نتایج جستجو برای: human recourses
تعداد نتایج: 1643116 فیلتر نتایج به سال:
OBJECTIVE The implementation of work-related injury prevention policies has been hindered by underreporting of incidents among formal workers, and substantial underreporting among informal workforce. This study aimed at estimating the underreporting of work-related injury in a median-sized city. METHODS A random survey was carried out among residences in the urban area of Brazil. Residents we...
worship is submission and humitility with believe to divinity in fornt of god. in jewish religion ,worship is submission of the god inall the ordes and devosion tohim .worshio is not only so widely in islam and jew and does not include pray and fast and etc but also is every action that human does with divine intention and to content him. worship has huge and excellent rank in qoran and old te...
Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicious code and reprogramming the nodes. We provide a protocol that yields source authentication in the group setting like a public-key signature scheme, only with signature and verification times much closer to those of a MAC. We ...
The rapid increasing the industrialization, motorization, in the world has remarkably raised the demand of the petroleum products. The reservations of such a petroleum based fuels are limited in the world. Furthermore, they are exhaustible and cost is rapidly increasing day to day. For those countries having not ability of petroleum recourses, are importing the petroleum fuels. So, it is quit n...
System integration, interoperability, just in time delivery, window of opportunity, and dust-to-dust optimization are all keywords of our computerized future. Survivability is an important concept that together with dependability and quality of service are key issues in the systems of the future, i.e. infrastructural systems, business applications, and everyday desktop applications. The importa...
As time goes, the global access to information and recourses is becoming a routine and a necessity in our daily lives. Unfortunately this great increase in global accessibility brings great chances of intrusions and great attacks. In an effort to handle these new threats, automated identification techniques are now being sought. In this paper, a hybrid keystroke authentication dynamics is propo...
This work presents the implementation of dynamically reconfigurable system with operating system support specifically Linux. The presented work combines both HW and SW flows where the complex parts of the architecture are designed to HW modules. These HW modules can be reconfigured on the fly by using partial dynamic reconfiguration. In our work, we are using floating point computation unit as ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید