Search alternatives:
aspect » aspects (Expand Search)
decrease » increase (Expand Search)
protective » prospective (Expand Search), protection (Expand Search)
aspect » aspects (Expand Search)
decrease » increase (Expand Search)
protective » prospective (Expand Search), protection (Expand Search)
-
21
-
22
-
23
Investigating the Quality Combined Effect of Root Cause Analysis (RCA) in Quality Management in Manufacturing Firms
Published 2024“…By employing tools such as flowcharts, fishbone diagrams, and statistical analysis, the research pinpointed the inadequate 4KV surge protection as a primary defect contributor. Implementing a 6KV surge protector for higher-wattage lights significantly reduced defect rates by 0.5%. …”
Get full text
-
24
Design of A Theoretical Framework For A Real-Time Fire Evacuation Guidance System
Published 2020Get full text
doctoralThesis -
25
-
26
-
27
-
28
-
29
Evaluating the impact of a brief Health at Every Size-informed health promotion activity on body positivity and internalized weight-based oppression
Published 2021“…Conversely, body positivity is a multi-faceted concept that encompasses body acceptance, body appreciation, and body love, and adaptive approaches protective of health and wellbeing. The aim of this study was to evaluate the impact of a brief health promotion activity informed by Health at Every Size- and critical health promotion principles on body positivity and internalized weight-based oppression in female students at Qatar University. …”
Get full text
Get full text
Get full text
article -
30
-
31
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Published 2024“…<p dir="ltr">Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling. …”
-
32
An Integrated Model for Metaverse Adoption in Higher Education Institutions: A Structural Equation Modelling and Artificial Neural Network Approach
Published 2024“…Information and Communication Technology (ICT) is experiencing a significant shift with the advent of the Metaverse, merging physical reality with a virtual world via virtual and augmented reality headsets. …”
Get full text
-
33
The distribution of toxic sources in Louisiana
Published 1993Get full text
Get full text
Get full text
masterThesis -
34
An Overview of Membrane Based NO<sub>x</sub> Removal Technologies and Dinitrification Fitlers
Published 2025“…<p dir="ltr">Air pollution has emerged as a significant global issue, largely due to the increasing demand for energy and industrial processes that release harmful gases into the atmosphere. …”
-
35
The antiproliferative and pro-apoptotic effect of kefir on human leukemic cell lines. (c2008)
Published 2008Get full text
Get full text
masterThesis -
36
Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system
Published 2023“…Detecting attacks on the CAN bus, particularly masquerade attacks, presents significant challenges. It necessitates an intrusion detection system (IDS) that effectively utilizes both CAN ID and payload data to ensure thorough detection and protection against a wide range of attacks, all while operating within the constraints of limited computing resources. …”
-
37
-
38
-
39
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Published 2023“…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. The top-ranking authentication feature categories included the most compatible and common authentication feature for all types of IoT-based devices as an elementary security requirement for protection from unauthorized access. …”
Get full text
Get full text
Get full text
article -
40
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
Published 2023“…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. The top-ranking authentication feature categories included the most compatible and common authentication feature for all types of IoT-based devices as an elementary security requirement for protection from unauthorized access. …”