نتایج جستجو برای: clothes

تعداد نتایج: 3366  

Journal: :The Yale Law Journal 2000

Journal: :The Journal of Nutrition 2001

2013
Bobbie Person Katharine Schilling Mercy Owuor Lorraine Ogange Rob Quick

BACKGROUND Recommended disease prevention behaviors of hand washing, hygienic hand drying, and covering one's mouth and nose in a hygienic manner when coughing and sneezing appear to be simple behaviors but continue to be a challenge to successfully promote and sustain worldwide. We conducted a qualitative inquiry to better understand current hand drying behaviors associated with activities of ...

2006
RICHARD KAHN

There are several key features of the metabolic syndrome that virtually all interested individuals and organizations agree upon. First, that certain “metabolic” factors tend to associate with each other more often than chance would dictate. Second, these risk factors taken alone or in any possible combination are associated with an elevated risk for cardiovascular disease (CVD) and diabetes. Th...

Journal: :The Birth gazette 1996
H Goer

To begin with, GD doesn't fit the definition of a disease. GD as a concept began in 1964 when O'Sullivan and Mahan performed a 100g 3hour oral glucose tolerance test (OGTT) on 752 pregnant women and tracked all women with at least two values above two standard deviations beyond the mean to see if hyperglycemic women were predisposed to develop diabetes down the road (O'Sullivan 1964). They were...

Journal: :Comput. Graph. Forum 2002
Frederic Cordier Nadia Magnenat-Thalmann

Cloth simulation has a long history, starting almost three decades ago. Thanks to the continuous increase of computation speed of computers, real-time simulation of clothes has become very recently possible. The research on real-time clothes has really begun few years ago when researchers have started simulating simple garments such as flags or tablecloths. Nowadays, the research aims at propos...

Journal: :The British journal of ophthalmology 1994
J L Jay

Journal: :Int. Arab J. e-Technol. 2011
Diaa Salama Abd Elminaam Hatem Abdual Kader Mohey M. Hadhoud

As the popularity of wireless networks increases, so does the need to protect them. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید