AN OVERVIEW OF ARTIFICIAL INTELLIGENCE TECHNIQUES USED IN KINGDOM OF SAUDI ARABIA
Journal Title: World Journal of Engineering Research and Technology - Year 2017, Vol 3, Issue 4
Abstract
The paper discussed an investigative study of of Artificial Intelligence Techniques used in the Kingdom of Saudi Arabia. The paper has adopted a methodology in which questionnaires were filled by different people, which help a researcher to investigate about level of acceptance of Biometric Technology in Kingdom of Saudi Arabia. The results of this study indicated that many people have accepted the presence of biometric technology in their life. However, there are some people who could not accept this fact; it is due to a cultural gap with technology. People are accepting these changes but need to gain more awareness of the significance of Biometric technology. Based on the findings of this paper people need to be aware about these technologies before any implementation.
Authors and Affiliations
Bushra Mohamed Elamin Elnaim
EFFECT OF FOLIAGE ON MOBILE RADIO PROPAGATION CHARACTERISTIC IN MTN NIGERIA AND AIRTEL NIGERIA (A CASE STUDY OF MAIDUGURI METROPOLIS)
This research investigated the effects of foliage on mobile networks. The wet season is known to be characterized by increase in foliage due to increased moisture content. Global System for Mobile Communications (GSM) si...
WIFI ENABLED TOXIC GAS AND LANDMINE DETECTING ROBOTIC VEHICLE
Demining is the process of detecting and removing land mines from a mined area. Uncleared landmines present a major humanitarian and economic threat in several countries, so it is necessary to find and remove it. The exi...
RESEARCH ON POSSIBILITY OF INCREASED FUEL ECONOMY WHILE AT LIGHT LOADING OF THE DIESEL ENGINEOF WHEELED TRACTOR
We proved by experiment the theory that in the MTZ tractor commonly used in various sectors of industry that fuel efficiency is lost at light loading. For the first time we applied the changes in design to the oblique ed...
FUZZY STRONG BI-IDEALS OF NEAR-RINGS
In this paper we introduce the notation of fuzzy strong bi-ideal of a near-ring and obtain a characterization of a strong bi-ideal in terms of a fuzzy strong bi-ideal of a near-ring. We establish that every fuzzy left N-...
DESIGN OF MULTI-LEVEL ALGORITHM FOR DATA STORAGE SECURITY IN CLOUD COMPUTING
Cloud computing is an Internet based technology where a large amount of computing resources are shared as a services. Since data is shared in cloud, security of the data is considered as the major concern in cloud comput...