بدائل البحث:
programs implementation » programme implementation (توسيع البحث)
system implementation » its implementation (توسيع البحث)
programs implementation » programme implementation (توسيع البحث)
system implementation » its implementation (توسيع البحث)
-
141
Life cycle assessment of compressed air, vanadium redox flow battery, and molten salt systems for renewable energy storage
منشور في 2021"…<p dir="ltr">Energy storage systems critically assist in the implementation of renewable energy sources. …"
-
142
-
143
A Cross-Sectional Study about a Health Information System (HIS) in the United Arab Emirates Federal Healthcare Organization (UAE FHO)
منشور في 2014"…As healthcare organizations world-wide competing to provide the ultimate care as easy as possible to its customers, IT technologies have been embraced in delivering healthcare in various ways, such as: in diagnosing diseases, treatment and for research and planning purposes. Health information system (HIS) is part of IT technologies that most if not all healthcare organizations globally are moving toward implement it. …"
احصل على النص الكامل
-
144
Simulation study of a coincidence detection system for non-invasive determination of arterial blood time-activity curve measurements
منشور في 2020"…An alternative method is proposed in this work by the simulation of a non-invasive coincidence detection unit.…"
-
145
‘Leanomics’ in healthcare: a three-year quality improvement study on the financial impact of a modified Kanban system in hospital storerooms
منشور في 2025"…The traditional Kanban system was redesigned by introducing replenishment triggers, adopting bin systems, implementing Kanban boards, and standardizing Kanban quantities based on the frequency of consumable use. …"
-
146
A Holistic Exploration of Quality Assurance Mechanisms at Systemic and Institutional Levels: Conceptualisation, Perception and Practices in Pakistani Higher Education Institutions
منشور في 2025"…This thesis explores Quality Assurance (QA) mechanisms at systemic and institutional levels in Pakistani Higher Education Institutions (HEIs), focusing particularly on stakeholder conceptualisation, perceptions, and QA practices. …"
احصل على النص الكامل
-
147
-
148
Wellness Program Within Primary Health Care: How to Avoid “No Show” to Planned Appointments? – A Patient-Centred Care Perspective
منشور في 2021"…The first survey was regarding the appointment reminder’s method preference. Accordingly, the demanded reminder system has been implemented as per patients’ preferences and then the rate of completion of the 12-weeks-wellness-program has been compared to the months preceding the intervention to demonstrate the effectiveness of this new reminder system. …"
-
149
Whole Slide Imaging Integration with Lab Information Systems, a Study of the Requirements, Processes and Procedures Enabling a Reporting-Based Workflow
منشور في 2023"…</p><h3>Methods</h3><p dir="ltr">Exploring the requirements of direct integration of WSI with the lab and hospital information systems, demonstrating the workflow, challenges and best practices. …"
-
150
-
151
The predictive value of CTSI scoring system in non-operative management of patients with splenic blunt trauma: The experience of a level 1 trauma center
منشور في 2023"…</p><h3>Conclusion</h3><p dir="ltr">Our findings suggest implementing such a system in a level 1 trauma center will further improve the outcome of treatment for splenic blunt trauma. …"
-
152
-
153
Integration of Smart Sensors in Buildings to achieve Energy Efficiency in Hot and Humid Climate
منشور في 2021"…Therefore, it is important to assess the association between retrofitting old buildings and thereby turning them into Smart Buildings and the effect that this exercise may have on their energy efficiency through a holistic method. Of particular interest in this approach is to evaluate the impact on the HVAC and lighting systems in order to optimize the energy usage in those systems. …"
احصل على النص الكامل
-
154
Semantic Caching for Mobile Ad Hoc Networks
منشور في 2009"…Our simulations show the advantages of the system when compared to other cache methods that are proposed for MANETs.…"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
155
Using RSUs as Delegates for Pervasive Access to Services in Vehicle Ad Hoc Networks
منشور في 2010"…Since some of these services may require user authentication with the corresponding service providers, the system implements a method for allowing RSUs to use the user's credentials to get the requested services without jeopardizing the user's privacy. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
156
Data Communication through Distribution Network for Smart Grid Applications
منشور في 2014احصل على النص الكامل
doctoralThesis -
157
Low Cost Autopilot Design Using Fuzzy Supervisory Control
منشور في 2005احصل على النص الكامل
doctoralThesis -
158
Protecting Smart Homes: A study on AI approaches to Detect Malwares and Developing a Two Factor Authentication System Based on SRAM PUF For Smart Home Users in UAE
منشور في 2025"…Numerous existing methods, such as multi-factor authentication, frequently proved inadequate in practical scenarios, failing to resolve problems like weak passwords and insecure connections. …"
احصل على النص الكامل
-
159
A Blockchain Model for Secure Communications in Internet of Vehicles
منشور في 2021"…Based on a previously published communication model for VANETs that uses an efficient routing protocol for transmitting packets between vehicles, we describe in this paper how to integrate a blockchain model on top of the IoV communications system. We illustrate the method that we used to implement HPBC within the IoV nodes. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
160
Software-Defined-Networking-Based One-versus-Rest Strategy for Detecting and Mitigating Distributed Denial-of-Service Attacks in Smart Home Internet of Things Devices
منشور في 2024"…This SDN-ML-IoT uses a Machine Learning (ML) method in a Software-Defined Networking (SDN) environment in order to protect smart home IoT devices from DDoS attacks. …"