نتایج جستجو برای: protection support

تعداد نتایج: 823733  

Journal: :Journal of nursing management 2009
Vicki Rowse

AIM This qualitative study explored the experiences of nurses working in a hospital paediatric department, who had direct involvement in child protection cases, to discover their support needs and suggest developments in training and support. BACKGROUND The study was inspired by an awareness of increasing anxiety amongst nurses involved in child protection cases. METHOD A phenomenological a...

2015
Maureen C. Hayes Nils Peterson Justa L. Heinen-Kay Brian Langerhans

Fisheries resources in the Caribbean suffer intense pressure from overharvesting. Some of the most valuable fisheries in The Bahamas, such as queen conch (Strombus gigas), spiny lobster (Panulirus argus), and Nassau grouper (Epinephelus striatus), are overexploited and require additional protection. Despite these pressures, we currently know very little about the factors that underlie local res...

Fazeleh Heydari, Hadis Heydarirad, Hossein Ghamari Givi, Jugal Kishore, Sajjad Basharpoor, Seyed Javad Daryadel,

Abstract Introduction: Pregnancy anxiety is a common disorder occurred due to various factors. It has significant impact on the outcome of pregnancy. Objective: This study aimed at determining the role of perceived stress and social support to tame anxiety among pregnant women. Materials and Methods: This is a descriptive-analytical study with correlational design. The study&rsqu...

Introduction: Due to the rapid increase in the number of elderly people, health issue, Provide health and welfare of their community and wider finds new dimensions every day. The main purpose of this research is to explain the relationship between social support and interpersonal dependency and life expectancy were elderly women. Materials and Methods: This study is descriptive and correlati...

When the government, with all its forces along with civil society, is taking part in a collaborative criminal policy in support of the victim, it is portrayed as an inclusive and desirable pattern of social support. Social support works more than anything else through community-based activities. These supports from Non-Governmental Organizations can be divided into two categories: First, medica...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید بهشتی - دانشکده علوم اقتصادی و سیاسی 1389

چکیده ندارد.

Journal: :تحقیقات نظام سلامت 0

background: fertility as one of the factor affecting population growth itself is affected by various factors. therefore, identifying factors which can influence this component is very vital. the purpose of this study was comparative investigate fecundity rate of 15-49 year old and married women under imam-emdad-committee and rehabilitation organizations’ protection and 15-49 year old women who ...

2003
Adam Wiggins Simon Winwood Harvey Tuch Gernot Heiser

Fine-grained hardware protection, if it can be done without slowing down the processor, could deliver significant benefits to software, enabling the implementation of strongly encapsulated light-weight objects. In this paper we introduce Legba, a new caching architecture that aims at supporting fine-grained memory protection and protected procedure calls without slowing down the processor’s clo...

2012
Nune Mangasaryan Luann Martin Ann Brownlee Adebayo Ogunlade Christiane Rudert Xiaodong Cai

Reviews of programmes in Bangladesh, Benin, the Philippines, Sri Lanka, Uganda, and Uzbekistan sought to identify health policy and programmatic factors that influenced breastfeeding practices during a 10 to 15 year period. Exclusive breastfeeding rates and trends were analysed in six countries in general and from an equity perspective in two of them. Success factors and challenges were identif...

2005
Franz Puntigam

For many reasons we trust components just to some degree. Component users apply a number of methods to improve protection against malicious components. In this paper we briefly analyze some of these concepts and their relationships to our trust in components. It turns out that weak protection methods (those with potential security holes) can be beneficial for components we partially trust espec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید