Results 51 to 60 of about 79,557 (216)
Australia's Migration Strategy: An Effective Response to Migrant Worker Exploitation?
ABSTRACT A series of publicised migrant worker injuries and deaths has drawn attention to the issue of migrant worker exploitation (MWE) in Australia. In response, the Australian Government has included ‘Tackling Worker Exploitation’ as a key area of its Migration Strategy which it introduced in 2023. However, it is unclear how effective the Strategy’s
Evelyn Dowling, Alexandra Ridgway
wiley +1 more source
Associating cognitive abilities with naturalistic search behavior
Abstract Differences in cognitive abilities affect search behaviors, but this has mostly been observed in laboratory experiments. There is limited research on how users search for information in real‐world, naturalistic settings and how real‐world search behaviors relate to cognitive abilities.
Tung Vuong +2 more
wiley +1 more source
Russian firewall screening tools for secured systems
Objective. The purpose of the work is to make the comparative analysis of the firewall tools for secure systems on the Russian market. The sharp increase in demand for products from domestic developers is associated with the need to abandon the use of ...
A. M. Sadykov +2 more
doaj +1 more source
SoniControl - A Mobile Ultrasonic Firewall
The exchange of data between mobile devices in the near-ultrasonic frequency band is a new promising technology for near field communication (NFC) but also raises a number of privacy concerns.
Ringot, Alexis +2 more
core +1 more source
Aim Hyponatremia is a common yet potentially serious adverse event associated with antidepressants. Identifying the antidepressant class with the least risk of hyponatremia would improve patient safety. Methods Using electronic medical records from 15 hospitals standardized into Observational Medical Outcomes Partnership Common Data Model (2003–2023 ...
Kyungyeon Jung +21 more
wiley +1 more source
Decentralised firewall for malware detection
This paper describes the design and development of a decentralized firewall system powered by a novel malware detection engine. The firewall is built using blockchain technology.
Panigrahi, Rudrakh +3 more
core +1 more source
Corporate Decarbonization via Technology and Management
ABSTRACT This study provides a comprehensive overview of key findings on decarbonization, advanced technologies, and management strategies, highlighting emerging themes shaping the field. Advanced technologies enhance carbon reduction through efficiency, real‐time monitoring, and optimizing resource optimization.
Heidy Montero‐Teran +2 more
wiley +1 more source
This paper describes the mechanisms that are needed in order to provide a secure directory service based on the X.500 data model. A brief introduction to the X.500 data model is given followed by an overview of the Lightweight Directory Access Protocol ...
Chadwick, David W.
core
Abstract Identification of firefighting strategies (i.e., which endangered units to suppress or cool first) in chemical and process plants falls under the domain of multi‐objective decision‐making (MODM), where not only the safety and integrity of the affected process plant but also the safety of on‐site and off‐site vulnerable targets matter.
Sina Khakzad, Nima Khakzad
wiley +1 more source
Firewall or smooth horizon? [PDF]
Recently, Almheiri, Marolf, Polchinski, and Sully found that for a sufficiently old black hole (BH), the set of assumptions known as the \emph{complementarity postulates} appears to be inconsistent with the assumption of local regularity at the horizon ...
Ori, Amos
core

