نتایج جستجو برای: security building processes after world war ii
تعداد نتایج: 3297024 فیلتر نتایج به سال:
BACKGROUND The aim of the study was to determine the amount of trauma impact, post-traumatic stress symptoms and current psychopathological distress in a sample of former German children of World War II. METHODS 93 participants were recruited through the local press, and assessed using the modified Post-traumatic Diagnostic Scale (PDS) and the Symptom Checklist (SCL-90-R). RESULTS Subjects ...
Recently, new methods have been developed for estimating the current and recent changes in effective population sizes. Based on the methods, the effective population sizes of Korean populations were estimated using data from the Korean Association Resource (KARE) project. The overall changes in the population sizes of the total populations were similar to CHB (Han Chinese in Beijing, China) and...
Many U.S. Gulf War-era veterans complained of poor cognition following the war. This study assessed neuropsychological functioning in veterans 10 years after the war through objective tests. 2189 Gulf War-era veterans (1061 deployed, 1128 non-deployed) were examined at 1 of 16 U.S. Veterans Affairs medical centers. Outcomes included neuropsychological domains derived from factor analysis and in...
The contributions of American psychologists to war have been substantial and responsive to changes in U.S. national security threats and interests for nearly 100 years. These contributions are identified and discussed for four periods of armed conflict: World Wars I and II, the Cold War, and the Global War on Terror. In contrast, about 50 years ago, largely in reaction to the threat of nuclear ...
Nuclear weapons have been a cornerstone of U.S. national security since they were developed during World War II. In the Cold War, nuclear forces were central to U.S. defense policy, resulting in the buildup of a large arsenal. Since that time, nuclear forces have figured less prominently than conventional forces, and the United States has not built any new nuclear weapons or delivery systems fo...
Internet security attack could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's most secure systems’ browsers, including Netscape Navigator and Microsoft Internet Explorer. There are too many types, methods and mechanisms of attack where new attack techniques and exploits are constantly being developed and discovered. In this...
The 1953-1961 US President Dwight D. Eisenhower emphasized that his experience as the Supreme Commander of the Allied Expeditionary Forces in Europe during the Second World War taught him that “plans are worthless, but planning is everything”. This sound contradictory: if plans are worthless, why bother with planning at all? In this paper, we show that Eisenhower’s observation has a meaning: wh...
AIMS To develop an approach for monitoring national alcohol marketing policies globally, an area of the World Health Organization's (WHO) Global Alcohol Strategy. METHODS Data on restrictiveness of alcohol marketing policies came from the 2002 and 2008 WHO Global Surveys on Alcohol and Health. We included four scales in a sensitivity analysis to determine optimal weights to score countries on...
Conductive education, an educational approach devised by Andras Petö in Hungary after the second world war, has attracted considerable media attention. Eight Northern Ireland families who recently had treatment for their disabled child at the Petö Institute in Budapest were identified. Six families returned postal questionnaires designed to look at parental experience of conductive education. A...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید