Showing 1 - 10 of 58
The number of staff restructuring processes has considerably increased worldwide in recent years, and their effects are increasingly dramatic. Furthermore, the global economic context is becoming more and more turbulent. All this poses a series of new challenges for firms that they will only be...
Persistent link: https://www.econbiz.de/10012045447
against this background. It aims to resolve one of the main critical factors that distinguish the PSO network: the shortage of … applied to a network of nodes and arcs representing, respectively, the airports and their connecting routes, and the airport … objective is to determine a network structure which corresponds to the distribution of passengers on the various branches …
Persistent link: https://www.econbiz.de/10012043082
Android based Smartphones are nowadays getting more popular. While using Smartphone, user is always concerned about security and malicious attacks, cryptographic vulnerability of the applications. With increase in the number of Android mobiles, Android malwares are also increasing very rapidly....
Persistent link: https://www.econbiz.de/10012045695
characterized by intensive competencies and knowledge. Several services intensive organizations present a model called multi sites … full time at client sites. The challenge for these organizations is to manage the knowledge acquired in these various sites … in order not to lose the knowledge created from the improvement, problem solving and innovations implemented in the …
Persistent link: https://www.econbiz.de/10012046228
multiple network interface to overcome the problems of SISC where each node is equipped with a single antenna to ensure … connectivity with all other nodes. The proposed protocols primarily exploit the idea of interaction among MAC and Network layers by …
Persistent link: https://www.econbiz.de/10012046460
Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are...
Persistent link: https://www.econbiz.de/10012047053
an algorithm that recognizes influential users to reach a target in the network, in order to provide a strategic … the total number of nodes in the network. …
Persistent link: https://www.econbiz.de/10012048589
Continuous learning is essential in academic and business environments for the 21st century learner as success, survival, and growth lean toward the educator answering the question, ‘Which educational design best facilitates educators in becoming learner-focused while producing adaptive...
Persistent link: https://www.econbiz.de/10012043118
The research literature on awareness, knowledge, and ability of mobile security of young mobile phone users was … mobile security issues when using a mobile phone. Young mobile phone users are often found to lack the knowledge to detect … their awareness, knowledge, and ability of mobile security so that they can effectively and enjoyably use their mobile …
Persistent link: https://www.econbiz.de/10012043512
People in a variety of settings can be heard uttering the phrase that “knowledge is power” or the relatively equivalent … examine the relationship between knowledge and power. There is a lack operational quantitative definitions of this … a relational algorithm that can be used in both conceptual discussions on knowledge empowerment modeling, as well as in …
Persistent link: https://www.econbiz.de/10012043583