نتایج جستجو برای: cases
تعداد نتایج: 664376 فیلتر نتایج به سال:
background: tuberculosis remains a worldwide public health problem and india accounts for highest tb burden in the world. the aim of the study was to evaluate the trend and treatment outcome of tuberculosis (tb) cases treated under dots strategy at a district level in karnataka, india. methods : this was a retrospective record based study conducted in dakshina kannada district of karnataka, du...
A youi^g Mahomedan Sowar fell from the roof of a house at night time, and sustained a compound fracture of both radius and ulna on the left side, at about two inches above the wrist joint. When admitted into the dispensary, very soon after the accident, the lower end of the upper portion of the radius projected through a jagged horizontal wound at site of fracture. There was very little haemorr...
These tilcers are very rare in the situation above mentioned, and hence I deem this case worthy of record. Besides rarity, the total absence of any previous history of urgent symptoms and the fatal termination of the case within 41 hours after admission, render it peculiarly interesting and instructive. Dr. Rutherford Sanders, Professor of Pathology in the Edinburgh University, describing the p...
Assurance cases are widely used in the safely domain, where they provide a way to justify the safety of a system and render that justification open to review. Assurance cases have not been widely used in security, but there is guidance available and there have been some promising experiments. There are a number of differences between safety and security which have implications for how we create...
Use cases can be used to capture requirements and to subdivide IT-systems into functionally coherent units. Information systems are activity systems that carry out important business activities. Many systems development methods recognize activity modeling as an important development activity. Use cases are based on a set of assumptions that makes them unsuitable for general activity modeling. T...
Eliciting security requirements Security requirements exist because people and the negative agents that they create (such as computer viruses) pose real threats to systems. Security differs from all other specification areas in that someone is deliberately threatening to break the system. Employing use and misuse cases to model and analyze scenarios in systems under design can improve security ...
Background: Malignant pleural effusion is common in patients with advanced malignant tumor. The aim of this study is to analyze the characteristics of pleural metastasis of renal clear cell carcinoma, pleural effusion under medical thoracoscopy and the diagnostic value of interventional thoracoscopy-guided biopsy, and to improve the understanding of pleural metastasis of renal clear cell carcin...
cml in breif cml is characterized by the proliferation of large numbers of immature wbc in the blood and bone marrow. in most of the patients , it is a clonal disorder in which all cell lines, express the philadelphia chromosome)q/22 translocation(it accounts for 20 of all leukemias and most cases occur over 25 yrs of age. the disease usually begins insidiously,but symptoms referable to anemia ...
A three-member family from Tehran referred with variety of nasopharyngeal symptoms including sneezing, coughing and nasal discharge following consumption of barbecued liver (Kabab). Thirteen worm-like nymphs of Linguatula serrata were separated from larynx, nose and gum of these patients. The adult parasites live in the nose and paranasal sinuses of dogs and other carnivores. Although this in...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید