuracy comparison 
3 
4 
5 
6 
7 
8 
9 
10 
#recent calls 
0 
0.05 
0.1 
0.15 
0.3 
0.2 
0.25 
Type I error
Gogolook Confidential 
Deployment 
All the algorithms have been implemented in the whoscallapp, so how does it work?
Gogolook Confidential 
OO推銷 
小明 
Data center 
Classifier calculating… 
0984-003-XXX 
回傳:此號碼可能 為推銷電話 
所需時間: 50-100 milliseconds
Gogolook Confidential 
What’s next?
Gogolook Confidential 
Improvements of the classification model 
1. 
Fraud numbers analysis 
2. 
Fuzzy classification algorithm 
3. 
Spam-category scores 
4. 
Cooperate with more solid outside sources 
5. 
Generalize to other countries. 
Much more… 
★Improvements of the classification model
Gogolook Confidential 
Future perspectives 
1. 
User’s tag correction mechanisms 
2. 
Personalized penalty setting 
3. 
Anti-countermeasures 
4. 
Extend to SMS spam detection 
5. 
Clustering vs. user tags 
6. 
Spam detect Scam detection 
★Future perspectives
Gogolook Confidential 
Creating a contact network of trust 
感謝大家寶貴的時間

Contenu connexe

En vedette

[系列活動] 手把手教你R語言資料分析實務
[系列活動] 手把手教你R語言資料分析實務[系列活動] 手把手教你R語言資料分析實務
[系列活動] 手把手教你R語言資料分析實務台灣資料科學年會
 
[系列活動] 給工程師的統計學及資料分析 123
[系列活動] 給工程師的統計學及資料分析 123[系列活動] 給工程師的統計學及資料分析 123
[系列活動] 給工程師的統計學及資料分析 123台灣資料科學年會
 
[系列活動] 使用 R 語言建立自己的演算法交易事業
[系列活動] 使用 R 語言建立自己的演算法交易事業[系列活動] 使用 R 語言建立自己的演算法交易事業
[系列活動] 使用 R 語言建立自己的演算法交易事業台灣資料科學年會
 
資料、社群、大協作 - 零時政府的數位革命
資料、社群、大協作 - 零時政府的數位革命資料、社群、大協作 - 零時政府的數位革命
資料、社群、大協作 - 零時政府的數位革命台灣資料科學年會
 
從 2013 社群網絡活動看台灣社會發展趨勢
從 2013 社群網絡活動看台灣社會發展趨勢從 2013 社群網絡活動看台灣社會發展趨勢
從 2013 社群網絡活動看台灣社會發展趨勢台灣資料科學年會
 
讓數字說話:資料的公益責信應用
讓數字說話:資料的公益責信應用讓數字說話:資料的公益責信應用
讓數字說話:資料的公益責信應用台灣資料科學年會
 
人口統計應用於選舉預測-蔡佳泓
人口統計應用於選舉預測-蔡佳泓人口統計應用於選舉預測-蔡佳泓
人口統計應用於選舉預測-蔡佳泓台灣資料科學年會
 
劉正山/世代之爭爭什麼 ? 談談如何從調查資料挖掘出豐厚的意義
劉正山/世代之爭爭什麼 ? 談談如何從調查資料挖掘出豐厚的意義劉正山/世代之爭爭什麼 ? 談談如何從調查資料挖掘出豐厚的意義
劉正山/世代之爭爭什麼 ? 談談如何從調查資料挖掘出豐厚的意義台灣資料科學年會
 
Collaboration with Statistician? 矩陣視覺化於探索式資料分析
Collaboration with Statistician? 矩陣視覺化於探索式資料分析Collaboration with Statistician? 矩陣視覺化於探索式資料分析
Collaboration with Statistician? 矩陣視覺化於探索式資料分析台灣資料科學年會
 
莊坤達/資料科學與防疫應用的結合 : 以登革熱防治為例
莊坤達/資料科學與防疫應用的結合 : 以登革熱防治為例莊坤達/資料科學與防疫應用的結合 : 以登革熱防治為例
莊坤達/資料科學與防疫應用的結合 : 以登革熱防治為例台灣資料科學年會
 
黃從仁/心理與行為資料中的因與果
黃從仁/心理與行為資料中的因與果黃從仁/心理與行為資料中的因與果
黃從仁/心理與行為資料中的因與果台灣資料科學年會
 
巨量與開放資料之創新機會與關鍵挑戰-曾新穆
巨量與開放資料之創新機會與關鍵挑戰-曾新穆巨量與開放資料之創新機會與關鍵挑戰-曾新穆
巨量與開放資料之創新機會與關鍵挑戰-曾新穆台灣資料科學年會
 
以健保資料分析對抗健康新聞的恐慌症候群-張俊鴻
以健保資料分析對抗健康新聞的恐慌症候群-張俊鴻以健保資料分析對抗健康新聞的恐慌症候群-張俊鴻
以健保資料分析對抗健康新聞的恐慌症候群-張俊鴻台灣資料科學年會
 
顏汝芳/從薪酬制度讀 CEO 的行為心理學
顏汝芳/從薪酬制度讀 CEO 的行為心理學顏汝芳/從薪酬制度讀 CEO 的行為心理學
顏汝芳/從薪酬制度讀 CEO 的行為心理學台灣資料科學年會
 
軟工人的資料科學奇航-線上遊戲、網路學習與中華職棒 by 許懷中
軟工人的資料科學奇航-線上遊戲、網路學習與中華職棒 by 許懷中軟工人的資料科學奇航-線上遊戲、網路學習與中華職棒 by 許懷中
軟工人的資料科學奇航-線上遊戲、網路學習與中華職棒 by 許懷中台灣資料科學年會
 
周世恩/資料分析前的奏曲 : 談資料收集的挑戰
周世恩/資料分析前的奏曲 : 談資料收集的挑戰周世恩/資料分析前的奏曲 : 談資料收集的挑戰
周世恩/資料分析前的奏曲 : 談資料收集的挑戰台灣資料科學年會
 
天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統
天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統
天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統台灣資料科學年會
 
林煜軒…œ/從手機解讀行為與心理
林煜軒…œ/從手機解讀行為與心理林煜軒…œ/從手機解讀行為與心理
林煜軒…œ/從手機解讀行為與心理台灣資料科學年會
 
開場致詞 -- 2014 台灣資料科學愛好者年會
開場致詞 -- 2014 台灣資料科學愛好者年會開場致詞 -- 2014 台灣資料科學愛好者年會
開場致詞 -- 2014 台灣資料科學愛好者年會台灣資料科學年會
 
陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰台灣資料科學年會
 

En vedette (20)

[系列活動] 手把手教你R語言資料分析實務
[系列活動] 手把手教你R語言資料分析實務[系列活動] 手把手教你R語言資料分析實務
[系列活動] 手把手教你R語言資料分析實務
 
[系列活動] 給工程師的統計學及資料分析 123
[系列活動] 給工程師的統計學及資料分析 123[系列活動] 給工程師的統計學及資料分析 123
[系列活動] 給工程師的統計學及資料分析 123
 
[系列活動] 使用 R 語言建立自己的演算法交易事業
[系列活動] 使用 R 語言建立自己的演算法交易事業[系列活動] 使用 R 語言建立自己的演算法交易事業
[系列活動] 使用 R 語言建立自己的演算法交易事業
 
資料、社群、大協作 - 零時政府的數位革命
資料、社群、大協作 - 零時政府的數位革命資料、社群、大協作 - 零時政府的數位革命
資料、社群、大協作 - 零時政府的數位革命
 
從 2013 社群網絡活動看台灣社會發展趨勢
從 2013 社群網絡活動看台灣社會發展趨勢從 2013 社群網絡活動看台灣社會發展趨勢
從 2013 社群網絡活動看台灣社會發展趨勢
 
讓數字說話:資料的公益責信應用
讓數字說話:資料的公益責信應用讓數字說話:資料的公益責信應用
讓數字說話:資料的公益責信應用
 
人口統計應用於選舉預測-蔡佳泓
人口統計應用於選舉預測-蔡佳泓人口統計應用於選舉預測-蔡佳泓
人口統計應用於選舉預測-蔡佳泓
 
劉正山/世代之爭爭什麼 ? 談談如何從調查資料挖掘出豐厚的意義
劉正山/世代之爭爭什麼 ? 談談如何從調查資料挖掘出豐厚的意義劉正山/世代之爭爭什麼 ? 談談如何從調查資料挖掘出豐厚的意義
劉正山/世代之爭爭什麼 ? 談談如何從調查資料挖掘出豐厚的意義
 
Collaboration with Statistician? 矩陣視覺化於探索式資料分析
Collaboration with Statistician? 矩陣視覺化於探索式資料分析Collaboration with Statistician? 矩陣視覺化於探索式資料分析
Collaboration with Statistician? 矩陣視覺化於探索式資料分析
 
莊坤達/資料科學與防疫應用的結合 : 以登革熱防治為例
莊坤達/資料科學與防疫應用的結合 : 以登革熱防治為例莊坤達/資料科學與防疫應用的結合 : 以登革熱防治為例
莊坤達/資料科學與防疫應用的結合 : 以登革熱防治為例
 
黃從仁/心理與行為資料中的因與果
黃從仁/心理與行為資料中的因與果黃從仁/心理與行為資料中的因與果
黃從仁/心理與行為資料中的因與果
 
巨量與開放資料之創新機會與關鍵挑戰-曾新穆
巨量與開放資料之創新機會與關鍵挑戰-曾新穆巨量與開放資料之創新機會與關鍵挑戰-曾新穆
巨量與開放資料之創新機會與關鍵挑戰-曾新穆
 
以健保資料分析對抗健康新聞的恐慌症候群-張俊鴻
以健保資料分析對抗健康新聞的恐慌症候群-張俊鴻以健保資料分析對抗健康新聞的恐慌症候群-張俊鴻
以健保資料分析對抗健康新聞的恐慌症候群-張俊鴻
 
顏汝芳/從薪酬制度讀 CEO 的行為心理學
顏汝芳/從薪酬制度讀 CEO 的行為心理學顏汝芳/從薪酬制度讀 CEO 的行為心理學
顏汝芳/從薪酬制度讀 CEO 的行為心理學
 
軟工人的資料科學奇航-線上遊戲、網路學習與中華職棒 by 許懷中
軟工人的資料科學奇航-線上遊戲、網路學習與中華職棒 by 許懷中軟工人的資料科學奇航-線上遊戲、網路學習與中華職棒 by 許懷中
軟工人的資料科學奇航-線上遊戲、網路學習與中華職棒 by 許懷中
 
周世恩/資料分析前的奏曲 : 談資料收集的挑戰
周世恩/資料分析前的奏曲 : 談資料收集的挑戰周世恩/資料分析前的奏曲 : 談資料收集的挑戰
周世恩/資料分析前的奏曲 : 談資料收集的挑戰
 
天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統
天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統
天下武功唯快不破:利用串流資料實做出即時分類器和即時推薦系統
 
林煜軒…œ/從手機解讀行為與心理
林煜軒…œ/從手機解讀行為與心理林煜軒…œ/從手機解讀行為與心理
林煜軒…œ/從手機解讀行為與心理
 
開場致詞 -- 2014 台灣資料科學愛好者年會
開場致詞 -- 2014 台灣資料科學愛好者年會開場致詞 -- 2014 台灣資料科學愛好者年會
開場致詞 -- 2014 台灣資料科學愛好者年會
 
陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰陸永祥/全球網路攝影機帶來的機會與挑戰
陸永祥/全球網路攝影機帶來的機會與挑戰
 

Similaire à 資料科學在 Whoscall 產品體系中的角色

Achieving Revenue Growth With AI: Best Practices And Strategies
Achieving Revenue Growth With AI: Best Practices And StrategiesAchieving Revenue Growth With AI: Best Practices And Strategies
Achieving Revenue Growth With AI: Best Practices And Strategiesiovox
 
Whoscall 的 Realtime Monitoring 經驗分享
Whoscall 的 Realtime Monitoring 經驗分享Whoscall 的 Realtime Monitoring 經驗分享
Whoscall 的 Realtime Monitoring 經驗分享William Yeh
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaSteve Poole
 
What Can You Do With Twilio
What Can You Do With TwilioWhat Can You Do With Twilio
What Can You Do With TwilioTwilio Inc
 
The New 411: Transforming your Marketing with Rich Caller Insights
The New 411: Transforming your Marketing with Rich Caller InsightsThe New 411: Transforming your Marketing with Rich Caller Insights
The New 411: Transforming your Marketing with Rich Caller InsightsInvoca
 
Edmonton Google Partners Event Recap - Adster Creative
Edmonton Google Partners Event Recap - Adster CreativeEdmonton Google Partners Event Recap - Adster Creative
Edmonton Google Partners Event Recap - Adster CreativeDavid Forster
 
Conversionista : Conversion manager course - Stockholm 20 march 2013
Conversionista : Conversion manager course  - Stockholm 20 march 2013Conversionista : Conversion manager course  - Stockholm 20 march 2013
Conversionista : Conversion manager course - Stockholm 20 march 2013Craig Sullivan
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developerSteve Poole
 
Track it easy
Track it easyTrack it easy
Track it easyMishkins
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!AVG Technologies AU
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO Alliance
 
Understanding The Impact Of Robocall Spam On Business With Faisal Abidi
Understanding The Impact Of Robocall Spam On Business With Faisal AbidiUnderstanding The Impact Of Robocall Spam On Business With Faisal Abidi
Understanding The Impact Of Robocall Spam On Business With Faisal AbidiFaisal Abidi
 
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UImozilla.presentations
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleJarrod Overson
 
Block numbers on any i phone simple process
Block numbers on any i phone simple processBlock numbers on any i phone simple process
Block numbers on any i phone simple processsagar_raj
 
brighton final.pptx
brighton final.pptxbrighton final.pptx
brighton final.pptxssuser152aeb
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdfRavi Aggarwal
 

Similaire à 資料科學在 Whoscall 產品體系中的角色 (20)

Achieving Revenue Growth With AI: Best Practices And Strategies
Achieving Revenue Growth With AI: Best Practices And StrategiesAchieving Revenue Growth With AI: Best Practices And Strategies
Achieving Revenue Growth With AI: Best Practices And Strategies
 
Whoscall 的 Realtime Monitoring 經驗分享
Whoscall 的 Realtime Monitoring 經驗分享Whoscall 的 Realtime Monitoring 經驗分享
Whoscall 的 Realtime Monitoring 經驗分享
 
Cybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 SofiaCybercrime and the Developer Java2Days 2016 Sofia
Cybercrime and the Developer Java2Days 2016 Sofia
 
What Can You Do With Twilio
What Can You Do With TwilioWhat Can You Do With Twilio
What Can You Do With Twilio
 
The New 411: Transforming your Marketing with Rich Caller Insights
The New 411: Transforming your Marketing with Rich Caller InsightsThe New 411: Transforming your Marketing with Rich Caller Insights
The New 411: Transforming your Marketing with Rich Caller Insights
 
Edmonton Google Partners Event Recap - Adster Creative
Edmonton Google Partners Event Recap - Adster CreativeEdmonton Google Partners Event Recap - Adster Creative
Edmonton Google Partners Event Recap - Adster Creative
 
Conversionista : Conversion manager course - Stockholm 20 march 2013
Conversionista : Conversion manager course  - Stockholm 20 march 2013Conversionista : Conversion manager course  - Stockholm 20 march 2013
Conversionista : Conversion manager course - Stockholm 20 march 2013
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Track it easy
Track it easyTrack it easy
Track it easy
 
How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!How I'd hack into your business and how you can stop me!
How I'd hack into your business and how you can stop me!
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
 
In 5 steps to successful trademark watching
In 5 steps to successful trademark watchingIn 5 steps to successful trademark watching
In 5 steps to successful trademark watching
 
How Savvy PPC Advertisers Generate Phone Call Leads [Webinar]
How Savvy PPC Advertisers Generate Phone Call Leads [Webinar]How Savvy PPC Advertisers Generate Phone Call Leads [Webinar]
How Savvy PPC Advertisers Generate Phone Call Leads [Webinar]
 
Understanding The Impact Of Robocall Spam On Business With Faisal Abidi
Understanding The Impact Of Robocall Spam On Business With Faisal AbidiUnderstanding The Impact Of Robocall Spam On Business With Faisal Abidi
Understanding The Impact Of Robocall Spam On Business With Faisal Abidi
 
BSides LA/PDX
BSides LA/PDXBSides LA/PDX
BSides LA/PDX
 
Beyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UIBeyond The Padlock: New Ideas in Browser Security UI
Beyond The Padlock: New Ideas in Browser Security UI
 
The life of breached data and the attack lifecycle
The life of breached data and the attack lifecycleThe life of breached data and the attack lifecycle
The life of breached data and the attack lifecycle
 
Block numbers on any i phone simple process
Block numbers on any i phone simple processBlock numbers on any i phone simple process
Block numbers on any i phone simple process
 
brighton final.pptx
brighton final.pptxbrighton final.pptx
brighton final.pptx
 
iOS Application Security.pdf
iOS Application Security.pdfiOS Application Security.pdf
iOS Application Security.pdf
 

Plus de 台灣資料科學年會

[台灣人工智慧學校] 人工智慧技術發展與應用
[台灣人工智慧學校] 人工智慧技術發展與應用[台灣人工智慧學校] 人工智慧技術發展與應用
[台灣人工智慧學校] 人工智慧技術發展與應用台灣資料科學年會
 
[台灣人工智慧學校] 執行長報告
[台灣人工智慧學校] 執行長報告[台灣人工智慧學校] 執行長報告
[台灣人工智慧學校] 執行長報告台灣資料科學年會
 
[台灣人工智慧學校] 工業 4.0 與智慧製造的發展趨勢與挑戰
[台灣人工智慧學校] 工業 4.0 與智慧製造的發展趨勢與挑戰[台灣人工智慧學校] 工業 4.0 與智慧製造的發展趨勢與挑戰
[台灣人工智慧學校] 工業 4.0 與智慧製造的發展趨勢與挑戰台灣資料科學年會
 
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機台灣資料科學年會
 
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機台灣資料科學年會
 
[台灣人工智慧學校] 台北總校第三期結業典禮 - 執行長談話
[台灣人工智慧學校] 台北總校第三期結業典禮 - 執行長談話[台灣人工智慧學校] 台北總校第三期結業典禮 - 執行長談話
[台灣人工智慧學校] 台北總校第三期結業典禮 - 執行長談話台灣資料科學年會
 
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇台灣資料科學年會
 
[TOxAIA台中分校] 2019 台灣數位轉型 與產業升級趨勢觀察
[TOxAIA台中分校] 2019 台灣數位轉型 與產業升級趨勢觀察 [TOxAIA台中分校] 2019 台灣數位轉型 與產業升級趨勢觀察
[TOxAIA台中分校] 2019 台灣數位轉型 與產業升級趨勢觀察 台灣資料科學年會
 
[TOxAIA台中分校] 智慧製造成真! 產線導入AI的致勝關鍵
[TOxAIA台中分校] 智慧製造成真! 產線導入AI的致勝關鍵[TOxAIA台中分校] 智慧製造成真! 產線導入AI的致勝關鍵
[TOxAIA台中分校] 智慧製造成真! 產線導入AI的致勝關鍵台灣資料科學年會
 
[台灣人工智慧學校] 從經濟學看人工智慧產業應用
[台灣人工智慧學校] 從經濟學看人工智慧產業應用[台灣人工智慧學校] 從經濟學看人工智慧產業應用
[台灣人工智慧學校] 從經濟學看人工智慧產業應用台灣資料科學年會
 
[台灣人工智慧學校] 台中分校第二期開學典禮 - 執行長報告
[台灣人工智慧學校] 台中分校第二期開學典禮 - 執行長報告[台灣人工智慧學校] 台中分校第二期開學典禮 - 執行長報告
[台灣人工智慧學校] 台中分校第二期開學典禮 - 執行長報告台灣資料科學年會
 
[台中分校] 第一期結業典禮 - 執行長談話
[台中分校] 第一期結業典禮 - 執行長談話[台中分校] 第一期結業典禮 - 執行長談話
[台中分校] 第一期結業典禮 - 執行長談話台灣資料科學年會
 
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人台灣資料科學年會
 
[TOxAIA新竹分校] AI整合是重點! 竹科的關鍵轉型思維
[TOxAIA新竹分校] AI整合是重點! 竹科的關鍵轉型思維[TOxAIA新竹分校] AI整合是重點! 竹科的關鍵轉型思維
[TOxAIA新竹分校] AI整合是重點! 竹科的關鍵轉型思維台灣資料科學年會
 
[TOxAIA新竹分校] 2019 台灣數位轉型與產業升級趨勢觀察
[TOxAIA新竹分校] 2019 台灣數位轉型與產業升級趨勢觀察[TOxAIA新竹分校] 2019 台灣數位轉型與產業升級趨勢觀察
[TOxAIA新竹分校] 2019 台灣數位轉型與產業升級趨勢觀察台灣資料科學年會
 
[TOxAIA新竹分校] 深度學習與Kaggle實戰
[TOxAIA新竹分校] 深度學習與Kaggle實戰[TOxAIA新竹分校] 深度學習與Kaggle實戰
[TOxAIA新竹分校] 深度學習與Kaggle實戰台灣資料科學年會
 
[台灣人工智慧學校] Bridging AI to Precision Agriculture through IoT
[台灣人工智慧學校] Bridging AI to Precision Agriculture through IoT[台灣人工智慧學校] Bridging AI to Precision Agriculture through IoT
[台灣人工智慧學校] Bridging AI to Precision Agriculture through IoT台灣資料科學年會
 
[2018 台灣人工智慧學校校友年會] 產業經驗分享: 如何用最少的訓練樣本,得到最好的深度學習影像分析結果,減少一半人力,提升一倍品質 / 李明達
[2018 台灣人工智慧學校校友年會] 產業經驗分享: 如何用最少的訓練樣本,得到最好的深度學習影像分析結果,減少一半人力,提升一倍品質 / 李明達[2018 台灣人工智慧學校校友年會] 產業經驗分享: 如何用最少的訓練樣本,得到最好的深度學習影像分析結果,減少一半人力,提升一倍品質 / 李明達
[2018 台灣人工智慧學校校友年會] 產業經驗分享: 如何用最少的訓練樣本,得到最好的深度學習影像分析結果,減少一半人力,提升一倍品質 / 李明達台灣資料科學年會
 
[2018 台灣人工智慧學校校友年會] 啟動物聯網新關鍵 - 未來由你「喚」醒 / 沈品勳
[2018 台灣人工智慧學校校友年會] 啟動物聯網新關鍵 - 未來由你「喚」醒 / 沈品勳[2018 台灣人工智慧學校校友年會] 啟動物聯網新關鍵 - 未來由你「喚」醒 / 沈品勳
[2018 台灣人工智慧學校校友年會] 啟動物聯網新關鍵 - 未來由你「喚」醒 / 沈品勳台灣資料科學年會
 

Plus de 台灣資料科學年會 (20)

[台灣人工智慧學校] 人工智慧技術發展與應用
[台灣人工智慧學校] 人工智慧技術發展與應用[台灣人工智慧學校] 人工智慧技術發展與應用
[台灣人工智慧學校] 人工智慧技術發展與應用
 
[台灣人工智慧學校] 執行長報告
[台灣人工智慧學校] 執行長報告[台灣人工智慧學校] 執行長報告
[台灣人工智慧學校] 執行長報告
 
[台灣人工智慧學校] 工業 4.0 與智慧製造的發展趨勢與挑戰
[台灣人工智慧學校] 工業 4.0 與智慧製造的發展趨勢與挑戰[台灣人工智慧學校] 工業 4.0 與智慧製造的發展趨勢與挑戰
[台灣人工智慧學校] 工業 4.0 與智慧製造的發展趨勢與挑戰
 
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
 
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
[台灣人工智慧學校] 開創台灣產業智慧轉型的新契機
 
[台灣人工智慧學校] 台北總校第三期結業典禮 - 執行長談話
[台灣人工智慧學校] 台北總校第三期結業典禮 - 執行長談話[台灣人工智慧學校] 台北總校第三期結業典禮 - 執行長談話
[台灣人工智慧學校] 台北總校第三期結業典禮 - 執行長談話
 
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
[TOxAIA台中分校] AI 引爆新工業革命,智慧機械首都台中轉型論壇
 
[TOxAIA台中分校] 2019 台灣數位轉型 與產業升級趨勢觀察
[TOxAIA台中分校] 2019 台灣數位轉型 與產業升級趨勢觀察 [TOxAIA台中分校] 2019 台灣數位轉型 與產業升級趨勢觀察
[TOxAIA台中分校] 2019 台灣數位轉型 與產業升級趨勢觀察
 
[TOxAIA台中分校] 智慧製造成真! 產線導入AI的致勝關鍵
[TOxAIA台中分校] 智慧製造成真! 產線導入AI的致勝關鍵[TOxAIA台中分校] 智慧製造成真! 產線導入AI的致勝關鍵
[TOxAIA台中分校] 智慧製造成真! 產線導入AI的致勝關鍵
 
[台灣人工智慧學校] 從經濟學看人工智慧產業應用
[台灣人工智慧學校] 從經濟學看人工智慧產業應用[台灣人工智慧學校] 從經濟學看人工智慧產業應用
[台灣人工智慧學校] 從經濟學看人工智慧產業應用
 
[台灣人工智慧學校] 台中分校第二期開學典禮 - 執行長報告
[台灣人工智慧學校] 台中分校第二期開學典禮 - 執行長報告[台灣人工智慧學校] 台中分校第二期開學典禮 - 執行長報告
[台灣人工智慧學校] 台中分校第二期開學典禮 - 執行長報告
 
台灣人工智慧學校成果發表會
台灣人工智慧學校成果發表會台灣人工智慧學校成果發表會
台灣人工智慧學校成果發表會
 
[台中分校] 第一期結業典禮 - 執行長談話
[台中分校] 第一期結業典禮 - 執行長談話[台中分校] 第一期結業典禮 - 執行長談話
[台中分校] 第一期結業典禮 - 執行長談話
 
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
[TOxAIA新竹分校] 工業4.0潛力新應用! 多模式對話機器人
 
[TOxAIA新竹分校] AI整合是重點! 竹科的關鍵轉型思維
[TOxAIA新竹分校] AI整合是重點! 竹科的關鍵轉型思維[TOxAIA新竹分校] AI整合是重點! 竹科的關鍵轉型思維
[TOxAIA新竹分校] AI整合是重點! 竹科的關鍵轉型思維
 
[TOxAIA新竹分校] 2019 台灣數位轉型與產業升級趨勢觀察
[TOxAIA新竹分校] 2019 台灣數位轉型與產業升級趨勢觀察[TOxAIA新竹分校] 2019 台灣數位轉型與產業升級趨勢觀察
[TOxAIA新竹分校] 2019 台灣數位轉型與產業升級趨勢觀察
 
[TOxAIA新竹分校] 深度學習與Kaggle實戰
[TOxAIA新竹分校] 深度學習與Kaggle實戰[TOxAIA新竹分校] 深度學習與Kaggle實戰
[TOxAIA新竹分校] 深度學習與Kaggle實戰
 
[台灣人工智慧學校] Bridging AI to Precision Agriculture through IoT
[台灣人工智慧學校] Bridging AI to Precision Agriculture through IoT[台灣人工智慧學校] Bridging AI to Precision Agriculture through IoT
[台灣人工智慧學校] Bridging AI to Precision Agriculture through IoT
 
[2018 台灣人工智慧學校校友年會] 產業經驗分享: 如何用最少的訓練樣本,得到最好的深度學習影像分析結果,減少一半人力,提升一倍品質 / 李明達
[2018 台灣人工智慧學校校友年會] 產業經驗分享: 如何用最少的訓練樣本,得到最好的深度學習影像分析結果,減少一半人力,提升一倍品質 / 李明達[2018 台灣人工智慧學校校友年會] 產業經驗分享: 如何用最少的訓練樣本,得到最好的深度學習影像分析結果,減少一半人力,提升一倍品質 / 李明達
[2018 台灣人工智慧學校校友年會] 產業經驗分享: 如何用最少的訓練樣本,得到最好的深度學習影像分析結果,減少一半人力,提升一倍品質 / 李明達
 
[2018 台灣人工智慧學校校友年會] 啟動物聯網新關鍵 - 未來由你「喚」醒 / 沈品勳
[2018 台灣人工智慧學校校友年會] 啟動物聯網新關鍵 - 未來由你「喚」醒 / 沈品勳[2018 台灣人工智慧學校校友年會] 啟動物聯網新關鍵 - 未來由你「喚」醒 / 沈品勳
[2018 台灣人工智慧學校校友年會] 啟動物聯網新關鍵 - 未來由你「喚」醒 / 沈品勳
 

Dernier

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

資料科學在 Whoscall 產品體系中的角色