178 research outputs found
Dispositional Effects on Job Stressors and Job Satisfaction: The Role of Core Evaluations
AbstractCore self-evaluations (CSE) is a broad, integrative trait indicated by self-esteem, locus of control, generalized self-efficacy, and (low) neuroticism (high emotional stability). The aim of this study was to investigate the role of core self evaluations and its traits in the job stressors and job satisfaction. Two hundred and twenty eight (45 males, 183 females) of Islamic Azad University employees completed Measures of Job Stressors which consisted of the Interpersonal Conflict at Work Scale, the Organizational Constraints Scale, and Quantitative Workload Inventory, Overall Job Satisfaction, Rosenberg Self-Esteem Scale, Generalized Self-Efficacy Scale (GSES), Eysenck Personality Inventory Neuroticism Scale, Internality, Powerful Others and Chance Scale (IPC), as well as Core Self-Evaluation Scale (CSEs). Findings revealed the negative correlation of self-esteem, generalized self-efficacy and core self-evaluations with interpersonal conflict at work, organizational constraints, and job satisfaction. Neuroticism had also a positive correlation with them. Furthermore, regression analysis of the data demonstrated that self-esteem, generalized self-efficacy, neuroticism, and core self-evaluations significantly predicted interpersonal conflict, organizational constraints, and job satisfaction. Therefore, based on the results it could be concluded that core self evaluation and four traits influence the job satisfaction and job stressors with the exception of quantitative workload
Hypoxia: a Review
Tissue hypoxia occurs where there is an imbalance between oxygen supply and consumption. Growing evidence from experimental and clinical studies points to the fundamental and patho-physiologic role of hypoxia in cancer, ischemic tolerance, and stroke. Hypoxia-induced changes in ion homeostasis, erythropoiesis, angiogenesis, proliferation and differentiation. This review outlines hypoxia effect at molecular level and describes briefly hypoxia role in the physiological and pathological conditions
Autogenous skin transplant for repair of traumatic ventral hernia in sheep
Traumatic ventral abdominal hernia is common in sheep. Fifteen adult sheep affected with large ventral hernia defect were treated. Skin was harvested from the same sheep and replaced for the defective abdominal muscle and sutured. Subcutaneous tissue and skin were opposed over the transplanted skin and sutured. The animals were evaluated clinically, haematologically and by biopsy. Clinically, the animals ate and drank normally after surgery. The transplanted skins were perfectly secured in place. Leukocytosis with neutrophilia and lymphopenia were noticed in 77.7% of cases until the 5th day post-operation. Biopsy results indicated vascularization, atretic hair follicles and no signs of rejection. After six months there were signs of re-herniation and the transplanted skin began to enlarge, showing a defect in the abdominal wall in all cases
The Impact of Housing on Primary Student’s Welfare and Role of International Organizations to improve it
Abstract The purpose of this literature review paper is to determine the role of housing availability in improving well-being in children’s life and prevention of child abuse by considering the role of international organizations. This review shows that having a suitable home has an important role in succeeding the academic achievement among students, and also, homeless children more than others suffer from lack of health, physical problems and child abuse. Furthermore, this study finds that homeless school students more than their peers have a problem about academic achievement. This paper also supports the need of improving legal ways to respond to the problem of homeless among students. Key word:  Housing, Student’s welfare, International organization, Child abuse, Academic achievementÂ
The Impact of Housing on Primary Students Welfare and Role of International Organizations to Improve IT
The purpose of this literature review paper is to determine the role of housing availability in improving well-being in childrens life and prevention of child abuse by considering the role of international organizations. This review shows that having a suitable home has an important role in succeeding the academic achievement among students, and also, homeless children more than others suffer from lack of health, physical problems and child abuse. Furthermore, this study finds that homeless school students more than their peers have a problem about academic achievement. This paper also supports the need of improving legal ways to respond to the problem of homeless among students. Key word: Housing, Students welfare, International organization, Child abuse, Academic achievemen
The relationship between motivation in work and spirituality among nursing staff in the hospitals in Isfahan using spirituality- based motivation model
زمینه و هدف: انگیزش در کار مجموعه ای از نیروهای درونی و بیرونی بوده که به عنوان امری مهم و ضروری در شغل پرستاران و سایر افراد ارائه دهنده خدمات به بیماران جهت ارائه کار دقیق و با کیفیت شناخته شده است. این مطالعه به منظور تعیین رابطه انگیزش در کار و معنویت در میان کادر پرستاری بیمارستان های شهر اصفهان با استفاده از مدل انگیزشی مبتنی بر معنویت انجام گردید. روش بررسی: این مطالعه توصیفی- تحلیلی در سال 1393 بر روی 230 نفر از پرستاران، ماماها و بهیاران شاغل در بیمارستان های دولتی شهر اصفهان که به صورت نمونه گیری تصادفی ساده انتخاب شده بودند انجام گردید. ابزار جمع آوری شامل پرسشنامه محقق ساخته شامل 64 سوال بر اساس مدل انگیزشی مبتنی بر معنویت در حوزه ارتباطات فرافردی، درون فردی، میان فردی، برون فردی، انگیزش و فرا انگیزش و معنویت بود. یافته ها: در این مطالعه 230 نفر از پرستاران، ماماها و بهیاران شامل 57/8 (133 نفر) مرد و 42/2 (97 نفر) زن تحت مطالعه قرار گرفتند. ارتباطات فرافردی با بتای 0/86 بیشترین تأثیر را داشته و بعد از آن ارتباط درون فردی با بتای 0/70، ارتباط میان فردی و برون فردی با بتای 0/59 بر روی معنویت در کار اثر داشتند؛ همچنین متغیر معنویت در کار با بتای 0/667 به طور معنی داری بر انگیزش و فرا انگیزش موثر بود. ارتباط معنی داری بین مولفه های مدل انگیزش مبتنی بر معنویت با تحصیلات و سن افراد وجود نداشت نتیجه گیری: با توجه به تأثیرگذاری بیشتر ارتباطات فرا فردی و درون فردی در مقایسه با ارتباطات میان فردی و برون فردی در معنویت و انگیزش در کار پیشنهاد به ارتقای این ارتباطات توسط مدیران بیمارستان ها و بدین ترتیب افزایش انگیزش در کار با رهیافت معنویت می شود
PATHOLOGY OF I.R.I. RULES ON TENDER’S EXCEPTIONS: IN THE LIGHT OF FUNDAMENTAL PRINCIPLES GOVERNING ON INTEGRITY OF PUBLIC TRANSACTIONS
Abstract. The macro volume of working capital in public transaction and various renting can formadministrative corruption in this field. To fight against corruption in public transaction, the governments have predicted different mechanisms and one of the most important types is obliging the administrative institutes to observe the formalities of tender in public transaction. The formalities of tender include the processes with the aim of protection of the public benefits, avoidance of corruption and keeping the competitive space. If the formalities of tender are not observed for some logical reasons, we can leave these formalities in the rules. As tender exception is performed without following the rules and processes of tender, observing the fundamental principles to guarantee the administrative health is necessary. These principles include transparency, competitiveness, responsiveness and revision of the administrative decisions. The present study evaluates the Iranian rules regarding leaving the formalities of tender based on the mentioned principles to define how much the rules are based on these principles. The studies show that none of the mentioned principles are observed as fully in the rules of not observing the tender formalities and the rules have serious shortcomings in this regard. The lack of observing of these rules have important role in administrative corruption in this stage of public transaction. It is attempted to explain theweaknesses and strengths of the relevant rules and present corrective solutions and remove the legislative problems and fight against corruption in this field.Keywords: Tender exceptions, Administrative corruption, Fundamental principles, Public transactio
Child Abuse by Teachers and Legal Ways to Encounter in Rural Areas
Many children closely interact with teachers for nine months out of the year and schools are one of the safest places for students to be educated and teachers have a vital role for this education. Teachers should prevent from different kinds of child abuses and have an important role for preventing from child abuse. The primary purpose of this literature review study is to investigate of the phenomenon of child abuse within the school environment by teachers. The second aim of this paper is to determine the legal ways in different countries to encounter with physical child abuse by teachers. Child abuseby teachers has an in depth influence on children\u27s behaviors and their academic achievements. Abused children have been found to suffer from extreme deficits in school, exhibit poor academic performance, antisocial behaviour, poor self-respect, higher criminal behaviour rates, scepticism of adults, and central nervous system functioning. The findings of this paper showed that there are many reported cases of child abuse by teachers in rural areas, nevertheless, many countries banned or restricted physical abuse or corporal punishment and made legal decisions
Classification, Formalization and Automatic Verification of Untraceability in RFID Protocols
Résumé
Les protocoles sécurité RFID sont des sous-ensembles des protocoles cryptographiques mais avec des fonctions cryptographiques légères. Leur objectif principal est l'identification à l'égard de certaines propriétés de intimité comme la non-traçabilité et la confidentialité de l'avant. La intimité est un point essentielle de la société d'aujourd'hui. Un protocole d'identification RFID devrait non seulement permettre à un lecteur légitime d'authentifier un tag, mais il faut aussi protéger la intimité du tag. Des failles de sécurité ont été découvertes dans la plupart de ces protocoles, en dépit de la quantité considérable de temps et d'efforts requis pour la conception et la mise en œuvre de protocoles cryptographiques. La responsabilité de la vérification adéquate devient cruciale.
Les méthodes formelles peuvent jouer un rôle essentiel dans le développement de protocoles de sécurité fiables. Les systèmes critiques qui nécessitent une haute fiabilité tels que les protocoles de sécurité sont difficiles à évaluer en utilisant les tests conventionnels et les techniques de simulation. Cela a eu comme effet de concentrer les recherches sur les techniques de vérification formelle de tels systèmes pour assurer un degré élevé de fiabilité. Par conséquent, certaines recherches ont été faites dans ce domaine, mais une définition explicite de certaines de ces propriétés de sécurité n'ont pas encore été donnée.
L'objectif principal de cette thèse est de démontrer l'utilisation de méthodes formelles pour analyser les propriétés de intimité du protocole RFID. Plusieurs définitions sont données dans la littérature pour les propriétés non-traçabilité, mais il n'y a pas d'accord sur sa définition exacte. Nous avons introduit trois niveaux différents pour cette propriété en ce qui concerne les expériences de intimité existantes. Nous avons également classé toutes les définitions existantes avec différents points forts de la propriété non-traçabilité dans la littérature. De plus, notre approche utilise spécifiquement les techniques de calculs de processus pi calcul appliqués pour créer un modèle pour un protocole. Nous démontrons les définitions formelles de nos niveaux de non-traçabilité proposées et l'applique à des études de cas sur les protocoles existants.----------Abstract
RFID protocols are subsets of cryptographic protocols but with lightweight cryptographic functions. Their main objective is identification with respect to some privacy properties, like anonymity, untraceability and forward secrecy. Privacy is the essential part of today's society. An RFID identification protocol should not only allow a legitimate reader to authenticate a tag but also it should protect the privacy of the tag. Although design and implementation of cryptographic protocols are tedious and time consuming, security flaws have been discovered in most of these protocols. Therefore the responsibility for reliable and proper verification becomes crucial.
Formal methods can play an essential role in the development of reliable security protocols. Critical systems which require high reliability such as security protocols are difficult to be evaluated using conventional tests and simulation techniques. This has encouraged the researchers to focus on the formal verification techniques to ensure a high degree of reliability in such systems. In spite of the studies which have been carried out in this field, an explicit definition for some of these security properties is still missing
- …