-
181
The Impact Of E-Leadership On Employees
Published 2023Get full text
Get full text
Get full text
masterThesis -
182
-
183
-
184
-
185
Quality data at a reduced price
Published 1995“…Extensive testing of processing tools and interpolation techniques on the most dense part of the survey, before completion of the acquisition, led to an efficient processing sequence that resulted in high quality data meeting all the user's objectives. …”
Get full text
Get full text
Get full text
conferenceObject -
186
Online Recruitment Fraud (ORF) Detection Using Deep Learning Approaches
Published 2024“…<p dir="ltr">Most companies nowadays are using digital platforms for the recruitment of new employees to make the hiring process easier. …”
-
187
-
188
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
Published 2022“…<p>Communication has become a lot easier in this era of technology, development of high-speed computer networks, and the inexpensive uses of Internet. Therefore, data transmission has become vulnerable to and unsafe from different external attacks. …”
-
189
Mazari UAV Adaptive Autopilot System Design and Implementation
Published 2013Get full text
doctoralThesis -
190
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2024“…Additionally, a new strategy using similarity-based selective training reduces the amount of data required for the training of an incremental learning-based model, focusing on the most relevant data to improve efficiency. …”
-
191
-
192
-
193
Household-Level Energy Forecasting in Smart Buildings Using a Novel Hybrid Deep Learning Model
Published 2021“…The proposed framework consists of two stages, namely, data cleaning, and model building. The data cleaning phase applies pre-processing techniques to the raw data and adds additional features of lag values. …”
-
194
DDoS Detection Mechanism Using Trust-Based Evaluation System in VANET
Published 2019“…Occasionally, the malicious node transmits the counterfeit data amid other nodes. To find out trust/belief is deemed to be a difficult task when the malicious nodes try to distort the discovery of route or transmission of data within the network. …”
-
195
-
196
The Effects of Digital HR on Employee Engagement and Employee Development
Published 2023Get full text
Get full text
Get full text
masterThesis -
197
Classification of Cognitive Workload Levels under Vague Visual Stimulation
Published 2016Get full text
doctoralThesis -
198
-
199
-
200