نتایج جستجو برای: vulnerable

تعداد نتایج: 52131  

Journal: :international journal of architecture and urban development 2015
behnaz aminzadeh mehrnaz attaran

due to the poor social and economic conditions of vulnerable children's families, vulnerable children experience urbanspaces for work and play more than other children. although these children gain a solid understanding of urban spaces,which can be used in the process of designing desirable urban spaces in their neighborhoods, they are less considered insuch projects. thus, the methodology for ...

Journal: :iranian journal of nursing and midwifery research 0
zahra baghersad nasrollah alimohammadi zahra boroumandfar parastoo golshiri

abstract background: vulnerable women are prone to sexually transmitted diseases due to their high-risk behaviors. the present study aimed to investigate the effect of self-care training program based on orem’s model on the behaviors leading to sexually transmitted diseases in vulnerable women. materials and methods: this field trial was initially conducted on 100 women covered under health ser...

2008
ernando Alfonso

n a new era where the clinical manifestations of acute oronary syndromes are just considered to be the peak of the ceberg of an underlying systemic inflammatory process, erms such as “vulnerable plaque” have lost appeal in favor of ore comprehensive terminology such as vulnerable blood, ulnerable myocardium, and vulnerable patient (1). Ultiately, all of them emphasize the need for implementing ...

1966
Max Glatt

Why is it that some people who are exposed to drugs ultimately become dependent on them, while others seem to be able to withstand the experience without lasting damage? What are the personal factors that cause addiction? Are they physical or psychological? Dr. Max Glatt of St. Bernard's Hospital has made a special investigation of the causes of addiction and here outlines some significant find...

2012
Yossi Gilad Amir Herzberg

We show that fragmented IPv4 and IPv6 traffic is vulnerable to effective interception and denial-of-service (DoS) attacks by an off-path attacker. Specifically, we demonstrate a weak attacker intercepting more than 80% of the data between peers and causing over 94% loss rate. We show that our attacks are practical through experimental validation on popular industrial and opensource products, wi...

Journal: :JACC. Cardiovascular imaging 2011
Jin-Man Cho Il-Suk Sohn Chong-Jin Kim Ik-Kyung Jang

I T H A S B E E N P R O P O S E D T H A T N O N H E A L I N G E N D O T H E L I U M after percutaeous coronary intervention may allow for insudation of lipids superficial to the stent strut level, specially when the underlying plaque carried a large necrotic core. This may result in formation of a ipid-rich neointima, and the lipid core so created is referred to as nouveau atherosclerosis; the ...

2001
M. H. A. Klaver J. Huizenga

It is impossible to achieve a critical infrastructure that is secured for one hundred percent. One of the main conclusions of the KWINT study on the vulnerabilities of the (Netherlands section of the) Internet is that the aim of the Dutch Government should be to prevent incidents, to reduce critical infrastructure vulnerabilities to an acceptable level for society, and to ensure that control of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید