Search alternatives:
model implementation » broader implementation (Expand Search), system implementation (Expand Search), _ implementation (Expand Search)
code implementation » broader implementation (Expand Search), _ implementation (Expand Search), its implementation (Expand Search)
action model » activation model (Expand Search)
model implementation » broader implementation (Expand Search), system implementation (Expand Search), _ implementation (Expand Search)
code implementation » broader implementation (Expand Search), _ implementation (Expand Search), its implementation (Expand Search)
action model » activation model (Expand Search)
-
21
Integrating Statistical Process Control, Engineering Process Control And Taguchi'S Quality Engineering
Published 2020“…The models employ the concept of Taguchi's quadratic loss function to determine whether to take an EPC action by comparing the cost of the action and the cost of quality. …”
Get full text
article -
22
-
23
Experimentally validated thermo-mechanically coupled FE simulations of Al/Mg friction stir welded joints
Published 2017“…Numerical simulations of the friction stir welding of dissimilar metal joints is a daunting task given the complex issues involved such as the flow mixing action and the phase transformations. In this work, a 3D thermo-mechanical FE model is developed to simulate the dissimilar friction stir welding (DFSW) of aluminum-magnesium bi-metallic joints. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
24
A Six Sigma Define Phase Methodology for Service-Level Compliance Processes
Published 2007Get full text
doctoralThesis -
25
A bi-directional ultrasonic elliptical vibration actuator (BUEVA) for micro machining
Published 2017“…Presented is the detailed design and implementation of a bi-directional ultrasonic elliptical vibration actuator (BUEVA) for micro machining. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
26
Factors Affecting Cybersecurity Behaviour in the Metaverse: A Hybrid SEM-ANN Approach Based on Deep Learning
Published 2023“…The hypotheses testing results reinforced most of the suggested hypotheses in the developed model. The sensitivity analysis results for the ANN model revealed that “cues to action” have the most considerable importance in understanding cybersecurity behaviour in the Metaverse, with 97.8% normalized importance, followed by habit (69.7%), perceived vulnerability (69.6%), self-efficacy (40.9%), and trust (27.2%). …”
Get full text
-
27
The Influence of Management Practices on Employee Commitment and Food Safety Performance in Food Manufacturing Firms
Published 2018“…The data analysis was accomplished using the Statistical Package for the Social Sciences (SPSS) and structural equation modelling (AMOS) by means of multiple regression, path and mediation analysis. …”
Get full text
-
28
Embedding the Safe System into the next generation of road safety audits
Published 2015“…If the answer is yes to any of these questions there is a need to take action. The Safe System is progressively being implemented globally as a new approach to reducing the unacceptable number of people being killed or injured. …”
-
29
Project-Based Organization Structure and Procurement
Published 2011“…However for the procurement problem a detailed ‘Hard System Model of Change’ was developed to be recommended to senior management to avoid in future unnecessary problems created by processes failures in in-house projects.…”
Get full text
-
30
Fast Transient Stability Assessment of Power Systems Using Optimized Temporal Convolutional Networks
Published 2024“…A grey wolf optimizer (GWO) is utilized to fine-tune the TCN hyperparameters to improve the proposed model's accuracy. The proposed model provides critical information on the transient grid status in the early stages of fault occurrence, which may lead to taking the proper action. …”
-
31
Water scarcity as a window of opportunity for a peacful settlement in the Middle East. (c2011)
Published 2011Get full text
Get full text
masterThesis -
32
Behavior Of Reinforced Concrete Columns Embedded with PET Bottles Under Concentric Axial Compression
Published 2025Get full text
doctoralThesis -
33
A design thinking-based Framework for effective business excellence outcomes in the public sector
Published 2021“…Positive relationships were found between knowledge, actions, attitude and excellence with business excellence implementation outcomes. …”
Get full text
-
34
Traffic medicine in Saudi Arabia, from prevention to rehabilitation
Published 2015“…Another important aspect of traffic medicine is the implementation of Trauma Registry as part of the national trauma system project, trauma registries can provide information on injury pattern and allow statistical modeling of trauma related variables to identify public health threats and prioritize interventions. …”
-
35
The effect of knowledge sharing on employees innovation in media industry
Published 2012“…The knowledge sharing process is presented to show how to explicit tacit knowledge in order to make available to employees. The same process or model conducted in media organization is also explained. …”
Get full text
-
36
Analysis and Quantification of Demand Flexibility for Resilient Distribution Networks: A Systematic Review
Published 2025“…The techno-economic impacts of DF integration reveal significant benefits in grid reliability and infrastructure investment deferral, while highlighting implementation challenges. Through a synthesis of cutting-edge methodologies, this review provides actionable insights for researchers, policymakers, and industry stakeholders advancing resilient, flexible distribution networks in the evolving energy landscape.…”
-
37
Framework for Mapping Internal Stakeholder Dynamics in Driving Green Innovation Strategies in the UAE Oil & Gas Sector
Published 2025“…A sequential mixed-methods design was employed, beginning with a quantitative survey (n=252) analysed using Partial Least Squares Structural Equation Modelling (PLS-SEM), followed by qualitative interviews (n=15) to validate and contextualise the results. …”
Get full text
-
38
A novel approach for the development and deployment of security patterns
Published 2017“…Moreover, we design and implement the RBAC (Role Based Access Control) model for a Library Circulation system called RBAC-LB. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
39
New Approach Targeting Security Patterns Development and Deployment
Published 2011“…Moreover, we design and implement the RBAC (Role Based Access Control) model for a Library Circulation system called RBAC-LB. …”
Get full text
Get full text
Get full text
article -
40
Modulation of SLFN11 induces changes in DNA Damage response in breast cancer
Published 2023“…RNAseq was used to elucidate the mechanisms of action affected by the alteration in SLFN11 expression. …”