استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Hybrid Deep Neural Network Based Recommendation Through ImplicitInteractions /
Racism Detection in Twitter Using Deep Learning and Text Mining Techniques for the Arabic language /
Detecting Threats from Live videos Using Deep Learning Algorithms /
Development of a network-based intrusion prevention system using data mining approach \
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
Voice Command and Gesture Recognition using Multimodal Deep Learning /
Remote Access Trojan Detection Method Based on Bidirectional Encoder Representations from Transformers /
Resource Allocation Based on Swarm Intelligence for Securing Cloud Environment Against Multi-Tenancy Attack /
The Investigation of the Effect of Ensemble Learning for Assisting the Employment Process /
Enhancing User Reputation Evaluation in Blockchain-Based Access Control for IoT using Fuzzy Logic and Decay Algorithms /
Deep learning /
Identifying Fake Twitter Trends with Deep Learning /
Multivariate Time-Series Anomaly Detection for Industrial Control Systems /
A Component-Based Functional Model for E-Learning Systems /
Arabic Grammatical Error Detection Using Tranformers-based pretrained language models /
Knowledge-based systems in artificial intelligence /
Applying Machine Learning techniques to detect Money Laundering in Kingdom of Saudi Arabia /
IoT-Based Remote HealthCare Monitoring System for the Pilgrims /
Detecting Sensitive Information For Data Loss Prevention Using Layers Selection In Deep Learning/
Intelligent systems design and applications /
Principles of data mining /
Arabic Sentiment Analysis Using Machine Learning Algorithms of Twitter Data Based on Spatial and Temporal Analysis - Case Study /
Branch and bound and A* search using fuzzy underestimates \
Artificial intelligence : a modern approach /
Application of agents and intelligent information technologies /
7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009) /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Almost human : making robots think /
Advances in applied artificial intelligence /
Branch and Bound and A Search Using Fuzzy Underestimates /
Encyclopedia of artificial intelligence /
Intelligent information technologies : concepts, methodologies, tools, and applications.
Intelligent computer graphics 2010 /
Metamagical themas : questing for the essence of mind and pattern /
Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /
Applications of information systems to homeland security and defense /
Structured computer organization /
Computer organization and architecture : designing for performance /
Computer organization and design : the hardware/software interface /
The Essentials of computer organization and architecture /
Parallel computer organization and design /
Toward a Successful Virtual School System Implementation : A Case Study of the Saudi Arabia Ministry of Education /
Predicting and Mining Real Estate Data /
The essentials of computer organization and architecture /
Ensemble-based Deep Learning Intrusion Detection System for Spoofing Attack on UAV /
Structured computer organization
Human Behaviour classification indigital forensics with BERT via realsurveillance cameras' videos /