نتایج جستجو برای: employee assistance

تعداد نتایج: 68386  

2006
Vinaykumar Muralidharan Weichao Wang Alexander Wyglinski

Security is a concern in the next generation Hybrid networks. This paper analyzes the various architectures that are proposed for next generation networks. Then we analyze their performance towards defending themselves from various malicious attacks and how the malicious nodes can exploit the differences in nature of the network to perform attacks. The solution to these attacks are provided by ...

Journal: :The American journal of occupational therapy : official publication of the American Occupational Therapy Association 1995
K Laflin D Aja

As members of injury prevention and injury management teams, physical therapists and occupational therapists have the opportunity to evaluate back stress associated with patient-lifting activities. In this study, three mathematical formulas are presented that can be used to objectively assess health care workers' maximum safe lifting capacity for moving patients. Recommendations to reduce the r...

2015
Emma Blakey Daniel J. Carroll

Cognitive training has been shown to improve executive functions (EFs) in middle childhood and adulthood. However, fewer studies have targeted the preschool years-a time when EFs undergo rapid development. The present study tested the effects of a short four session EF training program in 54 four-year-olds. The training group significantly improved their working memory from pre-training relativ...

2017
Mohamed Taha Chikhaoui Kanty Rabenorosoa Nicolas Andreff Mohamed T. Chikhaoui

An active micro-endoscope based on concentric tubes, an emerging class of continuum robots, is presented hereby. It is designed to reach the digestive tube and the stomach for early cancer detection and intervention. The manipulator is constructed from three flexible, telescopic, and actuated tubes. The actuators are based on Electro-Active Polymer electrodes coated and patterned around the tub...

2005
Yoseph Bar-Cohen

The evolution of nature led to the introduction of highly effective and power efficient biological mechanisms. Imitating these mechanisms offers enormous potentials for the improvement of our life and the tools we use. Humans have always made efforts to imitate nature and we are increasingly reaching levels of advancement that it becomes significantly easier to imitate, copy, and adapt biologic...

2017
Keith Townsend

Political cartoons are a ubiquitous form of satire which assists the public to interpret political life. This study examined the tone and content of 107 political, satirical cartoon images published in mainstream Australian newspapers in 2005 and 2006. The cartoons illustrated the sweeping reforms of the industrial relations system at a turbulent time in Australia’s political history. We invest...

2008
Andres Almazan Javier Suarez Adolfo de Motta Mark Flannery

We develop a model of a firm whose production process requires it to initiate and nurture a relationship with its stakeholders. Because there are spillover benefits of being associated with a “winner,” the perceptions of stakeholders and potential stakeholders can affect firm value. Our analysis indicates that while transparency (i.e., generating information about a firm’s quality) may improve ...

2017
Jia Wen John R. Harp Elizabeth M. Fozo

Many bacterial type I toxin mRNAs possess a long 5΄ untranslated region (UTR) that serves as the target site of the corresponding antitoxin sRNA. This is the case for the zorO-orzO type I system where the OrzO antitoxin base pairs to the 174-nucleotide zorO 5΄ UTR. Here, we demonstrate that the full-length 5΄ UTR of the zorO type I toxin hinders its own translation independent of the sRNA where...

2004
J. Arkko V. Lehtovirta P. Eronen

This specification defines a new EAP method, EAP-AKA’, a small revision of the EAP-AKA method. The change is a new key derivation function that binds the keys derived within the method to the name of the access network. The new key derivation mechanism has been defined in 3GPP. This specification allows its use in EAP in an interoperable manner. In addition, EAP-AKA’ employs SHA256 instead of S...

2007
D. Harkins

The HOKEY WG is developing solutions for optimizations as well as security key hierarchy specifications for handovers. The key derivation specifications all draw from a trust relationship that is created as a result of a "2-party" EAP authentication between a peer and a backend server, while distributing the resulting keys to third parties other than the peer and the backend server. This docume...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید