Monthly Archives: July 2016

Mobile Phone Usage and the Risk of Brain Tumors

Author(s): Naina Sawal, Amir Hossein Mortazavi Entesab ABSTRACT Purpose: This literature review investigated the possible association between the use of mobile phones and brain tumors. Methods: In brief, 11 publications were retrieved from JSTOR, PubMed, Google Scholar and Summon in … Continue reading

Posted in ODEM | Tagged , , , , , , , , , , , , | 1 Comment

Enhancing Mobile Cloud Computing Security Using Steganography

Author(s): Hassan Reza, Madhuri Sonawane ABSTRACT Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the … Continue reading

Posted in JIS | Tagged , , , , , , | 85 Comments

Corporate Social Responsibility and Family Enterprise

Author(s): Fengjiao Zhang ABSTRACT As one of important characteristics of the economic development and social progress, fulfilling corporation social responsibility has attracted wide attention from all sectors of society. We empirically test the influence of family enterprise on the behavior … Continue reading

Posted in OJBM | Tagged , , , | 124 Comments

Unequal Exchange? Marx’ Solution to the Value Problem on the World Market

Author(s): Guenther Sandleben ABSTRACT By drawing on his critically developed labour theory of value, Marx was able to provide a satisfactory answer to the question of unequal exchange—that is, the question of how the law of value regulates exchange between … Continue reading

Posted in TEL | Tagged , , , , , | 12 Comments

A Derived Exposure Chart for Computed Radiography in a Negroid Population

Author(s): Thomas Adejoh, Odira C. Ewuzie, Joshua K. Ogbonna, Stanley O. Nwefuru, Nnamdi C. Onuegbu ABSTRACT Background: Computed radiography has a wider exposure latitude when compared with film-screen imaging system. Consequently, the risk of dose creep is high. A conscientious … Continue reading

Posted in Health | Tagged , , , , , | 9 Comments

Enhancing Mobile Cloud Computing Security Using Steganography

Author(s): Hassan Reza, Madhuri Sonawane ABSTRACT Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the … Continue reading

Posted in JIS | Tagged , , , , , , | 1 Comment

Comparison of Three Techniques to Identify and Count Individual Animals in Aerial Imagery

Author(s): Pat A. Terletzky, Robert Douglas Ramsey ABSTRACT Whether a species is rare and requires protection or is overabundant and needs control, an accurate estimate of population size is essential for the development of conservation plans and management goals. Current … Continue reading

Posted in JSIP | Tagged , , , , | 9 Comments

The Relationship between Happiness and Self-Awareness among Introverts and Extroverts

Author(s): Mandana Bagherian, Adis Kraskian Mojembari, Parviz Naghibian, Sanam Farshad Nik ABSTRACT It is commonly believed that extroverts are happy and felicitous, and introversion is usually regarded as the state of having no fun or happiness in life. The present … Continue reading

Posted in Psych | Tagged , , , , | 474 Comments