Behaviour protocols

Xem 1-11 trên 11 kết quả Behaviour protocols
  • Sub-Saharan Africa has the worst indicators of women’s health—particularly of reproductive health—of any world region. These indicators include the highest number of HIV-positive women and the highest infant, maternal, and HIV-related death rates worldwide. The ability of a woman to make her own decisions regarding her body and her reproductive life are key to improving these indicators.

    pdf12p connicquy 20-12-2012 34 7   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành y học dành cho các bạn tham khảo đề tài: Protocol for a randomised controlled trial of risk screening and early intervention comparing childand family-focused cognitive-behavioural therapy for PTSD in children following accidental injury

    pdf9p thulanh29 18-12-2011 35 3   Download

  • Tham khảo luận văn - đề án 'báo cáo y học: " protocol for a randomised controlled trial of risk screening and early intervention comparing childand family-focused cognitive-behavioural therapy for ptsd in children following accidental injury"', luận văn - báo cáo phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf2p thulanh29 18-12-2011 32 3   Download

  • I created Matrix Reimprinting in 2006, but the story of how I arrived at the technique starts many yea rs earlier in 1987. At 211 had what can only be described as a profound spontaneous spi ritual experience. For the two yea rs that led up to this experience, I had an incessant need to spend time alone. As a social person who had always enjoyed the company of others, this was very new to me. Many l ife issues got in the way of finding time to be alone d u ring this period, but eventually, in the summer of '87, I secured a hol iday...

    pdf297p maket1311 16-10-2012 34 3   Download

  • Propagating information about materialized views: When a query is posed, the first step is to consider whether it can be answered using the data at “nearby” storage providers, and to evaluate the costs of doing so. This requires the query initiator to be aware of existing materialized views and properties such as location and data freshness. One direction we are exploring is to propagate information about materialized views using techniques derived from routing protocols [14]. In particular, a node advertises its materialized views to its neighbors.

    pdf17p yasuyidol 02-04-2013 24 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành y học dành cho các bạn tham khảo đề tài: Strengthening evaluation and implementation by specifying components of behaviour change interventions: a study protocol

    pdf8p toshiba22 22-11-2011 20 2   Download

  • Clinical evidence continuous medical education: a randomised educational trial of an open access e-learning program for transferring evidence-based information – ICEKUBE (Italian Clinical Evidence Knowledge Utilization Behaviour Evaluation) – study protocol Lorenzo Moja*1, Ivan Moschetti1, Michela Cinquini2, Valeria Sala1, Anna Compagnoni3, Piergiorgio Duca4, Christian Deligant5, Roberto Manfrini5, Luca Clivio6, Roberto Satolli5, Antonio Addis7, Jeremy M Grimshaw8, Pietro Dri5 and Alessandro Liberati1 Address: 1Italian Cochrane Centre, Mario Negri Institute for Pharmacological Researc...

    pdf11p toshiba23 11-12-2011 36 2   Download

  • The guidance assumes the presence of a trained health worker to administer the uterotonic, the medicine is used after childbirth for postpartum hemorrhage, and that 600 micrograms of misoprostol is administered. In low-resource settings, these conditions are not often met, which poses a disadvantage to the selection and use of misoprostol.

    pdf36p nhamnhiqa 01-03-2013 13 1   Download

  • NS-2 is an object oriented simulator, written in C++, with an OTcl (Object Tool Command Language) interpreter as a front-end. Back-end C++ Defining new agents, protocols and framework. Manipulations at the byte/bit levels. if you have to change the behaviour of an existing C++ class in ways that weren't anticipated.

    ppt49p thienthan_acquy 22-02-2010 176 80   Download

  • Having dealt with in-depth analysis of SS#7, GSM and GPRS networks I started to monitor UTRAN interfaces approximately four years ago. Monitoring interfaces means decoding the data captured on the links and analysing how the different data segments and messages are related to each other. In general I wanted to trace all messages belonging to a single call to prove if the network elements and protocol entities involved worked fine or if there had been failures or if any kind of suspicious events had influenced the normal call proceeding or the call’s quality of service.

    pdf228p japet75 30-01-2013 40 13   Download

  • The methods for human identity authentication based on biometrics – the physiological and behavioural characteristics of a person have been evolving continuously and seen significant improvement in performance and robustness over the last few years. However, most of the systems reported perform well in controlled operating scenarios, and their performance deteriorates significantly under real world operating conditions, and far from satisfactory in terms of robustness and accuracy, vulnerability to fraud and forgery, and use of acceptable and appropriate authentication protocols. ...

    pdf0p bi_bi1 13-07-2012 45 10   Download


Đồng bộ tài khoản