Showing 141 - 160 results of 196 for search '"outsourcing"', query time: 0.05s Refine Results
  1. 141

    Automatic Algorithm for Fractal Plant Art Image Similarity Feature Generation by Zhizhe Liu, Luo Sun

    Published 2021-01-01
    “…With the popularity of smart devices and the Internet, the volume of multimedia data is growing rapidly, and content-based image retrieval (CBIR) can search for similar images from large-scale images to realize the utilization of the data. For data owners, outsourcing the management and maintenance of image data to cloud service providers can effectively reduce costs, but there is a privacy leakage problem. …”
    Get full text
    Article
  2. 142

    The Critique of the Book "The Crafters and Their Business Life in the Safavid Period: Essays in the Socio-Economic History of Iran" by Shahram Yousefifar, Ahmad Abohamzeh, Behrang Zolfaghari, Amir Samadi Ahangar, Zahra Ghashghaei Nejad, said najjar

    Published 2018-12-01
    “…The latter section is presented in two parts: introspection and outsourcing critique.This critique is the first output of the "Review of the Impact of the Research on Social History" which has been reorganized in the framework of the Council for the Study of Texts and Humanities Books.…”
    Get full text
    Article
  3. 143

    Towards Dynamic Remote Data Auditing in Computational Clouds by Mehdi Sookhak, Adnan Akhunzada, Abdullah Gani, Muhammad Khurram Khan, Nor Badrul Anuar

    Published 2014-01-01
    “…Enterprise and businesses are now more interested in outsourcing their data to the cloud to lessen the burden of local data storage and maintenance. …”
    Get full text
    Article
  4. 144

    A Fuzzy Multi-Objective Mathematical Model for Supplier Evaluation in a Reliable Supply Chain considering Different Risk Levels by Yuanyuan Tian, Saeed Bahrami, null Farshad kaveh

    Published 2022-01-01
    “…One of the major parts of these activities that can save a lot of costs is careful outsourcing. In this study, an approach based on decision-making policies in order to select suppliers and allocate order volume to them is introduced. …”
    Get full text
    Article
  5. 145

    MODERN STRATEGIES FOR THE DEVELOPMENT OF SCIENCE AND RESEARCHERS TRAINING: INTERNATIONAL EXPERIENCE by Yu. D. Artamonova, A. L. Demchuk, A. N. Karneyev, V. V. Safonova

    Published 2018-05-01
    “…The reason is not only the global crisis of the 2000s that led to the stagnation of science funding and to changes in its financing by the state, local authorities, business and outsourcing, but also longer-term trends in the development of modern society, in particular, the formation of the academic precariat, the attraction of scientific personnel to traditional centres of innovation (despite funding), and others. …”
    Get full text
    Article
  6. 146

    A decision framework for cloud migration: A hybrid approach by Mirsaeid Hosseini Shirvani, Gholam R. Amin, Sara Babaeikiadehi

    Published 2022-12-01
    “…Abstract Cloud computing is utilised for information technology outsourcing of either industries or organisations. There are several inhibitors and motivations related factors to determine whether one can embrace the cloud services or not. …”
    Get full text
    Article
  7. 147

    National, International and Legal Mechanisms of Control over the Activity of Non-Government Security Entities by M. V. Zavalnyi

    Published 2019-06-01
    “…Further privatization and outsourcing in the security sector has led to a significant expansion of this area and increased risks of human rights and freedoms’ violations. …”
    Get full text
    Article
  8. 148

    Explaining and Prioritizing Supplier Evaluation Indicators with a Meta-Synthesis Approach by Sayyed Mohammad Reza Davoodi, Mehdi Papahn Shoushtari, Rasoul Bahalou Houreh, Hamid Reza Rezaei

    Published 2023-09-01
    “…The production process has changed from producing most products to outsourcing major accessories. Suppliers have a key role to play in creating a product. …”
    Get full text
    Article
  9. 149

    Privacy-preserving federated learning framework with irregular-majority users by Qianxin CHEN, Renwan BI, Jie LIN, Biao JIN, Jinbo XIONG

    Published 2022-02-01
    “…In response to the existing problems that the federated learning might lead to the reduction of aggregation efficiency by handing the majority of irregular users and the leak of parameter privacy by adopting plaintext communication, a framework of privacy-preserving robust federated learning was proposed for ensuring the robustness of the irregular user based on the designed security division protocol.PPRFL could enable the model and its related information to aggregate in ciphertext on the edge server facilitate users to calculate the model reliability locally for reducing the additional communication overhead caused by the adoption of the security multiplication protocol in conventional methods, apart from lowering the high computational overhead resulted from homomorphic encryption with outsourcing computing to two edge servers.Based on this, user could calculate the loss value of the model through jointly using the verification sets issued by the edge server and that held locally after parameter updating of the local model.Then the model reliability could be dynamically updated as the model weight together with the historic information of the loss value.Further, the model weight was scaled under the guidance of prior knowledge, and the ciphertext model and ciphertext weight information are sent to the edge server to aggregate and update the global model parameters, ensuring that global model changes are contributed by high-quality data users, and improving the convergence speed.Through the security analysis of the Hybrid Argument model, the demonstration shows that PPRFL can effectively protect the privacy of model parameters and intermediate interaction parameters including user reliability.The experimental results show that the PPRFL scheme could still achieve the accuracy of 92% when all the participants in the federated aggregation task are irregular users, with the convergence efficiency 1.4 times higher than that of the PPFDL.Besides, the PPRFL scheme could still reach the accuracy of 89% when training data possessed by 80% of the users in the federated aggregation task were noise data, with the convergence efficiency 2.3 times higher than that of the PPFDL.…”
    Get full text
    Article
  10. 150

    Pengaruh lingkungan kerja dan teknologi informasi terhadap kinerja tenaga alih daya by Asriati Asriati, Haeruddin Haeruddin, Agus Salim HR, Imran Tahalua, Ibrahim Ibrahim

    Published 2024-06-01
    “…Hasil penelitian yang diperoleh adalah secara parsial lingkungan kerja berpengaruh positif dan tidak signifikan terhadap kinerja tenaga alih daya dan teknologi informasi berpengaruh positif dan signifikan terhadap tenaga alih daya pada perusahaan outsourching Kota Makassar dan simultan lingkungan kerja dan teknologi informasi berpengaruh positif dan signifikan terhadap kinerja tenaga alih daya pada perusahaan outsourcing di Kota Makassar.…”
    Get full text
    Article
  11. 151

    THE IMPORTANCE OF MULTINATIONAL COMPANIES (MNCs) AND SMALL AND MEDIUM SIZED ENTERPRISES' (SMEs') INTERNATIONALIZATION AS BUSINESS DRIVERS IN GLOBALIZATION AND SLOWBALIZATION: MUTUA... by Anis BENABED

    Published 2024-12-01
    “…In conclusion, SMEs are considered driving companies for local economies in the EU and other economies with their rising numbers, they may remain domestic or grow through the process of export, import, outsourcing, licensing or franchising especially if they are innovative, they may follow the suitable internationalization entry mode in globalization. …”
    Get full text
    Article
  12. 152

    Analisis Sentimen Ulasan Rumah Makan Menggunakan Perbandingan Algoritma Support Vector Machine dengan Naive bayes (Studi Kasus: Ayam Goreng Nelongso Cabang Singosari, Malang) by Dinar Fairus Salsabillah, Dian Eka Ratnawati, Nanang Yudi Setiawan

    Published 2024-02-01
    “…Rekomendasi yang dapat dilakukan oleh pihak rumah makan diantaranya adalah evaluasi ukuran dan harga, penggunaan deep frying, pelatihan dan evaluasi pelayanan, serta penambahan tenaga kerja atau kerjasama dengan outsourcing dalam menjaga kebersihan tempat. Hasil penelitian diharapkan dapat membantu pemilik rumah makan dalam mengembangkan kualitas produk dan pelayanan serta memberikan pandangan untuk langkahlangkah yang dapat diambil di kemudian hari.  …”
    Get full text
    Article
  13. 153

    GuardianMPC: Backdoor-Resilient Neural Network Computation by Mohammad Hashemi, Domenic Forte, Fatemeh Ganji

    Published 2025-01-01
    “…The rapid growth of deep learning (DL) has raised serious concerns about users’ data and neural network (NN) models’ security and privacy, particularly the risk of backdoor insertion when outsourcing the training or employing pre-trained models. …”
    Get full text
    Article
  14. 154

    Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing by Shang LIU, Yinzhang GUO

    Published 2022-06-01
    “…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
    Get full text
    Article
  15. 155

    Information and Communication Technology Adoption and the Growth of Small Medium Enterprises in Uganda: Empirical Evidence from Kampala City Council Authority by Eton, Marus, Constant, Okello Obura, Fabian, Mwosi, Benard, Patrick Ogwel, Mary, Ejang, Francis, Ongia

    Published 2020
    “…Specialized ICT skills, regular updates and outsourcing of ICT functions appeared to be a key challenge businesses face in ICT adoption. …”
    Get full text
    Article
  16. 156

    COMPARATIVE ANALYSIS OF SECTORAL INNOVATION SYSTEMS: RUSSIA AND BRAZIL ON THE REGIONAL JET MARKET by M. G. Yevtodyeva

    Published 2018-07-01
    “…Revealing the most important features of evolution of the modern commercial aerospace sector such as high rate of innovation, R&D and subcontracting along the supply chain, development of new technologies, system-integration role of the leading global aircraft companies, outsourcing the production of major subsystems, liberalization of the regulative mechanisms and some others, the author demonstrates with the examples of the Brazilian and Russian cases how these changes were reflected in national sectoral systems of innovation of Brazil and Russia. …”
    Get full text
    Article
  17. 157

    Restructuring of Global Pharmaceutical Supply Chains after COVID-19 by N. A. Volgina

    Published 2022-03-01
    “…The multistage nature of global pharmaceutical chains, as well as the dynamic development of pharmaceutical outsourcing processes, have created favorable opportunities for “link” restructuring. …”
    Get full text
    Article
  18. 158

    ON-LINE PLATFORM FOR COMPETENCES DEVELOPMENT IN CORPORATE EDUCATIONAL SYSTEMS by L. G. Andreeva, O. A. Burukina, I. A. Vorob’eva, A. R. Denisov, V. A. Markova, V. P. Novikova, M. M. Stepanova

    Published 2016-01-01
    “…-Petersburg, Lipetsk, Chelyabinsk, Kostroma) to outsource their corporate education to universities prove that the offered solution is more appropriate than the existing alternatives (systems of additional education in universities, MOOC, corporate universities).…”
    Get full text
    Article
  19. 159

    Evaluating the impact of COVID-19 protection measures and staff absence on radiotherapy practice: A simulation study. by Elisabeth Jambor, Joe Viana, Melanie Reuter-Oppermann, Ralf Müller-Polyzou

    Published 2025-01-01
    “…The effect could be mitigated by outsourcing COVID-19 protection tasks to external service providers or other centre staff.…”
    Get full text
    Article
  20. 160

    El trabajo: concepciones de jóvenes que laboran en Call Centers en una ciudad intermedia colombiana by Mariana Castaño-Ravagli, Claudia Milena Álvarez-Giraldo

    Published 2017-01-01
    “…Las organizaciones actuales han desarrollado nuevos modelos para almacenar, transferir y transformar la información; esta era se caracteriza por su alta demanda de las nuevas tecnologías y de las características del individuo trabajador, lo que ha favorecido el desarrollo de la industria Business Process Outsourcing (BPO 1 ), logrando atraer a nuevos trabajadores y trabajadoras jóvenes. …”
    Get full text
    Article