بحث بسيط
السجلات المعروضة 1 -- 10 من 86
Small Steps Lead to Quality Assurance and Enhancement in Qatar University
(
Routledge
, 2009 , Article)
This paper presents a brief overview of Qatar University's history since it was started in 1973. Its primary focus is on the various small, but important, steps taken by the University to address the needs of quality ...
Critical success factors for TQM implementation and their impact on performance of SMEs
(
Emerald Group Publishing Limited
, 2009 , Article)
Abstract: Purpose – The purpose of this paper is to identify the critical success factors of TQM implementation, to evaluate their impact on the primary measures as expressed by the operational performance and the secondary ...
Chip-Level Modulated BPPM Fiber-Optic Code Division Multiple Access
(
IEEE
, 2009 , Conference Paper)
Chip-Level Modulated Binary Pulse Position Modulation (CLM-BPPM) is proposed as a modulation scheme for Fiber-Optic Code Division Multiple Access (FO-CDMA) systems using Optical Orthogonal Code (OOC) for time domain signal ...
Cost optimization of composite beams using genetic algorithms
(
Elsevier Ltd
, 2009 , Article)
This paper presents a genetic algorithm model for the cost optimization of composite beams based on the load and resistance factor design (LRFD) specifications of the AISC. The model formulation includes the cost of concrete, ...
A predictive strategy for lifetime maximization in selective relay networks
(
IEEE
, 2009 , Conference Paper)
Two algorithms based on an energy conserving dynamic transmit power threshold are proposed for improving the lifetime in relay networks utilizing selective relay strategies with amplify-and-forward (AF) relays. the lifetime ...
An efficient technique for finding the eigenvalues of fourth-order Sturm–Liouville problems
(
Elsevier
, 2009 , Article)
In this paper, we will develop a numerical technique for finding the eigenvalues of fourth-order non-singular Sturm–Liouville problems. We used the variational iteration methods as a basis for this technique. Numerical ...
A Pyramidal Security Model for Large-Scale Group-Oriented Computing in Mobile Ad Hoc Networks: The Key Management Study
(
IEEE
, 2009 , Article)
In mobile ad hoc networks (MANETs), many applications require group-oriented computing among a large number of nodes in an adversarial environment. To deploy these large-scale cooperative applications, secure multicast ...
Guest Editorial: Special Issue on: WiMAX security and applications
(
John Wiley & Sons, Ltd.
, 2009 , Article)
Complex-impedance response of an Ag/TeO2-V2O5/Ag structure
(
Elsevier
, 2009 , Article)
The ac conductivity of glass samples of composition 50 mol% TeO2 and 50 mol% V2O5 has been analyzed. The samples were prepared by the usual melt-quench method. The electrical conductance and capacitance were measured over ...
Estimating design effort for the compressor design department: a case study at Pratt & Whitney Canada
(
Elsevier Ltd
, 2009 , Article)
The effort required in a design project not only impacts the final cost, but also the project lead-time. This paper presents a case study carried out with the collaboration of Pratt & Whitney Canada, a global leader in the ...