<< مقالات لاتين >>
<< بر اساس عنوان >>
1
Second-order standard addition for deconvolution and quantification of fatty acids of fish oil using GC–MS
2
Second-Order Statistical Approaches to Channel Shortening in Multicarrier Systems
3
Second-order statistical characterization of the filter bank and its elements
4
Second-order statistical properties of nonlinearly distorted phase-shift keyed (PSK) signals
5
Second-Order Statistical Texture Representation of Asphalt Pavement Distress Images Based on Local Binary Pattern in Spatial and Wavelet Domain
6
Second-order statistics based blind source separation using a bank of subband filters
7
Second-order statistics of the elastic buckling of functionally graded rectangular plates
8
Second-order statistics-based blind equalization of IIR single-input multiple-output channels with common zeros
9
Second-order stiffness matrix and load vector of an imperfect beam-column with generalized end conditions on a two-parameter elastic foundation
10
Second-order stochastic fluid models with fluid-dependent flow rates
11
Second-order Sturm–Liouville problems with asymmetric, superlinear nonlinearities Original Research Article
12
Second-order subdifferentials and convexity of real-valued functions Original Research Article
13
Second-order susceptibility tensor of a monolayer at the liquid–air interface: SHG spectroscopy by compression
14
Second-order sustainability—conditions for the development of sustainable innovations in a dynamic environment
15
Second-order symmetric and self duality in multiobjective programming Original Research Article
16
Second-order symmetric duality in multiobjective programming Original Research Article
17
Second-order symmetric duality with cone constraints
18
Second-order tensorial calibration for kinetic spectrophotometric determination
19
Second-order terminal sliding mode controller for a class of chaotic systems with unmatched uncertainties
20
Second‐order theoretical analysis: a method for constructing theoretical explanation
21
Second-order theory for the effective behavior and field fluctuations in viscoplastic polycrystals
22
Second-order thermodynamic derivative properties of selected mixtures by the soft-SAFT equation of state
23
Second-order time evolution of PN equations for radiation transport
24
Second-order time-accurate and geometrically conservative implicit schemes for flow computations on unstructured dynamic meshes Original Research Article
25
Second-order tracking control for leader–follower multi-agent flocking in directed graphs with switching topology
26
Second-order turbulence closure models for geophysical boundary layers. A review of recent work
27
Second-order type isomorphisms through game semantics
28
Second-order type-changing evolution equations with first-order intermediate equations
29
Second-order variance estimation in poststratified two-stage sampling
30
Second-order Volterra system identification
31
SECOND-ORDER WAVES IN A THREE-DIMENSIONAL WAVE BASIN WITH PERFECTLY REFLECTING SIDEWALLS
32
Second-order, exact charge conservation for electromagnetic particle-in-cell simulation in complex geometry Original Research Article
33
Second-order, three-point, boundary value problems with jumping non-linearities Original Research Article
34
Second-order-accurate discrete ordinates solutions of transient radiative transfer in a scattering slab with variable refractive index
35
Second-order-accurate radiative hydrodynamics and multidimensional protostellar collapse Original Research Article
36
Second-phase assisted formation of {111} twins in barium titanate Original Research Article
37
Second-phase sampling designs for non-stationary spatial variables
38
Second-phase-dependent grain refinement in Ti–25Nb–3Mo–3Zr–2Sn alloy and its enhanced osteoblast response
39
Second-price auction tournament
40
Second-price common-value auctions under multidimensional uncertainty
41
Second-quantized mirror symmetry
42
Seconds cancers après radiothérapie pour séminome testiculaire : à propos de deux cas
43
Second-sphere ‘communication’ between two cis-bound guanine nucleotides. Factors influencing conformations of dynamic adducts of cis-type platinum anticancer drugs with guanine nucleotides as deduced by circular dichroism spectroscopy
44
Second-sphere coordination complex via hydrogen bonding: Synthesis, characterization, X-ray crystal structure determination and packing of hexaamminecobalt(III) chloride di(para-nitrobenzoate)
45
Second-sphere coordination complex via hydrogen bonding: synthesis, characterization and X-ray crystal structure of hexaamminecobalt(III)chloride dimethanesulphonate, [Co(NH3)6]Cl(CH3SO3)2
46
Second-sphere coordination complexes via hydrogen bonding: Synthesis, characterization of [Co(NH3)6](XO3)3·nH2O (X=Br, I) and single crystal X-ray structure determination of [Co(NH3)6](BrO3)3·0.5H2O
47
Second-sphere coordination complexes via hydrogen bonding: Synthesis, spectroscopic characterization, crystal structures and packing of cis-diazidobis(ethylenediamine)cobalt(III) cations with complex fluoroanions
48
Second-sphere coordination in anion binding: Synthesis and characterization of hexaamminecobalt(III) salts [Co(NH3)6](L)3·3H2O and [Co(NH3)6]Cl(L)2, L=(CH3)3C6H2SO3 and X-ray structure determination of [Co(NH3)6]Cl(L)2
49
Second-sphere coordination in anion binding: Synthesis, characterization and X-ray structures of bis(diethylenetriamine)cobalt(III) complexes containing benzoates
50
Second-sphere coordination in hexaamminecobalt(III) salt with organic sulphonate anion: Synthesis, characterisation and X-ray crystal structure of [Co(NH3)6](CH3SO3)3
51
Second-sphere coordination in non-spherical anion binding: Synthesis, characterization and X-ray structure of cis-diazidobis(ethylenediamine)cobalt(III) 2-chloro,5-nitrobenzenesulphonate monohydrate
52
Second-sphere coordination networks: ‘Tame-ing’ (Tame=1,1,1-Tris(aminomethyl)ethane) the hydrogen bond
53
Second-sphere coordination of ‘star’-shaped hexakis(N-pyridin-4-one)benzene (HPOB) with hexakis(methanol)nickel(II) nitrate; unusual (NO3 −)(HPOB)(NO3 −) π-stacked ‘sandwiching’
54
Second-sphere coordination of 5,5-diamino-2,2-bipyridine metal complexes with oxygen ligands through N-H···O hydrogen bonding
55
Second-tier natural antidepressants: Review and critique
56
Second-to-fourth digit length, testosterone and spatial ability
57
Second-to-fourth digit ratio related to Verbal and Numerical Intelligence and the Big Five
58
Second-trimester echogenic bowel and intraamniotic bleeding: Association between fetal bowel echogenicity and amniotic fluid spectrophotometry at 410 nm, ,
59
Second-trimester maternal serum inhibin A concentration as an early marker for preeclampsia,
60
Second-trimester maternal serum marker screening: Maternal serum α-fetoprotein, β-human chorionic gonadotropin, estriol, and their various combinations as predictors of pregnancy outcome
61
Second-trimester plasma homocysteine levels and pregnancy-induced hypertension, preeclampsia, and intrauterine growth restriction
62
Second-trimester prediction of severe placental complications in women with combined elevations in alpha-fetoprotein and human chorionic gonadotrophin
63
Second-trimester uterine evacuation: A comparison of intra-amniotic (15S)-15-methyl-prostaglandin F2α and intravaginal misoprostol, ,
64
Second-trimester vaginal bleeding: Correlation of ultrasonographic findings with perinatal outcome
65
Secoorthosiphols A–C: three highly oxygenated secoisopimarane-type diterpenes from Orthosiphon stamineus
66
Seco-prolinenitrile inhibitors of dipeptidyl peptidase IV define minimal pharmacophore requirements at P1
67
Secrecy and ambiguity: home care for people living with HIV/AIDS in Ghana: Maude Radstake; African Studies Centre, Leiden, 2000, 132pp
68
Secrecy and group creation
69
Secrecy and the development of personal identity—A challenge for parents and teachers in our time
70
Secrecy and transparency of medicines licensing in the EU
71
Secrecy and Utility Regulation
72
Secrecy considerations for conserving Lazarus species
73
Secrecy in research: cooperation and costimulation in immunology
74
Secrecy in the Bush Administration. Downloaded September 14, 2004. Prepared for Representative Henry A. Waxman by the Minority Staff, U.S. House of Representatives Committee on Government Reform, Special Investigations Division http://democrats.reform.hou
75
Secrecy logic: S-secrecy structures
76
Secrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance
77
Secrecy Systems for Identification Via Channels with Additive-Like Instantaneous Block Encipherers
78
Secrecy, two-sided bias and the value of evidence
79
Secrecy: Report of the Commission on Protecting and Reducing Government Secrecy : By Daniel Patrick Moynihan, New York, Chairman. Washington, DC: Government Printing Office, 1997. S.Doc.105-2. 114 p., with appendices. $25.00 (paper). ISBN 0-16-054119-0. L
80
Secret and public key image watermarking schemes for image authentication and ownership verification
81
Secret Component in Organizational Structure: Gender
82
Secret data transmission using advance steganography and image compression
83
Secret image communication scheme based on vector quantization
84
Secret image sharing based on cellular automata and steganography
85
Secret image sharing with smaller shadow images
86
Secret information hiding in image randomly method using steganography and cryptography
87
Secret Ingredients—The Brave New World of Industrial Farming, Stuart Laidlaw. McClelland & Stewart Ltd., Toronto, Canada (2003), ISBN: 0-7710-4595-6
88
Secret instantiation in ad-hoc networks
89
Secret Integrations: Black Humor and the Critique of Whiteness
90
Secret Key Estimation in Sequential Steganography
91
Secret out-of-court settlements in drug-injury cases
92
Secret Sarcoma: A Cardiac Mass Disguised as Influenza
93
Secret science: tobacco industry research on smoking behaviour and cigarette toxicity
94
Secret sets and applications
95
Secret sharing approaches for 3D object encryption
96
Secret sharing based on a hard-on-average problem
97
Secret Sharing Based On Cartesian product Of Graphs
98
Secret sharing schemes for graph-based prohibited structures
99
Secret sharing schemes from binary linear codes
100
Secret Sharing Schemes from Two-Weight Codes
101
Secret sharing schemes on access structures with intersection number equal to one Original Research Article
102
Secret sharing with multi-cover adaptive steganography
103
Secret Signatures Inside Genomic DNA
104
Secret Soldiers: The Story of World War II’s Heroic Army of Deception: Philip Gerard; New York, Dutton, 2002, 400 pp., with indexSlander: Liberal Lies About the American Right: Ann Coulter; New York, Crown Publishers, 256 pp., with indexThe Arts of Decept
105
Secret study: A new concept in continuing professional education
106
Secret swarm unit: Reactive k-secret sharing
107
Secretases as targets for the treatment of Alzheimerʹs disease: the prospects
108
Secreted 70 kDa lumican stimulates growth and inhibits invasion of human pancreatic cancer
109
Secreted acid phosphatase is expressed in cluster roots of lupin in response to phosphorus deficiency
110
Secreted and Placental Membrane Forms of Folate-Binding Protein Occur Sequentially During Pregnancy in Swine
111
Secreted Chemicals From Probiotic Bacteria Potentiate Th1 Pattern of Immune Cells and Apoptosis Induction in Breast Cancer and Gastric Adenocarcinoma Cell Lines
112
Secreted Epididymal Glycoprotein 2D6 That Binds to the Sperms Plasma Membrane Is a Member of the (beta)Defensin Superfamily of Pore-Forming Glycopeptides
113
Secreted expression of pseudozymogen forms of recombinant matriptase in Pichia pastoris
114
Secreted frizzled related protein 1 is a paracrine modulator of epithelial branching morphogenesis, proliferation, and secretory gene expression in the prostate: Joesting MS, Cheever TR, Volzing KG, Yamaguchi TP, Wolf V, Naf D, Rubin JS, Marker PC, Depart
115
SECRETED FRIZZLED-RELATED PROTEIN-4 REGULATES HUMAN VASCULAR SMOOTH MUSCLE CELL PROLIFERATION
116
Secreted phosphatase activity induced by dimethyl sulfoxide in Herpetomonas samuelpessoai
117
Secreted Phospholipases A2 – not just Enzymes
118
Secreted phosphoprotein 1 enhances proliferative self-renewal through PI3K/Akt signaling in skeletal myosphere-derived progenitor cells
119
Secreted transforming growth factor beta2 activates NF-kappaB, blocks apoptosis, and is essential for the survival of some tumor cells: Lu T, Burdelya LG, Swiatkowski SM, Boiko AD, Howe PH, Stark GR, Gudkov AV, Department of Molecular Biology, Lerner Rese
120
Secreted β-amyloid precursor protein activates microglia via JNK and p38-MAPK
121
Secreted β-APP stimulates MAP kinase and phosphorylation of tau in neurons
122
Secretin Controls Anion Secretion in the Rat Epididymisin an Autocrine/Paracrine Fashion
123
Secretin may not be effective in treatment of autism
124
Secretin receptors in the human liver: Expression in biliary tract and cholangiocarcinoma, but not in hepatocytes or hepatocellular carcinoma
125
Secreting Tumor Suppression
126
Secretion and dual regulation between epidermal growth factor and transforming growth factor-β1 in MDA-MB-231 cell line in 42-hour-long cultures
127
Secretion and purification of HCV E1 protein forms as glutathione-S-transferase fusion in the baculovirus insect cell system
128
Secretion and Purification of Recombinant β1-4 Galactosyltransferase from Insect Cells Using pFmel-protA, a Novel Transposition-Based Baculovirus Transfer Vector
129
Secretion Antigens of Mycobacterium tuberculosis:: A Comparison Between a Reference Strain and Seven Wild Isolates
130
Secretion from bacterial versus mammalian cells yields a recombinant scFv with variable folding properties
131
Secretion of 92 kDa gelatinase (MMP-9) by bovine neutrophils
132
Secretion of 92 kDa gelatinase (MMP-9) by bovine neutrophils
133
Secretion of biologically active murine interleukin-10 by Lactococcus lactis
134
Secretion of bladder tumor-derived hyaluronidase activity by invasive bladder tumor cells
135
Secretion of brain natriuretic peptide in patients with aneurysmal subarachnoid haemorrhage
136
Secretion of Cardiac Plasminogen Activator During Hypoxia-induced Right Ventricular Hypertrophy
137
Secretion of Cellobiase Is Mediated via Vacuoles in Termitomyces clypeatus
138
Secretion of estradiol-17β by porcine mammary gland of ovariectomized steroid-treated sows
139
Secretion of gastrin-releasing peptide by retroperitoneal tumors
140
Secretion of gonadotrophins change during the luteal phase of the bovine oestrous cycle in the absence of corresponding changes in progesterone or 17β-oestradiol
141
Secretion of IFN-γ by bovine peripheral blood mononuclear cells stimulated with Mycobacterium bovis protein fractions obtained by isoelectric-focusing
142
Secretion of IFN-γ by bovine peripheral blood mononuclear cells stimulated with Mycobacterium bovis protein fractions obtained by isoelectric-focusing
143
Secretion of IFN-γ, IL-6, Granulocyte-Macrophage Colony-Stimulating Factor and IL-10 Cytokines after Activation of Human Purified T Lymphocytes upon CD38 Ligation
144
Secretion of IGF-1 by ovine granulosa cells: effects of growth hormone and follicle stimulating hormone
145
Secretion of IL-1 and H2O2 by human mononuclear cells in vitro
146
Secretion of inhibin A, inhibin B and inhibin pro-(alpha)C during the oestrous cycle of the golden hamster (Mesocricetus auratus)
147
Secretion of interferon-tau by bovine embryos in long-term culture: comparison of in vivo derived, in vitro produced, nuclear transfer and demi-embryos
148
Secretion of interleukin-17 by CD8 + T cells expressing CD146 (MCAM)
149
Secretion of milk and milk components in sheep
150
Secretion of MIP-1β and MIP-1α by CD8+ T-lymphocytes correlates with HIV-1 inhibition independent of coreceptor usage
151
Secretion of momilactone A from rice roots to the rhizosphere
152
Secretion of Natural and Synthetic Toxic Compounds from Filamentous Fungi by Membrane Transporters of the ATP-binding Cassette and Major Facilitator Superfamily
153
Secretion of Nitrite by Schwann Cells and Its Effect on T-Cell Activationin Vitro
154
Secretion of Platelet-Activating Factor Acetylhydrolase Following Phorbol Ester-Stimulated Differentiation of HL-60 Cells
155
Secretion of preβ HDL increases with the suppression of cholesteryl ester transfer protein in Hep G2 cells
156
Secretion of Prolactin Following Three Dimensional Culture of Human Endometrial Tissue.
157
Secretion of prostaglandins and endothelin-1 by decidual endothelial cells from normal and preeclamptic pregnancies: Comparison with human umbilical vein endothelial cells
158
Secretion of prostate-specific antigen-suppressing activity by two human prostate carcinoma cell lines
159
Secretion of Salmonella-specific antibodies in the oviducts of hens experimentally infected with Salmonella enteritidis
160
Secretion of Salmonella-specific antibodies in the oviducts of hens experimentally infected with Salmonella enteritidis
161
Secretion of the ventral glands in Craesus sawfly larvae
162
Secretion of three enzymes for fatty acid synthesis into mouse milk in association with fat globules, and rapid decrease of the secreted enzymes by treatment with rapamycin
163
Secretion of tissue inhibitors of matrix metalloproteinases by human fetal membranes, decidua and placenta at parturition
164
Secretion of Two β-Fructofuranosidases byAspergillus nigerGrowing in Sucrose
165
Secretion of water soluble pyrroloquinoline quinone glucose dehydrogenase by recombinant Pichia pastoris
166
Secretion of β-glycosidase by middle midgut cells and its recycling in the midgut of Tenebrio molitor larvae
167
Secretion patterns of brain natriuretic peptide and atrial natriuretic peptide in patients with or without pulmonary hypertension complicating atrial septal defect, , ,
168
Secretion polarity of interferon-β in epithelial cell lines
169
Secretion Superfamily ATPases Swing Big
170
Secretion, purification and characterisation of a recombinant Volvariella volvacea endoglucanase expressed in the yeast Pichia pastoris
171
Secretions of Interleukin-1(beta) and Tumor Necrosis Factor (alpha) by Whole Fetal Membranes Depend on Initial Interactions of Amnion or Choriodecidua with Lipopolysaccharides or Group B Streptococci
172
Secretions of stingless bees: cephalic secretions of two Frieseomelitta species
173
Secretions of the interaural gland contain information about individuality and colony membership in the Bechsteinʹs bat
174
Secretive females or swaggering males?: An assessment of the quality of sexual partnership reporting in rural Tanzania
175
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
176
Secret-key agreement over unauthenticated public channels .II. Privacy amplification
177
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
178
Secretome analysis of microarray data reveals extracellular events associated with proliferative potential in a cell line model of breast disease
179
Secretome Analysis Reveals an Arabidopsis Lipase Involved in Defense against Alternaria brassicicola
180
Secretome injection effect on microscopic characteristics of cartilage, synovial membrane and subchondral bone in wistar rat knee osteoarthritis model
181
Secretome of adipose derived-mesenchymal stem cells reduces the Vibrio cholerae attachment to Caco-2 cells and subsequent inflammatory responses
182
Secretome of Aggregated Embryonic Stem Cell-Derived Mesenchymal Stem Cell Modulates the Release of Inflammatory Factors in Lipopolysaccharide-Induced Peripheral Blood Mononuclear Cells
183
Secretome of Aspergillus oryzae in Shaoxing rice wine koji
184
Secretome of human amniotic membrane stem cells promote recovery and testicular functions through modulating SIRT1/NRF2/TNF-α pathway in mice testicular torsion: An experimental study
185
Secretoneurin, a novel neuropeptide, in the human dental pulp
186
Secretory breast cancer in a 7.5-year old boy
187
Secretory breast carcinoma—case report and review of the medical literature
188
Secretory component of immunoglobulin A in maternal serum and the prediction of preterm delivery
189
Secretory component: A potential regulator of endometrial-decidual prostaglandin production in early human pregnancy
190
Secretory Duct Structure and Phytochemistry Compounds of Yellow Latex in Mangosteen Fruit
191
secretory excretory and somatic immunogenic antigens profiles of adult fasciola spp.
192
Secretory expression and characterization of a bile salt hydrolase from Lactobacillus plantarum in Escherichia coli
193
Secretory expression of porcine interferon-gamma in baculovirus using HBM signal peptide and its inhibition activity on the replication of porcine reproductive and respiratory syndrome virus
194
Secretory expression of porcine interferon-gamma in baculovirus using HBM signal peptide and its inhibition activity on the replication of porcine reproductive and respiratory syndrome virus
195
Secretory function of adrenal chromaffin cells cultured on polypyrrole films
196
Secretory group II phospholipase A2 in human atherosclerotic plaques Original Research Article
197
Secretory immunoglobulin A (sIgA) deficiency inserum of patients with GALTectomy (appendectomy and tonsillectomy)
198
Secretory Immunoglobulin A from Healthy Human Mothers Milk Catalyzes Nucleic Acid Hydrolysis
199
Secretory leukocyte protease inhibitor concentration increases in amniotic fluid with the onset of labour in women: characterizati of sites of release within the uterus
200
Secretory leukocyte protease inhibitor: inhibition of human immunodeficiency virus-1 infection of monocytic THP-1 cells by a newly cloned protein
201
Secretory Phospholipase A2-IIA and Cardiovascular Disease: A Mendelian Randomization Study
202
Secretory Production of Recombinant Protein by a High Cell Density Culture of a Protease Negative Mutant Escherichia coli Strain
203
Secretory production of Zymomonas mobilis levansucrase by the methylotrophic yeast Hansenula polymorpha
204
Secretory products from human adipocytes impair endothelial function via nuclear factor κB
205
Secretory Protein Profiling Reveals TNF-α Inactivation by Selective and Promiscuous Sec61 Modulators
206
SECRETORY STRUCTURES ON THE LEAF RACHIS OF CAESALPINIEAE AND MIMOSOIDEAE (LEGUMINOSAE): IMPLICATIONS FOR THE EVOLUTION OF NECTARY GLANDS
207
Secretory type of recombinant thioredoxin h induces ER stress in endosperm cells of transgenic rice
208
Secretory vesicles in live cells are not free-floating but tethered to filamentous structures: A study using photonic force microscopy
209
Secretory vesicles in live cells are not free-floating but tethered to filamentous structures: A study using photonic force microscopy
210
Secretory vesicles in live cells are not free-floating but tethered to filamentous structures: A study using photonic force microscopy
211
Secretory Vesicle-Specific Antibodies in the Confocal Study of Exo–Endocytosis Dynamics
212
SecretP: Identifying bacterial secreted proteins by fusing new features into Chou’s pseudo-amino acid composition
213
Secrets and lies: Breastfeeding and professional paid work
214
Secrets for managing materials budget allocations: A brief guide for collection managers
215
Secrets from friends and parents: Longitudinal links with depression and antisocial behavior
216
Secrets of a Secretase: N-Cadherin Proteolysis Regulates CBP Function
217
Secrets of adaptive support weight techniques for local stereo matching
218
Secrets of Light in Traditional Houses of Iran
219
Secrets of planning a good meeting
220
Secrets of RNA folding revealed
221
Secrets of success: assessing the large increases in transit ridership achieved by Houston and San Diego transit providers
222
Secrets of the code: Do vascular endothelial cells use ion channels to decipher complex flow signals?
223
Secrets to shield or share? new dilemmas for military R&D policy in the digital age
224
Secrets to Su Shi’s Happiness under Any Circumstances: Transcending and a Positive Perspective
225
Secrets to the successful Hungarian bank privatization: the benefits of foreign ownership through strategic partnerships
226
SECʹs insider trading enforcements and target firmsʹ stock values
227
SECʹs OK of Southernʹs Asia buy is challenged on appeal
228
Sectarian Conflicts: A dominant threat to Pakistan’s Internal Security
229
Sectarian landscape, Madrasas and Militancy in Punjab
230
Secteurs psychiatriques et circuits de lʹinformation en matière de précarité
231
Section 1. New Detectors Spawn New Fields
232
Section 1. New Detectors Spawn New Fields
233
Section 10. Electronic cooling
234
Section 10. Electronic cooling
235
Section 11. Cryostat for LTD
236
Section 11. Cryostat for LTD
237
Section 12. STJ physics
238
Section 12. STJ physics
239
Section 13. TES and calorimeter physics
240
Section 13. TES and calorimeter physics
241
Section 14. X-ray material analysis
242
Section 14. X-ray material analysis
243
Section 15. Novel industrial and laboratory applications
244
Section 15. Novel industrial and laboratory applications
245
Section 16. Analysis in the life sciences
246
Section 16. Analysis in the life sciences
247
Section 17. Signal read-out and processing
248
Section 17. Signal read-out and processing
249
Section 2. Neutrino physics
250
Section 2. Neutrino physics
251
Section 2: technology and process changes in the mining industry
252
Section 3. The research for dark matter
253
Section 3. The research for dark matter
254
Section 4. TES and calorimetric technology
255
Section 4. TES and calorimetric technology
256
Section 404 of the Sarbanes-Oxley act and its capital market effects
257
Section 5. Detector Fabrication
258
Section 5. Detector Fabrication
259
Section 6. Imaging
260
Section 6. Imaging
261
Section 7. Large arrays
262
Section 7. Large arrays
263
Section 8. Novel type detectors
264
Section 8. Novel type detectors
265
Section 9. Astronomy from microwave to gamma-rays
266
Section 9. Astronomy from microwave to gamma-rays
267
Section analysis of industrial sheet-metal stamping processes
268
Section capacity of very high strength (VHS) circular tubes under compression
269
Section I. Energy recovering linacs: General aspects
270
Section I. Energy recovering linacs: General aspects
271
Section II. Electron guns and injector designs
272
Section II. Electron guns and injector designs
273
Section III. Optics and beam transport
274
Section III. Optics and beam transport
275
Section IV. Superconducting RF and RF control
276
Section IV. Superconducting RF and RF control
277
Section modulus of corner joints in furniture frames as engineering design criteria for their efficient construction
278
Section moment capacity tests of LiteSteel beams
279
Section slenderness limits of very high strength circular steel tubes in bending
280
Section Theorems on H-Spaces with Applications
281
Section thickness, macrohardness and yield strength in high-pressure diecast magnesium alloy AZ91
282
Section V. Synchronization, diagnostics and instrumentation
283
Section V. Synchronization, diagnostics and instrumentation
284
Section VI. Summary reports
285
Section VI. Summary reports
286
Sectionable terraces and the (generalised) Oberwolfach problem Original Research Article
287
Sectional Analysis of Pendentive Dome Mosques During Ottoman Era
288
Sectional anatomic and tomographic study of the feline abdominal cavity for obtaining a three-dimensional vascular model
289
Sectional anatomy quiz
290
Sectional Anatomy Quiz - V
291
Sectional Anatomy Quiz - VI
292
Sectional Anatomy Quiz - VII
293
Sectional Anatomy Quiz – VIII
294
Sectional Anatomy Quiz II
295
Sectional Anatomy Quiz- III
296
Sectional Anatomy Quiz IV
297
Sectional Anatomy Quiz–IΧ
298
Sectional and discrete representations of floc breakage in agitated suspensions
299
Sectional curvature bounds in gravity: regularisation of the Schwarzschild singularity Original Research Article
300
SECTIONAL CURVATURE OF TIMELIKE RULED SURFACE PART I: LORENTZIAN BELTRAMI-EULER FORMULA
301
Sectional finite element analysis of coupled deformation between elastoplastic sheet metal and visco-elastoplastic body
302
Sectional finite element analysis of forming processes for aluminum-alloy sheet metals
303
Sectional finite element analysis of forming processes for aluminum-alloy sheet metals
304
Sectional finite element analysis of forming processes for aluminum-alloy sheet metals
305
Sectional Fixed Orthodontic Extrusion Technique in Management of Teeth with Complicated Crown-Root Fractures: Report of Two Cases
306
SECTIONAL LIFT FORCES FOR AN OSCILLATING CIRCULAR CYLINDER IN SMOOTH AND TURBULENT FLOWS
307
SECTIONAL MANDIBULAR COMPLETE DENTURE FOR A TOTAL MAXILLECTOMY PATIENT WITH TRISMUS: A CLINICAL REPORT
308
Sectional model investigation at high Reynolds number for a super tall building
309
Sectional moving window factor analysis for diagnosing elution chromatographic patterns
310
Sectional power-law correction for the accurate determination of lutetium by isotope dilution multiple collector-inductively coupled plasma-mass spectrometry
311
Sectional Warping Corrective Model for Free Edge Stresses in Composite Laminates
312
Sectional-curvature preserving skinning surfaces Original Research Article
313
SectionBuilder: An innovative finite element tool for analysis and design of composite rotor blade cross-sections
314
Section-dependent microstructure and mechanical properties of rapidly solidified and extruded Al–20Si alloy
315
Section-retraction-pairs between fuzzy domains
316
Sections and elections – Reflections on the early 2008 U.S. presidential primaries
317
Sections and Lacunary Sums of Linearly Recurrent Sequences
318
Sections of convex bodies and splitting problem for selections
319
Sections of maps with fibers homeomorphic to a two-dimensional manifold
320
Sections of Serre fibrations with 2-manifold fibers
321
Sections, selections and Prohorovʹs theorem
322
Sector analysis for a FTSE portfolio of stocks
323
Sector collapse of the SW flank of Volcán de Colima, México: The 3600 yr BP La Lumbre–Los Ganchos debris avalanche and associated debris flows
324
Sector collapses and large landslides on Late Pleistocene–Holocene volcanoes in Kamchatka, Russia
325
Sector field inductively coupled plasma mass spectrometry, another tool for plutonium isotopes and plutonium isotope ratios determination in environmental matrices
326
Sector imaging radar for enhanced vision
327
Sector modeling for the prediction and evaluation of Cretan olive oil
328
Sector multipad prototype of the FMD-MCP detector for ALICE
329
Sector multipad prototype of the FMD-MCP detector for ALICE
330
Sector review of UK higher education energy consumption
331
Sector strength and efficiency on developed and emerging financial markets
332
Sectoral adjustment costs and real exchange rate dynamics in a two-sector dependent economy
333
Sectoral analysis for international technology development and transfer: Cases of coal-fired power generation, cement and aluminium in China
334
Sectoral analysis of calendar effects in Malaysia: Post financial crisis (1998-2008)
335
Sectoral analysis of the causal relationship between electricity consumption and real output in Pakistan
336
Sectoral and geographical contributions to summertime continental United States (CONUS) black carbon spatial distributions
337
Sectoral and macroeconomic impacts of the large combustion plants in Poland: A general equilibrium analysis
338
Sectoral and regional impacts of the European carbon market in Portugal
339
Sectoral CO2, CH4, N2O and SO2 emissions from fossil fuel consumption in Nagpur City of Central India
340
Sectoral collaboration in biomedical research and development
341
Sectoral Contributions to Total Factor Productivity: Another Perspective on the Growth Slowdown
342
Sectoral crediting mechanism: How far China has to go
343
Sectoral dynamics and natural resource management
344
Sectoral emission inventories of greenhouse gases for 1990 on a per country basis as well as on 1°×1°
345
Sectoral energy consumption by source and economic growth in Turkey
346
Sectoral energy consumption in Iran
347
Sectoral energy consumption in Turkey
348
Sectoral Evaluation of EIA Practice in the Sudan
349
Sectoral Evaluation on the Relationship of Knowledge Management and Organizational Wisdom: Example of Metals and Machinery Sectors
350
Sectoral Innovation Systems in Low-tech Manufacturing: Types, Sources, Drivers and Barriers of Innovation in Malaysia’s Wooden Furniture Industry
351
Sectoral interactions in the Scottish coastal zone: Measuring sustainability in theory and practice
352
Sectoral investment in health: Prescription or principles?
353
Sectoral output trends and cycles in Victorian Britain
354
Sectoral patterns of small firm innovation, networking and proximity
355
Sectoral Phillips curves and the aggregate Phillips curve
356
Sectoral price data and models of price setting
357
Sectoral price data and models of price setting
358
Sectoral price rigidity and aggregate dynamics
359
Sectoral Restructuring and Labor Mobility: A Comparative Look at the Czech Republic
360
Sectoral shifts and structural change in the Japanese economy: Evidence and interpretation
361
Sectoral shifts and the mobility of displaced workers: When are microdata useful?
362
Sectoral Shocks and Metropolitan Employment Growth
363
Sectoral shocks and movement costs: Effects on employment and welfare
364
Sectoral shocks, human capital, and displaced workers
365
Sectoral Solow residuals
366
Sectoral sources of metropolitan growth
367
Sectoral spillovers and the price of land: a cost analysis
368
Sectoral strategic differences of technological development between electronics and chemistry: a historical view from analyses of Korean-invented US patents during the period of 1989–1992
369
Sectoral systems of innovation and production
370
Sectoral thermal emitter for testing of modern IR systems
371
Sectoral trends in global energy use and greenhouse gas emissions
372
SectoralPhillipscurvesandtheaggregatePhillipscurve
373
Sectorial operators and normalized numerical range Original Research Article
374
Sectorisation psychiatrique : évolution et perspectivesPsychiatric sectorization. Evolution and perspectives
375
Sectors expressing the homeobox gene liguleless3 implicate a timedependent mechanism for cell fate acquisition along the proximaldistal axis of the maize leaf : Muehlbauer GJ, Fowler JE, Freeling PMa:g PDersee v9ve3ile-o9wp4 m en tP 1D9F9 7(3,
376
Sectors of solutions in three-dimensional gravity and black holes Original Research Article
377
Sector-zoned augite megacrysts in Aleutian high alumina basalts: implications for the conditions of basalt crystallization and the generation of calc-alkaline series magmas
378
Secu’amamines E–G, new alkaloids from Securinega suffruticosa var. amamiensis
379
Secuʹamamine A, a novel indolizidine alkaloid from Securinega suffruticosa var. amamiensis
380
Secular and Koranic literacies in South Asia: From colonisation to contemporary practice
381
Secular and seasonal variation of length and weight at birth
382
Secular apocalyptic and Thomas Hardy
383
Secular apsidal configuration of non-resonant exoplanetary systems
384
Secular change in characteristics of thyristors used in HVDC valve
385
Secular change in northwestern Tethyan water-mass oxygenation during the late Hauterivian–early Aptian
386
Secular changes at the Earthʹs surface; evidence from palaeosols, some sedimentary rocks, and palaeoclimatic perturbations of the Proterozoic Eon
387
Secular changes in disability among middle-aged and elderly finns with and without coronary heart disease from 1978–1980 to 2000–2001
388
Secular changes in geologic and tectonic processes
389
Secular changes in sedimentation systems and sequence stratigraphy
390
Secular changes in the relation between social factors and depression: A study of two birth cohorts of Swedish septuagenarians followed for 5 years
391
Secular Changes of Anthropometric Parameters in Newborns from Gracanica Area in the Period from 1998 to 2008
392
Secular changes of the M tide in the Gulf of Maine
393
Secular cooling and thermal structure of continental lithosphere
394
Secular declines in cognitive test scores: A reversal of the Flynn Effect
395
Secular dynamics of the three-body problem: application to the υ Andromedae planetary system
396
Secular Effects on Orbits of Binary Stars Induced by Temporal Variation of Gravitational Constant (Case for Elliptical Orbit)
397
Secular environmental precursors to Early Toarcian (Jurassic) extreme climate changes
398
Secular evolution of the Neoproterozoic lithospheric mantle underneath the northern margin of the Yangtze Block, South China
399
Secular geochemical variations of the Lower Cretaceous siliciclastic rocks from central Tibet (China) indicate a tectonic transition from continental collision to back-arc rifting
400
Secular glacier mass balances derived from cumulative glacier length changes
401
Secular growth estimates for hyperbolic systems
402
Secular improvement in self-care independence of old people living in community in Kahoku, Japan
403
Secular increase of F2 peak altitude at northern temperate latitudes Original Research Article
404
Secular Increases in Body Fat Percentage in Male Children of Zaragoza, Spain, 1980–1995
405
Secular Law and Custom in Ducal Normandy, c. 1000–1144
406
Secular light curve of 2P/Encke, a comet active at aphelion
407
Secular light curve of comet 103P/Hartley 2, target of the EPOXI mission
408
Secular light curve of Comet 28P/Neujmin 1 and of spacecraft target Comets 1P/Halley, 9P/Tempel 1, 19P/Borrelly, 21P/Giacobinni–Zinner, 26P/Grigg–Skjellerup, 67P/Churyumov–Gerasimenko, and 81P/Wild 2
409
Secular light curve of Comet 28P/Neujmin 1 and of spacecraft target Comets 1P/Halley, 9P/Tempel 1, 19P/Borrelly, 21P/Giacobinni–Zinner, 26P/Grigg–Skjellerup, 67P/Churyumov–Gerasimenko, and 81P/Wild 2
410
Secular light curve of Comet 9P/Tempel 1
411
Secular light curve of Comet 9P/Tempel 1
412
Secular light curves of comets
413
Secular light curves of comets, II: 133P/Elst–Pizarro, an asteroidal belt comet
414
Secular oscillations in the carbonate mineralogy of reef-building and sediment-producing organisms driven by tectonically forced shifts in seawater chemistry
415
Secular spin dynamics of inner main-belt asteroids
416
Secular stability and reliability of measurements of the percentage of dense tissue on mammograms
417
Secular stability and total stability Original Research Article
418
Secular State, Citizenship and the Matrix of Globalized Religious Identity
419
Secular Trend in Thinness Prevalence for 26 Years (1989 - 2014) among High School Runners in Japan
420
Secular trend of academician aging
421
Secular Trend of Birth Height and Weight in a Population of Iranian Neonates during 1991 and 2011
422
Secular Trend of Menopausal Age and Related Factors among Tehrani Women Born from 1930 to 1960; Tehran Lipid and Glucose Study
423
Secular trends and seasonality in first-time hospitalization for acute myocardial infarction—a Danish population-based study
424
Secular Trends and Socioeconomic Differentials in Menarcheal Age for South Korean Women
425
Secular Trends in Alcohol Consumption over 50 Years: The Framingham Study
426
Secular trends in bloodstream infection caused by antimicrobial-resistant bacteria in New Jersey hospitals, 1991 to 1995
427
Secular trends in cancer mortality, California 1970–1998
428
Secular trends in cardiovascular disease mortality, incidence, and case fatality rates in adults in the United States
429
Secular trends in cognitive test performance: Swedish conscript data 1970–1993
430
Secular trends in coronary heart disease mortality, hospitalization rates, and major cardiovascular risk factors in Taiwan, 1971–2001
431
SECULAR TRENDS IN GROWTH AMONG SCHOOL CHILDREN OF SHIRAZ (SOUTHERN IRAN) BORN IN THE POST-WAR PERIOD
432
Secular trends in leisure-time physical activity in men and women across four decades
433
Secular trends in mortality associated with new therapeutic strategies in surgical critical illness
434
Secular trends in mortality by stroke subtype in the 20th century: a retrospective analysis
435
Secular Trends in Nosocomial Bloodstream Infections in a 55-Bed Cardiothoracic Intensive Care Unit
436
Secular Trends in Overweight and Obesity among Urban Children in Guangzhou China, 2007-2011
437
Secular trends in prevalence of diabetes among younger patients admitted with acute myocardial infarction
438
Secular trends in stroke mortality and early-life environment
439
Secular trends in the geologic record and the supercontinent cycle
440
Secular trends in the melting depths of mantle plumes: Evidence from HFSE/REE systematics of Archean high-Mg lavas and modern oceanic basalts
441
Secular trends in the national prevalence of overweight and obesity during 2007-2009 in 6-year-old Iranian children
442
Secular trends in the physical performance of Australian school children
443
Secular trends in the prevalence of atrial fibrillation: The Framingham study
444
Secular Trends of Global Burden of Violence, 1990–2015: In Spite of Successes, Women and Children Are Highly Affected in Low- and the Middle-Income Countries
445
Secular trends of heart failure among US male physicians
446
Secular trends of motor vehicle mortality in the United States, 1910–1994
447
Secular values and the location of religion: A spatial analysis of an English medical centre
448
Secular variation in carbon uptake into the ocean crust
449
Secular variation in Mexico during the last 40,000 years
450
Secular variation in numerical geodynamo models with lateral variations of boundary heat flow
451
Secular variation in Permian red beds from Dôme de Barrot, SE France
452
Secular variation in Permian red beds from Dôme de Barrot, SE France
453
Secular variation in Phanerozoic marine biocalcification and the original mineralogy and mode of calcification of receptaculitids: a discussion
454
Secular variation in Phanerozoic marine biocalcification and the original mineralogy and mode of calcification of receptaculitids: a reply
455
Secular variation of Nd and Pb isotopes in ferromanganese crusts from the Atlantic, Indian and Pacific Oceans
456
Secular variation of the geomagnetic field intensity during the past 2000 years in Japan
457
Secular variation study from non-welded pyroclastic deposits from Montagne Pelée volcano, Martinique (West Indies)
458
Secular variations in magmatism during a continental arc to post-arc transition: Plio-Pleistocene volcanism in the Lake Tahoe/Truckee area, Northern Sierra Nevada, California
459
Secular variations of carbon and helium isotopes at Izu-Oshima Volcano, Japan
460
Secular variations of helium and carbon isotopes at Galeras volcano, Colombia
461
Secular variations of OH nightglow emission and of the OH intensity-weighted temperature induced by gravity–wave forcing in the MLT region Original Research Article
462
Secular variations of the Earthʹs apparent resistivity
463
Secular vs. Sacred Paradigms in Science, Technology, and Economics: Crises of the Enlightenment and Search for an Alternative Paradigm
464
Secular, episodic changes in stable carbon isotope composition of crude oils
465
Secundum ASD closure using a right lateral minithoracotomy: Five-Year experience in 122 patients
466
Secundum Atrial Septal Defect
467
Secundum atrial septal defect is a dynamic three-dimensional entity,
468
Secur(e/ity) Management: A Continuing Uphill Climb
469
Secure acknowledgment aggregation and multisignatures with limited robustness
470
Secure agent data integrity shield
471
Secure and Defensive High Self-Esteem
472
Secure and Efficient Image Hiding Method and Model for Digital Content Access Control
473
Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks
474
Secure and Fast Aggregation of Financial Data in Cloud-Based Expense Tracking Applications
475
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm
476
Secure and lightweight advertising on the Web
477
Secure and Low-Area Implementation of the AES Using FPGA
478
Secure and optimal operation of a power generation and transmission system-application to the Moroccan system
479
Secure and scalable many-to-one symbol transmission for sensor networks
480
Secure Arithmetic Coding
481
Secure Arithmetic Coding with Error Detection Capability
482
Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks
483
Secure authentication system that generates seed from biometric information
484
Secure automated request processing software for DataGrid certification authorities
485
Secure automated request processing software for DataGrid certification authorities
486
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
487
Secure biometric template generation for multi-factor authentication
488
Secure Bit: Transparent, Hardware Buffer-Overflow Protection
489
Secure broadcasting in large networks
490
Secure brokerage mechanisms for mobile electronic commerce
491
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves
492
Secure chaotic system with application to chaotic ciphers
493
Secure Coding Guidelines — Python
494
Secure Collaborative Spectrum Sensing for Distributed Cognitive Radio Networks
495
Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
496
Secure collaborative supply chain planning and inverse optimization – The JELS model
497
Secure communication by chaotic synchronization: Robustness under noisy conditions
498
Secure communication for electronic business applications in mobile agent networks
499
Secure Communication in Shotgun
500
Secure communication protocols with discrete nonlinear chaotic maps
501
Secure communication via multiple parameter modulation in a delayed chaotic system
502
Secure communication via parameter modulation in a class of chaotic systems
503
Secure communications based on the synchronization of the hyperchaotic Chen and the unified chaotic systems
504
Secure Communications in Group-based Wireless Sensor Networks
505
Secure communications of chaotic systems with robust performance via fuzzy observer-based design
506
Secure computation with horizontally partitioned data using adaptive regression splines
507
Secure computation with horizontally partitioned data using adaptive regression splines
508
Secure construction of k-unlinkable patient records from distributed providers
509
Secure content access and replication in pure P2P networks
510
Secure data aggregation without persistent cryptographic operations in wireless sensor networks
511
Secure digital communication using controlled projective synchronisation of chaos
512
Secure digital communication using discrete-time chaos synchronization
513
Secure distributed constraint satisfaction: reaching agreement without revealing private information Original Research Article
514
Secure distributed intelligent networks
515
Secure domination critical graphs
516
Secure dynamic anycasting for ‘best’ server selection using active networks
517
Secure dynamic fragment and replica allocation in large-scale distributed file systems
518
Secure Dynamic Interactive Blood Bank based on Cognitive Computing
519
Secure E-Mail Messaging to Selected Group Members Using PGP Technique
520
SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC
521
Secure emergency communication of cellular phones in ad hoc mode
522
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
523
Secure energy supply in 2025: Indonesiaʹs need for an energy policy strategy
524
Secure Environment via Prediction of Software Vulnerabilities-Severity
525
Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)
526
Secure Flow: a totally integrated transportation security system
527
Secure FPGA Design by Filling Unused Spaces
528
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
529
Secure from Rash Assault: Sustaining the Victorian Environment
530
Secure group communication in wireless mesh networks
531
Secure Group Communication Using Multicast Key Distribution Scheme in Ad hoc Network (SGCMKDS)
532
Secure group communications using key graphs
533
Secure group key agreement protocol based on chaotic Hash
534
Secure group key management for storage area networks
535
Secure hosts auto-configuration in mobile ad hoc networks
536
Secure Image Data by Double encryption
537
Secure implementation experiments: Do strategy-proof mechanisms really work?
538
Secure Implementation of Channel Abstractions
539
Secure Internet management by delegation
540
Secure interoperation design in multi-domains environments based on colored Petri nets
541
Secure IoT Resources with Access Control over RESTful Web Services
542
Secure IP over Satellite DVB Using Chaotic Sequences
543
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
544
Secure Key Management Scheme for Hierarchical Network Using Combinatorial Design
545
Secure localization with phantom node detection
546
Secure Location Verification Using Radio Broadcast
547
Secure many-to-one symbol transmission for implementation on smart cards
548
Secure Marketing Website
549
Secure mechanical verification of mutually recursive procedures
550
Secure median computation in wireless sensor networks
551
Secure medical image communication using ROI based lossless watermarking and novel digital signature
552
Secure Message Broadcasting in VANET Using RSU based Authentication and Cascade Encryption
553
Secure message transmission in mobile ad hoc networks
554
Secure Method for Software Upgrades for Implantable Medical Devices
555
Secure Mobile Architecture (SMA) – A way to fix the broken Internet
556
Secure mobile business applications – framework, architecture and implementation
557
SECURE MONOPHONIC DOMINATION NUMBER OF SUBDIVISION OF GRAPHS
558
Secure multicast in dynamic environments
559
Secure multi-party computation made simple Original Research Article
560
Secure multiplication of shared secrets in the exponent
561
Secure neighbor discovery and wormhole localization in mobile ad hoc networks
562
Secure network for beamline control
563
Secure network for beamline control
564
Secure Optical Data Storage with Random Phase Key Codes by use of a Configuration of a Joint Transform Correlator
565
Secure Outsourcing of Two Standard Identity-Based Cryptosystems
566
Secure P2P Data Storage andMaintenance
567
Secure Payment in E-commerce: Deal with Keyloggers and Pishings.
568
Secure performance enhancing proxy: To ensure end-to-end security and enhance TCP performance over IPv6 wireless networks
569
Secure position-based routing protocol for mobile ad hoc networks
570
Secure probabilistic location verification in randomly deployed wireless sensor networks
571
Secure Protocols or How Communication Generates Correlation
572
Secure public-key encryption scheme without random oracles
573
Secure quantum report with authentication based on GHz states and entan-glement swapping
574
Secure query processing against encrypted XML data using Query-Aware Decryption
575
Secure reliable multicast protocols in a WAN
576
Secure remote user access over insecure networks
577
Secure routing in mobile wireless ad hoc networks
578
Secure routing in wireless sensor networks: attacks and countermeasures
579
Secure SCADA communication by using a modified key management scheme
580
Secure semi-blind watermarking based on iteration mapping and image features
581
Secure Sensitive Data Sharing on a Big Data Platform
582
Secure sensor networks for perimeter protection
583
Secure Service Discovery based on Trust Management for ad-hoc Networks1
584
Secure shared data-space coordination languages: A process algebraic survey
585
Secure Signature Protocol
586
Secure Signature Protocol
587
Secure Software Engineering: A New Teaching Perspective Based on the SWEBOK
588
Secure spread spectrum watermarking for multimedia
589
Secure Spread: An Integrated Architecture for Secure Group Communication
590
Secure Style, PWB-related Gratitude and SWB-related Engagement as Predictors of Affect Balance among Social Science Students in Malaysia: A Pilot Study
591
Secure synchronization of a class of chaotic systems from a nonlinear observer approach
592
Secure Text Message in Audio Using LSB Based Steganography
593
Secure the volume: Vertical geopolitics and the depth of power
594
Secure threshold multi authority attribute based encryption without a central authority
595
Secure tightening of a CMC fastener for the heat shield of re-entry vehicles
596
Secure Transmission for Nano-Memories using Fault Secure Encoder and Decoder
597
Secure trust delegation for sharing patient medical records in a mobile environment
598
Secure untraceable off-line electronic cash system
599
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Technology
600
SECURE WATERMARKING BASED ON SVD AND WAVELETS
601
Secure Web Development Based on Vulnerabilities
602
Secure web-based invocation of large-scale plasma simulation codes Original Research Article
603
Secured Access Control in Security Information and Event Management Systems
604
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors
605
Secured debt and the likelihood of reorganization
606
Secured Encryption - Concept and Challenge
607
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
608
Secured operating regions of Slotted ALOHA in the presence of interfering signals from other networks and DoS attacking signals
609
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive DSR for Secured Route Discovery
610
Secured Requirement Specification Framework ( RSF)
611
Secured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks
612
Secured Toll Surveillance System through Combination of KNN, Outguess and DES
613
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud
614
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
615
Securin depletion sensitizes human colon cancer cells to fisetin-induced apoptosis
616
Securin Is Required for Chromosomal Stability in Human Cells
617
Securing a distributed environment — A practical case study
618
Securing access to drylands resources for multiple users in Africa: A review of recent research
619
Securing bulk content almost for free
620
Securing Clusterheads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
621
Securing credit card transactions with one-time payment scheme
622
Securing decent work and living conditions in low-income urban settlements by linking social protection and local development: A review of case studies
623
Securing Designs against Scan-Based Side-Channel Attacks
624
Securing Digital Content
625
Securing digital signatures for non-repudiation
626
Securing distributed adaptation
627
Securing DNA Information from Selective Attacks on Humans
628
Securing DSR with mobile agents in wireless ad hoc networks
629
Securing energy equity
630
Securing future ATM-conceptsʹ safety by measuring situation awareness in ATC
631
Securing fuzzy vault schemes through biometric hashing
632
Securing graduate commitment: an exploration of the comparative expectations of placement students, graduate recruits and human resource managers within the hospitality, leisure and tourism industries
633
Securing high resolution grayscale facial captures using a blockwise coevolutionary GA
634
SECURING INTERPRETABILITY OF FUZZY MODELS FOR MODELING NONLINEAR MIMO SYSTEMS USING A HYBRID OF EVOLUTIONARY ALGORITHMS
635
Securing knowledge in organizations: lessons from the defense and intelligence sectors
636
Securing life through technology acceptance: The first six months after transvenous internal cardioverter defibrillator implantation
637
Securing lower costs for the present and future
638
Securing MDSplus in a multi-organisation environment
639
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
640
SECURING NETWORK TRAFFIC USING GENETICALLY EVOLVED TRANSFORMATIONS
641
Securing Networks with Convolutional Long Short-term Memory Based Traffic Prediction and Attention Mechanism for Intrusion Detection
642
Securing oil and gas infrastructure
643
Securing PCs and data in libraries and schools : by Allen C. Benson. New York, NY: Neal-Schuman Publishers, Inc., 1997. 252p. $125.00 (book and CD-ROM). ISBN 1-55570-321-6
644
Securing Preservation Funds: National and Institutional Requirements
645
Securing privacy at work: the importance of contextualized consent
646
Securing quality and equity in education: Lessons from PISA
647
Securing recompense under nuisance law for crop damages from pesticide applications Original Research Article
648
Securing Reliability Constrained Technology Combination for Isolated Micro-Grid Using Multi-Agent Based Optimization
649
Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure
650
Securing reproductive rights
651
Securing reproductive rights
652
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
653
Securing Safe Plasma for Fractionation the Duty of any Country
654
Securing sensor networks: A novel approach that combines encoding, uncorrelation and node disjoint transmission
655
Securing services in nomadic computing environments
656
Securing the Critical IP Infrastructure
657
Securing the future by remembering the past: But just when does this past and future begin to develop?
658
Securing the Future of Ground Water Resources in the Great Lakes Basin
659
Securing the future: the transfusion of physicians overseas
660
Securing the nation against terrorism
661
Securing the operational reliability of an autonomous mini-submarine
662
Securing the operational reliability of an autonomous mini-submarine
663
Securing the Shell — Implementing a Host Level Default Deny Policy
664
Securing the volume/volumen: Comments on Stuart Eldenʹs Plenary paper ‘Secure the volume’
665
Securing Water Distribution Systems Using Online Contamination Monitoring
666
Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme
667
Securiosides A and B, novel acylated triterpene bisdesmosides with selective cytotoxic activity against M-CSF-stimulated macrophages
668
Sécurisation de l’activité de radiothérapie bi-site dans le cadre de la reprise des traitements au centre hospitalier d’Épinal par l’équipe du centre Alexis-Vautrin de Nancy
669
Sécurité des traitements en radiothérapie externe
670
Sécurité en curiethérapie
671
Sécurité en radiothérapie : le contrôle des logiciels et des systèmes informatiques
672
Sécurité en radiothérapie : résultats de trois ans d’expérience avec la Mission nationale d’expertise et d’audits hospitalier (MEAH)
673
Sécurité et transparence: Au cœur de la culture des oncologues radiothérapeutes
674
Securities legislation and the accounting profession in the 1930s: The rhetoric and reality of the American Dream
675
Securities lending, shorting, and pricing
676
Securities Price Consequences of the Private Securities Litigation Reform Act of 1995 and Related Events
677
Securitisation and the bank lending channel
678
Securitising Threats without the State: A casestudy of misgovernance as a security threat inBangladesh
679
Securitization and distressed loan renegotiation: Evidence from the subprime mortgage crisis
680
Securitization markets and central banking: An evaluation of the term asset-backed securities loan facility
681
Securitization of catastrophe mortality risks
682
Securitization of energy supply chains in China
683
Securitization of Migration in Europe: Critical Reflections on Turkish Migration Practices
684
Securitization of motor insurance loss rate risks
685
Securitization trumps competition
686
Securitization without adverse selection: The case of CLOs
687
Securitization without risk transfer
688
Securitization, structuring and pricing of longevity risk
689
Securitization: a state attorney generalʹs perspective
690
SECURITIZATION: EVALUTION FROM LEGAL LEGITIMACY TO POLITICAL LEGITIMACY COPENHAGEN SCHOOL
691
Securitizationmarketsandcentralbanking:Anevaluationofthe term asset-backedsecuritiesloanfacility
692
Securitized Transition Costs: Rethinking Who Wins and Who Loses
693
Securitizing and tranching longevity exposures
694
Security adoption and influence of cyber-insurance markets in heterogeneous networks
695
Security Agents Public Perception in Nigeria: A Study on the Police and the Vigilante (Neighborhood Watch)
696
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks
697
Security Analysis and Improvement of Wei-Chi Ku and Yi-Han Chen’s RFID protocol
698
Security Analysis Method of Recognition-based Graphical Password
699
Security analysis of a chaos-based image encryption algorithm
700
Security Analysis of a Hash-Based Secret Sharing Scheme
701
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
702
Security analysis of chaotic communication systems based on Volterra–Wiener–Korenberg model
703
Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking
704
Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati
705
Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati
706
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
707
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN
708
Security analysis of the SCO-family using key schedules
709
Security Analysis of Three Password Authentication Schemes
710
Security Analysis of Two Lightweight Certificateless Signature Schemes
711
Security and climate change
712
Security and coordination in a clandestine organization
713
Security and Crime Prevention in Academic Libraries: A Case Study of the Kano State College of Education, Kano, Nigeria
714
Security and Data Privacy of Medical Information in Blockchain Using Lightweight Cryptographic System
715
Security and Fault aware Scheduling in Computational Grid
716
Security and Feasibility of Laparoscopic Rectal Cancer Resection in Morbidly Obese Patients
717
Security and Management of Local Computer Data
718
Security and Maximal Tolerated Doses of Fluvastatin In Pediatric Cancer Patients
719
SECURITY AND PEACE MECHANISMS FOR GOOD GOVERNANCE IN NIGERIA: ISLAMIC PARADIGM SHIFTS
720
Security and potential level preferences with thresholds
721
Security and privacy analysis based on Internet of Things in the fourth industrial generation (Industry 4.0)
722
Security and Privacy Challenges in the Internet of Things
723
Security and Privacy Challenges in Vehicular Cloud Computing
724
Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6
725
Security and privacy for storage and computation in cloud computing
726
Security and privacy in sensor networks
727
Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks
728
Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes
729
Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays
730
Security and revenue reconciliation in optimal transmission pricing
731
Security and risks in travel and tourism
732
Security and Software Architectures
733
Security and stability control system for offshore platforms power grid
734
Security and the digital library: a look at authentication and authorization issues
735
Security and the problem of context: a hermeneutical critique of securitisation theory
736
Security and tolerable risk for hydrogen service stations
737
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
738
Security applications of peer-to-peer networks
739
Security Architecture in the Persian Gulf: A Comprehensive Appraisal
740
Security architecture testing using IDS—a case study
741
Security Arrangements of the Persian Gulf and the Strategic Competition of Iran and USA
742
Security Assessment of Web Based Distributed Applications
743
Security Assurance: An Authentication Initiative by Checklist
744
Security Barrier Design
745
Security bid/ask dynamics with discreteness and clustering: Simple strategies for modeling and estimation
746
Security boundary visualization for systems operation
747
Security broker for multimedia wireless LANs
748
Security Challenges in Android mHealth Apps Permissions: A Case Study of Persian Apps
749
Security Challenges in Cloud Storage
750
Security Challenges in wireless sensor networks
751
Security classification reviews and the search for reform
752
Security concepts for the dynamics of autonomous vehicle networks
753
Security Concerns in IP-Based Telephony: Covering TIPHON as a Case Study
754
Security concerns in the Middle East for oil supply: Problems and solutions
755
Security considerations for broadcast systems
756
Security considerations for the spiral development model
757
Security considerations in ad hoc sensor networks
758
Security considerations in outsourcing IT services
759
Security considerations in the use of biometric devices
760
Security constrained economic dispatch using nonlinear Dantzig-Wolfe decomposition
761
Security constrained optimal power flow for an economical operation of FACTS-devices in liberalized energy markets
762
Security constrained optimal power flow in a power system based on energy storage system with high wind penetration
763
Security Constrained Reactive Power Scheduling Considering N-1 Contingency of Transmission Lines
764
Security Constrained Unit Commitment by a new adaptive hybrid stochastic search technique
765
Security Constrained Unit Commitment in the Simultaneous Presence of Demand Response Sources and Electric Vehicles
766
Security Culture and Security Awareness as the Basic Factors for Security Effectiveness in Health Information Systems
767
Security Debates and Alliance against Terrorism
768
SECURITY DEPLOYMENT IN MOBILE ADHOC NETWORKS
769
Security design and the allocation of voting rights: Evidence from the Australian IPO market
770
SECURITY DESIGN, INCOMPLETE CONTRACTS AND RELATIONAL CONTRACTING: IMPLICATIONS FOR ACCOUNTING AND AUDITING
771
Security Dilemma in South Asia
772
Security dispatch using the Hopfield neural network
773
Security enforcement aware software development
774
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
775
Security Enhancement and Performance Assessment in Blockchain-based Smallholder Palm Oil Supply Chain
776
Security enhancement for digital signature schemes with fault tolerance in RSA
777
security enhancement in open-source healthcare developer network using graph theory
778
Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs
779
Security enhancement of an IC-card-based remote login mechanism
780
Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach
781
Security evaluation and certification: The future of a national scheme
782
Security factors as linear combinations of economic variables
783
Security flaws of remote user access over insecure networks
784
Security for cluster based ad hoc networks
785
Security for Distributed Databases
786
Security for eBusiness
787
Security for the Third Generation (3G) Mobile System
788
Security For Three-Tiered Web Application
789
Security for Workflow Systems
790
Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review
791
Security Framework of IoT-Based Smart Home
792
SECURITY GAME: SEATO and CENTO as Instrument of Economic and Military Assistance to Encircle Pakistan
793
Security implications of implementing active network infrastructures using agent technology
794
Security improvement on an anonymous key agreement protocol based on chaotic maps
795
Security in computer networks and distributed systems
796
Security in CORBA distributed object systems
797
Security in CORBA-based electronic commerce systems
798
Security in Cyberspace in the Field of International Relations
799
Security in Federated Database Systems
800
Security in graphs Original Research Article
801
Security in Information Systems: New Advances and Tendencies
802
Security in Information Systems: New Challenges and Opportunities
803
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
804
Security in Mobile IPv6: A survey
805
Security in SRAM FPGAs
806
Security in storage [standards]
807
Security in Telemedicine-based IoT
808
Security in the ED: Legislation paves the way
809
Security in the Semantic Web using OWL
810
Security in third Generation Mobile Networks
811
Security in Wireless Local Area Network (WLAN)
812
Security in XML-based financial reporting services on the Internet
813
Security Issues and Attacks on the GSM Standard: a Review
814
Security issues and solutions in multicast content distribution: a survey
815
Security issues in a satellite global GSM network
816
Security issues in control, management and routing protocols
817
Security Issues in Cyber Warfare
818
Security issues in todayʹs corporate network
819
Security Issues of the Digital Certificates within Public Key Infrastructures
820
Security Issues of Wireless Communication Networks.
821
Security issues related to mobile code and agent-based systems
822
Security Lending and The relationship between Short Selling in ISE and Takasbank Lending Borrowing Market Commission Rates
823
Security management and deployment of distributed digital mine system
824
Security Management in Distributed IT Applications
825
Security Market Reaction to Purchase Business Combinations at the First Earnings Announcement Date
826
Security markets and the information content of monetary policy turning points
827
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions
828
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents
829
SECURITY METRICS FOR CLOUD BASED INFORMATION RETRIEVAL SYSTEM
830
Security middleware approaches and issues for ubiquitous applications
831
Security modeling for power system reliability evaluation
832
Security monitoring in heterogeneous globally distributed environments
833
Security number of grid-like graphs
834
Security of a key agreement protocol based on chaotic maps
835
Security of Data of EHR in a grid computing Environment
836
Security of electricity supply at the generation level: Problem analysis
837
Security of energy supply in Turkey: Challenges and solutions
838
Security of energy supply: Comparing scenarios from a European perspective
839
Security of industrial sensor network-based remote substations in the context of the Internet of Things
840
Security of Information and Communication Networks
841
Security of interdependent and identical networked control systems
842
Security of Iris Recognition and Voice Recognition Techniques
843
Security of land tenure revised: the case of CRRU in Recife and Porto Alegre, Brazil
844
Security of most significant bits of gx2
845
Security of polynomial transformations of the Diffie–Hellman key
846
Security of public-key cryptosystems based on Chebyshev polynomials
847
Security of Random Data Perturbation Methods
848
Security of residence and expulsion: protection of aliens in Europe: Elspeth Guild and Paul Minderhoud (Eds.) (2000) Kluwer Law International, ISBN 9041114580, 256 pages, £67
849
Security of supply and regulation of energy networks
850
Security of supply and retail competition in the European gas market.: Some model-based insights
851
Security of supply, energy spillage control and peaking options within a 100% renewable electricity system for New Zealand
852
Security of tenure and the way forward: The case of Samakee Pattana, Bangkok
853
Security of the redefined Liaw’s broadcasting cryptosystem
854
Security of Tseng–Janʹs group signature schemes
855
Security of two remote user authentication schemes using smart cards
856
Security of Tzengs time-bound key assignment scheme for access control in a hierarchy
857
Security of Wang et al.ʹs group-oriented (t,n) threshold signature schemes with traceable signers
858
Security of wireless keyboards: threats, vulnerabilities and countermeasures
859
Security on Fragile and Semi-fragile Watermarks Authentication
860
Security on Mobile Agent Based Crawler (SMABC)
861
Security on the US fusion grid
862
Security Optimization for Distributed Applications Oriented on Very Large Data Sets
863
Security Optimization of VTP Model in an Enterprise VLAN
864
Security patterns and surface model in landscape ecological planning
865
Security performance
866
Security performance of loaded IEEE 802.11b wireless networks
867
Security pitfalls of frame-by-frame approaches to video watermarking
868
Security platforms in the telecommunication market: technologies, developments and regulations
869
Security Policy Based on Firewall and Intrusion Detection System.
870
Security policy conceptual modeling and formalization for networked information systems
871
Security Policy Development: Towards a Life-Cycle and Logic-Based Verification Model
872
SECURITY PREVENTIVE MAINTENANCE SCHEDULING INCORPORATING OPTIMAL RESERVE PROCUREMENT
873
Security price adjustment across exchanges: an investigation of common factor components for Dow stocks
874
Security problems for a pseudorandom sequence generator based on the Chen chaotic system Original Research Article
875
Security problems with a chaos-based deniable authentication scheme
876
Security properties: two agents are sufficient
877
Security protection design for deception and real system regimes: A model and analysis
878
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
879
Security protocols: from linear to classical logic by abstract interpretation
880
Security reconsideration of the Huang–Wang nominative signature
881
Security requirements engineering framework for software product lines
882
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
883
Security Risk Analysis and the Security Need in Citizen Oriented Applications
884
Security Risk Minimization for Desktop and Mobile Software Systems. An In-Depth Analysis.
885
Security risks and probabilistic risk assessment of glazing subject to explosive blast loading
886
Security risks and probabilistic risk assessment of glazing subject to explosive blast loading
887
Security risks of global environmental changes
888
Security Schemes for a Mobile Agent Based Network and System Management Framework
889
Security service level agreements for outsourced security functions
890
Security standards: An end-user perspective
891
Security System Using Controller Area Network (CAN ) Bus
892
Security systems for a mobile world
893
SECURITY TECHNIQUES AND SOLUTIONS FOR PREVENTING THE CROSS-SITE SCRIPTING WEB VULNERABILITIES: A GENERAL AAPROACH
894
Security Technologies for the World Wide Web: Rolf Oppliger; Reference List, Acronyms and Glossary, Index, 419 pages, ISBN 1-58053-045-1 (US$ 65.00)
895
Security technology of smart cards applied in an information system
896
Security Technology. The 36th International Carnahan conference on security technology
897
Security Testing of Session Initiation Protocol Implementations
898
Security Theorems via Model Theory
899
Security threat issues in Mersing waters and the surrounding islands
900
Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures
901
Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures
902
Security threats to Internet: a Korean multi-industry investigation
903
Security threats to Internet: a Korean multi-industry investigation
904
Security Threats to Regional Powers Investment in Iraq After the Defeat of ISIS
905
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
906
Security weakness in an authenticated group key agreement protocol in two rounds
907
Security, independence, and sustainability: Imprecise language and the manipulation of energy policy in the United States
908
Security, Political Dimensions and Consequences of NATO Expansion in the Region
909
Security, privacy, and confidentiality in electronic prescribing systems: A review study
910
Security, risk and registration
911
Security: An end user perspective
912
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability
913
Security-based rescheduling of transactions in a deregulated power system
914
Security-Constrained Dispatch Gives Financially and Economically Significant Nodal Prices
915
Security-constrained economic dispatch using dual quadratic programming
916
Security-Constrained Optimal Generation Scheduling for GENCOs
917
Security-constrained optimal rescheduling of real power using Hopfield neural network
918
Security-constrained self-scheduling of generation companies in day-ahead electricity markets considering financial risk
919
Security-Constrained Unit Commitment Considering Large-Scale Compressed Air Energy Storage (CAES) Integrated With Wind Power Generation
920
Security-Constrained Unit Commitment for Simultaneous Clearing of Energy and Ancillary Services Markets.
921
Security-Constrained Unit Commitment in the Presence of Demand Response Programs and Electric Vehicles
922
Security-Constrained Unit Commitment With AC Constraints*
923
Security-Constrained Unit Commitment With AC Constraints. . . .
924
Security-enhanced Search Engine Design in Internet of Things
925
Security-oriented sensor placement in intelligent buildings
926
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware
927
Sedation and analgesia after pediatric cardiac surgery
928
Sedation and Anesthesia in the Office Setting,
929
Sedation and Pain Management with Intravenous Romifidine−Butorphanol in Standing Horses
930
Sedation caused by primidone may exacerbate dementia
931
Sedation for cardioversion in the emergency department: Analysis of effectiveness in four protocols
932
Sedation for children undergoing cardiac catheterization: A review of literature
933
Sedation for pediatric dental patients
934
Sedation for Percutaneous Endoscopic Lumbar Discectomy
935
Sedation in cerebral malaria
936
SEDATION IN ICU: ARE WE ACHIEVING GOALS?
937
Sedation in terminally ill patients
938
Sedation in the intensive-care unit: good and bad?
939
Sedation of intoxicated, agitated patients requiring CT to evaluate head injury
940
Sedation with etomidate-fentanyl versus propofol-fentanyl in colonoscopies: A prospective randomized study
941
SEDATION WITH KETOFOL (KETAMINE AND PROPOFOL ADMIXTURE) VERSUS PROPOFOL DURING MONITORED ANESTHESIA IN PATIENTS UNDERGOING ERCP
942
Sedation with Medicinal Plants: A Review of Medicinal Plants with Sedative Properties in Iranian Ethnoblotanical Documents
943
Sedation with Xylazine-Diazepam and Epidural Administration of Lidocaine and Xylazine for Castration and Ovariohysterectomy in Cats
944
Sedation-Paralysis as Cornerstone on Rabies Management (Milwaukee Protocol)
945
Sedative and Analgesic Effects of Intravenous Midazolam and Ketamine Combination in Bone Marrow Aspiration and Biopsy of Childhood Cancer
946
Sedative and Analgesic Effects of Propofol-Fentanyl Versus Propofol-Ketamine During Endoscopic Retrograde Cholangiopancreatography: A Double-Blind Randomized Clinical Trial
947
Sedative and Analgesic efficacy of Propofol-Ketamine and Propofol- Remifentanil During Painful Procedures in Children with Acute Lymphoblastic Leukemia
948
Sedative and Anticonvulsant Activities of the Ethanol Root Extract of Flemingia chappar Benth
949
Sedative Effect of Midazolam Elixir Compare to Vial Through Oral Route in Uncooperative Pediatric Dental Patients
950
Sedative Effect of Nasal Midazolam-Ketamine at Different Doses on 3-6-year-old Uncooperative Dental Patients
951
Sedative Effect of Oral Midazolam/Hydroxyzine versus Chloral Hydrate/Hydroxyzine on 2-6 Year-Old Uncooperative Dental Patients: A Randomized Clinical Trial
952
Sedative effect on humans of inhalation of essential oil of linalool:: Sensory evaluation and physiological measurements using optically active linalools
953
Sedative Efficacy of Propofol in Patients Intubated/Ventilated after Coronary Artery Bypass Graft Surgery
954
Sedative, anxiolytic and analgesic effects of Urena sinuata L. leaf extract in animal models
955
Sedative, Hemodynamic, and Respiratory Effects of Dexmedetomidine, Propofol, and Ketamine for Intraoperative Sedation During Spinal Anesthesia
956
Sedative/Analgesic Efficacy of Medetomidine in Goats
957
Sedative-Hypnotic Activity of Extracts and Essential Oil of Coriander Seeds
958
SEDC-Based Hardware-Level Fault Tolerance and Fault Secure Checker Design for Big Data and Cloud Computing
959
SEDDS of gliclazide: Preparation and characterization by in-vitro, ex-vivo and in-vivo techniques
960
Sedentarism affects body fat mass index and fat-free mass index in adults aged 18 to 98 years
961
Sedentarization and childrenʹs health: Changing discourses in the northeast Badia of Jordan
962
Sedentary behavior and neck pain in children and adolescents; a systematic review and meta-analysis
963
Sedentary behavior and residual-specific mortality
964
Sedentary Behavior Associated with Obesity in Rural-to-Urban Migrant Children by Comparison of Those in Rural and Urban Area in China
965
Sedentary behavior, physical activity and cardiorespiratory fitness on leukocyte telomere length
966
Sedentary behavior, physical activity and cardiorespiratory fitness on leukocyte telomere length
967
Sedentary Behaviors and the Risk of Incident Hypertension: The SUN Cohort
968
Sedentary behaviour, physical activity and weight problems in adolescents in Wales
969
Sedentary habits of anthozoa-like animals in the Chengjiang Lagerstنtte: Adaptive strategies for Phanerozoic-style soft substrates
970
Sedentary images in a popular US based parenting magazine: 2010-2015
971
Sedentary Lifestyle and Antecedents of Cardiovascular Disease in Young Adults
972
Sedentary snakes and gullible geckos: predator–prey coevolution in nocturnal rock-dwelling reptiles
973
Sedentary, active and athletic lifestyles: Right and left ventricular long axis diastolic function
974
Sedentism and child health among rendille pastoralists of Northern Kenya
975
Sediment (un)balance budget in a high-gradient stream on flysch bedrock: A case study using dendrogeomorphic methods and bedload transport simulation
976
Sediment accretion and organic carbon burial relative to sea-level rise and storm events in two mangrove forests in Everglades National Park
977
Sediment Accretion and Recent Sea-level Rise in the Solent, Southern England: Inferences from Radiometric and Geochemical Studies
978
Sediment accumulation and organic material flux in a managed mangrove ecosystem: estimates of land–ocean–atmosphere exchange in peninsular Malaysia
979
Sediment accumulation and radionuclide inventories (239,240Pu, 210Pb and 234Th) in the northern Gulf of Mexico, as influenced by organic matter and macrofaunal density
980
Sediment accumulation in newly constructed vegetative treatment facilities along a new major road
981
Sediment accumulation in the western Gulf of Lions, France: The role of Cap de Creus Canyon in linking shelf and slope sediment dispersal systems
982
Sediment accumulation on a cold-water carbonate mound at the Southwest Rockall Trough margin
983
Sediment accumulation patterns and fine-scale strata formation on the Waiapu River shelf, New Zealand
984
Sediment accumulation patterns in a tectonically subsiding incised valley: Insight from the Echigo Plain, central Japan
985
Sediment accumulation rate and radiological characterisation of the sediment of Palmones River estuary (southern of Spain)
986
Sediment accumulation rates and budgets of depositing particles of the East China Sea
987
Sediment accumulation rates and carbon burial in the bottom sediment in a high-productivity area: Gerlache Strait (Antarctica)
988
Sediment accumulation rates and carbon fluxes to bottom sediments at the Western Bransfield Strait (Antarctica)
989
Sediment accumulation rates in subpolar fjords – Impact of post-Little Ice Age glaciers retreat, Billefjorden, Svalbard
990
Sediment ages and flux variations from depth profiles of 210Pb: lake and marine examples
991
Sediment and hydrological response to vegetation recovery following wildfire on hillslopes and the hollow of a small watershed
992
Sediment and nutrient deposition in Lake Volta in Ghana due to Harmattan dust
993
Sediment and nutrient dynamics during snowmelt runoff generation in a southern Taiga catchment of Russia
994
Sediment and nutrient dynamics during storm events in the Enxoé temporary river, southern Portugal
995
Sediment and nutrient export by water from an agricultural catchment: An analysis of hysteresis patterns in the Upper Relau River, Penang
996
Sediment and organic carbon focusing in the Shelikof Strait, Alaska
997
Sediment and particulate organic carbon fluxes in various lacustrine basins of tropical Africa and in the Gulf of Guinea
998
SEDIMENT AND PHOSPHORUS DELIVERY FROM ALFALFA SWARDS
999
Sediment and phosphorus delivery from field to river via land drains in England and Wales. A risk assessment using field and national databases
1000
Sediment and phosphorus transfer in overland flow from a maize field receiving manure
بازگشت