Explore our comprehensive collection of books, articles, digital media, and more
Detecting Violence In Videos Using Movies Transcripts (Arabic Movie Or Dubbed Animations) By Using Text Mining Techniques /
Identifying Fake Twitter Trends with Deep Learning /
Applying Machine Learning techniques to detect Money Laundering in Kingdom of Saudi Arabia /
Text mining techniques and semantic resources usage to identify different scholarly interpretations of religious text /
Voice Command and Gesture Recognition using Multimodal Deep Learning /
Deep learning /
Cyberbullying Detection Using Text Mining Techniques and Semantic Resources in the Arabic Language / By Alanood Hamad Abdulaziz supervised by Muhammad Badruddin Khan
Sentiment Analysis of Twitter to Detect Signs of Depression using a Hybrid Model /
Intelligent data mining : techniques and applications /
Ensemble-based Deep Learning Intrusion Detection System for Spoofing Attack on UAV /
Data mining : concepts and techniques /
Predicting The Early Factors of Graft Failure Within Year after The Transplantation UsingData Mining Techniques /
Investigative data mining for security and criminal detection /
Knowledge-based business intelligence depends on data mining technique \
Mining the social web /
Data Warehousing and Data Mining Techniques for Cyber Security /
Automatic Temporal Classification of Arabic Texts /
The elements of statistical learning : data mining, inference and prediction /
Introduction to Data Mining /
Intelligent systems design and applications /
The Investigation of the Effect of Ensemble Learning for Assisting the Employment Process /
Principles of data mining /
Arabic Sentiment Analysis Using Machine Learning Algorithms of Twitter Data Based on Spatial and Temporal Analysis - Case Study /
Branch and bound and A* search using fuzzy underestimates \
Artificial intelligence : a modern approach /
Application of agents and intelligent information technologies /
7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009) /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Almost human : making robots think /
Knowledge-based systems in artificial intelligence /
Advances in applied artificial intelligence /
Branch and Bound and A Search Using Fuzzy Underestimates /
Encyclopedia of artificial intelligence /
Intelligent information technologies : concepts, methodologies, tools, and applications.
Intelligent computer graphics 2010 /
Metamagical themas : questing for the essence of mind and pattern /
Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /
Applications of information systems to homeland security and defense /
The Effectiveness of Introducing Programming Through Gamification Approach in Primary Schools to Enhance Creative Thinking Skills /
Software engineering and knowledge engineering: Theory and Practice selected papers from 2012 International Conference on Software Engineering, Knowledge Engineering and Information Engineering (SEKEIE 2012) /
Assessment of Impact of discussion of COVID-19 on Twitter on Saudi stock exchange market using Machine Learning Technique /
New advances in intelligent decision technologies : results of the first KES International Symposium IDT 2009 /
Artificial intelligence : foundations of computational agents /
Intelligent Path Planning in Dynamic Environment /
Predicting and Mining Real Estate Data /
Enhancing User Reputation Evaluation in Blockchain-Based Access Control for IoT using Fuzzy Logic and Decay Algorithms /
Electrical engineering and intelligent systems /
Binary Bio-inspired Load Balancing Task Scheduling in Cloud Environments /
Computational intelligence for engineering and manufacturing /
Information Hiding Using Intelligent Steganography/
Racism Detection in Twitter Using Deep Learning and Text Mining Techniques for the Arabic language /
Genetic Algorithm for the Generalized Travelling Salesman Problem /
An Energy Efficient Routing Algorithm Using Chaotic Grey Wolf with Mobile Sink-Based Path Optimization for Wireless Sensor Networks /
Hybrid Deep Neural Network Based Recommendation Through ImplicitInteractions /
Predicting the Severity of COVID-19 in the Kingdom of Saudi Arabia using Machine Learning Algorithms /
Predicting the suitability of IS students' skills for the recruitment in Saudi Arabian industry /
Social Media Mining for Assessing Brand Popularity /