استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Analysis Of Private Information Leakage From Saudis On Twitter - Online Social Network /
Visualization of Arabic Entities in Online Social Media using Machine Learning /
Intelligent systems design and applications /
Wireless sensor networks from theory to applications /
Cryptography and network security : principles and practice /
Hybrid Deep Neural Network Based Recommendation Through ImplicitInteractions /
Empirical Analysis of Software Test Suite Evolution /
Information Hiding Using Intelligent Steganography/
Neural networks : computational models and applications /
Network analysis, architecture, and design /
Design and analysis of computer communication networks /
Social networks and social support /
Data analysis in forensic science : a Bayesian decision perspective /
Application of agents and intelligent information technologies /
The basics of digital forensics : the primer for getting started in digital forensics /
Using Blockchain Technology to Enhance Reliability of the Online Hotels Reviews /
Applications, basics, and computing of exploratory data analysis /
Cellular neural networks and visual computing : foundation and applications /
Mining the social web /
The Investigation of the Effect of Ensemble Learning for Assisting the Employment Process /
Principles of data mining /
Arabic Sentiment Analysis Using Machine Learning Algorithms of Twitter Data Based on Spatial and Temporal Analysis - Case Study /
Branch and bound and A* search using fuzzy underestimates \
Artificial intelligence : a modern approach /
7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009) /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Almost human : making robots think /
Knowledge-based systems in artificial intelligence /
Advances in applied artificial intelligence /
Branch and Bound and A Search Using Fuzzy Underestimates /
Encyclopedia of artificial intelligence /
Intelligent information technologies : concepts, methodologies, tools, and applications.
Intelligent computer graphics 2010 /
Metamagical themas : questing for the essence of mind and pattern /
Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /
Applications of information systems to homeland security and defense /
Understanding cryptography : a textbook for students and practitioners /
Bi-directional transition mechanism between IPv4 and IPv6 \
Image encryption based on chaos technique \
FORENSIC ANALYSIS OF ONLINE SOCIAL NETWORKING APPLICATIONS /
Security Investigation and Analysis of OpenID: Problems and Enhancements /
Privacy and practicality of identity management systems : academic overview /