<< مقالات لاتين >>
<< بر اساس عنوان >>
1
Second-Order Statistical Approaches to Channel Shortening in Multicarrier Systems
2
Second-order statistical characterization of the filter bank and its elements
3
Second-order statistical properties of nonlinearly distorted phase-shift keyed (PSK) signals
4
Second-Order Statistical Texture Representation of Asphalt Pavement Distress Images Based on Local Binary Pattern in Spatial and Wavelet Domain
5
Second-order statistics based blind source separation using a bank of subband filters
6
Second-order statistics of the elastic buckling of functionally graded rectangular plates
7
Second-order statistics-based blind equalization of IIR single-input multiple-output channels with common zeros
8
Second-order stiffness matrix and load vector of an imperfect beam-column with generalized end conditions on a two-parameter elastic foundation
9
Second-order stochastic fluid models with fluid-dependent flow rates
10
Second-order Sturm–Liouville problems with asymmetric, superlinear nonlinearities Original Research Article
11
Second-order subdifferentials and convexity of real-valued functions Original Research Article
12
Second-order susceptibility tensor of a monolayer at the liquid–air interface: SHG spectroscopy by compression
13
Second-order sustainability—conditions for the development of sustainable innovations in a dynamic environment
14
Second-order symmetric and self duality in multiobjective programming Original Research Article
15
Second-order symmetric duality in multiobjective programming Original Research Article
16
Second-order symmetric duality with cone constraints
17
Second-order tensorial calibration for kinetic spectrophotometric determination
18
Second-order terminal sliding mode controller for a class of chaotic systems with unmatched uncertainties
19
Second‐order theoretical analysis: a method for constructing theoretical explanation
20
Second-order theory for the effective behavior and field fluctuations in viscoplastic polycrystals
21
Second-order thermodynamic derivative properties of selected mixtures by the soft-SAFT equation of state
22
Second-order time evolution of PN equations for radiation transport
23
Second-order time-accurate and geometrically conservative implicit schemes for flow computations on unstructured dynamic meshes Original Research Article
24
Second-order tracking control for leader–follower multi-agent flocking in directed graphs with switching topology
25
Second-order turbulence closure models for geophysical boundary layers. A review of recent work
26
Second-order type isomorphisms through game semantics
27
Second-order type-changing evolution equations with first-order intermediate equations
28
Second-order variance estimation in poststratified two-stage sampling
29
Second-order Volterra system identification
30
SECOND-ORDER WAVES IN A THREE-DIMENSIONAL WAVE BASIN WITH PERFECTLY REFLECTING SIDEWALLS
31
Second-order, exact charge conservation for electromagnetic particle-in-cell simulation in complex geometry Original Research Article
32
Second-order, three-point, boundary value problems with jumping non-linearities Original Research Article
33
Second-order-accurate discrete ordinates solutions of transient radiative transfer in a scattering slab with variable refractive index
34
Second-order-accurate radiative hydrodynamics and multidimensional protostellar collapse Original Research Article
35
Second-phase assisted formation of {111} twins in barium titanate Original Research Article
36
Second-phase sampling designs for non-stationary spatial variables
37
Second-phase-dependent grain refinement in Ti–25Nb–3Mo–3Zr–2Sn alloy and its enhanced osteoblast response
38
Second-price auction tournament
39
Second-price common-value auctions under multidimensional uncertainty
40
Second-quantized mirror symmetry
41
Seconds cancers après radiothérapie pour séminome testiculaire : à propos de deux cas
42
Second-sphere ‘communication’ between two cis-bound guanine nucleotides. Factors influencing conformations of dynamic adducts of cis-type platinum anticancer drugs with guanine nucleotides as deduced by circular dichroism spectroscopy
43
Second-sphere coordination complex via hydrogen bonding: Synthesis, characterization, X-ray crystal structure determination and packing of hexaamminecobalt(III) chloride di(para-nitrobenzoate)
44
Second-sphere coordination complex via hydrogen bonding: synthesis, characterization and X-ray crystal structure of hexaamminecobalt(III)chloride dimethanesulphonate, [Co(NH3)6]Cl(CH3SO3)2
45
Second-sphere coordination complexes via hydrogen bonding: Synthesis, characterization of [Co(NH3)6](XO3)3·nH2O (X=Br, I) and single crystal X-ray structure determination of [Co(NH3)6](BrO3)3·0.5H2O
46
Second-sphere coordination complexes via hydrogen bonding: Synthesis, spectroscopic characterization, crystal structures and packing of cis-diazidobis(ethylenediamine)cobalt(III) cations with complex fluoroanions
47
Second-sphere coordination in anion binding: Synthesis and characterization of hexaamminecobalt(III) salts [Co(NH3)6](L)3·3H2O and [Co(NH3)6]Cl(L)2, L=(CH3)3C6H2SO3 and X-ray structure determination of [Co(NH3)6]Cl(L)2
48
Second-sphere coordination in anion binding: Synthesis, characterization and X-ray structures of bis(diethylenetriamine)cobalt(III) complexes containing benzoates
49
Second-sphere coordination in hexaamminecobalt(III) salt with organic sulphonate anion: Synthesis, characterisation and X-ray crystal structure of [Co(NH3)6](CH3SO3)3
50
Second-sphere coordination in non-spherical anion binding: Synthesis, characterization and X-ray structure of cis-diazidobis(ethylenediamine)cobalt(III) 2-chloro,5-nitrobenzenesulphonate monohydrate
51
Second-sphere coordination networks: ‘Tame-ing’ (Tame=1,1,1-Tris(aminomethyl)ethane) the hydrogen bond
52
Second-sphere coordination of ‘star’-shaped hexakis(N-pyridin-4-one)benzene (HPOB) with hexakis(methanol)nickel(II) nitrate; unusual (NO3 −)(HPOB)(NO3 −) π-stacked ‘sandwiching’
53
Second-sphere coordination of 5,5-diamino-2,2-bipyridine metal complexes with oxygen ligands through N-H···O hydrogen bonding
54
Second-tier natural antidepressants: Review and critique
55
Second-to-fourth digit length, testosterone and spatial ability
56
Second-to-fourth digit ratio related to Verbal and Numerical Intelligence and the Big Five
57
Second-trimester echogenic bowel and intraamniotic bleeding: Association between fetal bowel echogenicity and amniotic fluid spectrophotometry at 410 nm, ,
58
Second-trimester maternal serum inhibin A concentration as an early marker for preeclampsia,
59
Second-trimester maternal serum marker screening: Maternal serum α-fetoprotein, β-human chorionic gonadotropin, estriol, and their various combinations as predictors of pregnancy outcome
60
Second-trimester plasma homocysteine levels and pregnancy-induced hypertension, preeclampsia, and intrauterine growth restriction
61
Second-trimester prediction of severe placental complications in women with combined elevations in alpha-fetoprotein and human chorionic gonadotrophin
62
Second-trimester uterine evacuation: A comparison of intra-amniotic (15S)-15-methyl-prostaglandin F2α and intravaginal misoprostol, ,
63
Second-trimester vaginal bleeding: Correlation of ultrasonographic findings with perinatal outcome
64
Secoorthosiphols A–C: three highly oxygenated secoisopimarane-type diterpenes from Orthosiphon stamineus
65
Seco-prolinenitrile inhibitors of dipeptidyl peptidase IV define minimal pharmacophore requirements at P1
66
Secrecy and ambiguity: home care for people living with HIV/AIDS in Ghana: Maude Radstake; African Studies Centre, Leiden, 2000, 132pp
67
Secrecy and group creation
68
Secrecy and the development of personal identity—A challenge for parents and teachers in our time
69
Secrecy and transparency of medicines licensing in the EU
70
Secrecy and Utility Regulation
71
Secrecy considerations for conserving Lazarus species
72
Secrecy in research: cooperation and costimulation in immunology
73
Secrecy in the Bush Administration. Downloaded September 14, 2004. Prepared for Representative Henry A. Waxman by the Minority Staff, U.S. House of Representatives Committee on Government Reform, Special Investigations Division http://democrats.reform.hou
74
Secrecy logic: S-secrecy structures
75
Secrecy of Communications in Data Transmission by Impulses with Unknown Moments of Appearance and Disappearance
76
Secrecy Systems for Identification Via Channels with Additive-Like Instantaneous Block Encipherers
77
Secrecy, two-sided bias and the value of evidence
78
Secrecy: Report of the Commission on Protecting and Reducing Government Secrecy : By Daniel Patrick Moynihan, New York, Chairman. Washington, DC: Government Printing Office, 1997. S.Doc.105-2. 114 p., with appendices. $25.00 (paper). ISBN 0-16-054119-0. L
79
Secret and public key image watermarking schemes for image authentication and ownership verification
80
Secret Component in Organizational Structure: Gender
81
Secret data transmission using advance steganography and image compression
82
Secret image communication scheme based on vector quantization
83
Secret image sharing based on cellular automata and steganography
84
Secret image sharing with smaller shadow images
85
Secret information hiding in image randomly method using steganography and cryptography
86
Secret Ingredients—The Brave New World of Industrial Farming, Stuart Laidlaw. McClelland & Stewart Ltd., Toronto, Canada (2003), ISBN: 0-7710-4595-6
87
Secret instantiation in ad-hoc networks
88
Secret Integrations: Black Humor and the Critique of Whiteness
89
Secret Key Estimation in Sequential Steganography
90
Secret out-of-court settlements in drug-injury cases
91
Secret Sarcoma: A Cardiac Mass Disguised as Influenza
92
Secret science: tobacco industry research on smoking behaviour and cigarette toxicity
93
Secret sets and applications
94
Secret sharing approaches for 3D object encryption
95
Secret sharing based on a hard-on-average problem
96
Secret Sharing Based On Cartesian product Of Graphs
97
Secret sharing schemes for graph-based prohibited structures
98
Secret sharing schemes from binary linear codes
99
Secret Sharing Schemes from Two-Weight Codes
100
Secret sharing schemes on access structures with intersection number equal to one Original Research Article
101
Secret sharing with multi-cover adaptive steganography
102
Secret Signatures Inside Genomic DNA
103
Secret Soldiers: The Story of World War II’s Heroic Army of Deception: Philip Gerard; New York, Dutton, 2002, 400 pp., with indexSlander: Liberal Lies About the American Right: Ann Coulter; New York, Crown Publishers, 256 pp., with indexThe Arts of Decept
104
Secret study: A new concept in continuing professional education
105
Secret swarm unit: Reactive k-secret sharing
106
Secretases as targets for the treatment of Alzheimerʹs disease: the prospects
107
Secreted 70 kDa lumican stimulates growth and inhibits invasion of human pancreatic cancer
108
Secreted acid phosphatase is expressed in cluster roots of lupin in response to phosphorus deficiency
109
Secreted and Placental Membrane Forms of Folate-Binding Protein Occur Sequentially During Pregnancy in Swine
110
Secreted Chemicals From Probiotic Bacteria Potentiate Th1 Pattern of Immune Cells and Apoptosis Induction in Breast Cancer and Gastric Adenocarcinoma Cell Lines
111
Secreted Epididymal Glycoprotein 2D6 That Binds to the Sperms Plasma Membrane Is a Member of the (beta)Defensin Superfamily of Pore-Forming Glycopeptides
112
Secreted expression of pseudozymogen forms of recombinant matriptase in Pichia pastoris
113
Secreted frizzled related protein 1 is a paracrine modulator of epithelial branching morphogenesis, proliferation, and secretory gene expression in the prostate: Joesting MS, Cheever TR, Volzing KG, Yamaguchi TP, Wolf V, Naf D, Rubin JS, Marker PC, Depart
114
SECRETED FRIZZLED-RELATED PROTEIN-4 REGULATES HUMAN VASCULAR SMOOTH MUSCLE CELL PROLIFERATION
115
Secreted phosphatase activity induced by dimethyl sulfoxide in Herpetomonas samuelpessoai
116
Secreted Phospholipases A2 – not just Enzymes
117
Secreted phosphoprotein 1 enhances proliferative self-renewal through PI3K/Akt signaling in skeletal myosphere-derived progenitor cells
118
Secreted transforming growth factor beta2 activates NF-kappaB, blocks apoptosis, and is essential for the survival of some tumor cells: Lu T, Burdelya LG, Swiatkowski SM, Boiko AD, Howe PH, Stark GR, Gudkov AV, Department of Molecular Biology, Lerner Rese
119
Secreted β-amyloid precursor protein activates microglia via JNK and p38-MAPK
120
Secreted β-APP stimulates MAP kinase and phosphorylation of tau in neurons
121
Secretin Controls Anion Secretion in the Rat Epididymisin an Autocrine/Paracrine Fashion
122
Secretin may not be effective in treatment of autism
123
Secretin receptors in the human liver: Expression in biliary tract and cholangiocarcinoma, but not in hepatocytes or hepatocellular carcinoma
124
Secreting Tumor Suppression
125
Secretion and dual regulation between epidermal growth factor and transforming growth factor-β1 in MDA-MB-231 cell line in 42-hour-long cultures
126
Secretion and purification of HCV E1 protein forms as glutathione-S-transferase fusion in the baculovirus insect cell system
127
Secretion and Purification of Recombinant β1-4 Galactosyltransferase from Insect Cells Using pFmel-protA, a Novel Transposition-Based Baculovirus Transfer Vector
128
Secretion Antigens of Mycobacterium tuberculosis:: A Comparison Between a Reference Strain and Seven Wild Isolates
129
Secretion from bacterial versus mammalian cells yields a recombinant scFv with variable folding properties
130
Secretion of 92 kDa gelatinase (MMP-9) by bovine neutrophils
131
Secretion of 92 kDa gelatinase (MMP-9) by bovine neutrophils
132
Secretion of biologically active murine interleukin-10 by Lactococcus lactis
133
Secretion of bladder tumor-derived hyaluronidase activity by invasive bladder tumor cells
134
Secretion of brain natriuretic peptide in patients with aneurysmal subarachnoid haemorrhage
135
Secretion of Cardiac Plasminogen Activator During Hypoxia-induced Right Ventricular Hypertrophy
136
Secretion of Cellobiase Is Mediated via Vacuoles in Termitomyces clypeatus
137
Secretion of estradiol-17β by porcine mammary gland of ovariectomized steroid-treated sows
138
Secretion of gastrin-releasing peptide by retroperitoneal tumors
139
Secretion of gonadotrophins change during the luteal phase of the bovine oestrous cycle in the absence of corresponding changes in progesterone or 17β-oestradiol
140
Secretion of IFN-γ by bovine peripheral blood mononuclear cells stimulated with Mycobacterium bovis protein fractions obtained by isoelectric-focusing
141
Secretion of IFN-γ by bovine peripheral blood mononuclear cells stimulated with Mycobacterium bovis protein fractions obtained by isoelectric-focusing
142
Secretion of IFN-γ, IL-6, Granulocyte-Macrophage Colony-Stimulating Factor and IL-10 Cytokines after Activation of Human Purified T Lymphocytes upon CD38 Ligation
143
Secretion of IGF-1 by ovine granulosa cells: effects of growth hormone and follicle stimulating hormone
144
Secretion of IL-1 and H2O2 by human mononuclear cells in vitro
145
Secretion of inhibin A, inhibin B and inhibin pro-(alpha)C during the oestrous cycle of the golden hamster (Mesocricetus auratus)
146
Secretion of interferon-tau by bovine embryos in long-term culture: comparison of in vivo derived, in vitro produced, nuclear transfer and demi-embryos
147
Secretion of interleukin-17 by CD8 + T cells expressing CD146 (MCAM)
148
Secretion of milk and milk components in sheep
149
Secretion of MIP-1β and MIP-1α by CD8+ T-lymphocytes correlates with HIV-1 inhibition independent of coreceptor usage
150
Secretion of momilactone A from rice roots to the rhizosphere
151
Secretion of Natural and Synthetic Toxic Compounds from Filamentous Fungi by Membrane Transporters of the ATP-binding Cassette and Major Facilitator Superfamily
152
Secretion of Nitrite by Schwann Cells and Its Effect on T-Cell Activationin Vitro
153
Secretion of Platelet-Activating Factor Acetylhydrolase Following Phorbol Ester-Stimulated Differentiation of HL-60 Cells
154
Secretion of preβ HDL increases with the suppression of cholesteryl ester transfer protein in Hep G2 cells
155
Secretion of Prolactin Following Three Dimensional Culture of Human Endometrial Tissue.
156
Secretion of prostaglandins and endothelin-1 by decidual endothelial cells from normal and preeclamptic pregnancies: Comparison with human umbilical vein endothelial cells
157
Secretion of prostate-specific antigen-suppressing activity by two human prostate carcinoma cell lines
158
Secretion of Salmonella-specific antibodies in the oviducts of hens experimentally infected with Salmonella enteritidis
159
Secretion of Salmonella-specific antibodies in the oviducts of hens experimentally infected with Salmonella enteritidis
160
Secretion of the ventral glands in Craesus sawfly larvae
161
Secretion of three enzymes for fatty acid synthesis into mouse milk in association with fat globules, and rapid decrease of the secreted enzymes by treatment with rapamycin
162
Secretion of tissue inhibitors of matrix metalloproteinases by human fetal membranes, decidua and placenta at parturition
163
Secretion of Two β-Fructofuranosidases byAspergillus nigerGrowing in Sucrose
164
Secretion of water soluble pyrroloquinoline quinone glucose dehydrogenase by recombinant Pichia pastoris
165
Secretion of β-glycosidase by middle midgut cells and its recycling in the midgut of Tenebrio molitor larvae
166
Secretion patterns of brain natriuretic peptide and atrial natriuretic peptide in patients with or without pulmonary hypertension complicating atrial septal defect, , ,
167
Secretion polarity of interferon-β in epithelial cell lines
168
Secretion Superfamily ATPases Swing Big
169
Secretion, purification and characterisation of a recombinant Volvariella volvacea endoglucanase expressed in the yeast Pichia pastoris
170
Secretions of Interleukin-1(beta) and Tumor Necrosis Factor (alpha) by Whole Fetal Membranes Depend on Initial Interactions of Amnion or Choriodecidua with Lipopolysaccharides or Group B Streptococci
171
Secretions of stingless bees: cephalic secretions of two Frieseomelitta species
172
Secretions of the interaural gland contain information about individuality and colony membership in the Bechsteinʹs bat
173
Secretive females or swaggering males?: An assessment of the quality of sexual partnership reporting in rural Tanzania
174
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
175
Secret-key agreement over unauthenticated public channels .II. Privacy amplification
176
Secret-key agreement over unauthenticated public channels-Part II: the simulatability condition
177
Secretome analysis of microarray data reveals extracellular events associated with proliferative potential in a cell line model of breast disease
178
Secretome Analysis Reveals an Arabidopsis Lipase Involved in Defense against Alternaria brassicicola
179
Secretome injection effect on microscopic characteristics of cartilage, synovial membrane and subchondral bone in wistar rat knee osteoarthritis model
180
Secretome of adipose derived-mesenchymal stem cells reduces the Vibrio cholerae attachment to Caco-2 cells and subsequent inflammatory responses
181
Secretome of Aggregated Embryonic Stem Cell-Derived Mesenchymal Stem Cell Modulates the Release of Inflammatory Factors in Lipopolysaccharide-Induced Peripheral Blood Mononuclear Cells
182
Secretome of Aspergillus oryzae in Shaoxing rice wine koji
183
Secretome of human amniotic membrane stem cells promote recovery and testicular functions through modulating SIRT1/NRF2/TNF-α pathway in mice testicular torsion: An experimental study
184
Secretoneurin, a novel neuropeptide, in the human dental pulp
185
Secretory breast cancer in a 7.5-year old boy
186
Secretory breast carcinoma—case report and review of the medical literature
187
Secretory component of immunoglobulin A in maternal serum and the prediction of preterm delivery
188
Secretory component: A potential regulator of endometrial-decidual prostaglandin production in early human pregnancy
189
Secretory Duct Structure and Phytochemistry Compounds of Yellow Latex in Mangosteen Fruit
190
secretory excretory and somatic immunogenic antigens profiles of adult fasciola spp.
191
Secretory expression and characterization of a bile salt hydrolase from Lactobacillus plantarum in Escherichia coli
192
Secretory expression of porcine interferon-gamma in baculovirus using HBM signal peptide and its inhibition activity on the replication of porcine reproductive and respiratory syndrome virus
193
Secretory expression of porcine interferon-gamma in baculovirus using HBM signal peptide and its inhibition activity on the replication of porcine reproductive and respiratory syndrome virus
194
Secretory function of adrenal chromaffin cells cultured on polypyrrole films
195
Secretory group II phospholipase A2 in human atherosclerotic plaques Original Research Article
196
Secretory immunoglobulin A (sIgA) deficiency inserum of patients with GALTectomy (appendectomy and tonsillectomy)
197
Secretory Immunoglobulin A from Healthy Human Mothers Milk Catalyzes Nucleic Acid Hydrolysis
198
Secretory leukocyte protease inhibitor concentration increases in amniotic fluid with the onset of labour in women: characterizati of sites of release within the uterus
199
Secretory leukocyte protease inhibitor: inhibition of human immunodeficiency virus-1 infection of monocytic THP-1 cells by a newly cloned protein
200
Secretory Phospholipase A2-IIA and Cardiovascular Disease: A Mendelian Randomization Study
201
Secretory Production of Recombinant Protein by a High Cell Density Culture of a Protease Negative Mutant Escherichia coli Strain
202
Secretory production of Zymomonas mobilis levansucrase by the methylotrophic yeast Hansenula polymorpha
203
Secretory products from human adipocytes impair endothelial function via nuclear factor κB
204
Secretory Protein Profiling Reveals TNF-α Inactivation by Selective and Promiscuous Sec61 Modulators
205
SECRETORY STRUCTURES ON THE LEAF RACHIS OF CAESALPINIEAE AND MIMOSOIDEAE (LEGUMINOSAE): IMPLICATIONS FOR THE EVOLUTION OF NECTARY GLANDS
206
Secretory type of recombinant thioredoxin h induces ER stress in endosperm cells of transgenic rice
207
Secretory vesicles in live cells are not free-floating but tethered to filamentous structures: A study using photonic force microscopy
208
Secretory vesicles in live cells are not free-floating but tethered to filamentous structures: A study using photonic force microscopy
209
Secretory vesicles in live cells are not free-floating but tethered to filamentous structures: A study using photonic force microscopy
210
Secretory Vesicle-Specific Antibodies in the Confocal Study of Exo–Endocytosis Dynamics
211
SecretP: Identifying bacterial secreted proteins by fusing new features into Chou’s pseudo-amino acid composition
212
Secrets and lies: Breastfeeding and professional paid work
213
Secrets for managing materials budget allocations: A brief guide for collection managers
214
Secrets from friends and parents: Longitudinal links with depression and antisocial behavior
215
Secrets of a Secretase: N-Cadherin Proteolysis Regulates CBP Function
216
Secrets of adaptive support weight techniques for local stereo matching
217
Secrets of Light in Traditional Houses of Iran
218
Secrets of planning a good meeting
219
Secrets of RNA folding revealed
220
Secrets of success: assessing the large increases in transit ridership achieved by Houston and San Diego transit providers
221
Secrets of the code: Do vascular endothelial cells use ion channels to decipher complex flow signals?
222
Secrets to shield or share? new dilemmas for military R&D policy in the digital age
223
Secrets to Su Shi’s Happiness under Any Circumstances: Transcending and a Positive Perspective
224
Secrets to the successful Hungarian bank privatization: the benefits of foreign ownership through strategic partnerships
225
SECʹs insider trading enforcements and target firmsʹ stock values
226
SECʹs OK of Southernʹs Asia buy is challenged on appeal
227
Sectarian Conflicts: A dominant threat to Pakistan’s Internal Security
228
Sectarian landscape, Madrasas and Militancy in Punjab
229
Secteurs psychiatriques et circuits de lʹinformation en matière de précarité
230
Section 1. New Detectors Spawn New Fields
231
Section 1. New Detectors Spawn New Fields
232
Section 10. Electronic cooling
233
Section 10. Electronic cooling
234
Section 11. Cryostat for LTD
235
Section 11. Cryostat for LTD
236
Section 12. STJ physics
237
Section 12. STJ physics
238
Section 13. TES and calorimeter physics
239
Section 13. TES and calorimeter physics
240
Section 14. X-ray material analysis
241
Section 14. X-ray material analysis
242
Section 15. Novel industrial and laboratory applications
243
Section 15. Novel industrial and laboratory applications
244
Section 16. Analysis in the life sciences
245
Section 16. Analysis in the life sciences
246
Section 17. Signal read-out and processing
247
Section 17. Signal read-out and processing
248
Section 2. Neutrino physics
249
Section 2. Neutrino physics
250
Section 2: technology and process changes in the mining industry
251
Section 3. The research for dark matter
252
Section 3. The research for dark matter
253
Section 4. TES and calorimetric technology
254
Section 4. TES and calorimetric technology
255
Section 404 of the Sarbanes-Oxley act and its capital market effects
256
Section 5. Detector Fabrication
257
Section 5. Detector Fabrication
258
Section 6. Imaging
259
Section 6. Imaging
260
Section 7. Large arrays
261
Section 7. Large arrays
262
Section 8. Novel type detectors
263
Section 8. Novel type detectors
264
Section 9. Astronomy from microwave to gamma-rays
265
Section 9. Astronomy from microwave to gamma-rays
266
Section analysis of industrial sheet-metal stamping processes
267
Section capacity of very high strength (VHS) circular tubes under compression
268
Section I. Energy recovering linacs: General aspects
269
Section I. Energy recovering linacs: General aspects
270
Section II. Electron guns and injector designs
271
Section II. Electron guns and injector designs
272
Section III. Optics and beam transport
273
Section III. Optics and beam transport
274
Section IV. Superconducting RF and RF control
275
Section IV. Superconducting RF and RF control
276
Section modulus of corner joints in furniture frames as engineering design criteria for their efficient construction
277
Section moment capacity tests of LiteSteel beams
278
Section slenderness limits of very high strength circular steel tubes in bending
279
Section Theorems on H-Spaces with Applications
280
Section thickness, macrohardness and yield strength in high-pressure diecast magnesium alloy AZ91
281
Section V. Synchronization, diagnostics and instrumentation
282
Section V. Synchronization, diagnostics and instrumentation
283
Section VI. Summary reports
284
Section VI. Summary reports
285
Sectionable terraces and the (generalised) Oberwolfach problem Original Research Article
286
Sectional Analysis of Pendentive Dome Mosques During Ottoman Era
287
Sectional anatomic and tomographic study of the feline abdominal cavity for obtaining a three-dimensional vascular model
288
Sectional anatomy quiz
289
Sectional Anatomy Quiz - V
290
Sectional Anatomy Quiz - VI
291
Sectional Anatomy Quiz - VII
292
Sectional Anatomy Quiz – VIII
293
Sectional Anatomy Quiz II
294
Sectional Anatomy Quiz- III
295
Sectional Anatomy Quiz IV
296
Sectional Anatomy Quiz–IΧ
297
Sectional and discrete representations of floc breakage in agitated suspensions
298
Sectional curvature bounds in gravity: regularisation of the Schwarzschild singularity Original Research Article
299
SECTIONAL CURVATURE OF TIMELIKE RULED SURFACE PART I: LORENTZIAN BELTRAMI-EULER FORMULA
300
Sectional finite element analysis of coupled deformation between elastoplastic sheet metal and visco-elastoplastic body
301
Sectional finite element analysis of forming processes for aluminum-alloy sheet metals
302
Sectional finite element analysis of forming processes for aluminum-alloy sheet metals
303
Sectional finite element analysis of forming processes for aluminum-alloy sheet metals
304
Sectional Fixed Orthodontic Extrusion Technique in Management of Teeth with Complicated Crown-Root Fractures: Report of Two Cases
305
SECTIONAL LIFT FORCES FOR AN OSCILLATING CIRCULAR CYLINDER IN SMOOTH AND TURBULENT FLOWS
306
SECTIONAL MANDIBULAR COMPLETE DENTURE FOR A TOTAL MAXILLECTOMY PATIENT WITH TRISMUS: A CLINICAL REPORT
307
Sectional model investigation at high Reynolds number for a super tall building
308
Sectional moving window factor analysis for diagnosing elution chromatographic patterns
309
Sectional power-law correction for the accurate determination of lutetium by isotope dilution multiple collector-inductively coupled plasma-mass spectrometry
310
Sectional Warping Corrective Model for Free Edge Stresses in Composite Laminates
311
Sectional-curvature preserving skinning surfaces Original Research Article
312
SectionBuilder: An innovative finite element tool for analysis and design of composite rotor blade cross-sections
313
Section-dependent microstructure and mechanical properties of rapidly solidified and extruded Al–20Si alloy
314
Section-retraction-pairs between fuzzy domains
315
Sections and elections – Reflections on the early 2008 U.S. presidential primaries
316
Sections and Lacunary Sums of Linearly Recurrent Sequences
317
Sections of convex bodies and splitting problem for selections
318
Sections of maps with fibers homeomorphic to a two-dimensional manifold
319
Sections of Serre fibrations with 2-manifold fibers
320
Sections, selections and Prohorovʹs theorem
321
Sector analysis for a FTSE portfolio of stocks
322
Sector collapse of the SW flank of Volcán de Colima, México: The 3600 yr BP La Lumbre–Los Ganchos debris avalanche and associated debris flows
323
Sector collapses and large landslides on Late Pleistocene–Holocene volcanoes in Kamchatka, Russia
324
Sector field inductively coupled plasma mass spectrometry, another tool for plutonium isotopes and plutonium isotope ratios determination in environmental matrices
325
Sector imaging radar for enhanced vision
326
Sector modeling for the prediction and evaluation of Cretan olive oil
327
Sector multipad prototype of the FMD-MCP detector for ALICE
328
Sector multipad prototype of the FMD-MCP detector for ALICE
329
Sector review of UK higher education energy consumption
330
Sector strength and efficiency on developed and emerging financial markets
331
Sectoral adjustment costs and real exchange rate dynamics in a two-sector dependent economy
332
Sectoral analysis for international technology development and transfer: Cases of coal-fired power generation, cement and aluminium in China
333
Sectoral analysis of calendar effects in Malaysia: Post financial crisis (1998-2008)
334
Sectoral analysis of the causal relationship between electricity consumption and real output in Pakistan
335
Sectoral and geographical contributions to summertime continental United States (CONUS) black carbon spatial distributions
336
Sectoral and macroeconomic impacts of the large combustion plants in Poland: A general equilibrium analysis
337
Sectoral and regional impacts of the European carbon market in Portugal
338
Sectoral CO2, CH4, N2O and SO2 emissions from fossil fuel consumption in Nagpur City of Central India
339
Sectoral collaboration in biomedical research and development
340
Sectoral Contributions to Total Factor Productivity: Another Perspective on the Growth Slowdown
341
Sectoral crediting mechanism: How far China has to go
342
Sectoral dynamics and natural resource management
343
Sectoral emission inventories of greenhouse gases for 1990 on a per country basis as well as on 1°×1°
344
Sectoral energy consumption by source and economic growth in Turkey
345
Sectoral energy consumption in Iran
346
Sectoral energy consumption in Turkey
347
Sectoral Evaluation of EIA Practice in the Sudan
348
Sectoral Evaluation on the Relationship of Knowledge Management and Organizational Wisdom: Example of Metals and Machinery Sectors
349
Sectoral Innovation Systems in Low-tech Manufacturing: Types, Sources, Drivers and Barriers of Innovation in Malaysia’s Wooden Furniture Industry
350
Sectoral interactions in the Scottish coastal zone: Measuring sustainability in theory and practice
351
Sectoral investment in health: Prescription or principles?
352
Sectoral output trends and cycles in Victorian Britain
353
Sectoral patterns of small firm innovation, networking and proximity
354
Sectoral Phillips curves and the aggregate Phillips curve
355
Sectoral price data and models of price setting
356
Sectoral price data and models of price setting
357
Sectoral price rigidity and aggregate dynamics
358
Sectoral Restructuring and Labor Mobility: A Comparative Look at the Czech Republic
359
Sectoral shifts and structural change in the Japanese economy: Evidence and interpretation
360
Sectoral shifts and the mobility of displaced workers: When are microdata useful?
361
Sectoral Shocks and Metropolitan Employment Growth
362
Sectoral shocks and movement costs: Effects on employment and welfare
363
Sectoral shocks, human capital, and displaced workers
364
Sectoral Solow residuals
365
Sectoral sources of metropolitan growth
366
Sectoral spillovers and the price of land: a cost analysis
367
Sectoral strategic differences of technological development between electronics and chemistry: a historical view from analyses of Korean-invented US patents during the period of 1989–1992
368
Sectoral systems of innovation and production
369
Sectoral thermal emitter for testing of modern IR systems
370
Sectoral trends in global energy use and greenhouse gas emissions
371
SectoralPhillipscurvesandtheaggregatePhillipscurve
372
Sectorial operators and normalized numerical range Original Research Article
373
Sectorisation psychiatrique : évolution et perspectivesPsychiatric sectorization. Evolution and perspectives
374
Sectors expressing the homeobox gene liguleless3 implicate a timedependent mechanism for cell fate acquisition along the proximaldistal axis of the maize leaf : Muehlbauer GJ, Fowler JE, Freeling PMa:g PDersee v9ve3ile-o9wp4 m en tP 1D9F9 7(3,
375
Sectors of solutions in three-dimensional gravity and black holes Original Research Article
376
Sector-zoned augite megacrysts in Aleutian high alumina basalts: implications for the conditions of basalt crystallization and the generation of calc-alkaline series magmas
377
Secu’amamines E–G, new alkaloids from Securinega suffruticosa var. amamiensis
378
Secuʹamamine A, a novel indolizidine alkaloid from Securinega suffruticosa var. amamiensis
379
Secular and Koranic literacies in South Asia: From colonisation to contemporary practice
380
Secular and seasonal variation of length and weight at birth
381
Secular apocalyptic and Thomas Hardy
382
Secular apsidal configuration of non-resonant exoplanetary systems
383
Secular change in characteristics of thyristors used in HVDC valve
384
Secular change in northwestern Tethyan water-mass oxygenation during the late Hauterivian–early Aptian
385
Secular changes at the Earthʹs surface; evidence from palaeosols, some sedimentary rocks, and palaeoclimatic perturbations of the Proterozoic Eon
386
Secular changes in disability among middle-aged and elderly finns with and without coronary heart disease from 1978–1980 to 2000–2001
387
Secular changes in geologic and tectonic processes
388
Secular changes in sedimentation systems and sequence stratigraphy
389
Secular changes in the relation between social factors and depression: A study of two birth cohorts of Swedish septuagenarians followed for 5 years
390
Secular Changes of Anthropometric Parameters in Newborns from Gracanica Area in the Period from 1998 to 2008
391
Secular changes of the M tide in the Gulf of Maine
392
Secular cooling and thermal structure of continental lithosphere
393
Secular declines in cognitive test scores: A reversal of the Flynn Effect
394
Secular dynamics of the three-body problem: application to the υ Andromedae planetary system
395
Secular Effects on Orbits of Binary Stars Induced by Temporal Variation of Gravitational Constant (Case for Elliptical Orbit)
396
Secular environmental precursors to Early Toarcian (Jurassic) extreme climate changes
397
Secular evolution of the Neoproterozoic lithospheric mantle underneath the northern margin of the Yangtze Block, South China
398
Secular geochemical variations of the Lower Cretaceous siliciclastic rocks from central Tibet (China) indicate a tectonic transition from continental collision to back-arc rifting
399
Secular glacier mass balances derived from cumulative glacier length changes
400
Secular growth estimates for hyperbolic systems
401
Secular improvement in self-care independence of old people living in community in Kahoku, Japan
402
Secular increase of F2 peak altitude at northern temperate latitudes Original Research Article
403
Secular Increases in Body Fat Percentage in Male Children of Zaragoza, Spain, 1980–1995
404
Secular Law and Custom in Ducal Normandy, c. 1000–1144
405
Secular light curve of 2P/Encke, a comet active at aphelion
406
Secular light curve of comet 103P/Hartley 2, target of the EPOXI mission
407
Secular light curve of Comet 28P/Neujmin 1 and of spacecraft target Comets 1P/Halley, 9P/Tempel 1, 19P/Borrelly, 21P/Giacobinni–Zinner, 26P/Grigg–Skjellerup, 67P/Churyumov–Gerasimenko, and 81P/Wild 2
408
Secular light curve of Comet 28P/Neujmin 1 and of spacecraft target Comets 1P/Halley, 9P/Tempel 1, 19P/Borrelly, 21P/Giacobinni–Zinner, 26P/Grigg–Skjellerup, 67P/Churyumov–Gerasimenko, and 81P/Wild 2
409
Secular light curve of Comet 9P/Tempel 1
410
Secular light curve of Comet 9P/Tempel 1
411
Secular light curves of comets
412
Secular light curves of comets, II: 133P/Elst–Pizarro, an asteroidal belt comet
413
Secular oscillations in the carbonate mineralogy of reef-building and sediment-producing organisms driven by tectonically forced shifts in seawater chemistry
414
Secular spin dynamics of inner main-belt asteroids
415
Secular stability and reliability of measurements of the percentage of dense tissue on mammograms
416
Secular stability and total stability Original Research Article
417
Secular State, Citizenship and the Matrix of Globalized Religious Identity
418
Secular Trend in Thinness Prevalence for 26 Years (1989 - 2014) among High School Runners in Japan
419
Secular trend of academician aging
420
Secular Trend of Birth Height and Weight in a Population of Iranian Neonates during 1991 and 2011
421
Secular Trend of Menopausal Age and Related Factors among Tehrani Women Born from 1930 to 1960; Tehran Lipid and Glucose Study
422
Secular trends and seasonality in first-time hospitalization for acute myocardial infarction—a Danish population-based study
423
Secular Trends and Socioeconomic Differentials in Menarcheal Age for South Korean Women
424
Secular Trends in Alcohol Consumption over 50 Years: The Framingham Study
425
Secular trends in bloodstream infection caused by antimicrobial-resistant bacteria in New Jersey hospitals, 1991 to 1995
426
Secular trends in cancer mortality, California 1970–1998
427
Secular trends in cardiovascular disease mortality, incidence, and case fatality rates in adults in the United States
428
Secular trends in cognitive test performance: Swedish conscript data 1970–1993
429
Secular trends in coronary heart disease mortality, hospitalization rates, and major cardiovascular risk factors in Taiwan, 1971–2001
430
SECULAR TRENDS IN GROWTH AMONG SCHOOL CHILDREN OF SHIRAZ (SOUTHERN IRAN) BORN IN THE POST-WAR PERIOD
431
Secular trends in leisure-time physical activity in men and women across four decades
432
Secular trends in mortality associated with new therapeutic strategies in surgical critical illness
433
Secular trends in mortality by stroke subtype in the 20th century: a retrospective analysis
434
Secular Trends in Nosocomial Bloodstream Infections in a 55-Bed Cardiothoracic Intensive Care Unit
435
Secular Trends in Overweight and Obesity among Urban Children in Guangzhou China, 2007-2011
436
Secular trends in prevalence of diabetes among younger patients admitted with acute myocardial infarction
437
Secular trends in stroke mortality and early-life environment
438
Secular trends in the geologic record and the supercontinent cycle
439
Secular trends in the melting depths of mantle plumes: Evidence from HFSE/REE systematics of Archean high-Mg lavas and modern oceanic basalts
440
Secular trends in the national prevalence of overweight and obesity during 2007-2009 in 6-year-old Iranian children
441
Secular trends in the physical performance of Australian school children
442
Secular trends in the prevalence of atrial fibrillation: The Framingham study
443
Secular Trends of Global Burden of Violence, 1990–2015: In Spite of Successes, Women and Children Are Highly Affected in Low- and the Middle-Income Countries
444
Secular trends of heart failure among US male physicians
445
Secular trends of motor vehicle mortality in the United States, 1910–1994
446
Secular values and the location of religion: A spatial analysis of an English medical centre
447
Secular variation in carbon uptake into the ocean crust
448
Secular variation in Mexico during the last 40,000 years
449
Secular variation in numerical geodynamo models with lateral variations of boundary heat flow
450
Secular variation in Permian red beds from Dôme de Barrot, SE France
451
Secular variation in Permian red beds from Dôme de Barrot, SE France
452
Secular variation in Phanerozoic marine biocalcification and the original mineralogy and mode of calcification of receptaculitids: a discussion
453
Secular variation in Phanerozoic marine biocalcification and the original mineralogy and mode of calcification of receptaculitids: a reply
454
Secular variation of Nd and Pb isotopes in ferromanganese crusts from the Atlantic, Indian and Pacific Oceans
455
Secular variation of the geomagnetic field intensity during the past 2000 years in Japan
456
Secular variation study from non-welded pyroclastic deposits from Montagne Pelée volcano, Martinique (West Indies)
457
Secular variations in magmatism during a continental arc to post-arc transition: Plio-Pleistocene volcanism in the Lake Tahoe/Truckee area, Northern Sierra Nevada, California
458
Secular variations of carbon and helium isotopes at Izu-Oshima Volcano, Japan
459
Secular variations of helium and carbon isotopes at Galeras volcano, Colombia
460
Secular variations of OH nightglow emission and of the OH intensity-weighted temperature induced by gravity–wave forcing in the MLT region Original Research Article
461
Secular variations of the Earthʹs apparent resistivity
462
Secular vs. Sacred Paradigms in Science, Technology, and Economics: Crises of the Enlightenment and Search for an Alternative Paradigm
463
Secular, episodic changes in stable carbon isotope composition of crude oils
464
Secundum ASD closure using a right lateral minithoracotomy: Five-Year experience in 122 patients
465
Secundum Atrial Septal Defect
466
Secundum atrial septal defect is a dynamic three-dimensional entity,
467
Secur(e/ity) Management: A Continuing Uphill Climb
468
Secure acknowledgment aggregation and multisignatures with limited robustness
469
Secure agent data integrity shield
470
Secure and Defensive High Self-Esteem
471
Secure and Efficient Image Hiding Method and Model for Digital Content Access Control
472
Secure and Efficient SIP Authentication Scheme for Converged VoIP Networks
473
Secure and Fast Aggregation of Financial Data in Cloud-Based Expense Tracking Applications
474
Secure and Imperceptible Image Steganography in Discrete Wavelet Transform Using the XOR Logical Function and Genetic Algorithm
475
Secure and lightweight advertising on the Web
476
Secure and Low-Area Implementation of the AES Using FPGA
477
Secure and optimal operation of a power generation and transmission system-application to the Moroccan system
478
Secure and scalable many-to-one symbol transmission for sensor networks
479
Secure Arithmetic Coding
480
Secure Arithmetic Coding with Error Detection Capability
481
Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks
482
Secure authentication system that generates seed from biometric information
483
Secure automated request processing software for DataGrid certification authorities
484
Secure automated request processing software for DataGrid certification authorities
485
Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
486
Secure biometric template generation for multi-factor authentication
487
Secure Bit: Transparent, Hardware Buffer-Overflow Protection
488
Secure broadcasting in large networks
489
Secure brokerage mechanisms for mobile electronic commerce
490
Secure Channel Coding Schemes based on Algebraic-Geometric Codes over Hermitian Curves
491
Secure chaotic system with application to chaotic ciphers
492
Secure Coding Guidelines — Python
493
Secure Collaborative Spectrum Sensing for Distributed Cognitive Radio Networks
494
Secure Collaborative Spectrum Sensing in the Presence of Primary User Emulation Attack in Cognitive Radio Networks
495
Secure collaborative supply chain planning and inverse optimization – The JELS model
496
Secure communication by chaotic synchronization: Robustness under noisy conditions
497
Secure communication for electronic business applications in mobile agent networks
498
Secure Communication in Shotgun
499
Secure communication protocols with discrete nonlinear chaotic maps
500
Secure communication via multiple parameter modulation in a delayed chaotic system
501
Secure communication via parameter modulation in a class of chaotic systems
502
Secure communications based on the synchronization of the hyperchaotic Chen and the unified chaotic systems
503
Secure Communications in Group-based Wireless Sensor Networks
504
Secure communications of chaotic systems with robust performance via fuzzy observer-based design
505
Secure computation with horizontally partitioned data using adaptive regression splines
506
Secure computation with horizontally partitioned data using adaptive regression splines
507
Secure construction of k-unlinkable patient records from distributed providers
508
Secure content access and replication in pure P2P networks
509
Secure data aggregation without persistent cryptographic operations in wireless sensor networks
510
Secure digital communication using controlled projective synchronisation of chaos
511
Secure digital communication using discrete-time chaos synchronization
512
Secure distributed constraint satisfaction: reaching agreement without revealing private information Original Research Article
513
Secure distributed intelligent networks
514
Secure domination critical graphs
515
Secure dynamic anycasting for ‘best’ server selection using active networks
516
Secure dynamic fragment and replica allocation in large-scale distributed file systems
517
Secure Dynamic Interactive Blood Bank based on Cognitive Computing
518
Secure E-Mail Messaging to Selected Group Members Using PGP Technique
519
SECURE E-MAIL SYSTEM USING S/MIME AND IB-PKC
520
Secure emergency communication of cellular phones in ad hoc mode
521
Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system
522
Secure energy supply in 2025: Indonesiaʹs need for an energy policy strategy
523
Secure Environment via Prediction of Software Vulnerabilities-Severity
524
Secure Erasure Code-Based Cloud Storage with Secured Data Forwarding Using Conditional Proxy Re-Encryption (C-PRE)
525
Secure Flow: a totally integrated transportation security system
526
Secure FPGA Design by Filling Unused Spaces
527
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
528
Secure from Rash Assault: Sustaining the Victorian Environment
529
Secure group communication in wireless mesh networks
530
Secure Group Communication Using Multicast Key Distribution Scheme in Ad hoc Network (SGCMKDS)
531
Secure group communications using key graphs
532
Secure group key agreement protocol based on chaotic Hash
533
Secure group key management for storage area networks
534
Secure hosts auto-configuration in mobile ad hoc networks
535
Secure Image Data by Double encryption
536
Secure implementation experiments: Do strategy-proof mechanisms really work?
537
Secure Implementation of Channel Abstractions
538
Secure Internet management by delegation
539
Secure interoperation design in multi-domains environments based on colored Petri nets
540
Secure IoT Resources with Access Control over RESTful Web Services
541
Secure IP over Satellite DVB Using Chaotic Sequences
542
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
543
Secure Key Management Scheme for Hierarchical Network Using Combinatorial Design
544
Secure localization with phantom node detection
545
Secure Location Verification Using Radio Broadcast
546
Secure many-to-one symbol transmission for implementation on smart cards
547
Secure Marketing Website
548
Secure mechanical verification of mutually recursive procedures
549
Secure median computation in wireless sensor networks
550
Secure medical image communication using ROI based lossless watermarking and novel digital signature
551
Secure Message Broadcasting in VANET Using RSU based Authentication and Cascade Encryption
552
Secure message transmission in mobile ad hoc networks
553
Secure Method for Software Upgrades for Implantable Medical Devices
554
Secure Mobile Architecture (SMA) – A way to fix the broken Internet
555
Secure mobile business applications – framework, architecture and implementation
556
SECURE MONOPHONIC DOMINATION NUMBER OF SUBDIVISION OF GRAPHS
557
Secure multicast in dynamic environments
558
Secure multi-party computation made simple Original Research Article
559
Secure multiplication of shared secrets in the exponent
560
Secure neighbor discovery and wormhole localization in mobile ad hoc networks
561
Secure network for beamline control
562
Secure network for beamline control
563
Secure Optical Data Storage with Random Phase Key Codes by use of a Configuration of a Joint Transform Correlator
564
Secure Outsourcing of Two Standard Identity-Based Cryptosystems
565
Secure P2P Data Storage andMaintenance
566
Secure Payment in E-commerce: Deal with Keyloggers and Pishings.
567
Secure performance enhancing proxy: To ensure end-to-end security and enhance TCP performance over IPv6 wireless networks
568
Secure position-based routing protocol for mobile ad hoc networks
569
Secure probabilistic location verification in randomly deployed wireless sensor networks
570
Secure Protocols or How Communication Generates Correlation
571
Secure public-key encryption scheme without random oracles
572
Secure quantum report with authentication based on GHz states and entan-glement swapping
573
Secure query processing against encrypted XML data using Query-Aware Decryption
574
Secure reliable multicast protocols in a WAN
575
Secure remote user access over insecure networks
576
Secure routing in mobile wireless ad hoc networks
577
Secure routing in wireless sensor networks: attacks and countermeasures
578
Secure SCADA communication by using a modified key management scheme
579
Secure semi-blind watermarking based on iteration mapping and image features
580
Secure Sensitive Data Sharing on a Big Data Platform
581
Secure sensor networks for perimeter protection
582
Secure Service Discovery based on Trust Management for ad-hoc Networks1
583
Secure shared data-space coordination languages: A process algebraic survey
584
Secure Signature Protocol
585
Secure Signature Protocol
586
Secure Software Engineering: A New Teaching Perspective Based on the SWEBOK
587
Secure spread spectrum watermarking for multimedia
588
Secure Spread: An Integrated Architecture for Secure Group Communication
589
Secure Style, PWB-related Gratitude and SWB-related Engagement as Predictors of Affect Balance among Social Science Students in Malaysia: A Pilot Study
590
Secure synchronization of a class of chaotic systems from a nonlinear observer approach
591
Secure Text Message in Audio Using LSB Based Steganography
592
Secure the volume: Vertical geopolitics and the depth of power
593
Secure threshold multi authority attribute based encryption without a central authority
594
Secure tightening of a CMC fastener for the heat shield of re-entry vehicles
595
Secure Transmission for Nano-Memories using Fault Secure Encoder and Decoder
596
Secure trust delegation for sharing patient medical records in a mobile environment
597
Secure untraceable off-line electronic cash system
598
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Technology
599
SECURE WATERMARKING BASED ON SVD AND WAVELETS
600
Secure Web Development Based on Vulnerabilities
601
Secure web-based invocation of large-scale plasma simulation codes Original Research Article
602
Secured Access Control in Security Information and Event Management Systems
603
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors
604
Secured debt and the likelihood of reorganization
605
Secured Encryption - Concept and Challenge
606
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
607
Secured operating regions of Slotted ALOHA in the presence of interfering signals from other networks and DoS attacking signals
608
Secured Preemptive DSR(S-PDSR): An integration of SRP and SMT with Preemptive DSR for Secured Route Discovery
609
Secured Requirement Specification Framework ( RSF)
610
Secured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks
611
Secured Toll Surveillance System through Combination of KNN, Outguess and DES
612
SecureKV: Secure Searchable Outsourcing of Key-Value Databases to the Public Cloud
613
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
614
Securin depletion sensitizes human colon cancer cells to fisetin-induced apoptosis
615
Securin Is Required for Chromosomal Stability in Human Cells
616
Securing a distributed environment — A practical case study
617
Securing access to drylands resources for multiple users in Africa: A review of recent research
618
Securing bulk content almost for free
619
Securing Clusterheads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining
620
Securing credit card transactions with one-time payment scheme
621
Securing decent work and living conditions in low-income urban settlements by linking social protection and local development: A review of case studies
622
Securing Designs against Scan-Based Side-Channel Attacks
623
Securing Digital Content
624
Securing digital signatures for non-repudiation
625
Securing distributed adaptation
626
Securing DNA Information from Selective Attacks on Humans
627
Securing DSR with mobile agents in wireless ad hoc networks
628
Securing energy equity
629
Securing future ATM-conceptsʹ safety by measuring situation awareness in ATC
630
Securing fuzzy vault schemes through biometric hashing
631
Securing graduate commitment: an exploration of the comparative expectations of placement students, graduate recruits and human resource managers within the hospitality, leisure and tourism industries
632
Securing high resolution grayscale facial captures using a blockwise coevolutionary GA
633
SECURING INTERPRETABILITY OF FUZZY MODELS FOR MODELING NONLINEAR MIMO SYSTEMS USING A HYBRID OF EVOLUTIONARY ALGORITHMS
634
Securing knowledge in organizations: lessons from the defense and intelligence sectors
635
Securing life through technology acceptance: The first six months after transvenous internal cardioverter defibrillator implantation
636
Securing lower costs for the present and future
637
Securing MDSplus in a multi-organisation environment
638
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
639
SECURING NETWORK TRAFFIC USING GENETICALLY EVOLVED TRANSFORMATIONS
640
Securing Networks with Convolutional Long Short-term Memory Based Traffic Prediction and Attention Mechanism for Intrusion Detection
641
Securing oil and gas infrastructure
642
Securing PCs and data in libraries and schools : by Allen C. Benson. New York, NY: Neal-Schuman Publishers, Inc., 1997. 252p. $125.00 (book and CD-ROM). ISBN 1-55570-321-6
643
Securing Preservation Funds: National and Institutional Requirements
644
Securing privacy at work: the importance of contextualized consent
645
Securing quality and equity in education: Lessons from PISA
646
Securing recompense under nuisance law for crop damages from pesticide applications Original Research Article
647
Securing Reliability Constrained Technology Combination for Isolated Micro-Grid Using Multi-Agent Based Optimization
648
Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure
649
Securing reproductive rights
650
Securing reproductive rights
651
Securing RFID systems conforming to EPC Class 1 Generation 2 standard
652
Securing Safe Plasma for Fractionation the Duty of any Country
653
Securing sensor networks: A novel approach that combines encoding, uncorrelation and node disjoint transmission
654
Securing services in nomadic computing environments
655
Securing the Critical IP Infrastructure
656
Securing the future by remembering the past: But just when does this past and future begin to develop?
657
Securing the Future of Ground Water Resources in the Great Lakes Basin
658
Securing the future: the transfusion of physicians overseas
659
Securing the nation against terrorism
660
Securing the operational reliability of an autonomous mini-submarine
661
Securing the operational reliability of an autonomous mini-submarine
662
Securing the Shell — Implementing a Host Level Default Deny Policy
663
Securing the volume/volumen: Comments on Stuart Eldenʹs Plenary paper ‘Secure the volume’
664
Securing Water Distribution Systems Using Online Contamination Monitoring
665
Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme
666
Securiosides A and B, novel acylated triterpene bisdesmosides with selective cytotoxic activity against M-CSF-stimulated macrophages
667
Sécurisation de l’activité de radiothérapie bi-site dans le cadre de la reprise des traitements au centre hospitalier d’Épinal par l’équipe du centre Alexis-Vautrin de Nancy
668
Sécurité des traitements en radiothérapie externe
669
Sécurité en curiethérapie
670
Sécurité en radiothérapie : le contrôle des logiciels et des systèmes informatiques
671
Sécurité en radiothérapie : résultats de trois ans d’expérience avec la Mission nationale d’expertise et d’audits hospitalier (MEAH)
672
Sécurité et transparence: Au cœur de la culture des oncologues radiothérapeutes
673
Securities legislation and the accounting profession in the 1930s: The rhetoric and reality of the American Dream
674
Securities lending, shorting, and pricing
675
Securities Price Consequences of the Private Securities Litigation Reform Act of 1995 and Related Events
676
Securitisation and the bank lending channel
677
Securitising Threats without the State: A casestudy of misgovernance as a security threat inBangladesh
678
Securitization and distressed loan renegotiation: Evidence from the subprime mortgage crisis
679
Securitization markets and central banking: An evaluation of the term asset-backed securities loan facility
680
Securitization of catastrophe mortality risks
681
Securitization of energy supply chains in China
682
Securitization of Migration in Europe: Critical Reflections on Turkish Migration Practices
683
Securitization of motor insurance loss rate risks
684
Securitization trumps competition
685
Securitization without adverse selection: The case of CLOs
686
Securitization without risk transfer
687
Securitization, structuring and pricing of longevity risk
688
Securitization: a state attorney generalʹs perspective
689
SECURITIZATION: EVALUTION FROM LEGAL LEGITIMACY TO POLITICAL LEGITIMACY COPENHAGEN SCHOOL
690
Securitizationmarketsandcentralbanking:Anevaluationofthe term asset-backedsecuritiesloanfacility
691
Securitized Transition Costs: Rethinking Who Wins and Who Loses
692
Securitizing and tranching longevity exposures
693
Security adoption and influence of cyber-insurance markets in heterogeneous networks
694
Security Agents Public Perception in Nigeria: A Study on the Police and the Vigilante (Neighborhood Watch)
695
Security Analysis and Improvement of an Access Control Scheme for Wireless Body Area Networks
696
Security Analysis and Improvement of Wei-Chi Ku and Yi-Han Chen’s RFID protocol
697
Security Analysis Method of Recognition-based Graphical Password
698
Security analysis of a chaos-based image encryption algorithm
699
Security Analysis of a Hash-Based Secret Sharing Scheme
700
Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol
701
Security analysis of chaotic communication systems based on Volterra–Wiener–Korenberg model
702
Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking
703
Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati
704
Security Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati
705
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
706
Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN
707
Security analysis of the SCO-family using key schedules
708
Security Analysis of Three Password Authentication Schemes
709
Security Analysis of Two Lightweight Certificateless Signature Schemes
710
Security and climate change
711
Security and coordination in a clandestine organization
712
Security and Crime Prevention in Academic Libraries: A Case Study of the Kano State College of Education, Kano, Nigeria
713
Security and Data Privacy of Medical Information in Blockchain Using Lightweight Cryptographic System
714
Security and Fault aware Scheduling in Computational Grid
715
Security and Feasibility of Laparoscopic Rectal Cancer Resection in Morbidly Obese Patients
716
Security and Management of Local Computer Data
717
Security and Maximal Tolerated Doses of Fluvastatin In Pediatric Cancer Patients
718
SECURITY AND PEACE MECHANISMS FOR GOOD GOVERNANCE IN NIGERIA: ISLAMIC PARADIGM SHIFTS
719
Security and potential level preferences with thresholds
720
Security and privacy analysis based on Internet of Things in the fourth industrial generation (Industry 4.0)
721
Security and Privacy Challenges in the Internet of Things
722
Security and Privacy Challenges in Vehicular Cloud Computing
723
Security and Privacy Criteria to Evaluate Authentication Mechanisms in Proxy Mobile IPv6
724
Security and privacy for storage and computation in cloud computing
725
Security and privacy in sensor networks
726
Security and Privacy in VANET to reduce Authentication Overhead for Rapid Roaming Networks
727
Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes
728
Security and Reliability Trade-off in Device to Device Communications with Untrusted Relays
729
Security and revenue reconciliation in optimal transmission pricing
730
Security and risks in travel and tourism
731
Security and Software Architectures
732
Security and stability control system for offshore platforms power grid
733
Security and the digital library: a look at authentication and authorization issues
734
Security and the problem of context: a hermeneutical critique of securitisation theory
735
Security and tolerable risk for hydrogen service stations
736
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
737
Security applications of peer-to-peer networks
738
Security Architecture in the Persian Gulf: A Comprehensive Appraisal
739
Security architecture testing using IDS—a case study
740
Security Arrangements of the Persian Gulf and the Strategic Competition of Iran and USA
741
Security Assessment of Web Based Distributed Applications
742
Security Assurance: An Authentication Initiative by Checklist
743
Security Barrier Design
744
Security bid/ask dynamics with discreteness and clustering: Simple strategies for modeling and estimation
745
Security boundary visualization for systems operation
746
Security broker for multimedia wireless LANs
747
Security Challenges in Android mHealth Apps Permissions: A Case Study of Persian Apps
748
Security Challenges in Cloud Storage
749
Security Challenges in wireless sensor networks
750
Security classification reviews and the search for reform
751
Security concepts for the dynamics of autonomous vehicle networks
752
Security Concerns in IP-Based Telephony: Covering TIPHON as a Case Study
753
Security concerns in the Middle East for oil supply: Problems and solutions
754
Security considerations for broadcast systems
755
Security considerations for the spiral development model
756
Security considerations in ad hoc sensor networks
757
Security considerations in outsourcing IT services
758
Security considerations in the use of biometric devices
759
Security constrained economic dispatch using nonlinear Dantzig-Wolfe decomposition
760
Security constrained optimal power flow for an economical operation of FACTS-devices in liberalized energy markets
761
Security constrained optimal power flow in a power system based on energy storage system with high wind penetration
762
Security Constrained Reactive Power Scheduling Considering N-1 Contingency of Transmission Lines
763
Security Constrained Unit Commitment by a new adaptive hybrid stochastic search technique
764
Security Constrained Unit Commitment in the Simultaneous Presence of Demand Response Sources and Electric Vehicles
765
Security Culture and Security Awareness as the Basic Factors for Security Effectiveness in Health Information Systems
766
Security Debates and Alliance against Terrorism
767
SECURITY DEPLOYMENT IN MOBILE ADHOC NETWORKS
768
Security design and the allocation of voting rights: Evidence from the Australian IPO market
769
SECURITY DESIGN, INCOMPLETE CONTRACTS AND RELATIONAL CONTRACTING: IMPLICATIONS FOR ACCOUNTING AND AUDITING
770
Security Dilemma in South Asia
771
Security dispatch using the Hopfield neural network
772
Security enforcement aware software development
773
Security enhanced accountable anonymous PKI certificates for mobile e-commerce
774
Security Enhancement and Performance Assessment in Blockchain-based Smallholder Palm Oil Supply Chain
775
Security enhancement for digital signature schemes with fault tolerance in RSA
776
security enhancement in open-source healthcare developer network using graph theory
777
Security Enhancement of an Authentication Scheme Based on DAC and Intel SGX in WSNs
778
Security enhancement of an IC-card-based remote login mechanism
779
Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach
780
Security evaluation and certification: The future of a national scheme
781
Security factors as linear combinations of economic variables
782
Security flaws of remote user access over insecure networks
783
Security for cluster based ad hoc networks
784
Security for Distributed Databases
785
Security for eBusiness
786
Security for the Third Generation (3G) Mobile System
787
Security For Three-Tiered Web Application
788
Security for Workflow Systems
789
Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review
790
Security Framework of IoT-Based Smart Home
791
SECURITY GAME: SEATO and CENTO as Instrument of Economic and Military Assistance to Encircle Pakistan
792
Security implications of implementing active network infrastructures using agent technology
793
Security improvement on an anonymous key agreement protocol based on chaotic maps
794
Security in computer networks and distributed systems
795
Security in CORBA distributed object systems
796
Security in CORBA-based electronic commerce systems
797
Security in Cyberspace in the Field of International Relations
798
Security in Federated Database Systems
799
Security in graphs Original Research Article
800
Security in Information Systems: New Advances and Tendencies
801
Security in Information Systems: New Challenges and Opportunities
802
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
803
Security in Mobile IPv6: A survey
804
Security in SRAM FPGAs
805
Security in storage [standards]
806
Security in Telemedicine-based IoT
807
Security in the ED: Legislation paves the way
808
Security in the Semantic Web using OWL
809
Security in third Generation Mobile Networks
810
Security in Wireless Local Area Network (WLAN)
811
Security in XML-based financial reporting services on the Internet
812
Security Issues and Attacks on the GSM Standard: a Review
813
Security issues and solutions in multicast content distribution: a survey
814
Security issues in a satellite global GSM network
815
Security issues in control, management and routing protocols
816
Security Issues in Cyber Warfare
817
Security issues in todayʹs corporate network
818
Security Issues of the Digital Certificates within Public Key Infrastructures
819
Security Issues of Wireless Communication Networks.
820
Security issues related to mobile code and agent-based systems
821
Security Lending and The relationship between Short Selling in ISE and Takasbank Lending Borrowing Market Commission Rates
822
Security management and deployment of distributed digital mine system
823
Security Management in Distributed IT Applications
824
Security Market Reaction to Purchase Business Combinations at the First Earnings Announcement Date
825
Security markets and the information content of monetary policy turning points
826
Security Measurement in Industrial IoT with Cloud Computing Perspective: Taxonomy, Issues, and Future Directions
827
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents
828
SECURITY METRICS FOR CLOUD BASED INFORMATION RETRIEVAL SYSTEM
829
Security middleware approaches and issues for ubiquitous applications
830
Security modeling for power system reliability evaluation
831
Security monitoring in heterogeneous globally distributed environments
832
Security number of grid-like graphs
833
Security of a key agreement protocol based on chaotic maps
834
Security of Data of EHR in a grid computing Environment
835
Security of electricity supply at the generation level: Problem analysis
836
Security of energy supply in Turkey: Challenges and solutions
837
Security of energy supply: Comparing scenarios from a European perspective
838
Security of industrial sensor network-based remote substations in the context of the Internet of Things
839
Security of Information and Communication Networks
840
Security of interdependent and identical networked control systems
841
Security of Iris Recognition and Voice Recognition Techniques
842
Security of land tenure revised: the case of CRRU in Recife and Porto Alegre, Brazil
843
Security of most significant bits of gx2
844
Security of polynomial transformations of the Diffie–Hellman key
845
Security of public-key cryptosystems based on Chebyshev polynomials
846
Security of Random Data Perturbation Methods
847
Security of residence and expulsion: protection of aliens in Europe: Elspeth Guild and Paul Minderhoud (Eds.) (2000) Kluwer Law International, ISBN 9041114580, 256 pages, £67
848
Security of supply and regulation of energy networks
849
Security of supply and retail competition in the European gas market.: Some model-based insights
850
Security of supply, energy spillage control and peaking options within a 100% renewable electricity system for New Zealand
851
Security of tenure and the way forward: The case of Samakee Pattana, Bangkok
852
Security of the redefined Liaw’s broadcasting cryptosystem
853
Security of Tseng–Janʹs group signature schemes
854
Security of two remote user authentication schemes using smart cards
855
Security of Tzengs time-bound key assignment scheme for access control in a hierarchy
856
Security of Wang et al.ʹs group-oriented (t,n) threshold signature schemes with traceable signers
857
Security of wireless keyboards: threats, vulnerabilities and countermeasures
858
Security on Fragile and Semi-fragile Watermarks Authentication
859
Security on Mobile Agent Based Crawler (SMABC)
860
Security on the US fusion grid
861
Security Optimization for Distributed Applications Oriented on Very Large Data Sets
862
Security Optimization of VTP Model in an Enterprise VLAN
863
Security patterns and surface model in landscape ecological planning
864
Security performance
865
Security performance of loaded IEEE 802.11b wireless networks
866
Security pitfalls of frame-by-frame approaches to video watermarking
867
Security platforms in the telecommunication market: technologies, developments and regulations
868
Security Policy Based on Firewall and Intrusion Detection System.
869
Security policy conceptual modeling and formalization for networked information systems
870
Security Policy Development: Towards a Life-Cycle and Logic-Based Verification Model
871
SECURITY PREVENTIVE MAINTENANCE SCHEDULING INCORPORATING OPTIMAL RESERVE PROCUREMENT
872
Security price adjustment across exchanges: an investigation of common factor components for Dow stocks
873
Security problems for a pseudorandom sequence generator based on the Chen chaotic system Original Research Article
874
Security problems with a chaos-based deniable authentication scheme
875
Security properties: two agents are sufficient
876
Security protection design for deception and real system regimes: A model and analysis
877
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
878
Security protocols: from linear to classical logic by abstract interpretation
879
Security reconsideration of the Huang–Wang nominative signature
880
Security requirements engineering framework for software product lines
881
Security requirements for e-government services: a methodological approach for developing a common PKI-based security policy
882
Security Risk Analysis and the Security Need in Citizen Oriented Applications
883
Security Risk Minimization for Desktop and Mobile Software Systems. An In-Depth Analysis.
884
Security risks and probabilistic risk assessment of glazing subject to explosive blast loading
885
Security risks and probabilistic risk assessment of glazing subject to explosive blast loading
886
Security risks of global environmental changes
887
Security Schemes for a Mobile Agent Based Network and System Management Framework
888
Security service level agreements for outsourced security functions
889
Security standards: An end-user perspective
890
Security System Using Controller Area Network (CAN ) Bus
891
Security systems for a mobile world
892
SECURITY TECHNIQUES AND SOLUTIONS FOR PREVENTING THE CROSS-SITE SCRIPTING WEB VULNERABILITIES: A GENERAL AAPROACH
893
Security Technologies for the World Wide Web: Rolf Oppliger; Reference List, Acronyms and Glossary, Index, 419 pages, ISBN 1-58053-045-1 (US$ 65.00)
894
Security technology of smart cards applied in an information system
895
Security Technology. The 36th International Carnahan conference on security technology
896
Security Testing of Session Initiation Protocol Implementations
897
Security Theorems via Model Theory
898
Security threat issues in Mersing waters and the surrounding islands
899
Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures
900
Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures
901
Security threats to Internet: a Korean multi-industry investigation
902
Security threats to Internet: a Korean multi-industry investigation
903
Security Threats to Regional Powers Investment in Iraq After the Defeat of ISIS
904
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
905
Security weakness in an authenticated group key agreement protocol in two rounds
906
Security, independence, and sustainability: Imprecise language and the manipulation of energy policy in the United States
907
Security, Political Dimensions and Consequences of NATO Expansion in the Region
908
Security, privacy, and confidentiality in electronic prescribing systems: A review study
909
Security, risk and registration
910
Security: An end user perspective
911
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability
912
Security-based rescheduling of transactions in a deregulated power system
913
Security-Constrained Dispatch Gives Financially and Economically Significant Nodal Prices
914
Security-constrained economic dispatch using dual quadratic programming
915
Security-Constrained Optimal Generation Scheduling for GENCOs
916
Security-constrained optimal rescheduling of real power using Hopfield neural network
917
Security-constrained self-scheduling of generation companies in day-ahead electricity markets considering financial risk
918
Security-Constrained Unit Commitment Considering Large-Scale Compressed Air Energy Storage (CAES) Integrated With Wind Power Generation
919
Security-Constrained Unit Commitment for Simultaneous Clearing of Energy and Ancillary Services Markets.
920
Security-Constrained Unit Commitment in the Presence of Demand Response Programs and Electric Vehicles
921
Security-Constrained Unit Commitment With AC Constraints*
922
Security-Constrained Unit Commitment With AC Constraints. . . .
923
Security-enhanced Search Engine Design in Internet of Things
924
Security-oriented sensor placement in intelligent buildings
925
Security-Performance Trade-offs in Embedded Systems Using Flexible ECC Hardware
926
Sedation and analgesia after pediatric cardiac surgery
927
Sedation and Anesthesia in the Office Setting,
928
Sedation and Pain Management with Intravenous Romifidine−Butorphanol in Standing Horses
929
Sedation caused by primidone may exacerbate dementia
930
Sedation for cardioversion in the emergency department: Analysis of effectiveness in four protocols
931
Sedation for children undergoing cardiac catheterization: A review of literature
932
Sedation for pediatric dental patients
933
Sedation for Percutaneous Endoscopic Lumbar Discectomy
934
Sedation in cerebral malaria
935
SEDATION IN ICU: ARE WE ACHIEVING GOALS?
936
Sedation in terminally ill patients
937
Sedation in the intensive-care unit: good and bad?
938
Sedation of intoxicated, agitated patients requiring CT to evaluate head injury
939
Sedation with etomidate-fentanyl versus propofol-fentanyl in colonoscopies: A prospective randomized study
940
SEDATION WITH KETOFOL (KETAMINE AND PROPOFOL ADMIXTURE) VERSUS PROPOFOL DURING MONITORED ANESTHESIA IN PATIENTS UNDERGOING ERCP
941
Sedation with Medicinal Plants: A Review of Medicinal Plants with Sedative Properties in Iranian Ethnoblotanical Documents
942
Sedation with Xylazine-Diazepam and Epidural Administration of Lidocaine and Xylazine for Castration and Ovariohysterectomy in Cats
943
Sedation-Paralysis as Cornerstone on Rabies Management (Milwaukee Protocol)
944
Sedative and Analgesic Effects of Intravenous Midazolam and Ketamine Combination in Bone Marrow Aspiration and Biopsy of Childhood Cancer
945
Sedative and Analgesic Effects of Propofol-Fentanyl Versus Propofol-Ketamine During Endoscopic Retrograde Cholangiopancreatography: A Double-Blind Randomized Clinical Trial
946
Sedative and Analgesic efficacy of Propofol-Ketamine and Propofol- Remifentanil During Painful Procedures in Children with Acute Lymphoblastic Leukemia
947
Sedative and Anticonvulsant Activities of the Ethanol Root Extract of Flemingia chappar Benth
948
Sedative Effect of Midazolam Elixir Compare to Vial Through Oral Route in Uncooperative Pediatric Dental Patients
949
Sedative Effect of Nasal Midazolam-Ketamine at Different Doses on 3-6-year-old Uncooperative Dental Patients
950
Sedative Effect of Oral Midazolam/Hydroxyzine versus Chloral Hydrate/Hydroxyzine on 2-6 Year-Old Uncooperative Dental Patients: A Randomized Clinical Trial
951
Sedative effect on humans of inhalation of essential oil of linalool:: Sensory evaluation and physiological measurements using optically active linalools
952
Sedative Efficacy of Propofol in Patients Intubated/Ventilated after Coronary Artery Bypass Graft Surgery
953
Sedative, anxiolytic and analgesic effects of Urena sinuata L. leaf extract in animal models
954
Sedative, Hemodynamic, and Respiratory Effects of Dexmedetomidine, Propofol, and Ketamine for Intraoperative Sedation During Spinal Anesthesia
955
Sedative/Analgesic Efficacy of Medetomidine in Goats
956
Sedative-Hypnotic Activity of Extracts and Essential Oil of Coriander Seeds
957
SEDC-Based Hardware-Level Fault Tolerance and Fault Secure Checker Design for Big Data and Cloud Computing
958
SEDDS of gliclazide: Preparation and characterization by in-vitro, ex-vivo and in-vivo techniques
959
Sedentarism affects body fat mass index and fat-free mass index in adults aged 18 to 98 years
960
Sedentarization and childrenʹs health: Changing discourses in the northeast Badia of Jordan
961
Sedentary behavior and neck pain in children and adolescents; a systematic review and meta-analysis
962
Sedentary behavior and residual-specific mortality
963
Sedentary Behavior Associated with Obesity in Rural-to-Urban Migrant Children by Comparison of Those in Rural and Urban Area in China
964
Sedentary behavior, physical activity and cardiorespiratory fitness on leukocyte telomere length
965
Sedentary behavior, physical activity and cardiorespiratory fitness on leukocyte telomere length
966
Sedentary Behaviors and the Risk of Incident Hypertension: The SUN Cohort
967
Sedentary behaviour, physical activity and weight problems in adolescents in Wales
968
Sedentary habits of anthozoa-like animals in the Chengjiang Lagerstنtte: Adaptive strategies for Phanerozoic-style soft substrates
969
Sedentary images in a popular US based parenting magazine: 2010-2015
970
Sedentary Lifestyle and Antecedents of Cardiovascular Disease in Young Adults
971
Sedentary snakes and gullible geckos: predator–prey coevolution in nocturnal rock-dwelling reptiles
972
Sedentary, active and athletic lifestyles: Right and left ventricular long axis diastolic function
973
Sedentism and child health among rendille pastoralists of Northern Kenya
974
Sediment (un)balance budget in a high-gradient stream on flysch bedrock: A case study using dendrogeomorphic methods and bedload transport simulation
975
Sediment accretion and organic carbon burial relative to sea-level rise and storm events in two mangrove forests in Everglades National Park
976
Sediment Accretion and Recent Sea-level Rise in the Solent, Southern England: Inferences from Radiometric and Geochemical Studies
977
Sediment accumulation and organic material flux in a managed mangrove ecosystem: estimates of land–ocean–atmosphere exchange in peninsular Malaysia
978
Sediment accumulation and radionuclide inventories (239,240Pu, 210Pb and 234Th) in the northern Gulf of Mexico, as influenced by organic matter and macrofaunal density
979
Sediment accumulation in newly constructed vegetative treatment facilities along a new major road
980
Sediment accumulation in the western Gulf of Lions, France: The role of Cap de Creus Canyon in linking shelf and slope sediment dispersal systems
981
Sediment accumulation on a cold-water carbonate mound at the Southwest Rockall Trough margin
982
Sediment accumulation patterns and fine-scale strata formation on the Waiapu River shelf, New Zealand
983
Sediment accumulation patterns in a tectonically subsiding incised valley: Insight from the Echigo Plain, central Japan
984
Sediment accumulation rate and radiological characterisation of the sediment of Palmones River estuary (southern of Spain)
985
Sediment accumulation rates and budgets of depositing particles of the East China Sea
986
Sediment accumulation rates and carbon burial in the bottom sediment in a high-productivity area: Gerlache Strait (Antarctica)
987
Sediment accumulation rates and carbon fluxes to bottom sediments at the Western Bransfield Strait (Antarctica)
988
Sediment accumulation rates in subpolar fjords – Impact of post-Little Ice Age glaciers retreat, Billefjorden, Svalbard
989
Sediment ages and flux variations from depth profiles of 210Pb: lake and marine examples
990
Sediment and hydrological response to vegetation recovery following wildfire on hillslopes and the hollow of a small watershed
991
Sediment and nutrient deposition in Lake Volta in Ghana due to Harmattan dust
992
Sediment and nutrient dynamics during snowmelt runoff generation in a southern Taiga catchment of Russia
993
Sediment and nutrient dynamics during storm events in the Enxoé temporary river, southern Portugal
994
Sediment and nutrient export by water from an agricultural catchment: An analysis of hysteresis patterns in the Upper Relau River, Penang
995
Sediment and organic carbon focusing in the Shelikof Strait, Alaska
996
Sediment and particulate organic carbon fluxes in various lacustrine basins of tropical Africa and in the Gulf of Guinea
997
SEDIMENT AND PHOSPHORUS DELIVERY FROM ALFALFA SWARDS
998
Sediment and phosphorus delivery from field to river via land drains in England and Wales. A risk assessment using field and national databases
999
Sediment and phosphorus transfer in overland flow from a maize field receiving manure
1000
Sediment and plant dynamics in saltmarshes pioneer zone: Puccinellia maritima as a key species?
بازگشت