Search
Now showing items 71-80 of 7121
Numerical bifurcation of predator-prey fractional differential equations with a constant rate harvesting
(
IOP Publishing
, 2008 , Article)
In this article saddle and Hopf bifurcation points of predator-prey fractional differential equations system with a constant rate harvesting are investigated. The numerical results based on Grunwald-Letnikov discretization ...
A review of process and production in SL studies
(
Qatar University
, 1990 , Article)
Estimating the number of components of a multicomponent nonstationary signal using the short-term time-frequency Rényi entropy
(
Springer
, 2011 , Article)
The time-frequency Rényi entropy provides a measure of complexity of a nonstationary multicomponent signal in the time-frequency plane. When the complexity of a signal corresponds to the number of its components, then this ...
A New One-Step Iterative Process for Common Fixed Points in Banach Spaces
(
Hindawi Publishing Corporation
, 2008 , Article)
We introduce a new one-step iterative process and use it to approximate the common fixed points of two asymptotically nonexpansive mappings through some weak and strong convergence theorems. Our process is computationally ...
USE OF EPORTFOLIOS IN K-12 TEACHER HIRING IN NORTH CAROLINA: PERSPECTIVES OF SCHOOL PRINCIPALS
(
Association for Supervision and Curriculum Development
, 2012 , Article)
This study explored the perceptions of principals involved in the hiring process of K–12 teachers in 11 counties in southeastern North Carolina. Forty-nine principals responded to a survey on ePortfolio use in the hiring ...
ASSESSMENT AND ASSURANCE OF SERVICE QUALITY IN PEDIATRIC HEALTHCARE IN QATAR
(
Qatar University
, 2014 , Article)
The purpose of this study was quality assessment and quality assurance in pediatric
services of public and private hospitals in Qatar. The purpose of quality assessment
was to identify gaps in the delivered services; ...
Security Dynamics of Cloud Computing
(
Cutter Consortium
, 2009 , Article)
This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing ...
Accounting for Interaction and Individual Specific Effects in an Analysis of International Air Traveler Preferences
(
Qatar University
, 2014 , Article)
selection decision based on contingency theory. Previous work has focused on main
effects without eploring the significance of interaction or individual heterogeneity
effects. Contingency theory suggests contextual and ...
The cardiovascular implication of single nucleotide polymorphisms of chromosome 9p21 locus among Arab population
(
Medknow Publications
, 2015 , Article)
Background: Based on several reports including genome-wide association studies, genetic variability has been linked with higher (nearly half) susceptibility toward coronary artery disease (CAD). We aimed to evaluate the ...
Challenges of Palestinian Security Sector Reform: Blame Israeli Occupation or Internal Political Fragmentation?
(
International Publishing House for China's Culture
, 2014 , Article)
The debate on Security Sector Reform (SSR) in Palestine has emerged within the context of the peace process between Israel and Palestinians, in particular following the Oslo agreement in 1993. There are different perceptions ...