Search Results - (( data competency gap algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Cross cultural competence, human resource management practices, cross cultural adjustment and adaptive performance among Jordanian military leaders in United Nations peacekeeping by Al Shdaifat, Fayez Hamed Abdo

    Published 2014
    “…However, little is known about the determinants of a military leader‟s adaptive performance in the United Nations missions. Hence a gap remains in the literature. This study fills the gap by examining the relationships that exist between cross-cultural competence, human resource management practices, cross-cultural adjustment and adaptive performance by using a sample of 279 Jordanian military leaders who participated in the United Nations missions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Variational Bayesian inference for exponentiated Weibull right censored survival data by Jibril Abubakar, Jibril Abubakar, Mohd Asrul Affendi Abdullah, Mohd Asrul Affendi Abdullah, Oyebayo Ridwan Olaniran, Oyebayo Ridwan Olaniran

    Published 2023
    “…The AFT model was developed using two comparative studies based on real-life and simulated data sets. The results from the experiments reveal that the Variational Bayesian (VB) approach is better than the competing Metropolis-Hasting Algorithm and the reference maximum likelihood estimates.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A comparison of the proposed system with other competing solutions demonstrates its superiority. © 2017, Springer-Verlag London Ltd., part of Springer Nature.…”
    Get full text
    Get full text
    Article
  7. 7

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A comparison of the proposed system with other competing solutions demonstrates its superiority. © 2017, Springer-Verlag London Ltd., part of Springer Nature.…”
    Get full text
    Get full text
    Article