Search alternatives:
making algorithm » cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
implementing » implemented (Expand Search)
element » elements (Expand Search)
making algorithm » cosine algorithm (Expand Search)
coding algorithm » cosine algorithm (Expand Search), colony algorithm (Expand Search), scheduling algorithm (Expand Search)
mean algorithm » deer algorithm (Expand Search), search algorithm (Expand Search)
implementing » implemented (Expand Search)
element » elements (Expand Search)
-
81
Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
Published 2015“…First, our approach resolves the complexity of policies by elaborating an intermediate set-based representation to which the elements of XACML are automatically converted. Second, it allows to detect flaws, conflicts and redundancies between rules by offering new mechanisms to analyze the meaning of policy rules through semantics verification by inference rule structure and deductive logic. …”
Get full text
Get full text
Get full text
article -
82
An efficient cache replacement strategy for the hybrid cache consistency approach
Published 2010“…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
Get full text
Get full text
Get full text
article -
83
After generative AI : preparing faculty to transform education, learning, and pedagogy
Published 2025“…Going beyond basic explanations, Hardey and Aad provide practical insights and implementation strategies that recognize the concerns and ethical challenges related to GAI, such as bias in algorithms, privacy issues, and the need for inclusivity. …”
Get full text
Get full text
Get full text
Get full text
bookPart -
84
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
85
Assessment of calcified aortic valve leaflet deformations and blood flow dynamics using fluid-structure interaction modeling
Published 2017“…However, implementation of this approach is difficult using custom built codes and algorithms. In this paper, we present an FSI modeling methodology for aortic valve hemodynamics using a commercial modeling software, ANSYS. …”
Get full text
Get full text
Get full text
article -
86
-
87
FPGA-Based Network Traffic Classification Using Machine Learning
Published 2019Get full text
doctoralThesis -
88
LDSVM: Leukemia Cancer Classification Using Machine Learning
Published 2022“…Moreover, a Synthetic minority oversampling technique (SMOTE) and Principal compenent analysis (PCA) approaches were implemented. This makes the records generalized and evaluates the outcomes well. …”
-
89
Use of Data Mining Techniques to Detect Fraud in Procurement Sector
Published 2022“…The findings from this study will help implement a system that will significantly reduce fraud in the procurement sector. …”
Get full text
-
90
Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases
Published 2024“…These AI algorithms are effective non-invasive biomarkers for cardiovascular illnesses because they can identify subtle patterns and signals in the ECG that may not be readily apparent to human interpreters. …”
-
91
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
Published 2023“…However, despite the significant impact of AI design on human interests, the security and trustworthiness of edge AI applications are not foolproof and ethicalneither foolproof nor ethical; Moreover, social norms are often ignored duringin the design, implementation, and deployment of edge AI systems. In this paper, we make the following two contributions: Firstly, we analyze the application of edge AI through a human-centric perspective. …”