نتایج جستجو برای: keywords hyperactivity

تعداد نتایج: 2013110  

Journal: :Revista chilena de pediatria 2017
María Pilar Pérez Carmona

The Complementary/Alternative Medicine (CAM) have been increasingly used by patients such as children and adolescents. The Ministry of Health in Chile (MINSAL) has recognized and regulated some CAM, although there is still unknown their effectiveness and safety of these. OBJECTIVE Review the available evidence regarding the use of CAM in adolescents with the attention deficit hyperactivity sy...

2017
Rana Ataran Ayla Bahramian Zahra Jamali Vahid Pishahang Homayoon Sadeghi Barzegani Parvin Sarbakhsh Javad Yazdani

Temporomandibular joint disorders (TMDs) usually present with symptoms and signs such as pain, mandibular movement, dysfunction, or joint sounds. Botulinum toxin type A (BTX-A) is a biologic toxin which inhibits skeletal muscle through hindering the production of acetylcholine in the nerve endings. This toxin is used for the treatment of hyperactivity of lateral pterygoid muscle and TMD symptom...

2017

The Complementary/Alternative Medicine (CAM) have been increasingly used by patients such as children and adolescents. The Ministry of Health in Chile (MINSAL) has recognized and regulated some CAM, although there is still unknown their effectiveness and safety of these. OBJECTIVE: Review the available evidence regarding the use of CAM in adolescents with the attention deficit hyperactivity syn...

Journal: :The Open Cybernetics & Systemics Journal 2015

Journal: :Organization, Technology & Management in Construction: An International Journal 2015

Journal: :The Spanish Journal of Psychology 2002

Journal: :Vestnik Kostromskogo gosudarstvennogo universiteta imeni N.A. Nekrasova 2023

The article focuses on the role of keywords, their statistical data for determining thematic dominance when working with large arrays texts. description is based materials a typological linguistic study texts military songs, period 1939-1945, in English and Russian. selection keywords was carried out basis semantic, lexical-syntactic, morphological analysis, taking into account frequency use. u...

1998
James P. Anderson

or Introduction Details of a planning study for USAF computer security requirements are presented. An Advanced development and Engineering program to obtain an open-use, multilevel secure computing capability is described. Plans are also presented for the related developments of communications security products and the interim solution to present secure computing problems. Finally a Exploratory...

Journal: :IACR Cryptology ePrint Archive 1998
Benny Chor Niv Gilboa Moni Naor

Private information retrieval (PIR) schemes enable a user to access one or more servers that hold copies of a database and privately retrieve parts of the n bits of data stored in the database. This means that the queries give each individual database no partial information (in the information theoretic or computational sense) on the identity of the item retrieved by the user. All known PIR sch...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید