Results 111 to 120 of about 555,024 (332)

Navigating Workplace Bullying: A Critical Theory Exploration of Lecturers' Experiences in a Higher Education Context

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Workplace bullying (WB) remains a pervasive concern across all sectors, including higher education institutions (HEIs), where shifting power dynamics, performance pressures, and transformation mandates often create fertile ground for systemic abuse.
Helen Meyer
wiley   +1 more source

Education: A More Powerful Weapon Than War?

open access: yes, 2015
In this paper, I analyze the impact of education on civil war onset, utilizing variables measuring length of compulsory education and number of internal armed conflicts in a given country per year.
Thomas, Maja K.
core  

Youths carrying a weapon or using a weapon in a fight: what makes the difference? [PDF]

open access: yes, 2017
The objective of this study was to characterize weapon-carrying adolescents and to assess whether weapon carriers differ from weapon users. Data were drawn from a cross-sectional school-based survey of 7548 adolescents aged 16-20 years in Switzerland ...
Akré, Christina   +4 more
core  

A Variable Neighborhood Search Algorithm for the Multi-stage Weapon Target Assignment Problem

open access: bronze, 2022
Xuening Chang   +36 more
openalex   +1 more source

Love of the Job: What It Is, How to Measure It, and Why It Matters for Work Outcomes

open access: yesHuman Resource Management, EarlyView.
ABSTRACT Employee retention, motivation, performance, and well‐being remain enduring priorities in human resource management, yet existing constructs such as engagement, commitment, and satisfaction do not fully capture the depth of emotional attachment that some employees feel towards their jobs.
Michelle Inness   +8 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Detection of hypersonic weak targets by high pulse repetition frequency radar based on multi‐hypothesis fuzzy‐matching radon transform

open access: yesIET Radar, Sonar & Navigation
For the integration detection of near space hypersonic weak targets by high pulse repetition frequency (PRF) radar, a novel method named Multi‐Hypothesis Fuzzy‐Matching Radon transform (MHFM‐RT) is proposed for the near space hypersonic target detection ...
Wu Wei, Liu Dandan, Wang Guohong
doaj   +1 more source

Strategies for preventing gender‐based violence in healthcare services: Evidence synthesis for health policy

open access: yesInternational Journal of Gynecology &Obstetrics, EarlyView.
Abstract Background Violence against women remains a serious public health problem and a violation of human rights that affects women's health. Healthcare providers play a fundamental role in preventing and responding to violence against women and girls.
Odette del Risco Sánchez   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy