Academic literature on the topic 'Protect'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protect.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Protect"
Chen, Huan, Liling Zhou, and Shufang Han. "Protest and protect." Journal of Asian Pacific Communication 27, no. 1 (May 11, 2017): 99–120. http://dx.doi.org/10.1075/japc.27.1.06che.
Full textCORDLE, DANIEL. "Protect/Protest: British nuclear fiction of the 1980s." British Journal for the History of Science 45, no. 4 (December 2012): 653–69. http://dx.doi.org/10.1017/s0007087412001112.
Full textBhatt, Nikhil J., Mona M. Abaza, Kanwar S. Kelley, Ayesha N. Khalid, Steve Church, William Matthes, and K. J. Lee. "Protect Your Practice, Protect Yourself, and Protect Your Family." Otolaryngology–Head and Neck Surgery 151, no. 1_suppl (September 2014): P9. http://dx.doi.org/10.1177/0194599814538403a6.
Full textMartinez-Ortiz, Wilnelly, and Ming-Ming Zhou. "Could PROTACs Protect Us From COVID-19?" Drug Discovery Today 25, no. 11 (November 2020): 1894–96. http://dx.doi.org/10.1016/j.drudis.2020.08.007.
Full textFox, Eleanor M. "“We Protect Competition, You Protect Competitors”." World Competition 26, Issue 2 (June 1, 2003): 149–65. http://dx.doi.org/10.54648/woco2003002.
Full textREBMANN, TERRI. "Protect yourself, protect your patients." Nursing Made Incredibly Easy! 5, no. 1 (January 2007): 30–39. http://dx.doi.org/10.1097/00152258-200701000-00008.
Full textKatz, Barbara. "Protect Your Paperwork, Protect Your Identity." Emergency Medicine News 30, no. 11 (November 2008): 32. http://dx.doi.org/10.1097/01.eem.0000340968.24163.5a.
Full textThe Lancet. "Protect the kidney, protect the heart." Lancet 375, no. 9722 (April 2010): 1226. http://dx.doi.org/10.1016/s0140-6736(10)60524-7.
Full textWaters, Rebecca. "Protect your hands: protect your health." Dental Nursing 15, no. 11 (November 2, 2019): 562–63. http://dx.doi.org/10.12968/denn.2019.15.11.562.
Full textGonsoulin, Sid, and Daniel M. Wax. "Protect Our Program! Protect Our Referees!" Recreational Sports Journal 13, no. 3 (May 1989): 54–56. http://dx.doi.org/10.1123/nirsa.13.3.54.
Full textDissertations / Theses on the topic "Protect"
Alhabashneh, Mohammad Abad Alhameed. "Protect team handler (PTH)." Thesis, University West, Department of Technology, Mathematics and Computer Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-567.
Full textThere is always a need for easy-to-follow processes that enable accurate and non-time consuming solutions. Nowadays we see a lot of different approaches to development processes in software engineering. This project is concerned with how to manage a software development process in a reliable, secure and efficient way. Software is available which provides some help for project managers / administrators to work more productively, with effective communication. Using such systems, it is possible to keep track of all the phases of development, including task distribution, making maximum use of previous hands-on experience and increasing productivity, to deliver a finished product in minimum time. No existing solution, however, fulfills all the desirable criteria. This paper describes the motivation, design and implementation of an improved development management system using Active Server Pages and Microsoft Internet Information Services with a backend Microsoft Access Database developed using a waterfall software development process. The resulting system is described and evaluated. This system will be beneficial for software houses, because they can communicate on the web, allowing efficiency gains by avoiding the need to call meetings for distribution of tasks among employees, with the additional advantage of location-transparent team management through the Internet.
Ярмак, Любов Павлівна, Любовь Павловна Ярмак, Liubov Pavlivna Yarmak, and N. Novatarska. "To protect our environment." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/15998.
Full textShaibah, Hassan S. "Does Wld's protect in Drosophila?" Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439380.
Full textPollentine, Marc. "Constructing the responsibility to protect." Thesis, Cardiff University, 2012. http://orca.cf.ac.uk/43100/.
Full textPochatko, T. V. "Ways to protect your ideas." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/62829.
Full textHuang, Yaping. "Organic Coatings to Protect Ferrous Structures." Diss., North Dakota State University, 2013. https://hdl.handle.net/10365/27125.
Full textDepartment of Energy
North Dakota State University. Department of Coatings and Polymeric Materials
MARTINS, THEO COTRIM. "DO MANDATORY DIVIDEND RULES PROTECT MINORITY SHAREDHOLDERS?" PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=16280@1.
Full textThis paper shows that Brazil s mandatory dividend rules partly explain why its average dividend yield is higher than in the U.S. And yet, several Brazilian firms bypass the mandatory dividend rules. We show that 42% of a broad sample of nonfinancial firms with shares listed at Bovespa use legal loopholes to pay fewer dividends than the amount that their statutes call for. The data suggest that the main reason for these firms to bypass the dividend rules is not to ensure financing for new projects. Instead, lower dividend payments seem to pave the way for the controlling shareholders to dilute the cash-flow rights of minority shareholders. Thus, short of credit crunch, the Brazilian mandatory dividend rules do protect minority shareholders, without making harder for firms to finance investment opportunities.
Hayes, Kelli A. "Logical extensions of the responsibility to protect." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2197.
Full textENGLISH ABSTRACT: Are violent and non-violent mass atrocities morally different? According to the United Nations, they are. But why? The answer to this question is important as it in part determines our obligations to people living in other countries. This thesis seeks to determine if violent and non-violent mass atrocities are morally different and, if not, whether the latter should be included under the United Nations’ doctrine of the responsibility to protect. In order to do this, the thesis first examines the conditions under which sovereignty exists in order to understand when intervention can occur. It also analyzes just war theory to discern when military intervention to halt nonviolent mass atrocities is justified. Having established these two concepts, the thesis then presents three arguments for why non-violent mass atrocities are morally indistinguishable from violent ones and should also be included under the doctrine of the responsibility to protect. A discussion of the feasibility of implementing this extension and the long-term effects of these types of interventions follows. Finally, the thesis contains three case studies in order to apply the arguments presented earlier.
AFRIKAANSE OPSOMMING: Is daar ‘n morele verskil tussen gewelddadige en nie-gewelddadige gruweldade? Volgens die Verenigde Nasies is daar so ‘n verskil, maar hoekom? Die antwoord tot hierdie vraag is deels belangrik omdat dit ons verantwoordelikhede tot mense in ander lande bepaal. In hierdie tesis word daar gepoog om te bepaal of daar so ‘n verskil tussen gewelddadige en nie-gewelddadige gruweldade is, en, indien nie, of nie-gewelddadige gruweldade ook moet tel onder die Verenige Nasies se verantwoordelikheid om te beskerm. Die tesis poog eerstens om die kondisies vir soewereiniteit te bepaal ten einde te probeer verstaan wanneer ‘n intervensie moreel regverdigbaar is. Dit analiseer ook die teorie van geregverdigde oorlogvoering ten einde te bepaal wanneer militêre inmenging om nie-gewelddadige gruweldade stop te sit geregverdig is. Na hierdie twee konsepte ondersoek is word daar drie argumente verskaf om aan te toon dat nie-gewelddadige gruweldade nie moreel onderskeibaar is van gewelddadige gruweldade nie, en dus dat nie-gewelddadige gruweldade onder die verantwoordelikheid om te beskerm behoort te tel. Dit word gevolg deur ‘n bespreking van die praktiese haalbaarheid van die implementering van so ‘n uitbreiding van die verantwoordelikheid om te beskerm, asook ‘n bespreking van die langtermyn effekte van hierdie tipes intervensies. Die tesis eindig met drie gevallestudies ten einde die argumente wat reeds gemaak is toe te pas.
Asher, Courtani. "Project protect and nurture| A grant proposal." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10076460.
Full textThe purpose of this project was to write a grant proposal to identify resource materials that can be used in whole or adapted for a series of workshops for K–6 school social workers and their colleagues (teachers, counselors, and support staff) aimed at enhancing their knowledge and skills in child abuse and trauma prevention and intervention. The potential host agency will be Dr. Albert Schweitzer Elementary, a school in Anaheim, California. The grant writer developed the project after an extensive review of the literature available on child abuse and trauma. The project seeks to provide social workers and their colleagues with the skills and knowledge needed to aid in the prevention and treatment of child abuse and trauma. The Weingart Foundation was chosen as the potential funding source for this project. The actual funding and submission of this grant proposal was not a requirement for successful completion of this project.
Mazzanti, Maria Rita. "From State sovereignty to responsibility to protect." Paris, Institut d'études politiques, 2013. https://spire.sciencespo.fr/notice/2441/45eb019724sn6sg9mcu4j489l.
Full textThe research was aimed at understanding by means of which developments in the political and legal thinking the R2P finally reached its present shape. To this end, we analyzed on one side the evolution of the concept of absolute sovereignty and the shift towards an increased involvement of the international community in the internal affairs of the individual states, and, on the other side, the modifications incurred in the concept of intervention for humanitarian purposes and the lessons learned out of the experiences of the 1990s. We have argued that what R2P is, or is not, should be understood in the light of this long development. Having then established what now R2P is about we wanted to measure to which extent R2P was able, in the ten years of its existence, to influence the behavior of the international community, and in particular of the United Nations Security Council. Hence, we selected four cases – Libya, Côte d’Ivoire Sri Lanka and Syria – where R2P was invoked or should have been invoked, with the aim of finding regularities useful for guiding future action. Our research hypothesis was that R2P is influenced by five main independent variables, namely: the dynamic within the Security Council (active involvement of some specific countries/country representatives); reasonable perspective of success/attractive cost-benefit profile; the role of the relevant regional/sub-regional organizations; the activity of the Human Rights Council; and the action of civil society
Books on the topic "Protect"
Barnham, Kay. Protect nature. New York: Crabtree Pub. Co., 2008.
Find full textEricson, Carol. Conceal, protect. Don Mills, Ont: Harlequin Enterprises Ltd., 2013.
Find full textProtect nature. London: Wayland, 2008.
Find full textPolice, Illinois State. Scott's Law: Let's protect those who protect us. Springfield, Ill.]: Illinois State Police, 2003.
Find full textPolice, Illinois State. Scott's Law: Let's protect those who protect us. Springfield, Ill.]: Illinois State Police, 2004.
Find full textMills, DiAnn. Sworn to protect. Carol Stream, Ill: Tyndale House, 2010.
Find full textWerner, Patricia. His to protect. Richmond: Silhouette, 2000.
Find full textProtect Your Patent. Naperville: Sourcebooks, Inc., 2005.
Find full textCompany, Carson-Dellosa Publishing, ed. Protect!: Wild animals. Greensboro, NC: Carson-Dellosa, 2014.
Find full textWerner, Patricia. His to protect. Richmond: Silhouette, 2000.
Find full textBook chapters on the topic "Protect"
Weik, Martin H. "protect." In Computer Science and Communications Dictionary, 1358. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14964.
Full textMelone, Michael. "Protect." In Designing Secure Systems, 83–124. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003144182-10.
Full textEarle, Sylvia. "Protect the Ocean, Protect Ourselves." In Coastal Change, Ocean Conservation and Resilient Communities, 155–61. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41914-5_11.
Full textBährle-Rapp, Marina. "protect(ing)." In Springer Lexikon Kosmetik und Körperpflege, 456. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71095-0_8589.
Full textCordle, Daniel. "Protect–Protest: Introducing the Nuclear 1980s." In Late Cold War Literature and Culture, 1–24. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51308-3_1.
Full textCooper, Richard H., and Juliette Voïnov Kohler. "Introduction The Responsibility to Protect." In Responsibility to Protect, 1–12. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_1.
Full textSchulz, William F. "Spread Wide the Word." In Responsibility to Protect, 145–59. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_10.
Full textSimmons, Adele, and April Donnellan. "Reaching Across Borders." In Responsibility to Protect, 163–78. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_11.
Full textFeinstein, Lee, and Erica De Bruin. "Beyond Words." In Responsibility to Protect, 179–98. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_12.
Full textVolk, Joe, and Scott Stedjan. "Building Structures for Peace." In Responsibility to Protect, 199–218. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_13.
Full textConference papers on the topic "Protect"
Kumar, Udayan, Gautam Thakur, and Ahmed Helmy. "PROTECT." In the 6th International Wireless Communications and Mobile Computing Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1815396.1815543.
Full textLindner, Steffen, Daniel Merling, Marco Häberle, and Michael Menth. "P4-Protect." In CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3426744.3431327.
Full textShenoy, Jayanth, Zikun Liu, Bill Tao, Zachary Kabelac, and Deepak Vasisht. "RF-protect." In SIGCOMM '22: ACM SIGCOMM 2022 Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3544216.3544256.
Full textUriel Gallego, Marta, Edgar Abarca Lachén, Nuriea Berenguer Torrijo, Loreto Saez-Benito, Ana Sáez-Benito Suescun, and Carlota Gómez Rincón. "PROTECT YOURSELF FROM THE SUN, PROTECT YOURSELF FROM LUPUS." In International Conference on Education and New Learning Technologies. IATED, 2017. http://dx.doi.org/10.21125/edulearn.2017.1408.
Full textPage, D. "Protect and survive." In DEFENCE SITES: HERITAGE AND FUTURE 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/dshf120081.
Full textKim, Kyung-chul, and Eun hye Kim. "Let’s Protect Precious Crayfishes!" In Advanced Science and Technology 2017. Science & Engineering Research Support soCiety, 2017. http://dx.doi.org/10.14257/astl.2017.143.09.
Full textHutchinson, Shinelle, Bing Zhou, and Umit Karabiyik. "Are We Really Protected? An Investigation into the Play Protect Service." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006100.
Full textToll, D., E. Engman, K. Arsenault, L. Friedl, C. Peters-Lidard, A. Pinheiro, J. Nigro, and J. Triggs. "Protect and Monitor Water Resources." In 2006 IEEE International Symposium on Geoscience and Remote Sensing. IEEE, 2006. http://dx.doi.org/10.1109/igarss.2006.900.
Full textШахаева, Фатима Магомедовна, and Сайд-Магомед Аббазович Осмаев. "WARNING WAYS TO PROTECT COPYRIGHT." In Высокие технологии и инновации в науке: сборник избранных статей Международной научной конференции (Санкт-Петербург, Май 2020). Crossref, 2020. http://dx.doi.org/10.37539/vt185.2020.28.78.019.
Full textPoulallion, P. L., L. A. de Abreu Moreira, and J. L. R. Dominguez. "Protect the Forest With LNG." In SPE Gas Technology Symposium. Society of Petroleum Engineers, 1993. http://dx.doi.org/10.2118/26162-ms.
Full textReports on the topic "Protect"
Newmark, R. Innovative Technologies to Protect Water Supplies. Office of Scientific and Technical Information (OSTI), July 2004. http://dx.doi.org/10.2172/15014411.
Full textDoerry, Armin W. Radar Design to Protect Against Surprise. Office of Scientific and Technical Information (OSTI), February 2015. http://dx.doi.org/10.2172/1171595.
Full textErin Eastwood, Erin Eastwood. Using DNA to Protect Fiji's Fisheries. Experiment, January 2014. http://dx.doi.org/10.18258/1836.
Full textJishnu, Das, Benjamin Daniels, and Tahir Andrabi. We Have to Protect the Kids. Research on Improving Systems of Education (RISE), May 2020. http://dx.doi.org/10.35489/bsg-rise-ri_2020/016.
Full textSadun, Raffaella. Does Planning Regulation Protect Independent Retailers? Cambridge, MA: National Bureau of Economic Research, January 2014. http://dx.doi.org/10.3386/w19797.
Full textMarter, W. L. Proposed Release Guides to Protect Aquatic Biota. Office of Scientific and Technical Information (OSTI), March 2001. http://dx.doi.org/10.2172/781033.
Full textPangman, Dale. Can the U.S. Adequately Protect Its Forces? Fort Belvoir, VA: Defense Technical Information Center, June 1997. http://dx.doi.org/10.21236/ada328095.
Full textSeyle, D. Conor. Business Participation in the Responsibility to Protect. One Earth Future Foundation, April 2013. http://dx.doi.org/10.18289/oef.2013.007.
Full textHillman, K. THYRATRON-PROTECT SYSTEM FOR POLARIZED PROTON MODULATORS. Office of Scientific and Technical Information (OSTI), June 1985. http://dx.doi.org/10.2172/1151134.
Full textAtack, Jeremy, and Fred Bateman. Whom Did Protective Legislation Protect? Evidence From 1880. Cambridge, MA: National Bureau of Economic Research, December 1991. http://dx.doi.org/10.3386/h0033.
Full text