نتایج جستجو برای: unsafe behavior

تعداد نتایج: 624331  

Journal: :Journal of interpersonal violence 2016
Ton Mooij

Gender and sexual orientation are expressed in heterosexual, lesbian (L), gay (G), bisexual (B), transgender (T), or queer (Q) interests and behavior. Compared with heterosexual persons, LGBTQ persons seem to experience more antisocial behavior, including negative discrimination and violence. To assess differences in LGBTQ-related discrimination in schools, the question for this research is "Do...

Journal: :Environment and development economics 2014
Soumya Balasubramanya Alexander Pfaff Lori Bennear Alessandro Tarozzi Kazi Matin Ahmed Amy Schoenfeld Alexander van Geen

A national campaign of well testing through 2003 enabled households in rural Bangladesh to switch, at least for drinking, from high-arsenic wells to neighboring lower-arsenic wells. We study the well-switching dynamics over time by re-interviewing, in 2008, a randomly selected subset of households in the Araihazar region who had been interviewed in 2005. Contrary to concerns that the impact of ...

Journal: :Journal of acquired immune deficiency syndromes and human retrovirology : official publication of the International Retrovirology Association 1998
Andrea Rachinger Precious Manyenga Judith A Burger Tom L P Derks van de Ven Ineke G Stolte Maria Prins Angélique B van 't Wout Hanneke Schuitemaker

BACKGROUND Human immunodeficiency virus type 1 (HIV-1) superinfection is infection of an HIV-1 seropositive individual with another HIV-1 strain. The rate at which HIV-1 superinfection occurs might be influenced by sexual behavior. Superinfection might be detected more often by analyzing longitudinal samples collected from time periods of unsafe sexual behavior. METHODS Envelope C2-C4 and gag...

Journal: :CoRR 2018
Guglielmo Fachini Catalin Hritcu Marco Stronati Arthur Azevedo de Amorim Ana Nora Evans Carmine Abate Roberto Blanco Théo Laurent Benjamin C. Pierce Andrew Tolmach

We propose a new formal criterion for secure compilation, giving strong end-to-end security guarantees for software components written in unsafe, low-level languages with C-style undefined behavior. Our criterion is the first to model dynamic compromise in a system of mutually distrustful components running with least privilege. Each component is protected from all the others—in particular, fro...

Journal: :iranian journal of public health 0
jizu li institute of economic management, taiyuan university of technology, p.r. china. yuejiao li institute of economic management, taiyuan university of technology, p.r. china. xiaoguang liu institute of economic management, taiyuan university of technology, p.r. china

background : in china, over 80% of all work-related deaths in the mining industry occur in coal mines and human factors constitute 85% of the direct causes of coal mine accidents, which indicates that significant shortcomings cur-rently exist in the safety behavior management of chinese coal mine workers. we aimed to verify the impact of human psychological behavior in coal mine accidents syste...

Journal: :Infection Control 1985

Journal: :Journal of Family Planning and Reproductive Health Care 2007

2017
Reza Tabrizi Maryam Akbari Kamran B. Lankarani Seyed Taghi Heydari Alireza Masoudi Amir Hossein Shams Armin Akbarzadeh Saba Moalemi Maryam Mahmoodi Mehr Ahmad Kalateh Sadati Payam Peymani

PURPOSE Unsafe behaviors are an important cause of accidents in adolescent age groups. This study was designed to examine the behaviors of adolescent pedestrians in southern Iran. METHODS This is a descriptive analytical cross-sectional study. The study population consisted of high school students in Shiraz, capital city of Fars Province, Iran. Five hundred and sixteen students were selected ...

2006
Jonathon T. Giffin Somesh Jha Barton P. Miller

Model-based anomaly detection systems restrict program execution by a predefined model of allowed system call sequences. These systems are useful only if they detect actual attacks. Previous research developed manuallyconstructed mimicry and evasion attacks that avoided detection by hiding a malicious series of system calls within a valid sequence allowed by the model. Our work helps to automat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید