Search Results - (( java evolution optimization algorithm ) OR ( data competency gap algorithm ))
Search alternatives:
- evolution optimization »
- data competency »
- competency gap »
- gap algorithm »
- java »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…The aim of this evolution is to reflect the unseen time overhead incurred by optimal real-time algorithm, represented by LRE-TL, which might hinder the claimed optimality of such algorithms when they are practically implemented. …”
Get full text
Get full text
Conference or Workshop Item -
2
Cross cultural competence, human resource management practices, cross cultural adjustment and adaptive performance among Jordanian military leaders in United Nations peacekeeping
Published 2014“…However, little is known about the determinants of a military leader‟s adaptive performance in the United Nations missions. Hence a gap remains in the literature. This study fills the gap by examining the relationships that exist between cross-cultural competence, human resource management practices, cross-cultural adjustment and adaptive performance by using a sample of 279 Jordanian military leaders who participated in the United Nations missions. …”
Get full text
Get full text
Get full text
Thesis -
3
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
Get full text
Get full text
Get full text
Article -
4
Variational Bayesian inference for exponentiated Weibull right censored survival data
Published 2023“…The AFT model was developed using two comparative studies based on real-life and simulated data sets. The results from the experiments reveal that the Variational Bayesian (VB) approach is better than the competing Metropolis-Hasting Algorithm and the reference maximum likelihood estimates.…”
Get full text
Get full text
Get full text
Article -
5
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A comparison of the proposed system with other competing solutions demonstrates its superiority. © 2017, Springer-Verlag London Ltd., part of Springer Nature.…”
Get full text
Get full text
Article -
6
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A comparison of the proposed system with other competing solutions demonstrates its superiority. © 2017, Springer-Verlag London Ltd., part of Springer Nature.…”
Get full text
Get full text
Article
