-
121
HASTANELERDE MODERN YÖNETİM FELSEFESİNİN VERİMLİLİĞE ETKİSİ: GEVHER NESİBE HASTANESİNDE BİR UYGULAMA
Published 2008-02-01“…Ayrıca, hastanelerde verimliliği artırmak için en yaygın olarak kullanılan modern yönetim teknikleri, Toplam Kalite Yönetimi ve DışKaynaklardan Yararlanma Outsourcing ’dır. Hemşirelerin hastanelerde verimliliğin iyileştirilmesine yönelik tutumlarıgenel olarak değerlendirildiğinde; modern yönetim felsefesinin uygulanmasına hem taraftar olduklarıhem de olmadıklarısonucuna ulaşılmıştır.…”
Get full text
Article -
122
HASTANELERDE MODERN YÖNETİM FELSEFESİNİN VERİMLİLİĞE ETKİSİ: GEVHER NESİBE HASTANESİNDE BİR UYGULAMA
Published 2008-08-01“…Ayrıca, hastanelerde verimliliği artırmak için en yaygın olarak kullanılan modern yönetim teknikleri, Toplam Kalite Yönetimi ve DışKaynaklardan Yararlanma Outsourcing ’dır. Hemşirelerin hastanelerde verimliliğin iyileştirilmesine yönelik tutumlarıgenel olarak değerlendirildiğinde; modern yönetim felsefesinin uygulanmasına hem taraftar olduklarıhem de olmadıklarısonucuna ulaşılmıştır.…”
Get full text
Article -
123
Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage
Published 2021-07-01“…To reduce the security implementation cost of the outsourcing data audit mechanism for the regenerating-coding-based distributed storage systems, an orthogonal algebraic coding method was put forward to construct a lightweight privacy-preserving audit scheme based on linear homomorphic authentication.The homomorphic authentication tags were generated with the orthogonalization between the file encoded data and the private secret key vector, and the privacy protection of the auditing response message was achieved by using the random masking that was constructed by randomizing the orthogonal basis vectors of the specific sub-vector of the user’s secret key.The work realized the effective integration of algebraic coding, privacy protection, and security auditing.Theoretical analysis shows that the proposed scheme can realize the information-theoretic security in the regenerating-coding-based storage applications.Compared with the existing works, the proposed scheme is of low computational complexity and communication overhead, and better performance advantages.…”
Get full text
Article -
124
Money Cares. Institutional Entrepreneurship in the Finnish Social Services Sector
Published 2015-01-01“…Practices of selling and buying care are described, and the underlying power relations in two care marketization models are analyzed: outsourcing and the so called ‘second wave’, i.e. the customer choice model, in Finland. …”
Get full text
Article -
125
Arbuscular mycorrhizal colonization defines root ecological strategies in an extreme arid environment
Published 2025-01-01“…We found that larger RD correlated with higher levels of colM, supporting the ‘outsourcing’ strategy within the ‘collaboration gradient’ hypothesis of the RES. …”
Get full text
Article -
126
Could Externalized St. Jude Medical Riata® Lead Be a Culture Medium of a Polymicrobial Endocarditis? A Clinical Case
Published 2017-01-01“…Jude Medical Riata lead with a malfunction because of the outsourcing of conductors. The patient was treated with antibiotic targeted therapy and showed different bacteria at the blood cultures and then underwent transvenous leads extraction. …”
Get full text
Article -
127
Economical operation strategy of integrated energy system under fault state
Published 2019-06-01“…A fault-state operation strategy for integrated energy systems based on multi-energy transfer was proposed.Firstly,an integrated energy system model was built to model each energy-supply device in the system using actual measurable parameters.Then,the calculation method of maximum energy supply capacity when energy-supply device fails was introduced,and the power constraint conditions of each equipment were obtained,and the power balance equations of cold/heat/electricity power were established.Then,set the lowest operating cost as the optimization goal,the objective function was solved by the linear programming method.Finally,taking a factory-level integrated energy system as an example,the rationality of the output changes of each equipment after using this strategy under several fault conditions was analyzed.It is pointed out that the strategy has three characteristics:the cost control effect is significant at low load situation,remarkably impacted by time-sharing energy prices,the outsourcing resource curve can predict the change of operating costs when fault occurs.…”
Get full text
Article -
128
From Epiphylogenesis to General Organology
Published 2022-07-01“…Specifically, the formation of organisational technics includes writing, art, clothing, tools, and machines, but also architecture and urban planning. This outsourcing of memory from the organic changes the conditions for further phylogenetic becomings, given that evolutions continue to be extrinsically organised (‘ex-organised’) by associated technicised milieus. …”
Get full text
Article -
129
Entre Église catholique, bailleur européen et Gouvernement marocain, l’action de Caritas Maroc auprès des migrants subsahariens
Published 2014-12-01“…Here is the example of Caritas Morocco. Firstly, with outsourcing management of migratory flows from Europe to the Maghreb countries and the strengthening of the repressive policy of the moroccan government, the figure of the african migrant beneficiary changed. …”
Get full text
Article -
130
Approach to keyword search over encrypted data in cloud
Published 2014-11-01“…With the advent of cloud computing,large-scale data are being increasingly outsourced to the cloud.For the protection of data privacy,sensitive data has to be encrypted before outsourcing,which makes effective data utilization a very challenging task.Although traditional searchable encryption approaches allow users to search over encrypted data through keywords,they don’t capture any relevance of data files,so users have to spend much time on post-processing every retrieved file in order to find ones most matching their interest.Moreover,retrieving all files containing the queried keyword further incurs unnecessary network traffic,which is not accord with pay-as-you-use cloud paradigm.An approach to ranked keyword search over encrypted data in cloud is proposed.Ranked search greatly mitigate the user’s effort by returning the matching files in a ranked order,and also protects the data privacy by order-preserving encryption.Extensive experimental results demonstrate the efficiency.…”
Get full text
Article -
131
A Reward Optimization Method Based on Action Subrewards in Hierarchical Reinforcement Learning
Published 2014-01-01Get full text
Article -
132
Des démarches de DD/RSE à la dégradation du rapport social de travail dans le secteur hôtelier
Published 2016-12-01“…SD/CSR processes inclusion in luxury hotels is achieved through outsourcing, whereas franchised hotels integrate them directly into their production process. …”
Get full text
Article -
133
O Estado de Alagoas no contexto regional nordestino
Published 2019-09-01“…Urbanization as a process, where the residence of workers, including farm workers, is increasingly urban and the demographic turmoil and outsourcing are notable facts. This research has the character of documentary and bibliographical investigation, being a qualitative research with regard to the agents and immediate purposes of the creation of urban centers, analyzing the determinant processes for this genesis. …”
Get full text
Article -
134
Reputational ranking of platform workers: on the gender discriminatory implications of users’ feedback
Published 2024-12-01“…One distinctive feature of on-demand platform work is the ease of outsourcing the service’s quality assessment to clients. …”
Get full text
Article -
135
Calidad del Empleo en Organizaciones de Servicios de Contact-Center en Manizales, Colombia
Published 2016-01-01“…En este documento analizamos la calidad del empleo en algunas organizaciones de Contact-Center bajo la modalidad de outsourcing en Manizales, Colombia, con el propósito de conocer la valoración de los sujetos teleoperadores sobre las condiciones de su trabajo. …”
Get full text
Article -
136
MANAGING SUPPLY CHAIN RISKS: A FUZZY-FAILURE MODE AND EVALUATION APPROACH FOR RANKING THREATS
Published 2021-12-01“… On the backdrop of lower transportation cost, outsourcing paved the way for borderless production activities and ushered in the era of Supply Chain Management (SCM). …”
Get full text
Article -
137
La guerra asimétrica. Una lectura crítica de la transformación de las doctrinas militares occidentales
Published 2011-01-01“…El autor identifica tres tendencias en la evolución de la guerra en conexión con los conflictos asimétricos: 1) una reorientación que conduce de los asuntos militares al problema del control social de la población; 2) una irregularización de la violencia, que implica una ruptura con las leyes y los acuerdos internacionales, y 3) la subcontratación -outsourcing- del ejercicio de la guerra a fuerzas irregulares aliadas, tales como corporaciones militares privadas, milicias, grupos paramilitares, señores de la guerra e incluso, crimen organizado.…”
Get full text
Article -
138
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01“…Furthermore, to maintain data confidentiality, symmetric encryption and Elliptic Curve Cryptography (ECC) based asymmetric encryption techniques are used before outsourcing data to the cloud server. The results illustrate that the proposed scheme outperforms some of the existing schemes by providing reduced computation costs.…”
Get full text
Article -
139
Gestión empresarial y competitividad de empresas de supervisión y análisis químico al sector minero del Perú, año 2022
Published 2025-01-01“…La muestra probabilística aleatoria simple fue de 70 participantes, que son colaboradores de empresas mineras que recibieron el servicio de outsourcing en supervisión y análisis químico al sector minero del Perú. …”
Get full text
Article -
140
RUSSIAN STRATEGY OF ENTERING THE INNOVATION MARKETS OF THE MIDDLE EAST
Published 2017-11-01“…Russia’s innovative presence in the Middle East region can be embodied in the form of joint ventures, the outsourcing of a number of industries and the provision of technological services as well as joint applied scientific research. …”
Get full text
Article