Showing 121 - 126 results of 126 for search '(( implement finding algorithm ) OR ((( element data algorithm ) OR ( relevant study algorithm ))))', query time: 0.11s Refine Results
  1. 121

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…Finally, we explore the viability and the relevance of our propositions by applying the defined approach for systematic security hardening to develop case studies.…”
    Get full text
    Get full text
    Get full text
    article
  2. 122

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…The technology stack of the proposed solution was also implemented with four algorithms and eight protocols. …”
    Get full text
  3. 123

    THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar by M. Walid Qoronfleh (14153088)

    Published 2020
    “…It is here. Implementing PM in routine clinical care does require some investment and infrastructure development. …”
  4. 124
  5. 125

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
    Get full text
  6. 126

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”