نتایج جستجو برای: governmental agencies
تعداد نتایج: 43058 فیلتر نتایج به سال:
● Summary ● Introduction ● What are the major sources of dioxin and related compounds in the human diet? ● How do food animals become contaminated with dioxin and related compounds? ● How can dioxin contamination in food animals be decreased? ● Have there been any serious incidents of contamination of food products with dioxins above background levels recently? ● What activities involving dioxi...
The past decade has witnessed a proliferation of scholarship around the topic of intellectual property law and indigenous people. Joining together fields as diverse as law, ethnobotany, pharmacology and anthropology, this topic has transformed theory and practice in each of these fields, becoming, for example, an established subfield in the discipline of anthropology, a subject of ethical debat...
The 10 x '20 Initiative: pursuing a global commitment to develop 10 new antibacterial drugs by 2020.
The time has come for a global commitment to develop new antibacterial drugs. Current data document the impending disaster due to the confluence of decreasing investment in antibacterial drug research and development concomitant with the documented rapid increase in the level of resistance to currently licensed drugs. Despite the good faith efforts of many individuals, professional societies, a...
Today’s world, for secure data transmission via Internet or any public network, there is no alternative to cryptography. The role of Cryptography is most important in the field of network security. The main goal of cryptography is Confidentiality, Integrity, Authentication, Nonrepudiation. Cryptography is widely used by governmental and intelligence agencies around the world to safe transmissio...
Since its establishment in February 2008, the Armed Forces Health Surveillance Center (AFHSC) has embarked on a number of initiatives and projects in collaboration with a variety of agencies in the Department of Defense (DoD), other organizations within the federal government, and non-governmental partners. In 2009, the outbreak of pandemic H1N1 influenza attracted the major focus of the center...
Health informatics and information management (HIIM) is an applied research discipline that integrates health, computer science, and business. Researchers in an applied discipline answer the questions of why and how. Policy makers, who can be leaders of health systems, legislators, or regulators at governmental agencies, are often the sources of these questions. In this research model, data col...
Cybersecurity entails the safeguarding of computer networks and the information they contain from penetration and from malicious damage or disruption. Since the use of computer networks has become a major element in governmental and business activities, tampering with these networks can have serious consequences for agencies, firms and individuals. The question is to what degree these individua...
The term, "non-governmental organization" or NGO, came into currency in 1945 because of the need for the UN to differentiate in its Charter between participation rights for intergovernmental specialized agencies and those for international private organizations. At the UN, virtually all types of private bodies can be recognized as NGOs. They only have to be independent from government control, ...
Standards are, generally speaking, a sensible way of simplifying a number of issues; this is also true for ICT professional competences, the standardization of which could bring huge benefits to all stakeholders, including education & training providers, employers, candidates and agencies for employment, freelance professionals, ICT associations, governmental and statistical institutions, and f...
Collectors of confidential data, such as governmental agencies, hospitals, or search engine providers, can be pressured to permit data to be used for purposes other than that for which they were collected. To support the data curators, we initiate a study of pan-private algorithms; roughly speaking, these algorithms retain their privacy properties even if their internal state becomes visible to...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید