نتایج جستجو برای: vulnerable
تعداد نتایج: 52131 فیلتر نتایج به سال:
due to the poor social and economic conditions of vulnerable children's families, vulnerable children experience urbanspaces for work and play more than other children. although these children gain a solid understanding of urban spaces,which can be used in the process of designing desirable urban spaces in their neighborhoods, they are less considered insuch projects. thus, the methodology for ...
abstract background: vulnerable women are prone to sexually transmitted diseases due to their high-risk behaviors. the present study aimed to investigate the effect of self-care training program based on orem’s model on the behaviors leading to sexually transmitted diseases in vulnerable women. materials and methods: this field trial was initially conducted on 100 women covered under health ser...
n a new era where the clinical manifestations of acute oronary syndromes are just considered to be the peak of the ceberg of an underlying systemic inflammatory process, erms such as “vulnerable plaque” have lost appeal in favor of ore comprehensive terminology such as vulnerable blood, ulnerable myocardium, and vulnerable patient (1). Ultiately, all of them emphasize the need for implementing ...
Why is it that some people who are exposed to drugs ultimately become dependent on them, while others seem to be able to withstand the experience without lasting damage? What are the personal factors that cause addiction? Are they physical or psychological? Dr. Max Glatt of St. Bernard's Hospital has made a special investigation of the causes of addiction and here outlines some significant find...
We show that fragmented IPv4 and IPv6 traffic is vulnerable to effective interception and denial-of-service (DoS) attacks by an off-path attacker. Specifically, we demonstrate a weak attacker intercepting more than 80% of the data between peers and causing over 94% loss rate. We show that our attacks are practical through experimental validation on popular industrial and opensource products, wi...
I T H A S B E E N P R O P O S E D T H A T N O N H E A L I N G E N D O T H E L I U M after percutaeous coronary intervention may allow for insudation of lipids superficial to the stent strut level, specially when the underlying plaque carried a large necrotic core. This may result in formation of a ipid-rich neointima, and the lipid core so created is referred to as nouveau atherosclerosis; the ...
It is impossible to achieve a critical infrastructure that is secured for one hundred percent. One of the main conclusions of the KWINT study on the vulnerabilities of the (Netherlands section of the) Internet is that the aim of the Dutch Government should be to prevent incidents, to reduce critical infrastructure vulnerabilities to an acceptable level for society, and to ensure that control of...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید