نتایج جستجو برای: ban logic

تعداد نتایج: 157888  

2013
Jidong Huang Rong Zheng Sherry Emery

BACKGROUND Despite the tremendous economic and health costs imposed on China by tobacco use, China lacks a proactive and systematic tobacco control surveillance and evaluation system, hampering research progress on tobacco-focused surveillance and evaluation studies. METHODS This paper uses online search query analyses to investigate changes in online search behavior among Chinese Internet us...

Journal: :Mathematics 2021

With the increasing number of users and emergence different types network services, a multi-server architecture has emerged in recent years. In order to ensure secure communication Internet participants an open environment, authentication key agreement protocol for architectures were proposed past. 2018, Chatterjee et al. put forward lightweight three-factor they claimed that all known security...

2003
Benoît Monin Michael I. Norton

A 5-day field study (N = 415) during and right after a shower ban demonstrated multifaceted social projection and the tendency to draw personality inferences from simple behavior in a time of drastic consensus change. Bathers thought showering was more prevalent than did non-bathers (false consensus) and respondents consistently underestimated the prevalence of the desirable and common behavior...

Journal: :The Journal of applied psychology 2009
Jessica B Rodell Jason A Colquitt

Our study drew on past theorizing on anticipatory justice (D. L. Shapiro & B. L. Kirkman, 2001) and fairness heuristic theory (K. Van den Bos, E. A. Lind, & H. A. M. Wilke, 2001) to build and test a model of employee reactions to a smoking ban. The results of a longitudinal study in a hospital showed that employee levels of preban anticipatory justice were predicted by their global sense of the...

Journal: :Tobacco control 2013
Sofie De Schoenmaker Philippe Van Cauwenberge Heidi Vander Bauwhede

OBJECTIVE To examine whether the nationwide smoking ban, imposed in 2007, had an impact on the profitability of Belgian restaurants. DATA AND METHODS Objective financial reporting data on 1613 restaurants were analysed with return on assets as the outcome measure. The data were collected from the Belfirst database and cover the period 2004-2009. To assess the impact of the smoking ban, a diff...

Journal: :BMC Public Health 2006
James L Repace James N Hyde Doug Brugge

BACKGROUND We quantified the air quality benefits of a smoke-free workplace law in Boston Massachusetts, U.S.A., by measuring air pollution from secondhand smoke (SHS) in 7 pubs before and after the law, comparing actual ventilation practices to engineering society (ASHRAE) recommendations, and assessing SHS levels using health and comfort indices. METHODS We performed real-time measurements ...

2017
Sericea Stallings-Smith Ariana Zeka Pat Goodman Zubair Kabir Luke Clancy

Background: Previous studies have shown decreases in cardiovascular mortality following the implementation of comprehensive smoking bans. It is not known whether cerebrovascular or respiratory mortality decreases post-ban. On March 29, 2004, the Republic of Ireland became the first country in the world to implement a national workplace smoking ban. The aim of this study was to assess the effect...

Journal: :Tobacco control 2000
S I Woodruff T L Conway C C Edwards

OBJECTIVE To examine the effect of a unique organisational smoking ban on female United States Navy recruits, a population with historically high smoking rates. SETTING AND DESIGN Study participants were female recruits (n = 5503) entering the Navy recruit training command between March 1996 and March 1997 (12 consecutive months). Participants completed smoking surveys at entry to recruit tra...

Journal: :I. J. Network Security 2013
Jung-San Lee Chin-Chen Chang Kuo-Jui Wei

Due to the explosive development of emerging applications such as, Multicast service, Pay-TV systems, Teleconference, and Collaborate tasks, engineers have proposed many conference key distribution mechanisms. Hwang et al. recently proposed an efficient group key exchange method for providing secure multicast communications, which is a transformation from the twoparty key exchange protocol to t...

Journal: :Simulation Modelling Practice and Theory 2015
Yingxu Lai Yinong Chen Qichen Zou Zenghui Liu Zhen Yang

Cloud security is a system engineering problem. A common approach to address the problem is to adapt existing Trusted Network Connection (TNC) framework in the cloud environment, which can be used to assess and verify end clients’ system state. However, TNC cannot be applied to network equipment attached to the cloud computing environment directly. To allow the network devices to access the tru...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید