منابع مشابه
How can Alzheimer's Patients be Helped?
پرستاری از بیمار مبتلا به بیماری آلزایمر چندان ساده نیست. حتی اگر از این امر که اختلال رفتاری فرد نشانه ای از بیماری اوست، آگاه باشید، اکثر مواقع نمی دانید که چگونه باید با او رفتار کنید. در این مقاله روشهای مناسبی ارائه گردیده تا خانواده بیمار بتواند با ۱۰ اختلال رفتاری شایع در بیماران مبتلا بدون احساس ناامیدی و خشم سازگاری یابند.
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملDoes Diarrhoea Causes Cataract? Can Cataract be Prevented by Aspirin?
Loss of transparency of the lens is termed cataract which is one of the commonest causes of blindness throughout the world. This major health problem appears to be much commoner in many developing countries such as India and Pakistan, where it causes visual disability at a substantially earlier age and several hypotheses have been put forward to explain this higher prevalence in these areas. Re...
متن کاملThyroid Nodules in Pediatrics: Which Ones Can Be Left Alone, Which Ones Must be Investigated, When and How
Thyroid nodules are less frequent in childhood than in adulthood, but are more often malignant. Recent estimates suggest that up to 25% of thyroid nodules in children are malignant, therefore, a more aggressive approach is recommended. In this review, we suggest an approach based on a first-step clinical, laboratory, and sonographic evaluation. A history of irradiation of the neck, cranium or u...
متن کاملSecurity Risk Management Can Be Investigated! Presenting the Relation Between Research Rigor and an Effective Study
Information security is a naturally intrusive topic that has not been researched to its full extent in IS. Taking note of a previous information security study that failed and lessons learned from it, we successfully carry out a study of our own with some modifications. In this paper we detail the method used, which we hope will prove beneficial for academic researchers.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science
سال: 1884
ISSN: 0036-8075,1095-9203
DOI: 10.1126/science.ns-4.97.525