Describing how two game search strategies in artificial intelligence works by an example.
The two strategies presented are:
Minimax.
Alpha-Beta Pruning.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
Problem solving
Problem formulation
Search Techniques for Artificial Intelligence
Classification of AI searching Strategies
What is Search strategy ?
Defining a Search Problem
State Space Graph versus Search Trees
Graph vs. Tree
Problem Solving by Search
Introduction Artificial Intelligence a modern approach by Russel and Norvig 1Garry D. Lasaga
In computer science, artificial intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and animals. - Wikipedia
Knowledge representation In Artificial IntelligenceRamla Sheikh
facts, information, and skills acquired through experience or education; the theoretical or practical understanding of a subject.
Knowledge = information + rules
EXAMPLE
Doctors, managers.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
Problem solving
Problem formulation
Search Techniques for Artificial Intelligence
Classification of AI searching Strategies
What is Search strategy ?
Defining a Search Problem
State Space Graph versus Search Trees
Graph vs. Tree
Problem Solving by Search
Introduction Artificial Intelligence a modern approach by Russel and Norvig 1Garry D. Lasaga
In computer science, artificial intelligence, sometimes called machine intelligence, is intelligence demonstrated by machines, in contrast to the natural intelligence displayed by humans and animals. - Wikipedia
Knowledge representation In Artificial IntelligenceRamla Sheikh
facts, information, and skills acquired through experience or education; the theoretical or practical understanding of a subject.
Knowledge = information + rules
EXAMPLE
Doctors, managers.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
Knowledge representation and reasoning (KR) is the field of artificial intelligence (AI) dedicated to representing information about the world in a form that a computer system can utilize to solve complex tasks such as diagnosing a medical condition or having a dialog in a natural language
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...Simplilearn
This presentation on "Supervised and Unsupervised Learning" will help you understand what is machine learning, what are the types of Machine learning, what is supervised machine learning, types of supervised machine learning, what is unsupervised learning, types of unsupervised learning and what are the differences between supervised and unsupervised machine learning. In supervised learning, the model learns from a labeled data whereas in unsupervised learning, model trains itself on unlabeled data. Now, let us get started and understand supervised and unsupervised learning and how they are different from each other.
Below are the topics explained in this supervised and unsupervised learning in Machine Learning presentation-
1. What is Machine Learning
- Types of Machine Learning
- Supervised Learning
- Unsupervised Learning
2. Supervised Learning
- Types of Supervised Learning
3. Unsupervised Learning
- Types of Unsupervised Learning
About Simplilearn Machine Learning course:
A form of artificial intelligence, Machine Learning is revolutionizing the world of computing as well as all people’s digital interactions. Machine Learning powers such innovative automated technologies as recommendation engines, facial recognition, fraud protection and even self-driving cars. This Machine Learning course prepares engineers, data scientists and other professionals with the knowledge and hands-on skills required for certification and job competency in Machine Learning.
Why learn Machine Learning?
Machine Learning is taking over the world- and with that, there is a growing need among companies for professionals to know the ins and outs of Machine Learning
The Machine Learning market size is expected to grow from USD 1.03 Billion in 2016 to USD 8.81 Billion by 2022, at a Compound Annual Growth Rate (CAGR) of 44.1% during the forecast period.
By the end of this Machine Learning course, you will be able to:
1. Master the concepts of supervised, unsupervised and reinforcement learning concepts and modeling.
2. Gain practical mastery over principles, algorithms, and applications of Machine Learning through a hands-on approach which includes working on 28 projects and one capstone project.
3. Acquire a thorough knowledge of the mathematical and heuristic aspects of Machine Learning.
4. Understand the concepts and operation of support vector machines, kernel SVM, naive Bayes, decision tree classifier, random forest classifier, logistic regression, K-nearest neighbors, K-means clustering and more.
5. Be able to model a wide variety of robust Machine Learning algorithms including deep learning, clustering, and recommendation systems
Learn more at: https://www.simplilearn.com/
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
A fast-paced introduction to Deep Learning concepts, such as activation functions, cost functions, back propagation, and then a quick dive into CNNs. Basic knowledge of vectors, matrices, and derivatives is helpful in order to derive the maximum benefit from this session.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
ICEIT'20 Cython for Speeding-up Genetic AlgorithmAhmed Gad
The presentation of the paper titled "Cython for Speeding-up Genetic Algorithm". Find it at IEEE Explore: https://ieeexplore.ieee.org/document/9113210
The abstract of the paper:
This paper proposes a library for implementing the genetic algorithm using Python mainly in NumPy and speeding-up its execution using Cython. The preliminary Python implementation is inspected for possible optimizations. The 4 main changes include statically defining data types for the NumPy arrays, specifying the data type of the array elements in addition to the number of dimensions, using indexing for looping through the arrays, and finally disabling some unnecessary features in Cython. Using Cython, the NumPy array processing is 1250 times faster than CPython. The Cythonized version of the genetic algorithm is 18 times faster than the Python version.
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...Ahmed Gad
The presentation of my paper titled "#NumPyCNNAndroid: A Library for Straightforward Implementation of #ConvolutionalNeuralNetworks for #Android Devices" at the second International Conference of Innovative Trends in #ComputerEngineering (ITCE 2019).
The paper proposes a library for implementing convolutional neural networks (CNNs) in order to run on Android devices. The process of running the CNN on the mobile devices is straightforward and does not require an in-between step for model conversion as it uses #Kivy cross-platform library.
The CNN layers are implemented in #NumPy. You can find their implementation in my #GitHub project at this link: https://github.com/ahmedfgad/NumPyCNN
The library is also open source available here: https://github.com/ahmedfgad/NumPyCNNAndroid
There are 2 modes of operation for this work. The first one is training the CNN on the mobile device but it is very time-consuming at least in the current version. The second and preferred way is to train the CNN in a desktop computer and then use it on the mobile device.
Knowledge representation and reasoning (KR) is the field of artificial intelligence (AI) dedicated to representing information about the world in a form that a computer system can utilize to solve complex tasks such as diagnosing a medical condition or having a dialog in a natural language
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
Supervised and Unsupervised Learning In Machine Learning | Machine Learning T...Simplilearn
This presentation on "Supervised and Unsupervised Learning" will help you understand what is machine learning, what are the types of Machine learning, what is supervised machine learning, types of supervised machine learning, what is unsupervised learning, types of unsupervised learning and what are the differences between supervised and unsupervised machine learning. In supervised learning, the model learns from a labeled data whereas in unsupervised learning, model trains itself on unlabeled data. Now, let us get started and understand supervised and unsupervised learning and how they are different from each other.
Below are the topics explained in this supervised and unsupervised learning in Machine Learning presentation-
1. What is Machine Learning
- Types of Machine Learning
- Supervised Learning
- Unsupervised Learning
2. Supervised Learning
- Types of Supervised Learning
3. Unsupervised Learning
- Types of Unsupervised Learning
About Simplilearn Machine Learning course:
A form of artificial intelligence, Machine Learning is revolutionizing the world of computing as well as all people’s digital interactions. Machine Learning powers such innovative automated technologies as recommendation engines, facial recognition, fraud protection and even self-driving cars. This Machine Learning course prepares engineers, data scientists and other professionals with the knowledge and hands-on skills required for certification and job competency in Machine Learning.
Why learn Machine Learning?
Machine Learning is taking over the world- and with that, there is a growing need among companies for professionals to know the ins and outs of Machine Learning
The Machine Learning market size is expected to grow from USD 1.03 Billion in 2016 to USD 8.81 Billion by 2022, at a Compound Annual Growth Rate (CAGR) of 44.1% during the forecast period.
By the end of this Machine Learning course, you will be able to:
1. Master the concepts of supervised, unsupervised and reinforcement learning concepts and modeling.
2. Gain practical mastery over principles, algorithms, and applications of Machine Learning through a hands-on approach which includes working on 28 projects and one capstone project.
3. Acquire a thorough knowledge of the mathematical and heuristic aspects of Machine Learning.
4. Understand the concepts and operation of support vector machines, kernel SVM, naive Bayes, decision tree classifier, random forest classifier, logistic regression, K-nearest neighbors, K-means clustering and more.
5. Be able to model a wide variety of robust Machine Learning algorithms including deep learning, clustering, and recommendation systems
Learn more at: https://www.simplilearn.com/
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
A fast-paced introduction to Deep Learning concepts, such as activation functions, cost functions, back propagation, and then a quick dive into CNNs. Basic knowledge of vectors, matrices, and derivatives is helpful in order to derive the maximum benefit from this session.
Artificial Intelligence: Introduction, Typical Applications. State Space Search: Depth Bounded
DFS, Depth First Iterative Deepening. Heuristic Search: Heuristic Functions, Best First Search,
Hill Climbing, Variable Neighborhood Descent, Beam Search, Tabu Search. Optimal Search: A
*
algorithm, Iterative Deepening A*
, Recursive Best First Search, Pruning the CLOSED and OPEN
Lists
ICEIT'20 Cython for Speeding-up Genetic AlgorithmAhmed Gad
The presentation of the paper titled "Cython for Speeding-up Genetic Algorithm". Find it at IEEE Explore: https://ieeexplore.ieee.org/document/9113210
The abstract of the paper:
This paper proposes a library for implementing the genetic algorithm using Python mainly in NumPy and speeding-up its execution using Cython. The preliminary Python implementation is inspected for possible optimizations. The 4 main changes include statically defining data types for the NumPy arrays, specifying the data type of the array elements in addition to the number of dimensions, using indexing for looping through the arrays, and finally disabling some unnecessary features in Cython. Using Cython, the NumPy array processing is 1250 times faster than CPython. The Cythonized version of the genetic algorithm is 18 times faster than the Python version.
NumPyCNNAndroid: A Library for Straightforward Implementation of Convolutiona...Ahmed Gad
The presentation of my paper titled "#NumPyCNNAndroid: A Library for Straightforward Implementation of #ConvolutionalNeuralNetworks for #Android Devices" at the second International Conference of Innovative Trends in #ComputerEngineering (ITCE 2019).
The paper proposes a library for implementing convolutional neural networks (CNNs) in order to run on Android devices. The process of running the CNN on the mobile devices is straightforward and does not require an in-between step for model conversion as it uses #Kivy cross-platform library.
The CNN layers are implemented in #NumPy. You can find their implementation in my #GitHub project at this link: https://github.com/ahmedfgad/NumPyCNN
The library is also open source available here: https://github.com/ahmedfgad/NumPyCNNAndroid
There are 2 modes of operation for this work. The first one is training the CNN on the mobile device but it is very time-consuming at least in the current version. The second and preferred way is to train the CNN in a desktop computer and then use it on the mobile device.
Python for Computer Vision - Revision 2nd EditionAhmed Gad
Python is a powerful tool for computer vision applications. This presentation reviews the essential libraries required for image analysis using Python. These libraries include NumPy, SciPy, Matplotlib, Python Image Library (PIL), scikit-image, and scikit-learn.
Multi-Objective Optimization using Non-Dominated Sorting Genetic Algorithm wi...Ahmed Gad
When solving a problem, the goal is not only solving it but also optimizing such solution. There might be multiple solutions to a problem and the challenge is to find the best of them. The more metrics defining the solution goodness, the harder finding the best solution. This presentation discusses one of the multi-objective optimization techniques called non-dominated sorting genetic algorithm II (NSGA-II) explaining its steps including non-dominated sorting, crowding distance, tournament selection, and genetic algorithm. The presentation works through a numerical example step-by-step.
M.Sc. Thesis - Automatic People Counting in Crowded ScenesAhmed Gad
This thesis proposes a real-time automatic people crowd density estimation method for overcoming the non-linearity problem, working with different densities and scales, and enhancing the prediction error. To cover most of the properties of the crowded scene, a newly used combination of features is proposed that includes segmented region properties, texture, edge, and SIFT keypoints. Edge strength is a suggested for use.
Derivation of Convolutional Neural Network from Fully Connected Network Step-...Ahmed Gad
In image analysis, #convolutional neural networks (#CNNs or #ConvNets for short) are time and memory efficient than fully connected (#FC) networks. But why? What are the advantages of ConvNets over FC networks in image analysis? How is #ConvNet derived from FC networks? Where the term #convolution in CNNs came from? These questions are to be answered in this #presentation.
Image analysis has a number of challenges such as classification, object detection, recognition, description, etc. If an image classifier, for example, is to be created, it should be able to work with a high accuracy even with variations such as occlusion, illumination changes, viewing angles, and others. The traditional pipeline of image classification with its main step of feature engineering is not suitable for working in rich environments. Even experts in the field won’t be able to give a single or a group of features that are able to reach high accuracy under different variations. Motivated by this problem, the idea of feature learning came out. The suitable features to work with images are learned automatically. This is the reason why artificial neural networks (ANNs) are one of the robust ways of image analysis. Based on a learning algorithm such as gradient descent (GD), ANN learns the image features automatically. The raw image is applied to the ANN and ANN is responsible for generating the features describing it.
Introduction to Optimization with Genetic Algorithm (GA)Ahmed Gad
Selection of the optimal parameters for machine learning tasks is challenging. Some results may be bad not because the data is noisy or the used learning algorithm is weak, but due to the bad selection of the parameters values. This article gives a brief introduction about evolutionary algorithms (EAs) and describes genetic algorithm (GA) which is one of the simplest random-based EAs.
References:
Eiben, Agoston E., and James E. Smith. Introduction to evolutionary computing. Vol. 53. Heidelberg: springer, 2003.
https://www.linkedin.com/pulse/introduction-optimization-genetic-algorithm-ahmed-gad
https://www.kdnuggets.com/2018/03/introduction-optimization-with-genetic-algorithm.html
Derivation of Convolutional Neural Network (ConvNet) from Fully Connected Net...Ahmed Gad
In image analysis, convolutional neural networks (CNNs or ConvNets for short) are time and memory efficient than fully connected (FC) networks. But why? What are the advantages of ConvNets over FC networks in image analysis? How is ConvNet derived from FC networks? Where the term convolution in CNNs came from? These questions are to be answered in this article.
Image analysis has a number of challenges such as classification, object detection, recognition, description, etc. If an image classifier, for example, is to be created, it should be able to work with a high accuracy even with variations such as occlusion, illumination changes, viewing angles, and others. The traditional pipeline of image classification with its main step of feature engineering is not suitable for working in rich environments. Even experts in the field won’t be able to give a single or a group of features that are able to reach high accuracy under different variations. Motivated by this problem, the idea of feature learning came out. The suitable features to work with images are learned automatically. This is the reason why artificial neural networks (ANNs) are one of the robust ways of image analysis. Based on a learning algorithm such as gradient descent (GD), ANN learns the image features automatically. The raw image is applied to the ANN and ANN is responsible for generating the features describing it.
-Reference
Aghdam, Hamed Habibi, and Elnaz Jahani Heravi. Guide to Convolutional Neural Networks: A Practical Application to Traffic-Sign Detection and Classification. Springer, 2017.
Have you ever created a machine learning model that is perfect for the training samples but gives very bad predictions with unseen samples! Did you ever think why this happens? This article explains overfitting which is one of the reasons for poor predictions for unseen samples. Also, regularization technique based on regression is presented by simple steps to make it clear how to avoid overfitting.
Selection of the optimal parameters for machine learning tasks is challenging. Some results may be bad not because the data is noisy or the used learning algorithm is weak, but due to the bad selection of the parameters values. This presentation gives a brief introduction about evolutionary algorithms (EAs) and describes genetic algorithm (GA) which is one of the simplest random-based EAs. A step-by-step example is given in addition to its implementation in Python 3.5.
---------------------------------
Read more about GA:
Yu, Xinjie, and Mitsuo Gen. Introduction to evolutionary algorithms. Springer Science & Business Media, 2010.
https://www.kdnuggets.com/2018/03/introduction-optimization-with-genetic-algorithm.html
https://www.linkedin.com/pulse/introduction-optimization-genetic-algorithm-ahmed-gad
ICCES 2017 - Crowd Density Estimation Method using Regression AnalysisAhmed Gad
The oral presentation of the paper titled "Crowd Density Estimation Method using Multiple Feature Categories and Multiple Regression Models".
This paper was accepted for publication and oral presentation in the 12th IEEE International Conference on Computer Engineering and Systems (ICCES 2017) held from 19 to 20 December 2017 in Cairo, Egypt.
The paper proposed a new method to estimate the number of people within crowded scenes using regression analysis. The two challenges in crowd density estimation using regression analysis are perspective distortion and non-linearity. This paper solves the perspective distortion using perspective normalization which is the best way to deal with that problem based on recent works.
The second challenge is solved by creating a new combination of features collected from multiple already existing categories including segmented region, texture, edge, and keypoints. This paper created a feature vector of length 164.
Five regression models are used which are GPR, RF, RPF, LASSO, and KNN.
Based on the experimental results, our proposed method gives better results than previous works.
----------------------------------
أحمد فوزي جاد Ahmed Fawzy Gad
قسم تكنولوجيا المعلومات Information Technology (IT) Department
كلية الحاسبات والمعلومات Faculty of Computers and Information (FCI)
جامعة المنوفية, مصر Menoufia University, Egypt
Teaching Assistant/Demonstrator
ahmed.fawzy@ci.menofia.edu.eg
---------------------------------
Find me on:
Blog
(Arabic) https://aiage-ar.blogspot.com.eg/
(English) https://aiage.blogspot.com.eg/
YouTube
https://www.youtube.com/AhmedGadFCIT
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad
reddit
https://www.reddit.com/user/AhmedGadFCIT
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://menofia.academia.edu/Gad
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad
Backpropagation: Understanding How to Update ANNs Weights Step-by-StepAhmed Gad
This presentation explains how the backpropagation algorithm is useful in updating the artificial neural networks (ANNs) weights using two examples step by step. Readers should have a basic understanding of how ANNs work, partial derivatives, and multivariate chain rule.
This presentation won`t dive directly into the details of the algorithm but will start by training a very simple network. This is because the backpropagation algorithm is meant to be applied over a network after training. So, we should train the network before applying it to catch the benefits of backpropagation algorithm and how to use it.
Computer Vision: Correlation, Convolution, and GradientAhmed Gad
Three important operations in computer vision are explained starting with each one got explained and implemented in Python.
Generally, all of these three operations have many similarities in as they follow the same general steps but there are some subtle changes. The main change is using different masks.
A brief review about Python for computer vision showing the different modules necessary to dive into computer vision.
The modules presented are NumPy, SciPy, and Matplotlib.
Anime Studio Pro 10 Tutorial as Part of Multimedia CourseAhmed Gad
There are different ways of presenting information to users. These ways are called medias because they similar to networking media that carry data from one place to another, they carry information from the source to the user. Examples of medias are text, image, sound, video, animation.
Because multiple types of medias can be used to carry the same piece of information, there is what is called multimedia (MM). This is a combined set of medias working together to present the information in a friendly way to the end-user. The use of one media depends on the type of audience and the type of information to be presented. One media may be powerful over another to present some types of information.
The primary goals of this course is to make you understand the different types of medias, use cases of one media over another, and combining different media types.
Also this course tells how to create such types of medias to create interactive media.
Brief Introduction to Deep Learning + Solving XOR using ANNsAhmed Gad
This presentation gives a very simple introduction to deep learning in addition to a step-by-step example showing how to solve the XOR non-linear problem using multi-layer artificial neural networks that has both input, hidden, and output layers.
Deep learning is based on artificial neural networks and it aims to analyze large amounts of data that are not easily analyzed using conventional models. It creates a large neural network with several hidden layers and several neurons within each layer and usually may take days for its learning.
Many beginners in artificial neural networks have a problem in understanding how hidden layers are useful and what is the best number of hidden layers and best number of neurons or nodes within each layer.
أحمد فوزي جاد Ahmed Fawzy Gad
قسم تكنولوجيا المعلومات Information Technology (IT) Department
كلية الحاسبات والمعلومات Faculty of Computers and Information (FCI)
جامعة المنوفية, مصر Menoufia University, Egypt
Teaching Assistant/Demonstrator
ahmed.fawzy@ci.menofia.edu.eg
:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://menofia.academia.edu/Gad
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
Operations in Digital Image Processing + Convolution by ExampleAhmed Gad
Digital image processing operations can be either point or group.
This presentation explains both operations (point and group) and shows how convolution works by a numerical example.
Ahmed Fawzy Gad
ahmed.fawzy@ci.menofia.edu.eg
Information Technology Department
Faculty of Computers and Information (FCI)
Menoufia University
Egypt
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
This file contains a simple description about what I have created about how to detect object motion and track whatever moving as a computer vision project when being undergraduate student at 2014.
The MATLAB code of the system is also available in the document.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
MATLAB Code + Description : Very Simple Automatic English Optical Character R...Ahmed Gad
This file contains a simple description about what I have created about how to recognize characters using feed forward back propagation neural network as a pattern recognition project when being undergraduate student at 2013.
The MATLAB code of the system is also available in the document.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
Graduation Project - Face Login : A Robust Face Identification System for Sec...Ahmed Gad
Face login is my 2015 graduation project started in 2014 and lasted 1.5 years of work.
Generally, it is an identification system using face images. It is a multi-use system but it was mainly created to authorize users to login into their system.
There is an IEEE paper published by the project algorithm used in ICCES 2014 http://ieeexplore.ieee.org/abstract/document/7030929/.
Here is its citation Semary, Noura A., and Ahmed Fawzi Gad. "A proposed framework for robust face identification system." Computer Engineering & Systems (ICCES), 2014 9th International Conference on. IEEE, 2014.
A YouTube video describing the project generally.
https://www.youtube.com/watch?v=OUvaPW70Eko
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
1. AI Game Search
MENOUFIA UNIVERSITY
FACULTY OF COMPUTERS AND INFORMATION
ALL DEPARTMENTS
ARTIFICIAL INTELLIGENCE
المنوفية جامعة
والمعلومات الحاسبات كلية
األقسام جميع
الذكاءاإلصطناعي
المنوفية جامعة
Ahmed Fawzy Gad
ahmed.fawzy@ci.menofia.edu.eg
7. Minimax Game Search
Two Players take turns:
Max and Min
Max : Maximizes Score.
Min : Minimizes Score.
MAX
MIN
8. Minimax Game Search
Two Players take turns:
Max and Min
Max : Maximizes Score.
Min : Minimizes Score.
Special Case.
Max is an expert.
Min is a beginner.
MAX
MIN
12. Minimax Game Search
Which node to follow?
No heuristic values.
A
B C
Hot to find heuristic values
for other nodes?
13. Minimax Game Search
Which node to follow?
No heuristic values.
A
B C
Hot to find heuristic values
for other nodes?
Use children heuristics to
calculate parent heuristic.
14. Minimax Game Search
Which node to follow?
No heuristic values.
A
B C
Hot to find heuristic values
for other nodes?
Use children heuristics to
calculate parent heuristic.
Minimax Game
Search Steps
15. Minimax Game Search
Which node to follow?
No heuristic values.
A
B C
Hot to find heuristic values
for other nodes?
Use children heuristics to
calculate parent heuristic.
Minimax Game
Search Steps
Calculate
Heuristics
16. Minimax Game Search
Which node to follow?
No heuristic values.
A
B C
Hot to find heuristic values
for other nodes?
Use children heuristics to
calculate parent heuristic.
Minimax Game
Search Steps
Calculate
Heuristics
Search
17. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
18. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
19. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B C
20. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B CB C
21. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
C
22. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
C
D E
B C
23. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
C
D E
B C
D E
24. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
C
D E
B C
D E
25. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
B C
D E
26. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
B C
D E
H I J
27. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
B C
D E
H I J
28. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
3 -2 5
B C
D E
H I J
29. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
3 -2 5
B C
D E
H I J
Max
30. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
3 -2 5
B C
D E
H I J
Max
5
31. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
3 -2 5
B C
D E
H I J
Max
5
5
32. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
3 -2 5
B C
D E
H I J
Max
5
5
5
33. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
D
H I
C
D E
J
3 -2 5
B C
D E
H I J
Max
5
5
5
5
34. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
C
D E
B C
D E5
5
35. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
C
D E
B C
D E5
5
36. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
B C
D E5
5
37. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
B C
D E
K L M
5
5
38. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
5
5
39. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
Max
5
5
40. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
Max
7
5
5
41. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
Max
7
7
5
5
42. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
Max
7
7
75
5
43. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
Max
7
7
7
Min
5
75
44. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
Max
7
7
7
Min5
55
75
45. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
Max
7
7
7
Min5
5
55
75
46. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
B
E
K L
C
D E
M
7 0 3
B C
D E
K L M
Max
7
7
7
Min5
5
55
7
5
5
47. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B CB C5
7
5
5
48. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
CB C5
7
5
5
49. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
C
F G
B C5
7
5
5
50. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
C
F G
B C5
F G
7
5
5
51. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
C
F G
B C5
F G
7
5
5
52. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
N O
C
F G
P
B C5
F G
7
5
5
53. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
N O
C
F G
P
B C
N O P
5
F G
7
5
5
54. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
N O
C
F G
P
0 -5 4
B C
N O P
5
F G
7
5
5
55. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
N O
C
F G
P
0 -5 4
B C
N O P
Max
5
F G
7
5
5
56. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
N O
C
F G
P
0 -5 4
B C
N O P
Max
4
5
F G
7
5
5
57. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
N O
C
F G
P
0 -5 4
B C
N O P
Max
4
5
4
F G
7
5
5
58. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
N O
C
F G
P
0 -5 4
B C
N O P
Max
4
5
4
F G4
7
5
5
59. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
F
N O
C
F G
P
0 -5 4
B C
N O P
Max
4
5
4
F G4
47
5
5
60. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
C
F G
B C5
F G4
47
5
5
61. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
C
F G
B C5
F G4
47
5
5
62. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
B C5
F G4
47
5
5
63. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
B C
Q R S
5
F G4
47
5
5
64. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
5
F G4
47
5
5
65. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
5
F G4
47
5
5
66. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
F G4
47
5
5
67. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4
47
5
5
68. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
47
5
5
69. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
Min
847
5
5
70. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
Min4
4
847
5
5
71. Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
Min4
4
4
847
5
5
4
72. Max
Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
Min4
4
4
847
5
5
4
73. Max
Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
Min4
4
4
5
8
4
47
5
5
74. Max
Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
Min4
4
4
5
5
8
4
47
5
5
75. Max
Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
Min4
4
4
5
5
8
4
5
47
5
5
76. Max
Phase 1 : Heuristic Value Calculation
Depth-First Search
A
B
C
G
Q R
C
F G
S
-6 8 2
B C
Q R S
Max
8
5
8
F G4 8
Min4
4
4
5
5
8
4
5
47
5
5
If both players play optimally then Max will win by a score 5.
81. Phase 2 : Game Search
8
4
5
47
5
5
B
D
Max
A
Min
82. Phase 2 : Game Search
8
4
5
47
5
5
B
D
J
Max
Min
Max
A
83. Minimax Game Search Drawback
• Expands all the tree
while not all
expanded nodes are
useful.
84. Minimax Game Search Drawback
• Expands all the tree
while not all
expanded nodes are
useful.
• In this example, just
few nodes of the
whole tree was useful
in reaching the goal.
86. Alpha-Beta Pruning = Minimax Except
• This game search strategy is a modification to Minimax game search
that avoids exploring nodes that are not useful in the search.
• It gives the same results as Minimax but avoids exploring some
nodes.
• In the previous example, the path explored using Minimax was A-B-D-
J.
• Also the Alpha-Beta Pruning path will be A-B-D-J but without
exploring all nodes as in Minimax.
87. Alpha-Beta Pruning Motivation
Never explore values that are not useful.
=Min(Max(1, 2, 5), Max(6, x, y), Max(1, 3, 4))
=Min(5, Max(6, x, y), 4)
=Min(Max(6, x, y), 4)
=4