نتایج جستجو برای: 390
تعداد نتایج: 5599 فیلتر نتایج به سال:
BACKGROUND Medicines are commonly accessed and used for management of illness in children without a prescription. This potentially increases the risk of unwanted treatment outcomes. We investigated medicine use practices in management of symptoms of acute upper respiratory tract infections among children (≤12 years) in households in Nakawa division, Kampala city. METHODS This was a cross-sect...
Scalability has never been more a part of System/390 than with Parallel Sysplex. The Parallel Sysplex environment permits a mainframe or Parallel Enterprise Server to grow from a single system to a configuration of 32 systems (initially), and appear as a single image to the end user and applications. The IBM S/390 Parallel Sysplex provides capacity for today’s largest commercial workloads by en...
Several concentrations of 9-chloro-9-(4-diethylaminophenyl)-10-phenylacridan (C-390), ranging from 5 to 100 micrograms/ml, were incorporated in brain heart infusion agar, MacConkey agar, and xylose-lysine-deoxycholate agar to evaluate the recovery of Pseudomonas aeruginosa from 538 sputum, 174 urine, and 22 stool samples. Seventy-six sputum samples containing P. aeruginosa grew this bacterium a...
Fusion proteins composed of tumor binding agents and potent catalytic toxins show promise for intracranial therapy of brain cancer and an advantage over systemic therapy. Glioblastoma multiforme (GBM) is the most common form of brain cancer and overexpresses IL-13R. Thus, we developed an interleukin-13 receptor targeting fusion protein, DT(390)IL13, composed of human interleukin-13 and the firs...
This is a re-issue in soft copy of the last hard copy edition published by McGraw-Hill “as is”, as of the completion date at end of 1996. A few corrections and typographic changes have been made to improve readability. Blank pages inserted to ensure that chapters start on a right-hand page have been removed. Page numbers in the index and Table of
As the Internet becomes the basis for electronic commerce, and as more businesses automate their data processing operations, the potential for unauthorized disclosure of sensitive data increases. On-line databases are becoming increasingly large and complex. Sensitive data is transmitted on communication lines and often stored off-line. As a result, the efficient, economical protection of enter...
©2003 SOFTWARE ENGINEERING GMBH. All rights reserved. ISDM is a registered trademark of SOFTWARE ENGINEERING. All other trademarks or trade names mentioned herein are trademarks or registered trademarks of their respective owners.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید