Showing 41 - 60 results of 286 for search 'Three Guards', query time: 0.08s Refine Results
  1. 41

    Eternal Domination of Generalized Petersen Graph by Ramy Shaheen, Ali Kassem

    Published 2021-01-01
    “…An eternal dominating set of a graph G is a set of guards distributed on the vertices of a dominating set so that each vertex can be occupied by one guard only. …”
    Get full text
    Article
  2. 42
  3. 43

    Sexualités féminines en prison : pratiques, discours et représentations by Gwenola Ricordeau

    Published 2009-07-01
    “…Differences between female and male custodies are also investigated through three items: relations with guards of the opposite sex, sexual violence in jail and finally, categorization and ranking amongst prisoners.…”
    Get full text
    Article
  4. 44
  5. 45
  6. 46

    Les effets conjoints du travail et des horaires alternants sur la santé des agents de surveillance des établissements pénitentiaires by Pierre Pavageau

    Published 2006-11-01
    “…The aim of our study is to compare the effects of three different forms of time organization (traditional 9 to 5 schedule, 6-hour shifts, and 12-hour shifts) inside French prisons, and particularly on prison guard staff. …”
    Get full text
    Article
  7. 47
  8. 48

    Forbuddet mod Loyal to Familia by Kim Møller

    Published 2022-10-01
    “…While their motivations differed, all three courts agreed that Danish society had a constitutional right. …”
    Get full text
    Article
  9. 49

    Des femmes allemandes au service de la guerre : participations actives aux politiques raciales nationales-socialistes, à la déportation et au génocide (1939-1945) by Elissa Mailänder

    Published 2015-09-01
    “…This article is shaped around the discussion of three recent works of research: Elizabeth Harvey, in her study Women and the Nazi East. …”
    Get full text
    Article
  10. 50

    Combating economic crime in Ukraine in 1946–1949 by V. A. Grechenko

    Published 2023-12-01
    “…The most common crimes were the following: 1) maliciously delaying the repair of agricultural machinery, allegedly due to the lack of spare parts and specialists; 2) theft of grain during its transportation and sowing by persons responsible for this (weighers, field crew leaders, guards); 3) theft of seeds and fuel by security guards; 4) theft and embezzlement of seeds by officials of collective and state farms and subsidiary farms; 5) theft of seed by reducing the seeding rate and theft of fuel due to lack of control over its consumption; 6) theft of seeds by employees of storage facilities with their subsequent resale at markets at speculative prices; 7) creation of surplus seeds by weighing, moistening, writing off for drying, and increasing waste during sorting. …”
    Get full text
    Article
  11. 51

    ‘We are not trained to do clinical work’: security staff providing physical restraint for NGT feeding in English paediatric wards—a qualitative multi-informant study by Dasha Nicholls, Jacinta Tan, Sarah Fuller, Emerie Sheridan

    Published 2024-12-01
    “…Objective To gain insights into the experience, and impact, of using security staff to facilitate physical restraints for nasogastric tube feeding.Design A cross-sectional design using 39 individual interviews, three online focus groups and three written submissions involving young people with lived experience (PWLE), parents/carers, paediatric staff and security staff involved in nasogastric feeding under restraint in paediatric settings in England. …”
    Get full text
    Article
  12. 52

    An Investigation into Information Security Managerial Practices in Selected Public Sector Organizations. by Ahimbisibwe, Benjamin K., Nabende, Peter, Musiimenta, Florence

    Published 2023
    “…The study aims to examine information security managerial practices in organisations. It was guided by three specific objectives: identification of information security practices critical to information assets management; establishment of implementation processes involved in the execution of structured information security governance; and evaluation of policies that influence information security best practices. …”
    Get full text
    Article
  13. 53
  14. 54

    Anthropometric, aerobic and muscle power profile of young costa rican basketball players by Randall Gutiérrez-Vargas, José Alexis Ugalde-Ramírez, José Pino-Ortega, José Andrés Trejos-Montoya, Luis Blanco-Romero, Braulio Sánchez-Ureña, Juan Carlos Gutiérrez-Vargas, Daniel Rojas-Valverde

    Published 2022-07-01
    “…The assessment was carried outa on 99 young players (43 women and 56 men; 18 guards, 51 forwards and 30 centers; 42 in the U16 category and 57 in the U18 category) from eight different teams. …”
    Get full text
    Article
  15. 55
  16. 56
  17. 57
  18. 58
  19. 59
  20. 60

    REPRESENTATION OF MUTUAL TERMS AND RESEARCH SKILLS TOWARDS GRADE POINT AVERAGE: EXPLORATION STUDY by Hasan Subekti, Wachidatul Linda Yuhanna, Herawati Susilo, Ibrohim Ibrohim, Hadi Suwono

    Published 2018-05-01
    “…The result of correlation analysis shows ð¹ð‘ð‘œð‘¢ð‘›ð‘¡ = 6,147˃ 3,140 = ð¹ð‘¡ð‘Žð‘ð‘™ð‘’ = (0,05;2;64) or in other words there a relationship of IR and KR collectively to GPA. …”
    Get full text
    Article