Showing 1,921 - 1,940 results of 15,919 for search '"employment"', query time: 0.10s Refine Results
  1. 1921

    Effect of Supervision on Employee Performance in Uganda: A Case Study of Shuuku Savings Cooperative SACCO in Sheema District. by Ayesiime, Peninah

    Published 2024
    “…This research report was undertaken at Shuuku Savings Cooperative Sacco in Sheema District to establish the effect of Supervision on Employee Performance in Uganda: A Case Study of Shuuku Savings Cooperative Sacco in Sheema District and emphasis was also put on the different objectives namely the effect of supervision on administrators performance in Shuuku SACCO and to analyse the effect of supervision on other employee performance in Shuuku SACCO. The study employed a descriptive research design which employed both quantitative and qualitative research approaches. …”
    Get full text
    Thesis
  2. 1922

    Application of a Fault Detection and Isolation System on a Rotary Machine by Silvia M. Zanoli, Giacomo Astolfi

    Published 2013-01-01
    “…A model-free approach, that is, the Principal Component Analysis (PCA), has been employed to solve the fault detection issue. For the fault isolation purpose structured residuals have been adopted while an adaptive threshold has been designed in order to detect and to isolate the faults. …”
    Get full text
    Article
  3. 1923

    Sphere quantization of Higgs and Coulomb branches and Analytic Symplectic Duality by Davide Gaiotto

    Published 2025-01-01
    “…We also employ hemisphere correlation functions to define a quantization of certain real loci in the Higgs and Coulomb branches. …”
    Get full text
    Article
  4. 1924

    Distance Learning in John Stuart Mill’s Utilitarianism Perspective by Raihan Chaerani Putri Budiman

    Published 2024-07-01
    “…This research explores distance learning from the perspective of John Stuart Mill's utilitarianism, employing a qualitative philosophical approach for an in-depth and contextual analysis. …”
    Get full text
    Article
  5. 1925

    Engaging Millennials in the Workplace by Lauren Headrick Sweeney, Matthew Benge, Hannah Carter

    Published 2019-02-01
    “…Because millennials make up such a large portion of the workforce, it is imperative that employers better understand them and understand how to engage them. …”
    Get full text
    Article
  6. 1926

    Workplace violence: Prevalence, risk factors and preventive measures across the globe by Daniela ACQUADRO MARAN

    Published 2020-03-01
    “…This viewpoint described prevalence of workplace violence across the globe, as well as risk factors and preventive measures that employers may put in place in order to contrast this widespread phenomenon. …”
    Article
  7. 1927

    Assessment of The Quality of Borehole Water in Kanenankumba Village Hoima Municipality. by Tayeebwa, Joshua

    Published 2024
    “…The purpose of the study was to assess the quality of borehole water in Kanenankumba village, Hoima municipality. The objectives employed were; to determine the physical and micro-biological water quality parameters, compare the obtained physical and micro-biological parameters with standard values outlined by WHO and also determine the local methods that can be employed to purify borehole water. …”
    Get full text
    Thesis
  8. 1928

    A Fast Finite-Difference Time Domain Simulation Method for the Source-Stirring Reverberation Chamber by Wenxing Li, Chongyi Yue, Atef Elsherbeni

    Published 2017-01-01
    “…Numerical analysis methods are often employed to improve the efficiency of the design and application of the source-stirring reverberation chamber. …”
    Get full text
    Article
  9. 1929

    Accurate range-based distributed localization of wireless sensor nodes using grey wolf optimizer by Nabil Abdelkader Nouri, Abdenacer Naouri, Sahraoui Dhelim

    Published 2023-06-01
    “… Various ranging techniques are frequently employed in wireless sensor networks (WSNs) to determine the distance between a node and its neighboring anchor nodes. …”
    Get full text
    Article
  10. 1930

    Collaborative Optimization of Aerodynamics and Wind Turbine Blades by Fushan He, Xingsheng Zheng, Weilin Luo, Jianfeng Zhong, Yunhua Huang, Aili Ye, Rongrong Qiu, Huafu Ma

    Published 2025-01-01
    “…The Wilson method is employed to obtain the aerodynamic shape of the blade. …”
    Get full text
    Article
  11. 1931

    The optimization of semiconductor light, generating white light, heating regime by Jurgita Dabulytė, Feliksas Ivanauskas

    Published 2023-12-01
    “… In this work the mathematical model of semiconductor light was employed. There were offered the distribution cases for monochromatic lighting sources. …”
    Get full text
    Article
  12. 1932

    Dynamic and Static Nature of Br4σ(4c–6e) and Se2Br5σ(7c–10e) in the Selenanthrene System and Related Species Elucidated by QTAIM Dual Functional Analysis with QC Calculations by Satoko Hayashi, Taro Nishide, Waro Nakanishi

    Published 2020-01-01
    “…In our treatment, data from the perturbed structures, around the fully optimized structure, are employed for the analysis, in addition to those from the fully optimized one, which represent the dynamic nature of interactions. …”
    Get full text
    Article
  13. 1933

    Inter-Agency Analysis of EU Specialised Administrative Services: Insights from the Republic of Cyprus by Andreas Kirlappos, Stefanos Iacovides

    Published 2024-05-01
    “…Design: This research employs two methodological tools: a literature review of domestic and international literature on Europeanisation and historical institutionalism, and a field study employing interviews and questionnaires with public servants working within these services. …”
    Get full text
    Article
  14. 1934

    Facial masks and soft‐biometrics: Leveraging face recognition CNNs for age and gender prediction on mobile ocular images by Fernando Alonso‐Fernandez, Kevin Hernandez‐Diaz, Silvia Ramis, Francisco J. Perales, Josef Bigun

    Published 2021-09-01
    “…However, state‐of‐the‐art solutions in related tasks such as identity or expression recognition employ large Convolutional Neural Networks, whose use in mobile devices is infeasible due to hardware limitations and size restrictions of downloadable applications. …”
    Get full text
    Article
  15. 1935

    Legal pathology of property acquisition in dilapidated context with historical value by the municipality (case study: Sari city) by alijan shamshirband, Reza Nasiri Larimi, Seyed Mehdi Ahmadi

    Published 2025-06-01
    “…Data analysis in this study employs chi-square statistical techniques using SPSS software. …”
    Get full text
    Article
  16. 1936

    ICEEMDAN–VMD denoising method for enhanced magnetic memory detection signal of micro-defects by Shouhong Ji, Jie Yan, Yang Liu, Guojun He

    Published 2025-02-01
    “…Subsequently, VMD is employed to perform secondary decomposition on the transition components obtained from the ICEEMDAN method and calculate the correlation coefficients. …”
    Get full text
    Article
  17. 1937

    Anti-Impact Performance Enhancement of Two-Way Spanning Slab through the Implementation of Steel Trussed Bars by Rayeh Nasr Al-Dala’ien, S. M. Anas, Abdel-Fattah Jamal Kodrg

    Published 2024-01-01
    “…Reinforced concrete (RC) slabs represent integral structural components extensively employed in architectural and infrastructural frameworks owing to their inherent robustness and longevity. …”
    Get full text
    Article
  18. 1938

    The work of return to work. Challenges of returning to work when you have chronic pain: a meta-ethnography by Martin Underwood, Mary Grant, Kate Seers, Robert Froud, Joanne O-Beirne-Elliman

    Published 2019-06-01
    “…Where this ability was not apparent, there could be a downward spiral resulting in not working.Conclusions For people with chronic pain, and for their employers, navigating obstacles to return to work entails balancing the needs of (1) the person with chronic pain, (2) work colleagues and (3) the employing organisation. …”
    Get full text
    Article
  19. 1939

    Remote Industrial Sensor Network Monitoring Using M2M Based Ethical Sniffers by Syed Muhammad Asad Zaidi, Jieun Jung, Minsoo Kang, Byunghun Song, Ki-Hyung Kim

    Published 2012-11-01
    “…Although recent wireless systems for industrial automation such as ISA100.11a employ device management protocols, these protocols generate and report a large amount of status information from individual sensor nodes. …”
    Get full text
    Article
  20. 1940

    Distance Education: Imbalance between Possibilities and Threats by D. А. Endovitsky, I. E. Risin, Yu. I. Treshchevsky, E. A. Rudnev

    Published 2022-02-01
    “…The analysis of three groups of experts’ opinions: employers, university professors and students showed not-high values of revealed possibilities, connected with distance learning. …”
    Get full text
    Article