Explore our comprehensive collection of books, articles, digital media, and more
LACE: locust-inspired scheduling algorithm to reduce consumed energy in cloud data centers /
Ant Colony Priority-Aware Scheduling Algorithm for Cloud Computing Environment /
Cloud computing for libraries /
Intelligent Path Planning in Dynamic Environment /
Transforming enterprise cloud services /
Intelligent data mining : techniques and applications /
Cloud Computing Third International Conference, CloudComp 2012, Vienna, Austria, September 24-26, 2012, Revised Selected Papers
Resource Allocation Based on Swarm Intelligence for Securing Cloud Environment Against Multi-Tenancy Attack /
الدليل التقني BIOS /
The COBOL environment /
Thermodynamics of clouds /
Racism Detection in Twitter Using Deep Learning and Text Mining Techniques for the Arabic language /
The Impact of using zSpace System as a Virtual Learning Environment in Saudi Arabia : A case study of Al-Hamra School for Girls in Jeddah /
Detecting Violence In Videos Using Movies Transcripts (Arabic Movie Or Dubbed Animations) By Using Text Mining Techniques /
Identifying Fake Twitter Trends with Deep Learning /
Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /
أسرار عالم ال BIOS /
Task reading /
Features Selection for Image Steganalysis Using Swarm Intelligence /
Resources, environment, and economics : applications of the materials/energy balance principle /
The Effectiveness of Introducing Programming Through Gamification Approach in Primary Schools to Enhance Creative Thinking Skills /
Software engineering and knowledge engineering: Theory and Practice selected papers from 2012 International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2012) /
Assessment of Impact of discussion of COVID-19 on Twitter on Saudi stock exchange market using Machine Learning Technique /
New advances in intelligent decision technologies : results of the first KES International Symposium IDT 2009 /
Artificial intelligence : foundations of computational agents /
Predicting and Mining Real Estate Data /
Enhancing User Reputation Evaluation in Blockchain-Based Access Control for IoT using Fuzzy Logic and Decay Algorithms /
Electrical engineering and intelligent systems /
Binary Bio-inspired Load Balancing Task Scheduling in Cloud Environments /
Computational intelligence for engineering and manufacturing /
Information Hiding Using Intelligent Steganography/
Genetic Algorithm for the Generalized Travelling Salesman Problem /
An Energy Efficient Routing Algorithm Using Chaotic Grey Wolf with Mobile Sink-Based Path Optimization for Wireless Sensor Networks /
The elements of statistical learning : data mining, inference and prediction /
Hybrid Deep Neural Network Based Recommendation Through ImplicitInteractions /
Predicting the Severity of COVID-19 in the Kingdom of Saudi Arabia using Machine Learning Algorithms /
Principles of data mining /
Visualizing discovered knowledge in databases mining \
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Data mining : concepts and techniques /
Fundamentals of database systems /
Fundamentals of data mining in genomics and proteomics /
Research and trends in data mining technologies and applications /
Evaluating the Performance of Multiple Sequence Alignment Algorithms with Application to Genotyping SARS-CoV-2 for Saudis Population /
Mining the social web /
Visualization of Arabic Entities in Online Social Media using Machine Learning /
Web data mining : exploring hyperlinks, contents, and usage data /
Handbook of research on fuzzy information processing in databases /
Cyberbullying Detection Using Text Mining Techniques and Semantic Resources in the Arabic Language / By Alanood Hamad Abdulaziz supervised by Muhammad Badruddin Khan
Automatic Temporal Classification of Arabic Texts /
Advanced data mining and applications : second international conference, ADMA 2006, Xi'an, China, August 14-16, 2006 : proceedings /
Intelligent information processing and web mining : proceedings of the international IIS: IIPWM'06 conference held in Ustron, Poland, June 19-22, 2006 /
A Unified Framework for Automating Software Security Analysis in DevSecOps /
Energy-aware virtual network embedding approach for distributed cloud /