Showing 281 - 296 results of 296 for search '(( relevant data algorithm ) OR ((( implement finding algorithm ) OR ( levels using algorithm ))))', query time: 0.12s Refine Results
  1. 281

    CAD TOOL FOR THE AUTOMATIC-GENERATION OF MICROPROGRAMS by Sait, Sadiq M.

    Published 2020
    “…Abstract A methodology for automatic synthesis of microprograms for digital systems modeled in the UAHPL register-transfer-level language is described. The algorithms used in the process of translation from UAHPL description to microprograms are also discussed. …”
    Get full text
    article
  2. 282

    Exploring AI Conversational Chatbot UX Design: Insights from High School by Suha Khalil Assayed

    Published 2025
    “…The authors in this study conducted a semi-structured qualitative interview with six high school students in UAE and the MAXQDA Analytics software—ver. 22.6.0 is implemented by processing the thematic analysis to study the findings. …”
    Get full text
  3. 283

    An intelligent EPROM silicon compiler by Amin, A.

    Published 1991
    “…A knowledge-based kernel determines the chip architecture and required circuit blocks and calls appropriate module generators for each block. Routing algorithms are then used to connect these blocks into a full chip…”
    Get full text
    Get full text
    article
  4. 284

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of our proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the results of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  5. 285

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…Moreover, we show the viability and correctness of the proposed pointcuts and primitives by elaborating and implementing their algorithms and presenting the result of explanatory case studies.…”
    Get full text
    Get full text
    Get full text
    article
  6. 286

    LDSVM: Leukemia Cancer Classification Using Machine Learning by Abdul Karim (417009)

    Published 2022
    “…This study proposes a novel method using machine learning algorithms based on microarrays of leukemia GSE9476 cells. …”
  7. 287

    Teachers' Perceptions of the Role of Artificial Intelligence in Facilitating Inclusive Practices for Students with Special Educational Needs and Disabilities: A Case Study in a Pri... by BACHIR, HIBAH AHMAD

    Published 2025
    “…Yet several barriers were highlighted. Findings referred these barriers to limited teacher training, technological accessibility, and data privacy concerns, as well as ethical biases in AI algorithms. …”
    Get full text
  8. 288

    Machine Learning Solutions for the Security of Wireless Sensor Networks: A Review by Yazeed Yasin Ghadi (16667109)

    Published 2024
    “…Furthermore, this study also focuses on different Machine learning algorithms that are used to secure wireless sensor networks. …”
  9. 289

    Strategies for Reliable Stress Recognition: A Machine Learning Approach Using Heart Rate Variability Features by Mariam Bahameish (19255789)

    Published 2024
    “…This study employed supervised learning algorithms to classify stress and relaxation states using HRV measures. …”
  10. 290
  11. 291

    THE FUTURE OF MEDICINE, healthcare innovation through precision medicine: policy case study of Qatar by M. Walid Qoronfleh (14153088)

    Published 2020
    “…It is here. Implementing PM in routine clinical care does require some investment and infrastructure development. …”
  12. 292

    Data Redundancy Management in Connected Environments by Mansour, Elio

    Published 2020
    “…To address these limitations, we propose a framework for data redundancy management at the device level, denoted DRMF. We describe its modules, and clustering-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  13. 293

    Detecting Arabic Cyberbullying Tweets in Arabic Social Using Deep Learning by ALFALASI, FARIS Jr

    Published 2023
    “…The data needs to be initially prepared so that deep learning algorithms may be trained on it before cyberbullying analysis can be done. …”
    Get full text
  14. 294

    Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study by Muhammad Atif Butt (10849980)

    Published 2023
    “…Since the success of AI is to be measured ultimately in terms of how it benefits human beings, and that the data driving the deep learning-based edge AI algorithms are intricately and intimately tied to humans, it is important to look at these AI technologies through a human-centric lens. …”
  15. 295

    Triage decisions for ICU admission by Blanch, Lluis

    Published 2016
    “…The team made recommendations and concluded that triage should be led by intensivists considering input from nurses, emergency medicine professionals, hospitalists, surgeons, and allied professionals. Triage algorithms and protocols can be useful but can never supplant the role of skilled intensivists basing their decisions on input from multidisciplinary teams. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article
  16. 296

    Data redundancy management for leaf-edges in connected environments by Mansour, Elio

    Published 2022
    “…To address these limitations, we propose here DRMF: Data Redundancy Management for leaF-edges allowing to identify and remove data redundancies in connected environments at the device level. DRMF considers both static and mobile edge devices, and provides two algorithms for temporal and spatio-temporal redundancy detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    article