Showing 261 - 276 results of 276 for search '(( implement making algorithm ) OR ((( element data algorithm ) OR ( present work algorithm ))))', query time: 0.10s Refine Results
  1. 261

    Building power consumption datasets: Survey, taxonomy and future directions by Yassine Himeur (14158821)

    Published 2020
    “…Accordingly, a novel visualization strategy based on using power consumption micro-moments has been presented along with an example of deploying machine learning algorithms to classify the micro-moment classes and identify anomalous power usage.…”
  2. 262
  3. 263
  4. 264

    Combining offline and on-the-fly disambiguation to perform semantic-aware XML querying by Tekli, Joe

    Published 2023
    “…Most methods rely on the concept of Lowest Comment Ancestor (LCA) between two or multiple structural nodes to identify the most specific XML elements containing query keywords posted by the user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  5. 265

    An efficient cache replacement strategy for the hybrid cache consistency approach by Haraty, Ramzi A.

    Published 2010
    “…Nevertheless, caching has its limitations too, due to the limited cache size and the limited bandwidth, which makes the implementation of cache replacement strategy an important aspect for improving the cache consistency algorithms. …”
    Get full text
    Get full text
    Get full text
    article
  6. 266

    After generative AI : preparing faculty to transform education, learning, and pedagogy by Hardey, Mariann

    Published 2025
    “…Going beyond basic explanations, Hardey and Aad provide practical insights and implementation strategies that recognize the concerns and ethical challenges related to GAI, such as bias in algorithms, privacy issues, and the need for inclusivity. …”
    Get full text
    Get full text
    Get full text
    Get full text
    bookPart
  7. 267
  8. 268
  9. 269

    Enhancing e-learning through AI: advanced techniques for optimizing student performance by Rund Mahafdah (21399854)

    Published 2024
    “…AI algorithms, known for their cognitive ability and capacity to learn, adapt, and make decisions, are employed to analyze and forecast student performance, thereby improving educational quality and outcomes. …”
  10. 270
  11. 271

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…Moreover, a Synthetic minority oversampling technique (SMOTE) and Principal compenent analysis (PCA) approaches were implemented. This makes the records generalized and evaluates the outcomes well. …”
  12. 272

    Engineering the advances of the artificial neural networks (ANNs) for the security requirements of Internet of Things: a systematic review by Yasir Ali (799969)

    Published 2023
    “…Therefore, a systematic approach is presented to unfold the efforts and approaches of ANNs towards the security challenges of IoT. …”
  13. 273

    Various Faults Classification of Industrial Application of Induction Motors Using Supervised Machine Learning: A Comprehensive Review by Rehaan Hussain (22302742)

    Published 2025
    “…This paper presents a comprehensive review of recent techniques proposed in the literature for bearing, stator winding and broken rotor bar faults with machine learning algorithms focused on fault detection for numerous faults. …”
  14. 274

    Artificial intelligence-enhanced electrocardiography for accurate diagnosis and management of cardiovascular diseases by Muhammad Ali Muzammil (17910611)

    Published 2024
    “…These AI algorithms are effective non-invasive biomarkers for cardiovascular illnesses because they can identify subtle patterns and signals in the ECG that may not be readily apparent to human interpreters. …”
  15. 275

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…However, despite the significant impact of AI design on human interests, the security and trustworthiness of edge AI applications are not foolproof and ethicalneither foolproof nor ethical; Moreover, social norms are often ignored duringin the design, implementation, and deployment of edge AI systems. In this paper, we make the following two contributions: Firstly, we analyze the application of edge AI through a human-centric perspective. …”
  16. 276

    Dynamic Cyber Resilience of Interdependent Critical Information Infrastructures by JUMA, MAZEN GHAZI

    Published 2021
    “…Finally, study limitations and recommendations for future works represented the research outcomes and contributions.…”
    Get full text