Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2007
  • Volume: 

    17
  • Issue: 

    58
  • Pages: 

    134-139
Measures: 
  • Citations: 

    0
  • Views: 

    1266
  • Downloads: 

    0
Abstract: 

Background and purpose: Oculogyric crisis which is a dystonic reaction commonly caused by typical antipsychotics treatment of acute dystonias, rarely occurs with atypical antipsychotics like clozapine. The aim of this report was to describe a rare case of clozapine-induced oculogyric crisis successfully treated with biperiden. Case: The patient was a 42-year-old woman with a 19-year history of schizophrenia treated with high-potency typical antipsychotics, risperidone and lithium augmentation with appropriate doses and duration. Because of poor response to prior medications, she was prescribed clozapine started with 25 mg/d and gradually titrated up to 150 mg/d. She has experienced two episodes of oculogyric crisis treated successfully with biperiden. Discussion: Although low affinity of clozapine for blocking D2 dopaminergic receptors and its anticholinergic activity may explain the significantly lower incidence of dystonic reactions, they may happen in some patients and could be suppressed with biperiden. Conclusion: Clinicians should consider dystonic reaction as a possible clozapine adverse effect and on the basis of this report, clozapine-induced oculogyric crisis may be treated successfully with biperiden.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1266

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Dehbani S. | Rezaei H.

Issue Info: 
  • Year: 

    2023
  • Volume: 

    14
  • Issue: 

    1
  • Pages: 

    63-77
Measures: 
  • Citations: 

    0
  • Views: 

    96
  • Downloads: 

    26
Abstract: 

Due to the devastating effects of the Industrial Revolution and technological advances in recent decades, the preservation of capital and natural resources, as well as the reduction of adverse effects of mechanization in all its dimensions, have received worldwide attention and led human society to the significant concept of "sustainability" in all areas, especially ecological, social, and economic macro aspects. However, the term sustainability is not limited to the three mentioned areas only in normal conditions. As human beings have lived in threat since the beginning of creation, maintaining this sustainability in times of crisis is also of particular importance. For this goal, the concept of passive defense is considered, mainly in special fields such as architecture. Because the architectural space should be to respond to function appropriately and create desirable spatial qualities in different time and location situations, it can also help strengthen the defense as an intermediary means. With this explanation, the main purpose of the present research is to achieve a pattern based on the spatial organization in the architectural design process that aims to strengthen the commonalities and moderate the divergences of sustainability strategies, with acceptable reliability, in both secure and crisis conditions to optimize the design. It should be noted that the research is of the applied kind in terms of purpose and descriptive-analytical in terms of method. In other words, it is a qualitative content analysis that collects qualitative data from the research literature through a documentary study and infers significant components forming the main variables of the problem using descriptive coding followed by a survey of experts through the Delphi technique. Finally, analyses have been concluded through logical reasoning. Based on the results, it should be acknowledged that some factors by having influences on sustainability in secure and crisis conditions, strengthen each other and some factors weaken. Therefore, according to the type of usage of buildings and other significant contextual conditions, decisions should be made appropriately and solutions should be adopted in the spatial organization that leads to strengthening the convergence of agreed factors and moderating the confrontation of divergent factors.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 96

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 26 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    44
Measures: 
  • Views: 

    286
  • Downloads: 

    151
Abstract: 

A SET S ÍV IS A CO-SECURE DOMINATING SET (CSDS) OF A GRAPH G= (V, E) IF S IS A DOMINATING SET, AND FOR EACH U 2 S THERE EXISTS A VERTEX N Î V \ S SUCH THAT UNÎE AND (S\{U}) È {N} A DOMINATING SET. THE MINIMUM CARDINALITY OF A CO-SECURE DOMINATING SET IN G IS THE CO-SECURE DOMINATION NUMBER ¡CS (G) OF G: IN THIS PAPER WE INITIATE A STUDY OF THIS PARAMETER. WE PROVE THAT THE DECISION PROBLEM FOR THIS PARAMETER IS NP-COMPLETE EVEN WHEN RESTRICTED TO BIPARTITE, CHORDAL OR PLANAR GRAPHS.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 286

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 151
Issue Info: 
  • Year: 

    2002
  • Volume: 

    14
  • Issue: 

    5
  • Pages: 

    228-238
Measures: 
  • Citations: 

    1
  • Views: 

    126
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 126

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2009
  • Volume: 

    17
Measures: 
  • Views: 

    334
  • Downloads: 

    0
Abstract: 

EMERGENCY AND CRISIS CONDITIONS ARE ALWAYS UNEXPECTED. THEREFORE DIFFERENT SECTIONS IN PORTS SHOULD BE ALWAYS READY TO DEAL WITH THESE CONDITIONS AND EVERY ONCE IN A WHILE IN THE SAME TIME DURATIONS MANEUVERS ARE HELD TO MAINTAIN THE READINESS OF EMPLOYEES AND WORKERS AND THEY ARE PREPARED TO DEAL WITH SUCH A SITUATION IN ADDITION TO THE PORT MANAGEMENT IN EVERY PORT AS FOCAL POINT FOR COORDINATION, ISSUING THE DIRECTIVES AND PRECEDENTS PLAY ROLES. HE IS ALSO RESPONSIBLE FOR COORDINATING THE INTERNAL AND EXTERNAL PARTS OF THE PORTS. ANOTHER OF HIS DUTIES IS THE AGREEMENTS WITH POLICE, MUNICIPALITY, EMERGENCY, HOSPITALS, GOVERNORATE-GENERAL, FIREFIGHTING AND PROVINCIAL UNEXPECTED DISASTER COMMITTEE TO RECEIVE THE REQUIRED ASSISTANCE WHEN NECESSARY. BASICALLY, THE EMERGENCY SITUATION IS ALWAYS AVAILABLE AND MIGHT HAPPEN EVERYWHERE AND PORTS ARE NOT EXCEPTIONAL FROM IT. IF THE MEASURES AND PRECAUTIONARY MEASURES ARE TAKEN BEFORE THE EVENTS BY SENIOR MANAGEMENT OF PORTS THE AMOUNT OF DAMAGES AND LOSSES ARE SIGNIFICANTLY REDUCED. THIS PAPER ATTEMPTS BY USING THE LATEST AVAILABLE INSTRUCTIONS THAT HAS BEEN DEVELOPED BY THE RELEVANT ORGANIZATIONS IN THIS AREA, GENERAL CONDITIONS, CONSTRAINS, REQUIRED EQUIPMENT, THE COORDINATION WAYS WITH DIFFERENT SECTORS AND THE SEGREGATION WAYS OF DUTIES AND RESPONSIBILITIES ARE DESCRIBED SO THAT WE CAN TAKE AN EFFECTIVE STEP TO FAMILIARIZING PERSONNEL WITH THESE PORTS.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 334

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    12
  • Issue: 

    1
  • Pages: 

    23-34
Measures: 
  • Citations: 

    0
  • Views: 

    162
  • Downloads: 

    73
Abstract: 

INTRODUCTION: Nowadays, government officials seek ways to monitor, control, and manage events and crises due to the concerns of the general public and social media as informative tools. Regarding this, the present study aims to identify and analyze the factors affecting the crisis incidence in Iranian stadiums. METHODS: The present interpretive qualitative research was performed based on a grounded theory method and latent content analysis technique. The data were collected by the implementation of in-depth interviews with 19 people consisting of the Ministry of Sports and Youth experts and executives, sports management professors, and crisis management specialists. The participants were selected using non-probability and snowball sampling techniques. The interviews were continued until reaching theoretical saturation regarding the research questions and objectives. The gathered data, in form of audio recording and text, were analyzed by MAXQDA software (version 18). FINDINGS: The interview data were analyzed based on open and process coding. Afterward, the researcher categorized the identified factors into causal, contextual, and intervening conditions. In this regard, the causal factors consisted of the following items: 1) nature of crisis, 2) technical and specialized factors, 3) infrastructure and equipment, and 4) environmental and equipment hazards. With respect to the contextual factors, they included: 1) human resources, 2) nature of sporting events, 3) security factors, 4) vandalism, 5) welfare facilities, and 5) management factors. Finally, the intervening factors were found to entail: 1) stadium atmosphere, 2) political and social crises, and 3) information and communications technology. CONCLUSION: According to the obtained results, the officials are recommended to consider the paradigmatic model of factors leading to crisis management in stadiums in the crisis management programs adopted for sports venues, especially large stadiums. The consideration of the factors constituting the given model can lead to the improvement of crisis management in the country's sports venues.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 162

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 73 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 1
Author(s): 

Paya Ali

Issue Info: 
  • Year: 

    2023
  • Volume: 

    17
  • Issue: 

    42
  • Pages: 

    258-280
Measures: 
  • Citations: 

    0
  • Views: 

    114
  • Downloads: 

    16
Abstract: 

Since the emergence of modernity, and in response to its myriad aspects and potentials, which are constantly unfolding, countless reactions have kept emerging in almost all quarters of the globe. A large variety of anti-modern reactions, the common core of which is perhaps the idea that modernity, in one way or another, is illegitimate, stand out among these responses. According to some of these anti-modern responses, modernity has usurped the characteristics and features of religion, which has been the soul as well as the main shaping force of the pre-modern era and has reproduced it in a corrupted form. Two German-speaking philosophers, Karl Popper and Hans Blumenberg, are among the intellectuals who have defended modernity against the onslaught of anti-modern tendencies. In this paper, I briefly, though critically, compare and contrast the approaches as well as some of the arguments of these two thinkers in defence of modernity.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 114

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 16 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2013
  • Volume: 

    44
Measures: 
  • Views: 

    122
  • Downloads: 

    45
Abstract: 

GIVEN A GRAPH G= (V, E), A SET S ÍV IS DOMINATING IF FOR EVERY UÎV \ S THERE EXISTS UÎS SUCH THAT UV Î E: ADOMINATING SET S ÍV IS SECURE IF FOR EVERY V 2 V N S THERE EXISTS UÎS SUCH THAT (FORMULA) IS DOMINATING. IN THIS WORK WE EXTEND THE CONCEPT OF SECURE DOMINATING SET TO DIGRAPHS IN THREE DIFFERENT WAYS, ALL OF THEM WITH INTERESTING APPLICATIONS, AND PROVE SOME RESULTS REGARDING EACH OF THEM.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 122

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 45
Issue Info: 
  • Year: 

    2021
  • Volume: 

    13
  • Issue: 

    3
  • Pages: 

    31-38
Measures: 
  • Citations: 

    0
  • Views: 

    256
  • Downloads: 

    316
Abstract: 

Recently, the interest in cybercrime and cybersecurity has increased dramatically both in terms of critical security issues and national economic information infrastructure and sensitive dealing policies, such as protection and data privacy. Moreover, the growing threat of cybersecurity has prompted the kingdom to pay more attention to its national cybersecurity strategy as the state embarks on a Vision 2030 plan, which aims to diversify the economy and create new jobs. Therefore, Any Computer system is always having security threats which are considered a big problem, and this includes application Codes as increasing demand. The paper aims to give detailed information about secure coding with Python and present security guidelines and considerations in di erent disciplines. It focuses on giving an overview of the authentication methods used in the application (Code) and showing program security mistakes to introduce vulnerabilities (Ex. SQL Injection). We review the new user authentication techniques, making it easier for the manager to choose the appropriate techniques for his organization by understanding the way it works, its advantages, and disadvantages. The administrator can integrate these mechanisms in a manner that is appropriate for his security plan. This will be useful for programmers and users to keep their codes and applications more secure and viable for usage in sensitive environments.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 256

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 316 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Gipson K. Lal | Vinisha C.

Issue Info: 
  • Year: 

    2025
  • Volume: 

    14
  • Issue: 

    2
  • Pages: 

    268-275
Measures: 
  • Citations: 

    0
  • Views: 

    0
  • Downloads: 

    0
Abstract: 

Let G = (V,E) be a simple graph. A set S ⊆ V is a dominating set of G, if for every vertex in V\S is adjacent to at least one vertex in S. A subset S of V is called a twain secure perfect dominating set of G (TSPD-set) if for every vertex v ∈ V \S is adjacent to exactly one vertex u ∈ S and (S\{u})∪{v} is a dominating set of G. The minimum cardinality of a twain secure perfect dominating set of G is called the twain secure perfect domination number of G and is denoted by γtsp(G).Let Dtsp(Cn, i) denote the family of all twain secure perfect dominating sets of Cn with cardinality i, for γtsp(Cn)≤ i≤ n. Let dtsp(Cn, i) = |Dtsp(Cn, i)|. In this article, we derive a recursive formula for dtsp(Cn, i) and construct Dtsp(Cn, i). Weconsider the polynomial Dtsp(Cn, x) = Σn i=γtsp(Cn) dtsp(Cn, i)xi, which we refer to as the twain secure perfect domination polynomial of cycles using this recursive formula. In this research, we use a recursive technique to generate all twain secure perfect dominating sets of cycles and twain secure perfect domination polynomials of cycles.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 0

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
email sharing button
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
sharethis sharing button