تصفح حسب العنوان
السجلات المعروضة 20488 -- 20507 من 50602
-
Prioritising solutions for Lean Six Sigma adoption barriers through fuzzy AHP-modified TOPSIS framework
( Emerald Group Publishing Ltd. , 2018 , Article)Purpose: This paper aims to guide about prioritisation and ranking of the solutions and overcoming barriers to facilitate the adoption of Lean Six Sigma (LSS) by using a hybrid framework. Design/methodology/approach: It ... -
Prioritization of supply chain reconfiguration variables using balanced score card and analytic network process
( International Forum of Management Scholars , 2020 , Article)Supply chain reconfiguration has emerged as a key variable that determines the capability of supply chain to adjust itself in wake of risks or dynamic business environment. However, supply chain reconfiguration is dependent ... -
Prioritizing deadline-constrained data flows in cloud datacenter networks
( Association for Computing Machinery , 2016 , Conference Paper)Real-time interactive application workloads (e.g. web search, social networking, etc.) are composed of a remarkably large number of mini request partitions that require stringent delayminimal aggregation of responses and ... -
Prioritizing Green HRM practices from policymaker's perspective
( Emerald Group Holdings Ltd. , 2022 , Article)Purpose: This study aims to identify and prioritize Green human resource management (GHRM) practices from the policymaker's perspective in the United Arab Emirates (UAE)-based manufacturing and service sectors to facilitate ... -
PRIORITIZING STRESS MANAGEMENT STRATEGIES FOR KAHRAMAA CUSTOMER SERVICE DEPARTMENT: ANALYTIC NETWORK PROCESS AND SUPERMATRIX APPROACHt
(2020 , Master Thesis)Stress is a ubiquitous phenomenon that has several fiscal and practical consequences on both the employees and the employers. Implementing stress management strategy in the workplace is a critical issue for leaders and ... -
Prioritizing the Issues extracted for Getting Right People on Right Project in Software Project Management from Vendors' Perspective
( IEEE , 2021 , Article)Software project management inspires and urges the spirit of software developing team members which continues until project completion. Obviously, success of every project based on right selection of team members that ... -
Prioritizing the multi-criterial features based on comparative approaches for enhancing security of IoT devices
( Elsevier , 2023 , Article)The Internet of Things (IoT) technologies continuously expand with time due to the advances in automated, connected device technology, mobility, and wide access to information. IoT is the collection of many linked devices ... -
Priority setting for the prevention and control of cardiovascular diseases: multi-criteria decision analysis in four eastern Mediterranean countries
( Springer Verlag , 2015 , Article)Objectives To explore the feasibility of using a simple multi-criteria decision analysis method with policy makers/key stakeholders to prioritize cardiovascular disease (CVD) policies in four Mediterranean countries: ... -
Priority-based medium access control for wireless body area networks with high-performance design
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The wireless body area network (WBAN) has attracted considerable attention. Two main problems exist in WBANs: 1) the quality of service (QoS) requirements and 2) the energy efficiency of data transmission. To solve the ... -
Priority-based scheduling for limited energy cognitive relaying
( IEEE , 2010 , Conference Paper)We study the problem of cognitive relaying with limited-energy constraint in opportunistic spectrum access cognitive networks. Under this network setting, the cognitive user increases the spectrum availability for its own ... -
Priority-based zero-forcing in spectrum sharing cognitive systems
( IEEE , 2013 , Article)We consider a spectrum sharing scenario between cognitive radio (CR) users and a licensed primary user (PU), in which the PU is not able to successfully transmit data to its destined receiver. The cognitive base station ... -
Privacy and gendered spaces in Arab Gulf homes
( Taylor & Francis , 2015 , Article)We report the findings of a qualitative study of Qatari homes in the Arab Gulf. We identify the significance of privacy and gender segregation as anchors for identity, both national and religious. Maintaining these anchors ... -
Privacy and security issues in online social networks
( MDPI AG , 2018 , Article)The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual ... -
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ... -
Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
( Springer Verlag , 2016 , Conference Paper)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Privacy-Aware Collaborative Task Offloading in Fog Computing
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ... -
Privacy-preserving artificial intelligence in healthcare: Techniques and applications
( Elsevier , 2023 , Article Review)There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ... -
Privacy-preserving data aggregation in smart power grid systems
(2021 , Master Thesis)Smart Meters (SMs) are IoT end devices used to collect user utility consumption withlimited processing power on the edge of the smart grid (SG). While SMs have significantapplications in providing data analysis to the ... -
PRIVACY-PRESERVING DECENTRALIZED INTRUSION DETECTION SYSTEM FOR IOT DEVICES USING DEEP LEARNING
(2022 , Dissertation)The convergence of advanced networking, breakthrough distributed systems technologies, and smart services has rapidly expanded the threat landscape for IoT devices. Researchers have been looking into lightweight and ... -
Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ...