نتایج جستجو برای: apos

تعداد نتایج: 9212  

ژورنال: حیات 2009
معماریان, ربابه, ونکی, زهره, پورفرزاد, زهرا,

Background & Aim: Communication is one of the basic concepts which nursing students must learn. Nurse instructors;apos behaviors have key role on effective clinical education. The aim of this study was to assess the effect of situational leadership model on nursing students;apos communication competency. Methods & Materials: In this before-after trial, we recruited the students who had medical...

ژورنال: حیات 2007
رضایی‌پور, افسر , محمودی, محمود , معصومه شاکری, , یوسفی, فرزانه ,

Background & Aim: Obesity is increasing dramatically world-wide not only in adults, but also in children and adolescents. Nutritional and physical activity behaviors are related to the prevalence of obesity. Determining adolescents;apos behavioral patterns is important in preventing and adjusting this healthy problem. This study was carried out to assess lifestyle behaviors among girl adolescen...

Journal: :International dental journal 2015
Panos N Papapanou

Studies conducted over the past 25 years have focussed on the role of periodontitis, an inflammatory condition of microbial aetiology that destroys the tooth-supporting tissues, as a systemic inflammatory stressor that can act as an independent risk factor of atherosclerotic vascular disease (AVSD) and adverse pregnancy outcomes (APOs). It has been suggested that periodontitis-associated bacter...

2015
Abeer Hamdy Ahmed E. Youssef Reda Ammar

The paper presents a novel allocation algorithm to allocate independent real time tasks on a processor in a way that improves the processor's throughput (Processor's throughput is the number of tasks the processor can accept for execution). The proposed approach allocates tasks' workloads (task's workload is the percentage of work required by the processor to execute the tas...

2014
Komal Naik joshi Arati M. Dixit P. Singh M. Chandra Pandey

Due to infrastructure – less networks and multi hop communication features of Mobile ad hoc network (MANET), every node in MANET has to cooperate with each other. Therefore, node security becomes one of the important research areas of MANET. The resources that provided to MANET nodes such as battery power, memory, and bandwidth are limited. As a result, developing a resource – aware node authen...

2014
M. A. Jawale D. N. Kyatanavar A. B. Pawar Chee Kian Leong Yew Haur Lee Wai Keong Mak Chunxia Yin Qinke Peng Huifeng Tang Songbo Tan Xueqi Cheng Magdalini Eirinaki Shamita Pisal

Today's world is relied on computer technology's advancement to get the best whatever they want or select. Since the possibility of sharing and exchanging information on internet, it is really easiest task than ever before and same technology aids are providing us ample amount of data, information while selecting best of services, best of products available as well as best of individu...

2014
Jiabi Qin Tubao Yang Shuiyuan Xiao Hongzhuan Tan Tiejian Feng Hanlin Fu

BACKGROUND To estimate probability of adverse pregnancy outcomes (APOs) among women with and without syphilis through a systematic review of published literatures. METHODOLOGY/PRINCIPAL FINDINGS Chinese and English literatures were searched for studies assessing pregnancy outcomes in the presence of maternal syphilis through August 2013. The prevalence estimates were summarized and analyzed b...

2014
Shail K Dinkar

Requirement Engineering encompasses the tasks that go into identifying, determining and understanding the customer needs as well as the expectations from the proposed software system or an application, taking account of possibly conflicting requirements of various stakeholders. Requirement Engineering, also referred to by names like requirement gathering or requirement analysis or requirement s...

1999
David Tall

What are the processes by which we construct mathematical concepts? What is the nature of the cognitive entities constructed in this process? Based on the theories of cognitive construction developed by Piaget for younger children, Dubinsky proposed APOS theory to describe how act ions become interiorized into processes and then encapsulated as mental objects, which take their place in more sop...

2013
Md. Rokibul Alam Saifuddin Mahmud Mohammad Nazmul Alam Khan M. Hwang C. Lee E. Mohammed A. C. Emarah Sattar J Aboud Fang-Ping Chiang Yi-Mien Lin

This paper presents the simulation of privacy-related applications employing blind signature (BS) schemes. Two popular privacy-related applications: 'traditional BS based electronic voting system (EVS)' and 'traditional offline electronic payment protocol (EPP)' have been chosen here. A BS scheme is a cryptographic protocol that plays a vital role to conduct the electronic t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید