-
1
The economics of hybridization: working with intellectually capacious processes and products
Published 2023-12-01Get full text
Article -
2
Use of BIM with Modular Construction in Future Construction Techniques
Published 2024-06-01“…With BIM and the modular construction method, physical conflicts between the structural system and its mechanical, electrical, and plumbing systems can be easily identified early in the design process, and resolution can be expedited. This article includes general information about the modular construction method, future application scenarios, use, and advantages of BIM. …”
Get full text
Article -
3
UAV With the Ability to Control with Sign Language and Hand by Image Processing
Published 2024-09-01Get full text
Article -
4
An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations.
Published 2023“…Focus was made on information security practices critical to managing information like human security, information classification, procedures for information labelling, compliance, standards, command and control techniques. …”
Get full text
Article -
5
Information Communication Technology and Service Delivery in Nyagatare District Local Goverment, Rwanda.
Published 2020“…The entire research process involved proposal writing, data collection, data analysis, presentation and discussion of results. …”
Get full text
Thesis -
6
INFLUENCE OF INTEGRATED FINANCIAL MANAGEMENT INFORMATION SYSTEM (IFMIS) ON THE PERFORMANCE OF GOVERNMENT ENTITIES IN NIGERIA
Published 2022-12-01“…The research design deployed was descriptive and inferential mixed research design using a purposive sampling technique. The study population was 1504 comprises of selected top and middle level pool officers in the Accountant-General for the Federation office on grade level 13 to 17. …”
Get full text
Article -
7
-
8
-
9
Weighted Sum Secrecy Rate Optimization for Cooperative Double-IRS-Assisted Multiuser Network
Published 2024-01-01Get full text
Article -
10
-
11
Decoding substance use disorder severity from clinical notes using a large language model
Published 2025-02-01Get full text
Article -
12
Real Time Face-mask Detection with Arduino to Prevent COVID-19 Spreading
Published 2021-04-01Get full text
Article -
13
-
14
-
15
Established Digital Model of Fruit Body Growth of Agrocybe cylindracea Based on Network Programming
Published 2021-01-01Get full text
Article -
16
A U-Net-based denoising method for semi-airborne transient electromagnetic data and its application
Published 2025-01-01Get full text
Article -
17
Training and Development on the Performance of Administrative Staff in Ministry of Infrastructure and Communication- Zanzibar.
Published 2020“…The researcher also used both simple random and purposive sampling techniques in identifying the study sample population. …”
Get full text
Thesis -
18
Algorithm for Cloud Particle Phase Identification Based on Bayesian Random Forest Method
Published 2025-01-01Get full text
Article -
19
Methods of committing criminal offences related to raiding
Published 2024-06-01“…The method is an independent and compulsory element of the forensic characterisation of any type of criminal offence, and the need to cognise it is due to the need to present the information model of the illegal activity (actions) of a raider or a group of raiders, on the basis of which other elements of certain forensic techniques will be built. …”
Get full text
Article -
20
Study of some features of the foreign countries special police units activities
Published 2021-12-01“…The analysis has been carried out in order to determine the priority areas of the domestic special police units member’s personality formation, as well as in the extreme combat conditions. In the process of theoretical analysis, the basic principles of training police officers serving in special police units of foreign countries have been determined. …”
Get full text
Article