Results 81 to 90 of about 20,562 (302)

Conduct disorder : the achievement of a diagnosis' [PDF]

open access: yes, 2003
This paper explores the historical shapings behind the diagnosis of conduct disorders. We take as our point of purchase oppositional ways of knowing the subject of conduct disorder—as either pathologically motivated or as the victim of a repressive ...
Laurence, Jennifer, McCallum, David
core   +1 more source

Faith, gender and financial investment: Providence and Presbyterianism in Scotland and abroad

open access: yesAsia‐Pacific Economic History Review, EarlyView.
Abstract Mid‐nineteenth century fictional representations of misdirected investment by widows and clergy position them as ignorant in financial matters and hence pitiable. While scholars have recognised female agency in nineteenth century commerce, insufficient attention has been paid to religious belief in financial decision‐making.
Jennifer Jones, Susan Poole
wiley   +1 more source

Suspected Spontaneous Aqueous Humor Misdirection Syndrome in a Boston Terrier

open access: yesCase Reports in Veterinary Medicine, 2020
An eight-year-old female spayed Boston Terrier presented to the North Carolina Veterinary Hospital with glaucoma in the left eye (OS). Initial ophthalmic examination revealed moderate ocular hypertension, a diffusely and markedly shallow anterior chamber
Ashley E. Zibura   +2 more
doaj   +1 more source

Current Literature [PDF]

open access: yes, 1998
Material appearing below is thought to be of particular interest to Linacre Quarterly readers because of its moral, religious, or philosophic content. The medical literature constitutes the primary, but not the sole source of such material.
Catholic Physicians\u27 Guild
core   +1 more source

Patient‐reported outcomes and visual function after four refractive strategies in cataract surgery: A randomized controlled trial

open access: yesActa Ophthalmologica, EarlyView.
Abstract Purpose To evaluate patient‐reported outcome measures (PROMs) and visual function across four groups of public cataract patients: emmetropia, mini‐monovision, monovision with partial‐range of field (RoF) narrow intraocular lenses (IOLs) and patients implanted with partial‐RoF extended IOLs.
Anne Guldhammer Skov   +4 more
wiley   +1 more source

Outcomes of Medical and Surgical Management in Aqueous Misdirection Syndrome

open access: yesClinical Ophthalmology, 2023
Reham Dakam AlQahtani,1 Adi Mohammed Al Owaifeer,1,2 Sami AlShahwan,1 Khawlah AlZaben,1 Raghad AlMansour3 1King Khaled Eye Specialist Hospital, Riyadh, Saudi Arabia; 2Ophthalmology Unit, Department of Surgery, College of Medicine, King Faisal University,
AlQahtani RD   +4 more
doaj  

“Yet the Problem Remains”: Why Genetic Determinism Still Haunts Biomedical Research

open access: yesBioethics, EarlyView.
ABSTRACT After the horrors of the Holocaust and its connections to eugenics were revealed to the world, many post‐war population geneticists sought to establish rhetorical distance from the Nazi's state‐led campaigns, without abandoning their belief that actively shaping the population's genetics would produce a prosperous society.
Christopher R. Donohue, Ian A. Myles
wiley   +1 more source

Notes on mirror visions in 'Modesty Blaise' [PDF]

open access: yes, 2013
Modesty Blaise (Joseph Losey, 1966) travels the cinematic distance between an opening shot of the seemingly contented sleeping face of its star Monica Vitti and an extreme close-up of her eponymous character’s over-stimulated, rapacious look directly at ...
Grant, Catherine
core  

Interception in Distance-Vector Routing Networks

open access: yes, 2016
Despite the large effort devoted to cybersecurity research over the last decades, cyber intrusions and attacks are still increasing. With respect to routing networks, route hijacking has highlighted the need to reexamine the existing protocols that ...
Burstein, David   +3 more
core   +1 more source

Octopus: A Secure and Anonymous DHT Lookup [PDF]

open access: yes, 2012
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P) networks. Its decentralized nature introduces security and privacy vulnerabilities for applications built on top of them; we thus set out to design a lookup ...
Borisov, Nikita, Wang, Qiyan
core   +1 more source

Home - About - Disclaimer - Privacy