استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Enhancing User Reputation Evaluation in Blockchain-Based Access Control for IoT using Fuzzy Logic and Decay Algorithms /
IoT-Based Remote HealthCare Monitoring System for the Pilgrims /
Ensemble-based Deep Learning Intrusion Detection System for Spoofing Attack on UAV /
Racism Detection in Twitter Using Deep Learning and Text Mining Techniques for the Arabic language /
A Hybrid Intelligent System for Prediction of Medical Diseases /
Multivariate Time-Series Anomaly Detection for Industrial Control Systems /
The tiger and the Trojan horse /
An Investigation of the Role of Image Properties in Influencing The Accuracy of Remote Sensing Change Detection Analysis /
Applying Machine Learning techniques to detect Money Laundering in Kingdom of Saudi Arabia /
Role-based access control /
Encoded Archival Description on the Internet /
Hybrid Deep Neural Network Based Recommendation Through ImplicitInteractions /
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Artificial intelligence Methods in Software Testing /
Introduction to remote sensing /
Knowledge-based systems in artificial intelligence /
The world as will and representation /
The world as will and representation.
Knowledge representation /
Sentiment Analysis of Twitter to Detect Signs of Depression using a Hybrid Model /
Intelligent systems design and applications /
The Investigation of the Effect of Ensemble Learning for Assisting the Employment Process /
Principles of data mining /
Arabic Sentiment Analysis Using Machine Learning Algorithms of Twitter Data Based on Spatial and Temporal Analysis - Case Study /
Branch and bound and A* search using fuzzy underestimates \
Artificial intelligence : a modern approach /
Application of agents and intelligent information technologies /
7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009) /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Almost human : making robots think /
Advances in applied artificial intelligence /
Branch and Bound and A Search Using Fuzzy Underestimates /
Encyclopedia of artificial intelligence /
Intelligent information technologies : concepts, methodologies, tools, and applications.
Intelligent computer graphics 2010 /
Metamagical themas : questing for the essence of mind and pattern /
Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /
Applications of information systems to homeland security and defense /
Dictionnaire de l'informatique : francais, anglais, arabe : avec abreviations francaises, abreviations anglaises, lexique anglais-francais et glossaire arabe /
Discrete mathematics in computer science /
International Computing Symposium, 1977 : proceedings of the International Computing Symposium, 1977, Liege, Belgium, 4-7 April 1977 /
Introduction to probability and statistics : principles and applications for engineering and the computing sciences /
Data processing, an introduction with BASIC /
An Introduction to high-performance scientific computing /
Basic English for computing: Teacher's book/
A dictionary of computers/
The information age /
Computers and microprocessors made simple /
Electronic data processing/
Structured systems analysis : tools and techniques /
Minicomputers in libraries, 1979-80 /
Writing handbook for computer professionals /
Computing : a dictionary of terms, concepts and ideas /
Introduction to IBM data processing systems: student text
Introduction to computer data processing /
Computers and crisis : how computers are shaping our future /
Distributed systems : concepts and design /
Introduction to computers /
Remote Access Trojan Detection Method Based on Bidirectional Encoder Representations from Transformers /