SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
Fares S. Al-Qunaieer
Engineering Consultant in Artificial Intelligence at SITE | Google
Developer Expert (GDE) in Machine Learning
7 September 2020
AI is a field in
Computer Science
that concerns on
developing
algorithms that
mimic human
intelligence
Artificial Intelligence
Problem Solving
Perception
Natural Language
Processing
Planning Knowledge
Representation
Machine LearningReasoning
Input Consume Compute
request
response
Data transmission
Data transmission
Latency (Performance)
Data transmission
Latency (Performance)
Scalability
Data transmission
Latency (Performance)
Scalability
User Experience
Data transmission
Latency (Performance)
ScalabilityPrivacy Concerns
User Experience
Data transmission
Latency (Performance)
Scalability
Security Risks
Privacy Concerns
User Experience
• Performing the computation locally
• Distribute the computation across the network
• Perform computations close to the data source
• Security and surveillance
• Removing Personally Identifiable Information (PII)
• Image quality check
• Autonomous cars
• Predictive maintenance
• Medical monitoring devices
Data transmission
Latency (Performance)
Scalability
Security Risks
Privacy Concerns
User Experience
Input Consume/Compute
Algorithms Hardware Capturing
Algorithms Hardware Capturing
Small networks
QuantizationSmall networks
Quantization PruningSmall networks
Image source: https://towardsdatascience.com/pruning-deep-neural-network-56cae1ec5505
Quantization Pruning
Knowledge Distillation
Small networks
Image source: https://nervanasystems.github.io/distiller/knowledge_distillation.html
Quantization Pruning
Knowledge Distillation
Small networks
Distributed Deep Neural
Networks (DDNN)
Image source: Machine Learning at the Network Edge: A Survey, M.G. Sarwar Murshed et. al, 2019
Federated and split learning
Quantization Pruning
Knowledge Distillation
Small networks
Distributed Deep Neural
Networks (DDNN)
Federated and split learning
Quantization Pruning
Knowledge Distillation
Small networks
Distributed Deep Neural
Networks (DDNN)
Image source: https://proandroiddev.com/federated-learning-e79e054c33ef
Image source: https://splitlearning.github.io
Algorithms Hardware Capturing
Graphics Processing
Unit (GPU)
Video source: https://www.youtube.com/watch?v=-P28LKWTzrI
Graphics Processing
Unit (GPU)
AI Accelerators
Graphics Processing
Unit (GPU)
Tensor Processing
Unit (TPU)
AI Accelerators
Graphics Processing
Unit (GPU)
Tensor Processing
Unit (TPU)
AI Accelerators
Field Programmable
Gate Array (FPGA)
Graphics Processing
Unit (GPU)
Tensor Processing
Unit (TPU)
AI Accelerators
Field Programmable
Gate Array (FPGA)
Application Specific
Integrated Circuit (ASIC)
Algorithms Hardware Capturing
Embedded Sensors
Embedded Sensors
Text / Speech / Images
Embedded Sensors
Text / Speech / Images
Event Cameras
Fares S. Al-Qunaieer
Website: www.qunaieer.com
Twitter: @qunaieer
LinkedIn: https://www.linkedin.com/in/qunaieer

Contenu connexe

Tendances

Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthrcnossen
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSIJNSA Journal
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...YogeshIJTSRD
 
Impactof IT
Impactof ITImpactof IT
Impactof ITPIREH
 
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915Economic Strategy Institute
 
The Internet of Things, Productivity, and Employment
The Internet of Things, Productivity, and Employment The Internet of Things, Productivity, and Employment
The Internet of Things, Productivity, and Employment Alex Krause
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...PacificResearchPlatform
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...IJECEIAES
 
Information technology ppt
Information technology pptInformation technology ppt
Information technology pptAkhilesh Verma
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensicsijtsrd
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityYogeshIJTSRD
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Managing Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDManaging Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDPacificResearchPlatform
 

Tendances (20)

Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
 
Impactof IT
Impactof ITImpactof IT
Impactof IT
 
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
 
The Internet of Things, Productivity, and Employment
The Internet of Things, Productivity, and Employment The Internet of Things, Productivity, and Employment
The Internet of Things, Productivity, and Employment
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Information technology ppt
Information technology pptInformation technology ppt
Information technology ppt
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Managing Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDManaging Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhD
 

Similaire à AI Edge Computing Techniques

Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...Enterprise Wired
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioBill Wong
 
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE
 
Architecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsArchitecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsDell World
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with IntelAmazon Web Services
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...owaspindia
 
Mobile Enterprise Dashboards by RapidValue Solutions
Mobile Enterprise Dashboards by RapidValue SolutionsMobile Enterprise Dashboards by RapidValue Solutions
Mobile Enterprise Dashboards by RapidValue SolutionsRapidValue
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...ijscai
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewAlert Logic
 
Getting started with IoT
Getting started with IoTGetting started with IoT
Getting started with IoTCodit
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidiszakmackraken
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...Chris Andrews
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)AnandSRao1962
 

Similaire à AI Edge Computing Techniques (20)

Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western Ontario
 
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
 
Architecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsArchitecting the Enterprise Internet of Things
Architecting the Enterprise Internet of Things
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with Intel
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 
Mobile Enterprise Dashboards by RapidValue Solutions
Mobile Enterprise Dashboards by RapidValue SolutionsMobile Enterprise Dashboards by RapidValue Solutions
Mobile Enterprise Dashboards by RapidValue Solutions
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Getting started with IoT
Getting started with IoTGetting started with IoT
Getting started with IoT
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)
 

Plus de Fares Al-Qunaieer

Deep convolutional neural networks and their many uses for computer vision
Deep convolutional neural networks and their many uses for computer visionDeep convolutional neural networks and their many uses for computer vision
Deep convolutional neural networks and their many uses for computer visionFares Al-Qunaieer
 
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟Fares Al-Qunaieer
 
التحليل التنبؤي للتقنيات التشغيلية
التحليل التنبؤي للتقنيات التشغيليةالتحليل التنبؤي للتقنيات التشغيلية
التحليل التنبؤي للتقنيات التشغيليةFares Al-Qunaieer
 
البيانات واستخدامها في القطاع غير الربحي السعودي
البيانات واستخدامها في القطاع غير الربحي السعوديالبيانات واستخدامها في القطاع غير الربحي السعودي
البيانات واستخدامها في القطاع غير الربحي السعوديFares Al-Qunaieer
 
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداًالذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداًFares Al-Qunaieer
 
تحليل بيانات شبكات التواصل الاجتماعي
تحليل بيانات شبكات التواصل الاجتماعيتحليل بيانات شبكات التواصل الاجتماعي
تحليل بيانات شبكات التواصل الاجتماعيFares Al-Qunaieer
 
التعرف على الأشخاص عن طريق القزحية
التعرف على الأشخاص عن طريق القزحيةالتعرف على الأشخاص عن طريق القزحية
التعرف على الأشخاص عن طريق القزحيةFares Al-Qunaieer
 
برنامج مقترح لتعلم (تعلم الآلة)
برنامج مقترح لتعلم (تعلم الآلة)برنامج مقترح لتعلم (تعلم الآلة)
برنامج مقترح لتعلم (تعلم الآلة)Fares Al-Qunaieer
 
نصائح لتطبيق تعلم الآلة
نصائح لتطبيق تعلم الآلةنصائح لتطبيق تعلم الآلة
نصائح لتطبيق تعلم الآلةFares Al-Qunaieer
 
مدخل إلى تعلم الآلة
مدخل إلى تعلم الآلةمدخل إلى تعلم الآلة
مدخل إلى تعلم الآلةFares Al-Qunaieer
 
معالجة وتحليل البيانات نظرة شاملة
معالجة وتحليل البيانات   نظرة شاملةمعالجة وتحليل البيانات   نظرة شاملة
معالجة وتحليل البيانات نظرة شاملةFares Al-Qunaieer
 

Plus de Fares Al-Qunaieer (12)

Deep convolutional neural networks and their many uses for computer vision
Deep convolutional neural networks and their many uses for computer visionDeep convolutional neural networks and their many uses for computer vision
Deep convolutional neural networks and their many uses for computer vision
 
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
 
التحليل التنبؤي للتقنيات التشغيلية
التحليل التنبؤي للتقنيات التشغيليةالتحليل التنبؤي للتقنيات التشغيلية
التحليل التنبؤي للتقنيات التشغيلية
 
البيانات واستخدامها في القطاع غير الربحي السعودي
البيانات واستخدامها في القطاع غير الربحي السعوديالبيانات واستخدامها في القطاع غير الربحي السعودي
البيانات واستخدامها في القطاع غير الربحي السعودي
 
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداًالذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
 
تنقيب البيانات
تنقيب البياناتتنقيب البيانات
تنقيب البيانات
 
تحليل بيانات شبكات التواصل الاجتماعي
تحليل بيانات شبكات التواصل الاجتماعيتحليل بيانات شبكات التواصل الاجتماعي
تحليل بيانات شبكات التواصل الاجتماعي
 
التعرف على الأشخاص عن طريق القزحية
التعرف على الأشخاص عن طريق القزحيةالتعرف على الأشخاص عن طريق القزحية
التعرف على الأشخاص عن طريق القزحية
 
برنامج مقترح لتعلم (تعلم الآلة)
برنامج مقترح لتعلم (تعلم الآلة)برنامج مقترح لتعلم (تعلم الآلة)
برنامج مقترح لتعلم (تعلم الآلة)
 
نصائح لتطبيق تعلم الآلة
نصائح لتطبيق تعلم الآلةنصائح لتطبيق تعلم الآلة
نصائح لتطبيق تعلم الآلة
 
مدخل إلى تعلم الآلة
مدخل إلى تعلم الآلةمدخل إلى تعلم الآلة
مدخل إلى تعلم الآلة
 
معالجة وتحليل البيانات نظرة شاملة
معالجة وتحليل البيانات   نظرة شاملةمعالجة وتحليل البيانات   نظرة شاملة
معالجة وتحليل البيانات نظرة شاملة
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

AI Edge Computing Techniques