نتایج جستجو برای: تحلیل اثرات متقاطع cia

تعداد نتایج: 279559  

Journal: :Clinical infectious diseases : an official publication of the Infectious Diseases Society of America 2015
Okeoma Mmeje Joan M Chow Lisette Davidson Jennifer Shieh Jeffrey M Schapiro Ina U Park

BACKGROUND The reverse sequence algorithm is often used for prenatal syphilis screening by high-volume laboratories, beginning with a treponemal test such as the chemiluminescence immunoassay (CIA), followed by testing of CIA-positive (CIA(+)) specimens with the rapid plasma reagin test (RPR). The clinical significance of discordant serology (CIA(+)/RPR(-)) for maternal and neonatal outcomes is...

2013
Shah M. Rashed Anwarul Iqbal Shahnewaj B. Mannan Tarequl Islam Mahamud-ur Rashid Fatema-tuz Johura Haruo Watanabe Nur A. Hasan Anwar Huq O. Colin Stine R. Bradley Sack Rita R. Colwell Munirul Alam

This study was funded by National Institutes of Health grant no. K08 AI-073525 (S.R.D.), by a fellowship from the Consejo Nacional para Ciencia y Tecnología of the Mexican federal government (S.G.R.), and by a fellowship from the Brazilian government agencies Coordenação de Aperfeiçoamento de Pessoal de Nível Superior and Conselho Nacional de Desenvolvimento Científico e Tecnológico (L.G.B.G.).

Journal: :Survival 2020

Journal: :The Journal of infectious diseases 2011
Ina U Park Joan M Chow Gail Bolan Mark Stanley Jennifer Shieh Jeffrey M Schapiro

BACKGROUND Screening for syphilis with treponemal chemiluminescence immunoassays (CIA) identifies patients with discordant serology who are not identified with traditional screening methods (eg, CIA-positive, rapid plasma regain (RPR)-negative). We sought to describe the clinical characteristics and management of patients with discordant syphilis serology. METHODS From August 2007-October 200...

Journal: :Softw. Test., Verif. Reliab. 2013
Bixin Li Xiaobing Sun Hareton K. N. Leung Sai Zhang

Software change impact analysis (CIA) is a technique for identifying the effects of a change, or estimating what needs to be modified to accomplish a change. Since the 1980s, there have been many investigations on CIA, especially for code-based CIA techniques. However, there have been very few surveys on this topic. This article tries to fill this gap. And 30 papers that provide empirical evalu...

2012
Sudjit Luanpitpong Yon Rojanasakul

Chemotherapy-induced alopecia (CIA) is a frequent toxicity and arguably the most feared side effect of cancer chemotherapy (Carelle et al., 2002). The incidence of CIA is approximately 65% of all patients (Wang et al., 2006). CIA could be easily noticeable by self and others in a relative short time, thus it is linked with having cancer and chemotherapy. CIA compromises patient quality of life,...

2007
Anastasios S Dontas Nicholas S Zerefos Demosthenes B Panagiotakos Dimitrios A Valis Anastasios Dontas

Correspondence: Anastasios Dontas, Hellenic Association of Gerontology and Geriatrics, Athens, Greece 9 Afroditis Str., Athens, 105 58, Greece Tel 0030 210 3245 090 Fax 0030 210 3245 090 Email [email protected] Abstract: There are now several scientifi c studies that relate this traditional dietary pattern with the incidence of coronary heart disease, various types of cancer, and other diseases. T...

Journal: : 2022

سابقه و هدف: ورود گونه­­ های ماهی مهاجم دراکوسیستم ­های آبی، سبب بروز انواع اثرات منفی اکولوژیکی اقتصادی-اجتماعی می ­­شود. اولین گام در تجزیه تحلیل مخاطرات ناشی از گونه­ غیر­بومی، شناسایی خطر است بر این اساس ابزارهای متعددی برای ارزیابی خطرات تهاجمی غیربومی به منظور پشتیبانی تصمیم گیرندگان گونه ­­ها ایجاد شده است. هدف پژوهش قدرت تیلاپیای شکم قرمز (Coptodon zillii) حوضه آبریز تالاب شادگان (حوضه‌...

2003
Dirk Balfanz Glenn Durfee Narendar Shankar Diana K. Smetters Jessica Staddon Hao-Chi Wong

Consider a CIA agent who wants to authenticate herself to a server, but does not want to reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the CIA server does not want to reveal its CIA credentials to anyone but CIA agents – not even to other CIA servers. In this paper we first show how pairing-based cryptography can be used to implement such secret handsh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید