Filtreler
Filtreler
Bulunan: 171 Adet 0.001 sn
Ambargo Durumu [1]
Tam Metin [1]
Eser Adı [20]
Yayın Tarihi [4]
Yazar Departmanı [20]
Yazar [KatkıdaBulunan] Kurum [20]
Esere Katkı Sağlayan [1]
Yayın Türü [Ortam] [1]
Dil [1]
Erişim Hakkı [1]
Yayın Turu [Akademik] [2]
Erişime Açık

The relationship between perceived toxic leadership and work engagement

Tamer, Ertan

White-collar employees working in the textile industry work in a dynamic, intense and stressful environment that requires effort to present the most accurate and completed work outputs to their internal stakeholders, teams and company. The workload and pressure in this stressful environment require a positive and open-minded leadership style that can motivate and guide textile workers. Based on the stated assumption, the relationship between toxic leadership and work engagement was examined in this study. As a result of the research; it is expected that the toxic leadership behaviors of manage ...Daha fazlası

Erişime Açık

Shamanism or shamanism, a comparative approach toward siberian Shamanism

Kızılhan, Cemil Ömer

Shamanism has been considered as a singular phenomenon in most of the studies carried out about Shamanism so far, and it has not been taken into consideration that there are different types of Shamanism. Shamanist beliefs, which were developed in a very large region such as Siberia, were divided into different branches as a result of different social, cultural and political effects in Siberia, and led to the emergence of Shamanist practices called Paleo-Siberian Shamanism and Neo-Siberian Shamanism.

Erişime Açık

Security analysis of advanced encryption standard (AES) for image encryption

Küçükbacak, Rıdvan

Abstract In recent years, there have been major advancements in multimedia technologies and accordingly, file transfer over the internet has become extremely frequent. However, some security issues can occur in the internet, since it is a very insecure channel. To preserve the privacy and security of multimedia data transmitted over the internet, a number of encryption algorithms have been developed. This research presents a methodology for examining practically used image processing encryption algorithms. To measure the quality of encoded images, a number of factors such as correlation coeffi ...Daha fazlası

6698 sayılı Kişisel Verilerin Korunması Kanunu kapsamında yükümlülüklerimiz ve çerez politikamız hakkında bilgi sahibi olmak için alttaki bağlantıyı kullanabilirsiniz.

creativecommons
Bu site altında yer alan tüm kaynaklar Creative Commons Alıntı-GayriTicari-Türetilemez 4.0 Uluslararası Lisansı ile lisanslanmıştır.
Platforms