SlideShare a Scribd company logo
Fares S. Al-Qunaieer
Engineering Consultant in Artificial Intelligence at SITE | Google
Developer Expert (GDE) in Machine Learning
7 September 2020
AI is a field in
Computer Science
that concerns on
developing
algorithms that
mimic human
intelligence
Artificial Intelligence
Problem Solving
Perception
Natural Language
Processing
Planning Knowledge
Representation
Machine LearningReasoning
Input Consume Compute
request
response
Data transmission
Data transmission
Latency (Performance)
Data transmission
Latency (Performance)
Scalability
Data transmission
Latency (Performance)
Scalability
User Experience
Data transmission
Latency (Performance)
ScalabilityPrivacy Concerns
User Experience
Data transmission
Latency (Performance)
Scalability
Security Risks
Privacy Concerns
User Experience
• Performing the computation locally
• Distribute the computation across the network
• Perform computations close to the data source
• Security and surveillance
• Removing Personally Identifiable Information (PII)
• Image quality check
• Autonomous cars
• Predictive maintenance
• Medical monitoring devices
Data transmission
Latency (Performance)
Scalability
Security Risks
Privacy Concerns
User Experience
Input Consume/Compute
Algorithms Hardware Capturing
Algorithms Hardware Capturing
Small networks
QuantizationSmall networks
Quantization PruningSmall networks
Image source: https://towardsdatascience.com/pruning-deep-neural-network-56cae1ec5505
Quantization Pruning
Knowledge Distillation
Small networks
Image source: https://nervanasystems.github.io/distiller/knowledge_distillation.html
Quantization Pruning
Knowledge Distillation
Small networks
Distributed Deep Neural
Networks (DDNN)
Image source: Machine Learning at the Network Edge: A Survey, M.G. Sarwar Murshed et. al, 2019
Federated and split learning
Quantization Pruning
Knowledge Distillation
Small networks
Distributed Deep Neural
Networks (DDNN)
Federated and split learning
Quantization Pruning
Knowledge Distillation
Small networks
Distributed Deep Neural
Networks (DDNN)
Image source: https://proandroiddev.com/federated-learning-e79e054c33ef
Image source: https://splitlearning.github.io
Algorithms Hardware Capturing
Graphics Processing
Unit (GPU)
Video source: https://www.youtube.com/watch?v=-P28LKWTzrI
Graphics Processing
Unit (GPU)
AI Accelerators
Graphics Processing
Unit (GPU)
Tensor Processing
Unit (TPU)
AI Accelerators
Graphics Processing
Unit (GPU)
Tensor Processing
Unit (TPU)
AI Accelerators
Field Programmable
Gate Array (FPGA)
Graphics Processing
Unit (GPU)
Tensor Processing
Unit (TPU)
AI Accelerators
Field Programmable
Gate Array (FPGA)
Application Specific
Integrated Circuit (ASIC)
Algorithms Hardware Capturing
Embedded Sensors
Embedded Sensors
Text / Speech / Images
Embedded Sensors
Text / Speech / Images
Event Cameras
Fares S. Al-Qunaieer
Website: www.qunaieer.com
Twitter: @qunaieer
LinkedIn: https://www.linkedin.com/in/qunaieer

More Related Content

What's hot

Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
rcnossen
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
CSCJournals
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
IJNSA Journal
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Damir Delija
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET Journal
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
YogeshIJTSRD
 
Impactof IT
Impactof ITImpactof IT
Impactof IT
PIREH
 
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915Economic Strategy Institute
 
The Internet of Things, Productivity, and Employment
The Internet of Things, Productivity, and Employment The Internet of Things, Productivity, and Employment
The Internet of Things, Productivity, and Employment
Alex Krause
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
PacificResearchPlatform
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Eswar Publications
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 
Information technology ppt
Information technology pptInformation technology ppt
Information technology ppt
Akhilesh Verma
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
ijtsrd
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
YogeshIJTSRD
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Managing Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDManaging Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhD
PacificResearchPlatform
 

What's hot (20)

Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
 
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice InteractionA Smart Receptionist Implementing Facial Recognition and Voice Interaction
A Smart Receptionist Implementing Facial Recognition and Voice Interaction
 
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTSA GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
A GENERIC FRAMEWORK FOR DEVICE PAIRING IN UBIQUITOUS COMPUTING ENVIRONMENTS
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
Cloud Analytics Ability to Design, Build, Secure, and Maintain Analytics Solu...
 
Impactof IT
Impactof ITImpactof IT
Impactof IT
 
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
THE INTERNET OF THINGS, PRODUCTIVITY AND EMPLOYMENT Boston 0915
 
The Internet of Things, Productivity, and Employment
The Internet of Things, Productivity, and Employment The Internet of Things, Productivity, and Employment
The Internet of Things, Productivity, and Employment
 
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
TIPPSS for Enabling & Securing our Increasingly Connected World – Trust, Iden...
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Information technology ppt
Information technology pptInformation technology ppt
Information technology ppt
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
IOTCYBER
IOTCYBERIOTCYBER
IOTCYBER
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Managing Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhDManaging Complexity in a World of Surprise David L. Alderson, PhD
Managing Complexity in a World of Surprise David L. Alderson, PhD
 

Similar to Artificial Intelligence at the Edge - الذكاء الاصطناعي على الأجهزة الطرفية

Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Enterprise Wired
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western Ontario
Bill Wong
 
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE
 
Architecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsArchitecting the Enterprise Internet of Things
Architecting the Enterprise Internet of Things
Dell World
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Mark Underwood
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with Intel
Amazon Web Services
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
owaspindia
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Mobile Enterprise Dashboards by RapidValue Solutions
Mobile Enterprise Dashboards by RapidValue SolutionsMobile Enterprise Dashboards by RapidValue Solutions
Mobile Enterprise Dashboards by RapidValue Solutions
RapidValue
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
Andris Soroka
 
International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...
ijscai
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
Alert Logic
 
Getting started with IoT
Getting started with IoTGetting started with IoT
Getting started with IoT
Codit
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
ipspat
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidiszakmackraken
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
Chris Andrews
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)
AnandSRao1962
 

Similar to Artificial Intelligence at the Edge - الذكاء الاصطناعي على الأجهزة الطرفية (20)

Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
Power of Edge AI: Bridging the Gap Between Data and Real-time Processing | En...
 
Dell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western OntarioDell NVIDIA AI Roadshow - South Western Ontario
Dell NVIDIA AI Roadshow - South Western Ontario
 
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
FIWARE Global Summit - Advanced ML/AI Techniques with FIWARE and Connected Io...
 
Architecting the Enterprise Internet of Things
Architecting the Enterprise Internet of ThingsArchitecting the Enterprise Internet of Things
Architecting the Enterprise Internet of Things
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Developing your IoT Solutions with Intel
Developing your IoT Solutions with IntelDeveloping your IoT Solutions with Intel
Developing your IoT Solutions with Intel
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
 
Ieee itmsb20
Ieee itmsb20Ieee itmsb20
Ieee itmsb20
 
Mobile Enterprise Dashboards by RapidValue Solutions
Mobile Enterprise Dashboards by RapidValue SolutionsMobile Enterprise Dashboards by RapidValue Solutions
Mobile Enterprise Dashboards by RapidValue Solutions
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...International Conference on Soft Computing, Data mining and Data Science (SCD...
International Conference on Soft Computing, Data mining and Data Science (SCD...
 
CSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model OverviewCSS17: Houston - Azure Shared Security Model Overview
CSS17: Houston - Azure Shared Security Model Overview
 
Getting started with IoT
Getting started with IoTGetting started with IoT
Getting started with IoT
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Bcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidisBcs presentation zacharias_enislidis
Bcs presentation zacharias_enislidis
 
Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
2023 GEOINT Tutorial - Synthetic Data Tools for Computer Vision-Based AI - Re...
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)Functionalities in AI Applications and Use Cases (OECD)
Functionalities in AI Applications and Use Cases (OECD)
 

More from Fares Al-Qunaieer

Deep convolutional neural networks and their many uses for computer vision
Deep convolutional neural networks and their many uses for computer visionDeep convolutional neural networks and their many uses for computer vision
Deep convolutional neural networks and their many uses for computer vision
Fares Al-Qunaieer
 
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
Fares Al-Qunaieer
 
التحليل التنبؤي للتقنيات التشغيلية
التحليل التنبؤي للتقنيات التشغيليةالتحليل التنبؤي للتقنيات التشغيلية
التحليل التنبؤي للتقنيات التشغيلية
Fares Al-Qunaieer
 
البيانات واستخدامها في القطاع غير الربحي السعودي
البيانات واستخدامها في القطاع غير الربحي السعوديالبيانات واستخدامها في القطاع غير الربحي السعودي
البيانات واستخدامها في القطاع غير الربحي السعودي
Fares Al-Qunaieer
 
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداًالذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
Fares Al-Qunaieer
 
تنقيب البيانات
تنقيب البياناتتنقيب البيانات
تنقيب البيانات
Fares Al-Qunaieer
 
تحليل بيانات شبكات التواصل الاجتماعي
تحليل بيانات شبكات التواصل الاجتماعيتحليل بيانات شبكات التواصل الاجتماعي
تحليل بيانات شبكات التواصل الاجتماعي
Fares Al-Qunaieer
 
التعرف على الأشخاص عن طريق القزحية
التعرف على الأشخاص عن طريق القزحيةالتعرف على الأشخاص عن طريق القزحية
التعرف على الأشخاص عن طريق القزحية
Fares Al-Qunaieer
 
برنامج مقترح لتعلم (تعلم الآلة)
برنامج مقترح لتعلم (تعلم الآلة)برنامج مقترح لتعلم (تعلم الآلة)
برنامج مقترح لتعلم (تعلم الآلة)
Fares Al-Qunaieer
 
نصائح لتطبيق تعلم الآلة
نصائح لتطبيق تعلم الآلةنصائح لتطبيق تعلم الآلة
نصائح لتطبيق تعلم الآلة
Fares Al-Qunaieer
 
مدخل إلى تعلم الآلة
مدخل إلى تعلم الآلةمدخل إلى تعلم الآلة
مدخل إلى تعلم الآلة
Fares Al-Qunaieer
 
معالجة وتحليل البيانات نظرة شاملة
معالجة وتحليل البيانات   نظرة شاملةمعالجة وتحليل البيانات   نظرة شاملة
معالجة وتحليل البيانات نظرة شاملة
Fares Al-Qunaieer
 

More from Fares Al-Qunaieer (12)

Deep convolutional neural networks and their many uses for computer vision
Deep convolutional neural networks and their many uses for computer visionDeep convolutional neural networks and their many uses for computer vision
Deep convolutional neural networks and their many uses for computer vision
 
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
البيانات، ذكاء الأعمال، الذكاء الاصطناعي ... من أين نبدأ؟ وكيف نصل؟
 
التحليل التنبؤي للتقنيات التشغيلية
التحليل التنبؤي للتقنيات التشغيليةالتحليل التنبؤي للتقنيات التشغيلية
التحليل التنبؤي للتقنيات التشغيلية
 
البيانات واستخدامها في القطاع غير الربحي السعودي
البيانات واستخدامها في القطاع غير الربحي السعوديالبيانات واستخدامها في القطاع غير الربحي السعودي
البيانات واستخدامها في القطاع غير الربحي السعودي
 
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداًالذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
الذكاء الاصطناعي وتعلم الآلة: تعريف سريع جداً
 
تنقيب البيانات
تنقيب البياناتتنقيب البيانات
تنقيب البيانات
 
تحليل بيانات شبكات التواصل الاجتماعي
تحليل بيانات شبكات التواصل الاجتماعيتحليل بيانات شبكات التواصل الاجتماعي
تحليل بيانات شبكات التواصل الاجتماعي
 
التعرف على الأشخاص عن طريق القزحية
التعرف على الأشخاص عن طريق القزحيةالتعرف على الأشخاص عن طريق القزحية
التعرف على الأشخاص عن طريق القزحية
 
برنامج مقترح لتعلم (تعلم الآلة)
برنامج مقترح لتعلم (تعلم الآلة)برنامج مقترح لتعلم (تعلم الآلة)
برنامج مقترح لتعلم (تعلم الآلة)
 
نصائح لتطبيق تعلم الآلة
نصائح لتطبيق تعلم الآلةنصائح لتطبيق تعلم الآلة
نصائح لتطبيق تعلم الآلة
 
مدخل إلى تعلم الآلة
مدخل إلى تعلم الآلةمدخل إلى تعلم الآلة
مدخل إلى تعلم الآلة
 
معالجة وتحليل البيانات نظرة شاملة
معالجة وتحليل البيانات   نظرة شاملةمعالجة وتحليل البيانات   نظرة شاملة
معالجة وتحليل البيانات نظرة شاملة
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Artificial Intelligence at the Edge - الذكاء الاصطناعي على الأجهزة الطرفية