نتایج جستجو برای: concealed antigen

تعداد نتایج: 204226  

2010
Khalid Ahmed Ismail

Materials & Methods: From January 2003 to January 2008, 20 patients with concealed penis were operated upon. the mean age was 6 years and 8 months. There were 10 patients with buried penis, 7 patients with trapped penis, and 3 patients had webbed penis. The common surgical policy in most of our cases included complete penile degloving, excising the scarring due to previous surgery, fixing the p...

Journal: :Circulation 1971
A N Damato S H Lau

THE FAILURE of a cardiac impulse to traverse the entire atrioventricular (AV) conducting system is called concealed conduction. Electrocardiographically, the effects of concealed conduction are reflected in the conduction and/or formation of subsequent beats.1 The concept of concealed conduction can be applied to explain (1) post-extrasystolic prolongation of the P-R interval, (2) the irregular...

Journal: :Journal of forensic sciences 2010
Ewout H Meijer Fren T Y Smulders Harald L G J Merckelbach

Lie detection procedures are typically aimed at determining guilt or innocence of a single suspect. Serious security threats, however, often involve groups, such as terrorist networks or criminal organizations. In this report, we describe a variant of the skin conductance-based Concealed Information Test (CIT) that allows for the extraction of critical information from such groups. Twelve parti...

2017
John Jackson Jason Webb Ewan Bigsby

Address for Correspondence: Ewan Bigsby, Department of Trauma and Orthopaedic, Soutmead Hospital, Bristol, United Kingdom E-mail: [email protected] ©Copyright 2017 by Emergency Physicians Association of Turkey Available online at www.jemcr.org Introduction The lumbosacral plexus comprises nerve roots from the twelfth thoracic to the fourth sacral nerves. The nerves of the plexus run from the ...

2009
J. Dai

A new approach of imaging reconstruction of concealed PEC targets in a dielectric closed box, using azimuth multi-angle measurements, is developed. As the broadband stepped-frequency radar transmits planar wave from different azimuth directions around the target, the backscattered electrical fields in both the amplitude and phase are obtained. The two-dimensional fast Fourier transform (2D-FFT)...

2011
M. Abbasi Dezfouli S. Mazraeh M. H. Yektaie

Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new...

2014
Thomas Zink

Cyberspace: a world at war. Our privacy, freedom of speech, and with them the very foundations of democracy are under attack. In the virtual world frontiers are not set by nations or states, they are set by those, who control the flows of information. And control is, what everybody wants. The Five Eyes are watching, storing, and evaluating every transmission. Internet corporations compete for o...

2012
M. Abbasi Dezfouli S. Mazraeh M. H. Yektaie

Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید