Search
Now showing items 9901-9910 of 10157
Abbey Steel : Conquering the steel recycling market
(Oxford University Press (OUP), 2010)
This chapter summarizes a case study involving recycled steel trader Abbey Steel Ltd. The company, with the assistance of the University of Hertfordshire Academics enhanced its customer retention by designing and implementing ...
Physiotherapy in the management of hemophilia
(Blackwell, 2010)
The physiotherapist is an integral member of the multidisciplinary team and plays a key role in the management of patients with haemophilia. This includes the management of acute joint or muscle bleeds, chronic synovitis ...
Conflict resolution, restorative justice approaches and bullying in young people's residential units
(2010)
Restorative justice has been an increasing feature in the discourses within adult and youth justice criminal justice systems in recent years. This article examines interpersonal conflicts arising from crime, bullying and ...
Multi-channel key agreement using encrypted public key exchange
(2010)
We present a new protocol for cryptographic key agreement between devices which have had no previous association, and which does not rely upon mutual access to a pre-existing key infrastructure. This protocol is suitable ...
Switching stable patients with schizophrenia from depot and oral antipsychotics to long-acting injectable risperidone : reasons for switching and safety
(2010)
Objective: An international, non-randomised study evaluated efficacy and safety of risperidone long-acting injectable (RLAI) compared to previous treatment. To investigate generisability of the European data set to the UK ...
Risk assessment in mental health : staff attitudes and an estimate of time cost
(2010)
Background : Risk assessment is a routine part of mental health services, with professionals being required to complete a risk assessment proforma (RAP) for every patient under their care. Aims : This study was designed ...
Multichannel protocols to prevent relay attacks
(2010)
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encrypting the communication between the honest ...
Using Assembly Theory to Explain Changes in a Weed Flora in Response to Agricultural Intensification
(2010)
The intensification of crop management in the U.K. over the past 60 years has resulted in the decline of the Populations of a number of annual plant species adapted to arable habitats. In contrast, other species continue ...