230 results on '"Najm A"'
Search Results
2. A Location-Based Fraud Detection in Shipping Industry Using Machine Learning Comparison Techniques
3. Congenital Coronary Artery Anomalies
4. Life Cycle Assessment of the Production of Concrete Masonry Units in the United Arab Emirates
5. Hydraulic Design Optimization and Performance Analysis of Piano Key Weirs: A Study of Geometric Factors and Staged Configurations
6. Efficiency of Production Resource Utilization for Sustainable Potato Crop Production in Baghdad Governorate
7. Novel Smart Water Quality Monitoring System for Iraqi Rivers and Marshes
8. IOT-Based Water Quality Monitoring for the Tigris River: Addressing Pollution Challenges
9. Measuring Stiffness in Residual Neural Networks
10. Nutzung des Gesundheitssystems mit naturinspirierten Computertechniken: Ein Überblick und zukünftige Perspektiven
11. Computational Intelligence Ethical Issues in Health Care
12. Effect of Length of Free Ends of Flamingo Shear Reinforcing Technique on Shear Capacity of Reinforced Concrete
13. A Systematic Bibliometric Analysis of Research on Hazardous Solid Waste Management
14. The Impact of Sustainability Principles on Organizational Commitments and the Mediating Effect of Digital Transformation Process
15. A New Epidemic Model with Direct and Indirect Transmission with Delay and Diffusion
16. Progresses in Improving Mechanical Properties of Maraging Steel MS1 Through Laser Additive Manufacturing for Renewable Energy Application
17. Efficient Shapely Explanation of Support Vector Regression for Agile and Non-agile Software Effort Estimation
18. Leveraging Healthcare System with Nature-Inspired Computing Techniques: An Overview and Future Perspective
19. Finite Element Model of Smart Composite Steel Plate Shear Walls : A Case Study of Distance Between Shear Studs
20. COVID-19 and the Economic Activity of Jordanian Companies: The Mediating Role of the Community Response
21. PBRE: A Rule Extraction Method from Trained Neural Networks Designed for Smart Home Services
22. Vertical Displacement Analysis of Embedded Square Foundation Under Vertical Dynamic Load
23. IoT Based Machine Learning and Deep Learning Platform for COVID-19 Prevention and Control: A Systematic Review
24. Three N-grams Based Language Model for Auto-correction of Speech Recognition Errors
25. Online Failure Prediction Model for Open-Source Software System Based on CNN
26. On the Cost of ASIC Hardware Crackers: A SHA-1 Case Study
27. Carotenoids Fortification
28. Lebanon
29. Multi-Criteria Decision Making for the Selection of Best Practice Seawater Desalination Technologies
30. Soil Microbes and Plant Health
31. Lessons in New Measurement Technologies: From Instrumenting Trees to the Trans-African Hydrometeorological Observatory
32. Politics and Social Media in the Arab World
33. Computational Singular Perturbation Method and Tangential Stretching Rate Analysis of Large Scale Simulations of Reactive Flows: Feature Tracking, Time Scale Characterization, and Cause/Effect Identification. Part 1, Basic Concepts
34. Computational Singular Perturbation Method and Tangential Stretching Rate Analysis of Large Scale Simulations of Reactive Flows: Feature Tracking, Time Scale Characterization, and Cause/Effect Identification. Part 2, Analyses of Ignition Systems, Laminar and Turbulent Flames
35. Rhizobial Inoculants for Sustainable Agriculture: Prospects and Applications
36. From Behavioural Contracts to Session Types
37. L'homme sans nom
38. Enhanced Ensemble Technique for Optical Character Recognition
39. Evaluating Risk Management in Jordanian Construction Projects: An ISO 31000-2009 Implementation Perspective
40. Joint Segmentation of Intracerebral Hemorrhage and Infarct from Non-Contrast CT Images of Post-treatment Acute Ischemic Stroke Patients
41. Inference Given Summary Statistics
42. Lebanon
43. Epilepsy in the Elderly
44. Chrétiens d'Orient: Mon amour
45. Correlated Extra-Reductions Defeat Blinded Regular Exponentiation
46. Dismantling Real-World ECC with Horizontal and Vertical Template Attacks
47. Making HeNB More Secure with Improved Secure Access Protocol and Analyzing It
48. Multi-variate High-Order Attacks of Shuffled Tables Recomputation
49. Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications
50. Analysis and Improvements of the DPA Contest v4 Implementation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.