Showing 1 - 20 results of 22 for search '(( python code implementation ) OR ( methods fail implementations ))', query time: 0.09s Refine Results
  1. 1

    Analysing Factors Influencing AI Implementation Effectiveness in the UAE Public Sector by ALAWADHI, JASSIM

    Published 2023
    “…Existing literature reveals that organisations' cognitive technology projects fail to meet their successful implementation. Therefore, the AI-deployed system fails to deliver the expected performance and objective outcome. …”
    Get full text
  2. 2

    Teacher Perceptions of the New Mathematics and Science Curriculum: A Step Towards STEM Implementation in Saudi Arabia by MADANI, REHAF A.

    Published 2017
    “…The methodology of the study was completed by using a parallel mixed method design, including teachers interviews and class observational methods in the qualitative part of the research study, and a cross sectional questionnaire in the quantitative part which was distributed to 547 high school mathematics and science teachers in different regions in Saudi Arabia in order to address the following research questions: What are the major aspects of the new mathematics and science curricula as a form of STEM education implementation in Saudi Arabia? …”
    Get full text
  3. 3
  4. 4

    Exploring the potential of onboard energy scavenging subsystems for generating valuable data by Raziq Yaqub (16488878)

    Published 2023
    “…This gathered data is seamlessly synchronized with GPS coordinates and timestamps, meticulously organized within a system architecture, and harnessed through meticulously crafted Python code. The wealth of data that we obtain from an onboard energy scavenging subsystem holds significant potential. …”
  5. 5

    Multigrid solvers in reconfigurable hardware by Haraty, Ramzi A.

    Published 2008
    “…For this reason, many attempts for exploiting the inherent parallelism of Multigrid have been made to achieve the desired efficiency and scalability of the method. Yet, most efforts fail in this respect due to many factors (time, resources) governed by software implementations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  6. 6

    Distributed DRL-Based Downlink Power Allocation for Hybrid RF/VLC Networks by Bekir Sait Ciftler (17541801)

    Published 2021
    “…Conventional resource allocation techniques fail to overcome these challenges. Heuristic methods can solve high complexity problems; however, they are not robust against changes such as dynamic channel conditions or alternating user requirements. …”
  7. 7

    Metaheuristics for portfolio optimization by Mansour, Nashat

    Published 2017
    “…We address the portfolio optimization problem with real-world constraints, where traditional optimization methods fail to efficiently find an optimal or near-optional solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  8. 8
  9. 9

    An Artificial Intelligence Approach for Predictive Maintenance in Electronic Toll Collection System by Alkhatib, Osama

    Published 2019
    “…Two types of machine learning models namely classification and regression model were developed and implemented to predict the failure and abnormal behavior of the system. …”
    Get full text
  10. 10

    Extracranial traumatic carotid artery dissections in children by Chamoun, Roukoz B.

    Published 2008
    “…These recommendations include utilizing MR angiography as a screening tool in cases in which the clinical suspicion of CAD is high, using conventional cerebral angiography to confirm the diagnosis, implementing antiplatelet therapy as initial medical management, and reserving endovascular stenting in cases of failed medical treatment.…”
    Get full text
    Get full text
    Get full text
    article
  11. 11

    Protecting Smart Homes: A study on AI approaches to Detect Malwares and Developing a Two Factor Authentication System Based on SRAM PUF For Smart Home Users in UAE by ALSHAMSI, OMAR KHALIFA ALI ALREZI

    Published 2025
    “…The current research seizes this research gap as an opportunity to address unauthorized access threats in smart homes by proposing a dual approach: one component emphasizes malware detection via machine learning, while the other incorporates a two-factor authentication system which integrates a hardware-based security feature, the static random-access memory (SRAM) Physical Unclonable Function (PUF), with a user-created password, providing enhanced protection against unauthorized access. Numerous existing methods, such as multi-factor authentication, frequently proved inadequate in practical scenarios, failing to resolve problems like weak passwords and insecure connections. …”
    Get full text
  12. 12
  13. 13

    Delay to Projects - Cause, Effect and Measures to Reduce/Eliminate Delay by Mitigation/Acceleration by Saeed, Shaikh Asif Abdus

    Published 2009
    “…The second case is a project which failed in its objectives of completion in time as well as budget. …”
    Get full text
  14. 14

    The impact of stakeholder integration on large-scale, innovative PPP infrastructure projects by ALBALOOSHI, HOORIAH AHMED

    Published 2020
    “…Much research has addressed the success factors of public and private sector projects and related challenges where a set of common factors have been identified, including stakeholder management factor. Examples of failed PPP projects indicate that some of the projects failed due to stakeholder related issues such as stakeholders’ knowledge, experience, and engagement. …”
    Get full text
  15. 15

    Wellness Program Within Primary Health Care: How to Avoid “No Show” to Planned Appointments? – A Patient-Centred Care Perspective by Sarah Musa (12269578)

    Published 2021
    “…The first survey was regarding the appointment reminder’s method preference. Accordingly, the demanded reminder system has been implemented as per patients’ preferences and then the rate of completion of the 12-weeks-wellness-program has been compared to the months preceding the intervention to demonstrate the effectiveness of this new reminder system. …”
  16. 16
  17. 17

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…Nearly many data mining techniques have failed because of the small sample size, which has become more critical for organizations. …”
  18. 18

    Platelet‐rich plasma intra‐articular knee injections from open preparation techniques do not pose a higher risk of joint infection: A systematic review of 91 randomized controlled... by Mohammad Sami Alazzeh (19730056)

    Published 2024
    “…Only 16 studies (17.58%) failed to report joint infections. Among the studies reporting joint infections as outcomes, 30 implemented a closed technique with 1195 patients, 1921 intra‐articular knee injections and 95.44% of patient follow‐up. …”
  19. 19

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
    Get full text
  20. 20