Results 121 to 130 of about 78,996 (280)
Energy security risk has a positive impact on material footprint. Renewable energy consumption reduces material footprint. ABSTRACT Following a high economic growth path, the group of G7 economies is found to be utilising more and more material, causing a material footprint (MF), which in turn contributes to pollution.
Serhat Çamkaya +4 more
wiley +1 more source
Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley +1 more source
Secure Outsourced Data Analytics
The goal of this document is to summarize my research activities since my recruitment as a Maître de Conférences in 2016. Most of my research in this period has been dedicated to addressing the data security concerns that occur when outsourcing some data to the cloud and then performing some computations (such as evaluating a query or a machine ...
openaire +1 more source
ABSTRACT The research‐practice gap (the gap) in HRD remains a significant challenge, hindering the application of academic research to practice and the integration of workplace challenges into research efforts. It is critical for HRD research to address the gap to develop evidence‐based solutions for learning and organizational performance. The purpose
Kelly Moore, Yonjoo Cho
wiley +1 more source
Abstract This paper conducts a comparative legal analysis of corporate restructuring frameworks in England and Bhutan, examining their capacity to integrate climate variability considerations and promote sustainable business practices. It discusses the procedural mechanisms for restructuring financially distressed enterprises available under the law of
Eugenio Vaccari, Migmar Lham
wiley +1 more source
ABSTRACT We use foreign trade data on both imports and exports of goods and services among a group of 15 advanced economies to determine the incomes and price elasticities of demand for exports and imports of goods, services and goods and services combined in the long run.
Tjeerd M. Boonman +2 more
wiley +1 more source
ABSTRACT Purpose/Objectives Insufficient tooth reduction compromises crown longevity and aesthetics. This study aimed to determine whether digitally designed, 3D‐printed reduction guides improved crown preparation accuracy and efficiency for dental students compared to freehand preparation.
Xiaoyue Shi, Shuncong Xu, Chenxuan Wei
wiley +1 more source
Secured Outsourced Linear Algebra
We propose an interactive algorithmic scheme for outsourcing matrix computations on untrusted global computing infrastructures such as clouds or volunteer peer-to-peer platforms. In this scheme, the client outsources part of the computation with guaranties on both the inputs' secrecy and output's integrity.
Kumar, Amrit +2 more
openaire +1 more source
Technology Development Outsourcing: When to Join Forces With a Rival?
ABSTRACT Knowing the challenges of collaborating with a competitor in developing new technologies, firms sometimes still choose a competitor instead of a noncompeting technology provider. To explore why, this study adopts an inter‐organizational trust view to explain the formation of a technology development outsourcing relationship.
Tingting Yan, Hubert Pun, Dina Ribbink
wiley +1 more source
ABSTRACT With the ongoing deployment of AI algorithms, managers do not know whether existing demand planning processes account for possible differences in human behavior when using AI‐based systems in comparison to legacy model‐based systems. This study examines how human behavior may differ when performing demand forecasting tasks due to the ...
Finnegan McKinley +3 more
wiley +1 more source

