Showing 21 - 40 results of 139 for search '(( significant ((aspect decrease) OR (largest decrease)) ) OR ( significant protective based ))', query time: 0.11s Refine Results
  1. 21
  2. 22
  3. 23

    Investigating the Quality Combined Effect of Root Cause Analysis (RCA) in Quality Management in Manufacturing Firms by ALBLOOSHI, ROUDHA KHALID ABDULLA

    Published 2024
    “…By employing tools such as flowcharts, fishbone diagrams, and statistical analysis, the research pinpointed the inadequate 4KV surge protection as a primary defect contributor. Implementing a 6KV surge protector for higher-wattage lights significantly reduced defect rates by 0.5%. …”
    Get full text
  4. 24
  5. 25
  6. 26
  7. 27
  8. 28
  9. 29

    Evaluating the impact of a brief Health at Every Size-informed health promotion activity on body positivity and internalized weight-based oppression by Lily, O’Hara

    Published 2021
    “…Conversely, body positivity is a multi-faceted concept that encompasses body acceptance, body appreciation, and body love, and adaptive approaches protective of health and wellbeing. The aim of this study was to evaluate the impact of a brief health promotion activity informed by Health at Every Size- and critical health promotion principles on body positivity and internalized weight-based oppression in female students at Qatar University. …”
    Get full text
    Get full text
    Get full text
    article
  10. 30
  11. 31

    Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection by Shakeel Ahmad (702854)

    Published 2024
    “…<p dir="ltr">Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling. …”
  12. 32

    An Integrated Model for Metaverse Adoption in Higher Education Institutions: A Structural Equation Modelling and Artificial Neural Network Approach by MAGHAYDAH, SAFWAN SULEIMAN MGHIED

    Published 2024
    “…Information and Communication Technology (ICT) is experiencing a significant shift with the advent of the Metaverse, merging physical reality with a virtual world via virtual and augmented reality headsets. …”
    Get full text
  13. 33
  14. 34

    An Overview of Membrane Based NO<sub>x</sub> Removal Technologies and Dinitrification Fitlers by Ahmed T. Yasir (17302753)

    Published 2025
    “…<p dir="ltr">Air pollution has emerged as a significant global issue, largely due to the increasing demand for energy and industrial processes that release harmful gases into the atmosphere. …”
  15. 35
  16. 36

    Beyond vanilla: Improved autoencoder-based ensemble in-vehicle intrusion detection system by Sampath Rajapaksha (17541411)

    Published 2023
    “…Detecting attacks on the CAN bus, particularly masquerade attacks, presents significant challenges. It necessitates an intrusion detection system (IDS) that effectively utilizes both CAN ID and payload data to ensure thorough detection and protection against a wide range of attacks, all while operating within the constraints of limited computing resources. …”
  17. 37
  18. 38
  19. 39

    Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices by Habib Ullah, Khan

    Published 2023
    “…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. The top-ranking authentication feature categories included the most compatible and common authentication feature for all types of IoT-based devices as an elementary security requirement for protection from unauthorized access. …”
    Get full text
    Get full text
    Get full text
    article
  20. 40

    Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices by Habib Ullah Khan (12024579)

    Published 2023
    “…Most of the security methods and procedures provided by researchers are based on existing Internet security practices. The top-ranking authentication feature categories included the most compatible and common authentication feature for all types of IoT-based devices as an elementary security requirement for protection from unauthorized access. …”