


default search action
International Journal of Knowledge-Based Organizations, Volume 12
Volume 12, Number 1, 2022
- Fahima Khanam, Md. Omar Al-Zadid, Mahmud Ullah
:
Measuring the Quality of Higher Education in Bangladesh: A Study on the University of Dhaka. 1-15 - Kapil Kumar:
Comprehensive Composition to Spot Intrusions by Optimized Gaussian Kernel SVM. 1-27 - Kapil Kumar, Kripa Shanker Mishra:
Prognostication of Sales by Auto Encoder and Long-Term Short Memory. 1-15 - Mostafa Sayyadi Ghasabeh:
How Transformational Leaders Can Effectively Manage Knowledge in Companies. 1-13 - Francisco de Castro, Angelin Gladston:
FPN-Based Small Orange Fruit Detection From Farm Images With Occlusion. 1-12 - Athanasios Antonios Mandilas, Dimitrios Kourtidis, Ioannis E. Petasakis, Stavros Ioannis Valsamidis
:
Digital Disruption in the Accounting Profession: The Case of Greek Accountants. 1-19 - Jinfeng Zhong, Elsa Negre:
Towards Better Representation of Context Into Recommender Systems. 1-12
Volume 12, Number 2, 2022
- Emna Ammar Elhadjamor, Sonia Ayachi Ghannouchi:
AHP and SMART Criteria for KPI Selection in Higher Education: Case of the Candidate Selection Process. 1-15 - Thierno Tounkara
, Nabyla Daidj:
Designing a Serious Game for Scrum Learning: Boundary Objects as a Medium for Knowledge Transfer. 1-22 - Eya Hamza
, Wafa Bouaynaya
:
Knowledge Transfer and Boundary Objects: An Ecological View of the Research Center. 1-12 - Sarra Bouzayane, Arezki Aberkane:
Visual Chatbot for Knowledge Transfer: What Challenges Lie Ahead? 1-13
Volume 12, Number 3, 2022
- B. P. Vijaya Kumar, Chongtham Pankaj, Naresh E.
:
An Approach for Semi-Supervised Machine Learning-Based Mobile Network Anomaly Detection With Tagging. 1-16 - Neha Shukla
, Puneet Garg, Madan Singh:
MANET Proactive and Reactive Routing Protocols: A ComparisonStudy. 1-14 - Ashutosh Dixit
, Preeti Sethi, Puneet Garg:
Rakshak: A Child Identification Software for Recognizing Missing Children Using Machine Learning-Based Speech Clarification. 1-15 - Adithya B., G. Santhi:
A Bio-Inspired DNA Cryptographic-Based Morse Code Ciphering Strategy for Secure Data Transmission. 1-18

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.