Results 101 to 110 of about 452,708 (285)

Navigating Workplace Bullying: A Critical Theory Exploration of Lecturers' Experiences in a Higher Education Context

open access: yesHuman Resource Development Quarterly, EarlyView.
ABSTRACT Workplace bullying (WB) remains a pervasive concern across all sectors, including higher education institutions (HEIs), where shifting power dynamics, performance pressures, and transformation mandates often create fertile ground for systemic abuse.
Helen Meyer
wiley   +1 more source

Development of Biotechnologies and Bioterrorism

open access: yesМосковский журнал международного права, 2009
All the states meet real or potential menace of terrorism. Legislation of the European countries attributes international terrorism to the most dangerous criminal offence.
A. S. Kontsevenko
doaj   +1 more source

Strategies for preventing gender‐based violence in healthcare services: Evidence synthesis for health policy

open access: yesInternational Journal of Gynecology &Obstetrics, EarlyView.
Abstract Background Violence against women remains a serious public health problem and a violation of human rights that affects women's health. Healthcare providers play a fundamental role in preventing and responding to violence against women and girls.
Odette del Risco Sánchez   +4 more
wiley   +1 more source

Irish traveller women and sexual assault: Patterns of engagement with sexual assault treatment units

open access: yesInternational Journal of Gynecology &Obstetrics, EarlyView.
Abstract Objective To detail the attendance of female Irish Travellers at the national Sexual Assault Treatment Unit (SATU) network. Methods Retrospective cross‐sectional study examining the attendance of female patients who identified as members of the Irish Traveller community at the national SATU network between 2017 and 2023 and comparing them with
Daniel Kane   +7 more
wiley   +1 more source

1. The Beginnings of Industrialization in England

open access: yes, 1958
The most momentous development of the last century and a half has been the industrialization off Western society and, more recently, the spread of that industrialization to other parts of the world.
Bloom, Robert L.   +6 more
core  

Review of millimeter‐wave and terahertz near‐field synthetic aperture radar imaging technology

open access: yesInfoScience, EarlyView.
Abstract This paper comprehensively reviews the development of millimeter‐wave (MMW) and terahertz (THz) near‐field imaging technologies, with an emphasis on the state of synthetic aperture radar (SAR)‐based imaging technologies. Near‐field imaging technologies are categorized into passive and active imaging modes, among which active imaging is favored
Qi Yang   +3 more
wiley   +1 more source

Federalism, treaty implementation, and political process: Bond v. United States [PDF]

open access: yes, 2014
In Bond v. United States,1 the U.S. Supreme Court disallowed the prosecution of a domestic poisoning case under legislation that implements the Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on ...
Bradley, Curtis A.
core   +2 more sources

Decoding temporal miRNA signatures of semen under in vitro exposure for forensic time since deposition estimation using machine learning‐driven modeling

open access: yesInterdisciplinary Medicine, EarlyView.
This study develops a novel miRNA‐based framework for estimating the time since deposition of semen stains, combining small RNA sequencing with machine learning. Time‐dependent miRNA modules were identified using Mfuzz clustering and WGCNA, followed by a multi‐stage feature selection pipeline that reduced 261 candidate miRNAs to a minimal 7‐miRNA panel.
Meiming Cai   +11 more
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy