Results 81 to 90 of about 2,389,131 (303)

The Potential of Data Envelopment Analysis (DEA) in Labor Adjustment Policy [PDF]

open access: yes, 2015
[Excerpt] Through labor-management policy, the management is responsible for establishing mutually beneficial relations between workers and employers. Establishing proper relations from the perspective of the worker refers to protecting workers’ rights ...
Choi, Intae
core   +1 more source

Prevalence of Systemic Lupus Erythematosus in Australia, 2010–2022: A Population‐Based Study Using Linked National Administrative Health Data

open access: yesArthritis Care &Research, Accepted Article.
Objectives Systemic lupus erythematosus (SLE) is a heterogenous inflammatory condition, with widely varying global prevalence estimates. Frequency of SLE in the general population of Australia has been reported to be notably lower than contemporary estimates in countries such as the US or UK at 19‐39 per 100,000 as opposed to 65‐97 per 100,000.
Lucinda Roper   +7 more
wiley   +1 more source

It Systems Security Management in Migration Process [PDF]

open access: yesFoundations of Management, 2010
It Systems Security Management in Migration Process This paper looks at the issue of IT systems migration as well as problems related to security policy in migration processes. Problem of migration is viewed in a broad context of changes which occur during construction or modernization of an IT system. Migration projects were classified against
openaire   +1 more source

Designing Strategies to Support a Transformation of Agriculture in Ethiopia [PDF]

open access: yes
The paper consists of three parts. The first part of the paper is a review of agricultural performance in Ethiopia over the past forty years. The second part diagnoses agricultural system performance and food security problems in Ethiopia and discusses ...
Gebre, Hagos   +3 more
core   +1 more source

The impact of security on Philippine tourism : a thesis presented in fulfilment of the requirements for the degree of Master of Philosophy in Development Studies at Massey University [PDF]

open access: yes, 2004
This study investigates the nexus between security and tourism within the development context within political structures and institutions examining specifically the impacts of security issues on the tourism industry of the Philippines. The latest global
Dela Cruz, Josephine Andres
core  

Cybersecurity Transformation: Cyber-Resilient IT Project Management Framework

open access: yesDigital
In response to the escalating threats of cybersecurity attacks and breaches, ensuring the development and deployment of secure IT products has become paramount for organizations in their cybersecurity transformation.
Samir Al-Janabi   +2 more
doaj   +1 more source

21st Century Security Manager [PDF]

open access: yesAnnals: Series on engineering sciences (Academy of Romanian Scientists), 2010
We live in world of uncertainty that generates major paradigms changing that affect security risk management. Modern organization’s security risks management can’t be done without a profound knowlegde and daily practice for security governance, security ...
Stelian ARION
doaj  

Reforming foodgrains management: Achieving food security with cost-effectiveness [PDF]

open access: yes
This paper examines the efficacy of the current system of public foodgrains management and policies in promoting food security in the country. It argues that the system has outlived its usefulness, and that continuing with the same only stifles growth in
A. Ganesh-Kumar   +2 more
core  

A Concept of a Digital and Traceable Manufacturing Documentation Based on Formalized Process Description Applied on Composite Aircraft Moveable

open access: yesAdvanced Engineering Materials, EarlyView.
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker   +4 more
wiley   +1 more source

Review on Hybrid Deep Learning Models for Enhancing Encryption Techniques Against Side Channel Attacks

open access: yesIEEE Access
During the years 2018-2024, considerable advancements have been achieved in the use of deep learning for side channel attacks. The security of cryptographic algorithm implementations is put at risk by this.
Amjed A. Ahmed   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy