Smart Applications of Artificial Intelligence and Big Data (eBook, PDF)
Redaktion: Belaqziz, Salwa; Ullah Khan, Inam; Abdellah, Boulouz; Koutti, Lahcen; Lahmyed, Redouan; Amellal, Hicham; Hajjami, Salma El
50,95 €
50,95 €
inkl. MwSt.
Sofort per Download lieferbar
25 °P sammeln
50,95 €
Als Download kaufen
50,95 €
inkl. MwSt.
Sofort per Download lieferbar
25 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
50,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
25 °P sammeln
Smart Applications of Artificial Intelligence and Big Data (eBook, PDF)
Redaktion: Belaqziz, Salwa; Ullah Khan, Inam; Abdellah, Boulouz; Koutti, Lahcen; Lahmyed, Redouan; Amellal, Hicham; Hajjami, Salma El
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Smart Applications of Artificial Intelligence and Big Data covers a wide range of topics related to AI and big data, including machine learning, deep learning, natural language processing, computer vision, data analytics, and data mining.
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 17.62MB
Andere Kunden interessierten sich auch für
- Smart Applications of Artificial Intelligence and Big Data (eBook, ePUB)50,95 €
- Emerging Technologies in Computing (eBook, PDF)50,95 €
- Data Science & Exploration in Artificial Intelligence (eBook, PDF)171,95 €
- Computer Vision and Image Analysis for Industry 4.0 (eBook, PDF)45,95 €
- Blockchain and AI (eBook, PDF)37,95 €
- Data Science & Exploration in Artificial Intelligence (eBook, PDF)53,95 €
- Metaheuristics for Enterprise Data Intelligence (eBook, PDF)53,95 €
-
-
-
Smart Applications of Artificial Intelligence and Big Data covers a wide range of topics related to AI and big data, including machine learning, deep learning, natural language processing, computer vision, data analytics, and data mining.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 304
- Erscheinungstermin: 30. Juni 2025
- Englisch
- ISBN-13: 9781040350188
- Artikelnr.: 74233192
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 304
- Erscheinungstermin: 30. Juni 2025
- Englisch
- ISBN-13: 9781040350188
- Artikelnr.: 74233192
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Dr. Salwa Belaqziz is a full Professor in Computer Science at the Faculty of Sciences, Ibn Zohr University in Agadir and an affiliate professor at the Center for Remote Sensing Applications of the Mohammed VI Polytechnic University. She received her PhD degree in Computer Science from Cadi Ayyad University of Marrakech in 2014, which focused on the development of a decision support approach for gravity irrigation systems management, based on the combination of multi-agent modeling, remote sensing and optimization by evolutionary algorithms. Salwa Belaqziz has worked at the National Institute of Agricultural Research in Toulouse as postdoctoral researcher, where she participated in the development of an agent-based modeling and simulation platform to assess the environmental, economic and social impacts of various management strategies and policies regarding the management and uses of water resources. Her main research interests include irrigation scheduling, smart farming and decision support systems development, based on approaches combining artificial intelligence, big data, data science, agent-based modeling, physics-based modeling, remote sensing, IoT and optimization algorithms for integrated water resources management. Salwa Belaqziz co-supervises four PhD students and participates in national and international research projects (ASSIWAT, MorSnow, GeanTech, PRIMA,...). She has published papers in international peer-reviewed journals and participated in several international conferences. Dr. Salma El Hajjami is an Assistant Professor and Researcher at Faculty of science, Ibn Zohr University, Agadir, Morocco since 2021. She is a Ph.D, graduated in 2021 in Computer Science, at the Laboratory of Artificial Intelligence, Data Science and Emerging Systems from ENSA, Sidi Mohammed Ben Abdellah University, Fez, Morocco. She is a Computer Science Engineer, graduated in 2015 from National School of Applied Sciences Fez, Morocco. She has previous expertise acting in Ministry of interior Morocco as Research and Development Engineer from 2017 to 2021. She is member of International Association of Engineers (IAENG) and International Association of Online Engineering. Dr. Salma has made contributions in the fields of Social Big Data, Semantics Analytics, Anomaly Detection, and Imbalanced Big Data published at international conferences and journals. Her main research topics are Machine Learning, Deep Learning, Imbalanced Big Data, Data Science and Blockchain. She has served and continues to serve on technical program and organizer committees of several conferences also as a reviewer of numerous international journals. Dr. Redouan Lahmyed received the Ph.D. degree in computer science from the Faculty of Science, University Ibn Zohr, Agadir, Morocco in 2019. He also received his master's degree in Computer Science (M.Sc) from the Department of Studies in Computer Science at The University of Mysore, Karnataka, India. His research interests include image processing and computer vision. Apart from his experience with teaching and working with researchers from different countries, he published and served as a reviewer at numerous international conferences and journals. Dr. Hicham Amellal is an Assistant Professor, Department of Computer Science Faculty of Sciences Ibn Zohr University. He holds a doctorate in information security from Mohamed V University, Faculty of Sciences Rabat-Morocco, and computer engineer, laureate of Kazan State Technological University, Russian Federation. Prof Amellal has different experiences in different regions and in various higher educational institutions with diverse academic configurations and in different level such as: International academy Mohammad VI of civil aviation, national school of applied sciences al Hoceima, Faculty of sciences Agdal and Faculty of Science and Technology al Hoceima. Prof Amellal is member of the workshop organizing committee: Cyber Crime and Quantum Information, 18 to 19 Oct 2016, Rabat VSST Association Chapter Morocco, and Quantum Africa C Advances in Quantum Sciences, Faculty of Sciences, 22 to 26 Sept 2014, Rabat. His research interests include IT security, Quantum cryptography, Post quantum cryptography and Quantum Algorithms. Information Classification: General Dr. Koutti Lahcen is a Professor at the Department of Computer Science within the Faculty of Science at Ibn Zohr University in Agadir, Morocco. He obtained his Ph.D. in computational physics from University Paul Verlaine in France in 1999 and his Habilitation degree from Ibn Zohr University in 2010. Prior to his academic career, Dr. Lahcen worked as a software engineer at the multinational company "ALDATA". His research interests revolve around Artificial Intelligence, Computer Vision, Medical Imaging, and Feature Extraction. Dr. Lahcen is a member of the Computer Systems and Vision Laboratory and has an h-index of 7, having co-authored 48 publications that have received 237 citations. Additionally, he currently manages the AL KHAWARZIMI project (2020/20). Dr. Abdellah Boulouz is a university professor in the IT department at the Faculty of Sciences, University Ibn Zohr in Agadir. He holds a PhD in Microelectronics, Microsensors, and Systems, which he obtained from the University of Montpellier 2, IES (Institut d'Électronique et des Systèmes). He also has a Master's degree in Computer Engineering and Open Systems/Computer Networks (MSIO) from Ecole Centrale Paris (ECP France) and a "Diplôme des Études Approfondies" in Instrumentation Sciences and Physics from the University of Reims Champagne-Ardenne. He worked as a researcher (Postdoctoral position) at the École Polytechnique Fédérale EPFL in Lausanne, Switzerland, and the Leibniz-Institut für Festkörper und Werkstoffforschung, IFW Dresden, Germany. He is also the president and founder of the association Sciences Pour Tous (https://spt.ma) and has several publications in specialized journals and international conferences with peer review. Dr. Inam Ullah Khan is visiting researcher at king's College London, Uk. Also, he was faculty member at different universities in Pakistan which include Center for Emerging Sciences Engineering & Technology (CESET), Islamabad, Abdul Wali Khan University, Garden Campus, Timergara Campus, University of Swat & Shaheed Zulfikar Ali Bhutto Institute of Science and Technology (SZABIST), Islamabad Campus. He completed his Ph.D. in Electronics Engineering from Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). Also, he did his M.S. degree in Electronic Engineering at Department of Electronic Engineering, Isra University, Islamabad Campus, School of Engineering & Applied Sciences (SEAS). He had done undergraduate degree in Bachelor of Computer Science from Abdul Wali Khan University Mardan, Pakistan. Apart from that his Master's thesis is published as a book on topic "Route Optimization with Ant Colony Optimization (ACO)" in Germany which is available on Amazon. More interestingly, he use to teach subjects like computer network security, artificial intelligence, evolutionary computing, professional practice, software engineering, data communication & networks, data base, cyber security, visual programming and introduction to programming. He authored/coauthored more than 30 research articles in reputable journals, conferences and book chapters.
Part I. Artificial intelligence (AI), 1. Resource utilization and cost
implications of container live migration in clouds: An approach performed
on Amazon Web Services (AWS), 2. A deep learning (DL) framework for
gastrointestinal (GI) abnormality classification and localization within
WCE images, 3. Breast cancer segmentation using U-Net and transfer learning
approaches, 4. Transforming graphics processing unit-accelerated machine
learning (ML) environments with Docker Cloud containers, 5. A review of
image-based deep learning approaches for atmospheric visibility estimation,
6. Advancing cloud security: Evaluating interpretable machine learning
algorithms for DDoS attack detection, 7. Classification of gastrointestinal
(GI) bleeding in WCE images based on fusing a stabilizing block with
Xception, 8. Lung tumor recognition and classification in CT scan images
using CNNs, transfer learning, and ensemble learning, 9. A new pedestrian
detection method for intelligent surveillance systems, Part II. Smart
applications, 10.Compensation of harmonic currents for shunt active power
filter using ADALINE neural network, 11. Control of a grid-connected
photovoltaic system based on MPPT and vector control, 12. GeoArgania: A
geolocation mapping dataset of Argania trees in the Souss region, 13. PSM
model for NoSQL key-value databases through model programming, 14. Body
temperature screening during COVID-19 pandemic, 15. Signal processing
system for Heart Rate Extraction via LabVIEW, 16. Investigating the impacts
of COVID-19 over time using sentiment analysis and topic modeling, Part
III. Internet of Things (IoT) and big data, 17. Smart EV routing to
charging stations for traffic optimization in smart cities: A case study in
Agadir, 18. Dual-scored dimensionality reduction and spectral unmixing for
hyperspectral data analysis, 19. Counterfeit medicine detection system, 20.
SDN-enabled intrusion detection system using machine learning and neural
network schemes, 21. Information security awareness in higher education:
The need for a tailor-made suit
implications of container live migration in clouds: An approach performed
on Amazon Web Services (AWS), 2. A deep learning (DL) framework for
gastrointestinal (GI) abnormality classification and localization within
WCE images, 3. Breast cancer segmentation using U-Net and transfer learning
approaches, 4. Transforming graphics processing unit-accelerated machine
learning (ML) environments with Docker Cloud containers, 5. A review of
image-based deep learning approaches for atmospheric visibility estimation,
6. Advancing cloud security: Evaluating interpretable machine learning
algorithms for DDoS attack detection, 7. Classification of gastrointestinal
(GI) bleeding in WCE images based on fusing a stabilizing block with
Xception, 8. Lung tumor recognition and classification in CT scan images
using CNNs, transfer learning, and ensemble learning, 9. A new pedestrian
detection method for intelligent surveillance systems, Part II. Smart
applications, 10.Compensation of harmonic currents for shunt active power
filter using ADALINE neural network, 11. Control of a grid-connected
photovoltaic system based on MPPT and vector control, 12. GeoArgania: A
geolocation mapping dataset of Argania trees in the Souss region, 13. PSM
model for NoSQL key-value databases through model programming, 14. Body
temperature screening during COVID-19 pandemic, 15. Signal processing
system for Heart Rate Extraction via LabVIEW, 16. Investigating the impacts
of COVID-19 over time using sentiment analysis and topic modeling, Part
III. Internet of Things (IoT) and big data, 17. Smart EV routing to
charging stations for traffic optimization in smart cities: A case study in
Agadir, 18. Dual-scored dimensionality reduction and spectral unmixing for
hyperspectral data analysis, 19. Counterfeit medicine detection system, 20.
SDN-enabled intrusion detection system using machine learning and neural
network schemes, 21. Information security awareness in higher education:
The need for a tailor-made suit
Part I. Artificial intelligence (AI), 1. Resource utilization and cost
implications of container live migration in clouds: An approach performed
on Amazon Web Services (AWS), 2. A deep learning (DL) framework for
gastrointestinal (GI) abnormality classification and localization within
WCE images, 3. Breast cancer segmentation using U-Net and transfer learning
approaches, 4. Transforming graphics processing unit-accelerated machine
learning (ML) environments with Docker Cloud containers, 5. A review of
image-based deep learning approaches for atmospheric visibility estimation,
6. Advancing cloud security: Evaluating interpretable machine learning
algorithms for DDoS attack detection, 7. Classification of gastrointestinal
(GI) bleeding in WCE images based on fusing a stabilizing block with
Xception, 8. Lung tumor recognition and classification in CT scan images
using CNNs, transfer learning, and ensemble learning, 9. A new pedestrian
detection method for intelligent surveillance systems, Part II. Smart
applications, 10.Compensation of harmonic currents for shunt active power
filter using ADALINE neural network, 11. Control of a grid-connected
photovoltaic system based on MPPT and vector control, 12. GeoArgania: A
geolocation mapping dataset of Argania trees in the Souss region, 13. PSM
model for NoSQL key-value databases through model programming, 14. Body
temperature screening during COVID-19 pandemic, 15. Signal processing
system for Heart Rate Extraction via LabVIEW, 16. Investigating the impacts
of COVID-19 over time using sentiment analysis and topic modeling, Part
III. Internet of Things (IoT) and big data, 17. Smart EV routing to
charging stations for traffic optimization in smart cities: A case study in
Agadir, 18. Dual-scored dimensionality reduction and spectral unmixing for
hyperspectral data analysis, 19. Counterfeit medicine detection system, 20.
SDN-enabled intrusion detection system using machine learning and neural
network schemes, 21. Information security awareness in higher education:
The need for a tailor-made suit
implications of container live migration in clouds: An approach performed
on Amazon Web Services (AWS), 2. A deep learning (DL) framework for
gastrointestinal (GI) abnormality classification and localization within
WCE images, 3. Breast cancer segmentation using U-Net and transfer learning
approaches, 4. Transforming graphics processing unit-accelerated machine
learning (ML) environments with Docker Cloud containers, 5. A review of
image-based deep learning approaches for atmospheric visibility estimation,
6. Advancing cloud security: Evaluating interpretable machine learning
algorithms for DDoS attack detection, 7. Classification of gastrointestinal
(GI) bleeding in WCE images based on fusing a stabilizing block with
Xception, 8. Lung tumor recognition and classification in CT scan images
using CNNs, transfer learning, and ensemble learning, 9. A new pedestrian
detection method for intelligent surveillance systems, Part II. Smart
applications, 10.Compensation of harmonic currents for shunt active power
filter using ADALINE neural network, 11. Control of a grid-connected
photovoltaic system based on MPPT and vector control, 12. GeoArgania: A
geolocation mapping dataset of Argania trees in the Souss region, 13. PSM
model for NoSQL key-value databases through model programming, 14. Body
temperature screening during COVID-19 pandemic, 15. Signal processing
system for Heart Rate Extraction via LabVIEW, 16. Investigating the impacts
of COVID-19 over time using sentiment analysis and topic modeling, Part
III. Internet of Things (IoT) and big data, 17. Smart EV routing to
charging stations for traffic optimization in smart cities: A case study in
Agadir, 18. Dual-scored dimensionality reduction and spectral unmixing for
hyperspectral data analysis, 19. Counterfeit medicine detection system, 20.
SDN-enabled intrusion detection system using machine learning and neural
network schemes, 21. Information security awareness in higher education:
The need for a tailor-made suit