تخطي إلى المحتوى
VuFind
  • شاركنا بملاحظاتك!
  • سلة الكتب: 0 مادة (ممتلئ)
  • تسجيل الدخول
    • العربية
    • الإنجليزية

اكتشف مناهل المعرفة!

استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها

بحث متقدم
  • الكل
  • فهرس المكتبة
  • المستودع الرقمي
  • القنوات
  • Detecting Threats from Live videos Using Deep Learning Algorithms /
البحث عن المزيد من القنوات:

مواد مشابهة: Detecting Threats from Live videos Using Deep Learning Algorithms /

Ensemble-based Deep Learning Intrusion Detection System for Spoofing Attack on UAV /

Detecting the risk of violence from the language used in a threat \

Virus detection using artificial immune system with genetic algorithm \

Racism Detection in Twitter Using Deep Learning and Text Mining Techniques for the Arabic language /

Deep learning /

Using Deep Learning Algorithms to Diagnose Coronavirus Disease (COVID-19) /

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

Prediction of Volatility in Stock Commodities using Deep Learning /

Detecting Sensitive Information For Data Loss Prevention Using Layers Selection In Deep Learning/

Living and learning /

Arabic Image Caption Generator Using Deep Learning Techniques /

Learning to live; flags on the battlements.

Accuracy Analysis of Machine Learning Algorithms in Detecting Fals Alarms For IOT Networks /

Classification and learning using genetic algorithms : applications in bioinformatics and web intelligence /

Voice Command and Gesture Recognition using Multimodal Deep Learning /

Enhancing Saudi High School Students Intrinsic Motivation when learning \

Learning to live with others : a high school psychology /

Algorithms /

Identifying Fake Twitter Trends with Deep Learning /

The origin of cells from living substance /

موضوع: Computer security

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

موضوع: Computer systems

  • موضوع: Reliability

A Unified Framework for Automating Software Security Analysis in DevSecOps /

Detecting Threats from Live videos Using Deep Learning Algorithms /

Trust in E-services : technologies, practices and challenges /

Computer Network System for University Hospitals in Saudi Arabia /

Architecture of computing systems--ARCS 2007 : 20th international conference, Zurich, Switzerland, March 12-15, 2007 /

المؤلف: AlShehri, Rawan Aamir Mushabab

Detecting Threats from Live videos Using Deep Learning Algorithms /

المؤلف: Saudagar, Abdul Khader Jilani

Customer Churn Prediction in the Telecom Industry Using Machine Learning Techniques /

The Effectiveness of Introducing Programming Through Gamification Approach in Primary Schools to Enhance Creative Thinking Skills /

Visualization of Arabic Entities in Online Social Media using Machine Learning /

Detecting Threats from Live videos Using Deep Learning Algorithms /

Adoption of Learning Relationship Management (LRM) Platform for Enhancing Student Learning and Satisfaction in Saudi Universities /

Prediction of Volatility in Stock Commodities using Deep Learning /

Applying Machine Learning techniques to detect Money Laundering in Kingdom of Saudi Arabia /

Severity Prediction in COVID-19 Patients Using Machine Learning Algorithms /

اكتشف المعرفة مع بوابة الاكتشاف الرقمي لجامعة الإمام محمد بن سعود الإسلامية

اطلع على آلاف الموارد الأكاديمية، والمواد البحثية، والمنشورات العلمية

ابدأ الاستكشاف الآن
Imam University Team
Imam University Logo

جامعة الإمام محمد بن سعود الإسلامية

الرياض، المملكة العربية السعودية
+966 11 259 5000
info@imamu.edu.sa

الموارد

  • استعراض الفهرس
  • استعرض أبجدياً
  • اكتشف القنوات
  • الحجز الأكاديمي
  • مواد جديدة
  • موارد تعليمية
  • ImamU API

البحث والمساعدة

  • بحث بسيط
  • بحث متقدم
  • سجل البحث
  • شاركنا بملاحظاتك!
  • إرشادات حول معاملات البحث
  • إسأل أخصائي مكتبات
  • مساعدة
  • الأسئلة الشائعة
  • اتفاقية مستوى الخدمة
  • اتفاقية المستخدم

تواصل معنا

© 2026 جامعة الإمام محمد بن سعود الإسلامية. جميع الحقوق محفوظة.

VuFind