Letteratura scientifica selezionata sul tema "Protect"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Protect".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Articoli di riviste sul tema "Protect"
Chen, Huan, Liling Zhou e Shufang Han. "Protest and protect". Journal of Asian Pacific Communication 27, n. 1 (11 maggio 2017): 99–120. http://dx.doi.org/10.1075/japc.27.1.06che.
Testo completoCORDLE, DANIEL. "Protect/Protest: British nuclear fiction of the 1980s". British Journal for the History of Science 45, n. 4 (dicembre 2012): 653–69. http://dx.doi.org/10.1017/s0007087412001112.
Testo completoBhatt, Nikhil J., Mona M. Abaza, Kanwar S. Kelley, Ayesha N. Khalid, Steve Church, William Matthes e K. J. Lee. "Protect Your Practice, Protect Yourself, and Protect Your Family". Otolaryngology–Head and Neck Surgery 151, n. 1_suppl (settembre 2014): P9. http://dx.doi.org/10.1177/0194599814538403a6.
Testo completoMartinez-Ortiz, Wilnelly, e Ming-Ming Zhou. "Could PROTACs Protect Us From COVID-19?" Drug Discovery Today 25, n. 11 (novembre 2020): 1894–96. http://dx.doi.org/10.1016/j.drudis.2020.08.007.
Testo completoFox, Eleanor M. "“We Protect Competition, You Protect Competitors”". World Competition 26, Issue 2 (1 giugno 2003): 149–65. http://dx.doi.org/10.54648/woco2003002.
Testo completoREBMANN, TERRI. "Protect yourself, protect your patients". Nursing Made Incredibly Easy! 5, n. 1 (gennaio 2007): 30–39. http://dx.doi.org/10.1097/00152258-200701000-00008.
Testo completoKatz, Barbara. "Protect Your Paperwork, Protect Your Identity". Emergency Medicine News 30, n. 11 (novembre 2008): 32. http://dx.doi.org/10.1097/01.eem.0000340968.24163.5a.
Testo completoThe Lancet. "Protect the kidney, protect the heart". Lancet 375, n. 9722 (aprile 2010): 1226. http://dx.doi.org/10.1016/s0140-6736(10)60524-7.
Testo completoWaters, Rebecca. "Protect your hands: protect your health". Dental Nursing 15, n. 11 (2 novembre 2019): 562–63. http://dx.doi.org/10.12968/denn.2019.15.11.562.
Testo completoGonsoulin, Sid, e Daniel M. Wax. "Protect Our Program! Protect Our Referees!" Recreational Sports Journal 13, n. 3 (maggio 1989): 54–56. http://dx.doi.org/10.1123/nirsa.13.3.54.
Testo completoTesi sul tema "Protect"
Alhabashneh, Mohammad Abad Alhameed. "Protect team handler (PTH)". Thesis, University West, Department of Technology, Mathematics and Computer Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-567.
Testo completoThere is always a need for easy-to-follow processes that enable accurate and non-time consuming solutions. Nowadays we see a lot of different approaches to development processes in software engineering. This project is concerned with how to manage a software development process in a reliable, secure and efficient way. Software is available which provides some help for project managers / administrators to work more productively, with effective communication. Using such systems, it is possible to keep track of all the phases of development, including task distribution, making maximum use of previous hands-on experience and increasing productivity, to deliver a finished product in minimum time. No existing solution, however, fulfills all the desirable criteria. This paper describes the motivation, design and implementation of an improved development management system using Active Server Pages and Microsoft Internet Information Services with a backend Microsoft Access Database developed using a waterfall software development process. The resulting system is described and evaluated. This system will be beneficial for software houses, because they can communicate on the web, allowing efficiency gains by avoiding the need to call meetings for distribution of tasks among employees, with the additional advantage of location-transparent team management through the Internet.
Ярмак, Любов Павлівна, Любовь Павловна Ярмак, Liubov Pavlivna Yarmak e N. Novatarska. "To protect our environment". Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/15998.
Testo completoShaibah, Hassan S. "Does Wld's protect in Drosophila?" Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439380.
Testo completoPollentine, Marc. "Constructing the responsibility to protect". Thesis, Cardiff University, 2012. http://orca.cf.ac.uk/43100/.
Testo completoPochatko, T. V. "Ways to protect your ideas". Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/62829.
Testo completoHuang, Yaping. "Organic Coatings to Protect Ferrous Structures". Diss., North Dakota State University, 2013. https://hdl.handle.net/10365/27125.
Testo completoDepartment of Energy
North Dakota State University. Department of Coatings and Polymeric Materials
MARTINS, THEO COTRIM. "DO MANDATORY DIVIDEND RULES PROTECT MINORITY SHAREDHOLDERS?" PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=16280@1.
Testo completoThis paper shows that Brazil s mandatory dividend rules partly explain why its average dividend yield is higher than in the U.S. And yet, several Brazilian firms bypass the mandatory dividend rules. We show that 42% of a broad sample of nonfinancial firms with shares listed at Bovespa use legal loopholes to pay fewer dividends than the amount that their statutes call for. The data suggest that the main reason for these firms to bypass the dividend rules is not to ensure financing for new projects. Instead, lower dividend payments seem to pave the way for the controlling shareholders to dilute the cash-flow rights of minority shareholders. Thus, short of credit crunch, the Brazilian mandatory dividend rules do protect minority shareholders, without making harder for firms to finance investment opportunities.
Hayes, Kelli A. "Logical extensions of the responsibility to protect". Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2197.
Testo completoENGLISH ABSTRACT: Are violent and non-violent mass atrocities morally different? According to the United Nations, they are. But why? The answer to this question is important as it in part determines our obligations to people living in other countries. This thesis seeks to determine if violent and non-violent mass atrocities are morally different and, if not, whether the latter should be included under the United Nations’ doctrine of the responsibility to protect. In order to do this, the thesis first examines the conditions under which sovereignty exists in order to understand when intervention can occur. It also analyzes just war theory to discern when military intervention to halt nonviolent mass atrocities is justified. Having established these two concepts, the thesis then presents three arguments for why non-violent mass atrocities are morally indistinguishable from violent ones and should also be included under the doctrine of the responsibility to protect. A discussion of the feasibility of implementing this extension and the long-term effects of these types of interventions follows. Finally, the thesis contains three case studies in order to apply the arguments presented earlier.
AFRIKAANSE OPSOMMING: Is daar ‘n morele verskil tussen gewelddadige en nie-gewelddadige gruweldade? Volgens die Verenigde Nasies is daar so ‘n verskil, maar hoekom? Die antwoord tot hierdie vraag is deels belangrik omdat dit ons verantwoordelikhede tot mense in ander lande bepaal. In hierdie tesis word daar gepoog om te bepaal of daar so ‘n verskil tussen gewelddadige en nie-gewelddadige gruweldade is, en, indien nie, of nie-gewelddadige gruweldade ook moet tel onder die Verenige Nasies se verantwoordelikheid om te beskerm. Die tesis poog eerstens om die kondisies vir soewereiniteit te bepaal ten einde te probeer verstaan wanneer ‘n intervensie moreel regverdigbaar is. Dit analiseer ook die teorie van geregverdigde oorlogvoering ten einde te bepaal wanneer militêre inmenging om nie-gewelddadige gruweldade stop te sit geregverdig is. Na hierdie twee konsepte ondersoek is word daar drie argumente verskaf om aan te toon dat nie-gewelddadige gruweldade nie moreel onderskeibaar is van gewelddadige gruweldade nie, en dus dat nie-gewelddadige gruweldade onder die verantwoordelikheid om te beskerm behoort te tel. Dit word gevolg deur ‘n bespreking van die praktiese haalbaarheid van die implementering van so ‘n uitbreiding van die verantwoordelikheid om te beskerm, asook ‘n bespreking van die langtermyn effekte van hierdie tipes intervensies. Die tesis eindig met drie gevallestudies ten einde die argumente wat reeds gemaak is toe te pas.
Asher, Courtani. "Project protect and nurture| A grant proposal". Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10076460.
Testo completoThe purpose of this project was to write a grant proposal to identify resource materials that can be used in whole or adapted for a series of workshops for K–6 school social workers and their colleagues (teachers, counselors, and support staff) aimed at enhancing their knowledge and skills in child abuse and trauma prevention and intervention. The potential host agency will be Dr. Albert Schweitzer Elementary, a school in Anaheim, California. The grant writer developed the project after an extensive review of the literature available on child abuse and trauma. The project seeks to provide social workers and their colleagues with the skills and knowledge needed to aid in the prevention and treatment of child abuse and trauma. The Weingart Foundation was chosen as the potential funding source for this project. The actual funding and submission of this grant proposal was not a requirement for successful completion of this project.
Mazzanti, Maria Rita. "From State sovereignty to responsibility to protect". Paris, Institut d'études politiques, 2013. https://spire.sciencespo.fr/notice/2441/45eb019724sn6sg9mcu4j489l.
Testo completoThe research was aimed at understanding by means of which developments in the political and legal thinking the R2P finally reached its present shape. To this end, we analyzed on one side the evolution of the concept of absolute sovereignty and the shift towards an increased involvement of the international community in the internal affairs of the individual states, and, on the other side, the modifications incurred in the concept of intervention for humanitarian purposes and the lessons learned out of the experiences of the 1990s. We have argued that what R2P is, or is not, should be understood in the light of this long development. Having then established what now R2P is about we wanted to measure to which extent R2P was able, in the ten years of its existence, to influence the behavior of the international community, and in particular of the United Nations Security Council. Hence, we selected four cases – Libya, Côte d’Ivoire Sri Lanka and Syria – where R2P was invoked or should have been invoked, with the aim of finding regularities useful for guiding future action. Our research hypothesis was that R2P is influenced by five main independent variables, namely: the dynamic within the Security Council (active involvement of some specific countries/country representatives); reasonable perspective of success/attractive cost-benefit profile; the role of the relevant regional/sub-regional organizations; the activity of the Human Rights Council; and the action of civil society
Libri sul tema "Protect"
Barnham, Kay. Protect nature. New York: Crabtree Pub. Co., 2008.
Cerca il testo completoEricson, Carol. Conceal, protect. Don Mills, Ont: Harlequin Enterprises Ltd., 2013.
Cerca il testo completoProtect nature. London: Wayland, 2008.
Cerca il testo completoPolice, Illinois State. Scott's Law: Let's protect those who protect us. Springfield, Ill.]: Illinois State Police, 2003.
Cerca il testo completoPolice, Illinois State. Scott's Law: Let's protect those who protect us. Springfield, Ill.]: Illinois State Police, 2004.
Cerca il testo completoMills, DiAnn. Sworn to protect. Carol Stream, Ill: Tyndale House, 2010.
Cerca il testo completoWerner, Patricia. His to protect. Richmond: Silhouette, 2000.
Cerca il testo completoProtect Your Patent. Naperville: Sourcebooks, Inc., 2005.
Cerca il testo completoCompany, Carson-Dellosa Publishing, a cura di. Protect!: Wild animals. Greensboro, NC: Carson-Dellosa, 2014.
Cerca il testo completoWerner, Patricia. His to protect. Richmond: Silhouette, 2000.
Cerca il testo completoCapitoli di libri sul tema "Protect"
Weik, Martin H. "protect". In Computer Science and Communications Dictionary, 1358. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14964.
Testo completoMelone, Michael. "Protect". In Designing Secure Systems, 83–124. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003144182-10.
Testo completoEarle, Sylvia. "Protect the Ocean, Protect Ourselves". In Coastal Change, Ocean Conservation and Resilient Communities, 155–61. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41914-5_11.
Testo completoBährle-Rapp, Marina. "protect(ing)". In Springer Lexikon Kosmetik und Körperpflege, 456. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71095-0_8589.
Testo completoCordle, Daniel. "Protect–Protest: Introducing the Nuclear 1980s". In Late Cold War Literature and Culture, 1–24. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51308-3_1.
Testo completoCooper, Richard H., e Juliette Voïnov Kohler. "Introduction The Responsibility to Protect". In Responsibility to Protect, 1–12. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_1.
Testo completoSchulz, William F. "Spread Wide the Word". In Responsibility to Protect, 145–59. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_10.
Testo completoSimmons, Adele, e April Donnellan. "Reaching Across Borders". In Responsibility to Protect, 163–78. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_11.
Testo completoFeinstein, Lee, e Erica De Bruin. "Beyond Words". In Responsibility to Protect, 179–98. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_12.
Testo completoVolk, Joe, e Scott Stedjan. "Building Structures for Peace". In Responsibility to Protect, 199–218. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_13.
Testo completoAtti di convegni sul tema "Protect"
Kumar, Udayan, Gautam Thakur e Ahmed Helmy. "PROTECT". In the 6th International Wireless Communications and Mobile Computing Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1815396.1815543.
Testo completoLindner, Steffen, Daniel Merling, Marco Häberle e Michael Menth. "P4-Protect". In CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3426744.3431327.
Testo completoShenoy, Jayanth, Zikun Liu, Bill Tao, Zachary Kabelac e Deepak Vasisht. "RF-protect". In SIGCOMM '22: ACM SIGCOMM 2022 Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3544216.3544256.
Testo completoUriel Gallego, Marta, Edgar Abarca Lachén, Nuriea Berenguer Torrijo, Loreto Saez-Benito, Ana Sáez-Benito Suescun e Carlota Gómez Rincón. "PROTECT YOURSELF FROM THE SUN, PROTECT YOURSELF FROM LUPUS". In International Conference on Education and New Learning Technologies. IATED, 2017. http://dx.doi.org/10.21125/edulearn.2017.1408.
Testo completoPage, D. "Protect and survive". In DEFENCE SITES: HERITAGE AND FUTURE 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/dshf120081.
Testo completoKim, Kyung-chul, e Eun hye Kim. "Let’s Protect Precious Crayfishes!" In Advanced Science and Technology 2017. Science & Engineering Research Support soCiety, 2017. http://dx.doi.org/10.14257/astl.2017.143.09.
Testo completoHutchinson, Shinelle, Bing Zhou e Umit Karabiyik. "Are We Really Protected? An Investigation into the Play Protect Service". In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006100.
Testo completoToll, D., E. Engman, K. Arsenault, L. Friedl, C. Peters-Lidard, A. Pinheiro, J. Nigro e J. Triggs. "Protect and Monitor Water Resources". In 2006 IEEE International Symposium on Geoscience and Remote Sensing. IEEE, 2006. http://dx.doi.org/10.1109/igarss.2006.900.
Testo completoШахаева, Фатима Магомедовна, e Сайд-Магомед Аббазович Осмаев. "WARNING WAYS TO PROTECT COPYRIGHT". In Высокие технологии и инновации в науке: сборник избранных статей Международной научной конференции (Санкт-Петербург, Май 2020). Crossref, 2020. http://dx.doi.org/10.37539/vt185.2020.28.78.019.
Testo completoPoulallion, P. L., L. A. de Abreu Moreira e J. L. R. Dominguez. "Protect the Forest With LNG". In SPE Gas Technology Symposium. Society of Petroleum Engineers, 1993. http://dx.doi.org/10.2118/26162-ms.
Testo completoRapporti di organizzazioni sul tema "Protect"
Newmark, R. Innovative Technologies to Protect Water Supplies. Office of Scientific and Technical Information (OSTI), luglio 2004. http://dx.doi.org/10.2172/15014411.
Testo completoDoerry, Armin W. Radar Design to Protect Against Surprise. Office of Scientific and Technical Information (OSTI), febbraio 2015. http://dx.doi.org/10.2172/1171595.
Testo completoErin Eastwood, Erin Eastwood. Using DNA to Protect Fiji's Fisheries. Experiment, gennaio 2014. http://dx.doi.org/10.18258/1836.
Testo completoJishnu, Das, Benjamin Daniels e Tahir Andrabi. We Have to Protect the Kids. Research on Improving Systems of Education (RISE), maggio 2020. http://dx.doi.org/10.35489/bsg-rise-ri_2020/016.
Testo completoSadun, Raffaella. Does Planning Regulation Protect Independent Retailers? Cambridge, MA: National Bureau of Economic Research, gennaio 2014. http://dx.doi.org/10.3386/w19797.
Testo completoMarter, W. L. Proposed Release Guides to Protect Aquatic Biota. Office of Scientific and Technical Information (OSTI), marzo 2001. http://dx.doi.org/10.2172/781033.
Testo completoPangman, Dale. Can the U.S. Adequately Protect Its Forces? Fort Belvoir, VA: Defense Technical Information Center, giugno 1997. http://dx.doi.org/10.21236/ada328095.
Testo completoSeyle, D. Conor. Business Participation in the Responsibility to Protect. One Earth Future Foundation, aprile 2013. http://dx.doi.org/10.18289/oef.2013.007.
Testo completoHillman, K. THYRATRON-PROTECT SYSTEM FOR POLARIZED PROTON MODULATORS. Office of Scientific and Technical Information (OSTI), giugno 1985. http://dx.doi.org/10.2172/1151134.
Testo completoAtack, Jeremy, e Fred Bateman. Whom Did Protective Legislation Protect? Evidence From 1880. Cambridge, MA: National Bureau of Economic Research, dicembre 1991. http://dx.doi.org/10.3386/h0033.
Testo completo