Search Results - (( data competency gap algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- data competency »
- competency gap »
- gap algorithm »
-
1
Cross cultural competence, human resource management practices, cross cultural adjustment and adaptive performance among Jordanian military leaders in United Nations peacekeeping
Published 2014“…However, little is known about the determinants of a military leader‟s adaptive performance in the United Nations missions. Hence a gap remains in the literature. This study fills the gap by examining the relationships that exist between cross-cultural competence, human resource management practices, cross-cultural adjustment and adaptive performance by using a sample of 279 Jordanian military leaders who participated in the United Nations missions. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
Get full text
Get full text
Get full text
Article -
4
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
5
Variational Bayesian inference for exponentiated Weibull right censored survival data
Published 2023“…The AFT model was developed using two comparative studies based on real-life and simulated data sets. The results from the experiments reveal that the Variational Bayesian (VB) approach is better than the competing Metropolis-Hasting Algorithm and the reference maximum likelihood estimates.…”
Get full text
Get full text
Get full text
Article -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A comparison of the proposed system with other competing solutions demonstrates its superiority. © 2017, Springer-Verlag London Ltd., part of Springer Nature.…”
Get full text
Get full text
Article -
7
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A comparison of the proposed system with other competing solutions demonstrates its superiority. © 2017, Springer-Verlag London Ltd., part of Springer Nature.…”
Get full text
Get full text
Article
