|
|
|
Mariam Sheikh Omar, Martin Onsiro Ronald, Njagi Gilbert Nyaga
Pág. 10 - 28
AbstractThe main purpose of this study was to analyzing working capital management practices on the performance of Small Medium Enterprises (Juakali) and develop instruments that may be used to assess and improve the performance in a business environment...
ver más
|
|
|
|
|
|
|
Omar Nabih El Kadi Janbeih
Pág. 1 - 3
Editorial Vol. 7 Num. 1
|
|
|
|
|
|
|
Omar Chabán, Alfredo Flores-Hernández, María Eugenia López-Pérez and Miguel A. Ruz-Mendoza
Society in general, and markets in particular, are increasingly sensitive to principles linked to corporate social responsibility (CSR) and sustainability. The literature is prolific in this vein?providing a broad range of research covering the terms? me...
ver más
|
|
|
|
|
|
|
Omar Serghini, Hayat Semlali, Asmaa Maali, Abdelilah Ghammaz and Salvatore Serrano
Spectrum sensing is an essential function of cognitive radio technology that can enable the reuse of available radio resources by so-called secondary users without creating harmful interference with licensed users. The application of machine learning tec...
ver más
|
|
|
|
|
|
|
Abdelrahman S. Abdeldayem, Salma I. Salah, Omar A. Aqel, Martin T. White and Abdulnaser I. Sayma
Supercritical carbon dioxide (sCO2) can be mixed with dopants such as titanium tetrachloride (TiCl4), hexafluoro-benzene (C6F6), and sulphur dioxide (SO2) to raise the critical temperature of the working fluid, allowing it to condense at ambient temperat...
ver más
|
|
|
|
|
|
|
Jordi Oliver-Manera, Omar García-Tejera, Mercè Mata and Joan Girona
Recently, the crop forcing technique (summer pruning that ?forces? the vine to start a new cycle) has proven to be effective in delaying the harvest date and increasing must acidity, but also reducing the yield. However, recent information on deficit irr...
ver más
|
|
|
|
|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
|
Kre?imir Nincevic, Thierry Guillet, Omar Al Mansouri and Roman Wan-Wendner
This contribution summarizes the largest available literature data collection on tensile and shear loaded anchor tests, obtained in two independent studies and performed by two different research groups. It was the objective of the two studies to investi...
ver más
|
|
|
|
|
|
|
Evaristo José Madarro-Capó, Eziel Christians Ramos Piñón, Guillermo Sosa-Gómez and Omar Rojas
This study describes the implementation of two algorithms in a parallel environment. These algorithms correspond to two statistical tests based on the bit?s independence criterion and the strict avalanche criterion. They are utilized to measure avalanche...
ver más
|
|
|
|
|
|
|
George Westergaard, Utku Erden, Omar Abdallah Mateo, Sullaiman Musah Lampo, Tahir Cetin Akinci and Oguzhan Topsakal
Automated Machine Learning (AutoML) tools are revolutionizing the field of machine learning by significantly reducing the need for deep computer science expertise. Designed to make ML more accessible, they enable users to build high-performing models wit...
ver más
|
|
|
|