Search
Now showing items 51-60 of 257
Extracellular matrix (ECM)
(
Springer Netherlands
, 2012 , Book chapter)
Summary: The region of space at the periphery of cyanobacterial cells is the interface between the environment and intracellular processes. This metaspace may include a structure appressed to the outer wall and membrane, ...
The application of quality management in the financial services sector in Jordan
(
Business Perspectives
, 2012 , Article)
This study examines the applicability of total quality management (TQM) in the Jordanian financial services sector using a sample of employees at 12 financial institutions. The applicability of the TQM is assessed through ...
Infinite-dimensional LQ optimal control of a dimethyl ether (DME) catalytic distillation column
(
Elsevier
, 2012 , Article)
This contribution addresses the development of a linear quadratic (LQ) regulator in order to control the concentration profiles along a catalytic distillation column, which is modelled by a set of coupled hyperbolic partial ...
Heuristic algorithms for aircraft sequencing problem
(2012 , Conference Paper)
Delays in flights resulting in multi-billion-dollar losses are declared annually worldwide. Hence, an identification of air traffic policies that can reduce frequent and costly inefficiencies is needed. The problem of ...
Development and evaluation of open educational resources for enhancing engineering students' learning experience
(
IEEE Education Society
, 2012 , Conference Paper)
The aim of this paper is to report on the development of control systems open educational resources. The paper reports on two control systems education software: 1) A LabVIEW based Control Systems Analysis Toolkit (CSAT) ...
Constraint-enhanced role engineering via answer set programming
(
Association for Computing Machinery
, 2012 , Conference Paper)
Role engineering (RE) aims to develop and maintain appropriate role-based access control (RBAC) configurations. However, RE with constraints in place is not well-studied. Constraints usually describe organizations' security ...
An ontology-based system to dynamically extract multimedia elements for children's tutorials
(
IEEE
, 2012 , Conference Paper)
Children with intellectual disabilities are very challenging to teach, and can learn best with the use of different methodologies that engage their senses, such as using images, sounds and clips. In this work, a new ...
Evaluating the riskiness of the banking sector of Jordan
(2012 , Article)
This study employs panel data analysis that controls for bank specific variables to evaluate the systematic, non-systematic and total risk of the banking sector of Jordan over the period 2001-2009. The total risk is measured ...
Standing stocks and body size of deep-sea macrofauna: Predicting the baseline of 2010 Deepwater Horizon oil spill in the northern Gulf of Mexico
(
Elsevier
, 2012 , Article)
A composite database encompassing 6 benthic surveys from years 1983 to 2003 was constructed to evaluate the distribution of macrofaunal biomass in the deep Gulf of Mexico (GoM) prior to the Deepwater Horizon oil spill. ...
Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
(
IEEE
, 2012 , Conference Paper)
In network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized ...