Showing 11,101 - 11,113 results of 11,113 for search '"containment"', query time: 0.14s Refine Results
  1. 11101

    Dépôts et pratiques symboliques dans l’établissement aristocratique gaulois de Varennes-sur-Seine, la Justice (Seine-et-Marne) by Jean-Marc Séguier, Ginette Auxiette, Fabien Pilon

    Published 2021-12-01
    “…Deposit number 1312 was composed of a rectangular wooden chest with a volume of 0.25 m3, installed in a small mock well and containing numerous faunal remains, lying on a bed of burned bone splinters. …”
    Get full text
    Article
  2. 11102

    IGJR 1/2020: Housing crisis: How can we improve the situation for young people? by IF and FRFG

    Published 2018-12-01
    “…Young researchers may also wish to participate in this essay competition, and it is hoped that this edition of the IGJR will contain a selection of the best prize submissions in English. …”
    Get full text
    Article
  3. 11103

    Synthesis, Superoxide Dismutase Mimetic and Anticancer Activities of Metal Complexes of 2,2-Dimethylpentanedioic Acid(2<small.letters>dmepda</small.letters>H<mml:math> <mml:mrow>...

    Published 2006-01-01
    “…The 1,10-phenanthroline containing complex [Cu(2dmepda)(phen)<mml:math> <mml:mrow> <mml:msub> <mml:mrow> <mml:mrow><mml:mrow> <mml:mrow><mml:mo>(</mml:mo> <mml:mrow><mml:msub> <mml:mtext>H</mml:mtext> <mml:mn>2</mml:mn> </mml:msub> <mml:mtext>O</mml:mtext> </mml:mrow> <mml:mo>)</mml:mo></mml:mrow> </mml:mrow> <mml:mo>]</mml:mo></mml:mrow> </mml:mrow> <mml:mn>2</mml:mn> </mml:msub> </mml:mrow> </mml:math>0.5phen (<bold>3</bold>) was the most potent with activity that compares well to that of <emph>cis</emph>platin.…”
    Get full text
    Article
  4. 11104

    Seawater-originated fluids interactions with oceanic lithospheric mantle peridotites and formation of hornblendite dykes, as well as spadaite and dolomite veins in the Naein ophiol... by Fatemeh Naderi, Ghodrat Torabi, Nargess Shirdashtzadeh

    Published 2024-12-01
    “…This study suggests that the percolation of seawater ingression fluids in the uppermost mantle peridotites, resulted in the formation of hornblende dikes and, in the late-stage phase, the development of carbonate veins that contain calcite, dolomite and spadaite. Introduction Petrological and geochemical studies indicate that the influence of seawater affects the mineralogy and chemistry of the oceanic crust and uppermost mantle peridotites (Berger et al., 2005; Python et al., 2007; Akizawa et al., 2011; Akizawa and Arai, 2014; Torabi et al., 2017). …”
    Get full text
    Article
  5. 11105

    IGJR 1/2020: Housing crisis: How can we improve the situation for young people? by IF and FRFG

    Published 2019-07-01
    “…Young researchers may also wish to participate in this essay competition, and it is hoped that this edition of the IGJR will contain a selection of the best prize submissions in English. …”
    Get full text
    Article
  6. 11106

    Designing a model for re-employment of employees during retirement (Study case: Ministry of Education) by Fatemeh Fatemeh Bina Baji, Hamid Rezaei Far, Mohammad Mohammadi, Monireh Salehnia

    Published 2024-09-01
    “…The central category of this research is called re-employment, which contains the components of skill diversity, task identity, and the importance of task and independence. …”
    Get full text
    Article
  7. 11107

    Presenting the model of antecedents affecting moral-emotional acting in education by arefeh kazemi malekmahmoudi, negin jabbari, kiomars niaz azari

    Published 2024-11-01
    “…Also, each research, while being based on previous studies, can in turn contain new findings and data and be a prelude to conducting subsequent studies.Considering the above, this research has tried to find out the main components of emotional acting by examining the characteristics of emotional acting through semi-structured interviews. …”
    Get full text
    Article
  8. 11108

    Co-Secure Domination Number in Some Graphs by Jiatong Cui, Tianhao Li, Jiayuan Zhang, Xiaodong Chen, Liming Xiong

    Published 2024-12-01
    “…</mo></mrow></semantics></math></inline-formula> Conversely, <i>S</i> is a co-secure dominating set (CSDS) of <i>G</i> if <i>S</i> is a dominating set of <i>G</i> and for each vertex <i>v</i> in <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>S</mi><mo>,</mo></mrow></semantics></math></inline-formula> <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>−</mo><mi>S</mi></mrow></semantics></math></inline-formula> contains a neighbor of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>v</mi><mo>,</mo></mrow></semantics></math></inline-formula> denoted by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>u</mi><mo>,</mo></mrow></semantics></math></inline-formula> such that <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mo>(</mo><mi>S</mi><mo>∖</mo><mo>{</mo><mi>v</mi><mo>}</mo><mo>)</mo><mo>∪</mo><mo>{</mo><mi>u</mi><mo>}</mo></mrow></semantics></math></inline-formula> is a dominating set of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>G</mi><mo>.…”
    Get full text
    Article
  9. 11109

    Study on Innovative Practices to Promote Girls’ Retention and Transition to Secondary and Higher Learning Institutions in Sub-Saharan Africa. by Ayiga, Natal, Adyanga, Francis Akena, Akello, Jacqueline

    Published 2024
    “…The primary data was collected by using 7 tools containing both quantitative and qualitative data. The structured questionnaire, in-depth interviews, and Focus Group Discussions (FGDs) were used to collect the data. …”
    Get full text
    Technical Report
  10. 11110

    Googling Patients by Emily Beer

    Published 2022-11-01
    “…For example, the FTC Act creates an obligation to maintain appropriate security of health data and requires entities to keep promises they make about privacy.[13] The Health Breach Notification Rule contains notice requirements for data breaches involving certain health information.[14] Additionally, the doctor-patient privilege protects confidential information from disclosure, and the exact confines of the privilege depend on the applicable statutes.[15] As these examples demonstrate, there are many different legal requirements that concern privacy and confidentiality in the health sphere. …”
    Get full text
    Article
  11. 11111
  12. 11112

    Contextual Vulnerability Should Guide Fair Subject Selection in Xenotransplantation Clinical Trials by Gianna Strand

    Published 2023-03-01
    “…[xxi] Additionally, the medical records of Black patients are 2.5 times more likely to contain negative descriptors like non-compliant, non-adherent, aggressive, unpleasant, and hysterical than those of white patients.…”
    Get full text
    Article
  13. 11113

    Addressing Shortcomings in Contingency Standards of Care by Alexander Quan

    Published 2022-09-01
    “…A 2020 review of 31 crisis standards of care in the US found that only 18 contained strong “ethical grounding,” 28 used “evidence-based clinical processes and operations,” 21 included “ongoing community and provider engagement, education, and communication,” and 16 had “clear indicators, triggers, and lines of responsibility.”[6] The need for standardization, public transparency, and guidelines for crisis standards of care to prevent bedside allocation has been widely recognized. …”
    Get full text
    Article