Search alternatives:
implementing finding » implementing bundled (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
implementing finding » implementing bundled (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
element » elements (Expand Search)
-
61
On the disk dimension of planar graphs
Published 2011“…More significantly, we devise a direct and highly practical linear-time algorithm to decide whether an arbitrary graph has fixed disk dimension k or less. …”
Get full text
Get full text
Get full text
conferenceObject -
62
Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation
Published 2023“…Additionally, a clustering algorithm with a fuzzy membership function is implemented, allowing the robots to advance in accordance with predefined clusters and arrive at their starting place within a predetermined amount of time. …”
-
63
Assessment of Inventory and Transportation Collaboration in a Logistics Marketplace
Published 2020Get full text
doctoralThesis -
64
AI-based remaining useful life prediction and modelling of seawater desalination membranes
Published 2024Get full text
doctoralThesis -
65
THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar
Published 2020“…It is here. Implementing PM in routine clinical care does require some investment and infrastructure development. …”
-
66
Dynamic multiple node failure recovery in distributed storage systems
Published 2018“…In this work, we address the problem of multiple failure recovery with dynamic scenarios using the fractional repetition code as a redundancy scheme. The fractional repetition (FR) code is a class of regenerating codes that concatenates a maximum distance separable code (MDS) with an inner fractional repetition code where data is split into several blocks then replicated and multiple replicas of each block are stored on various system nodes. …”
Get full text
Get full text
Get full text
Get full text
article -
67
-
68
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. We find this feature necessary in order to implement security hardening solutions that are infeasible or impractical using the current AOP proposals. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
69
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
70
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
71
Exploring AI Conversational Chatbot UX Design: Insights from High School
Published 2025“…The authors in this study conducted a semi-structured qualitative interview with six high school students in UAE and the MAXQDA Analytics software—ver. 22.6.0 is implemented by processing the thematic analysis to study the findings. …”
Get full text
-
72
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
-
73
Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri...
Published 2025“…Yet several barriers were highlighted. Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …”
Get full text
-
74
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…This essentially makes it easy to detect fraud and thus prevents it from happening. The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
Get full text
-
75
Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features
Published 2024“…This study employed supervised learning algorithms to classify stress and relaxation states using HRV measures. …”
-
76
Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures
Published 2021“…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
Get full text
-
77
Developing a UAE-Based Disputes Prediction Model using Machine Learning
Published 2022Get full text
doctoralThesis -
78
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”