نتایج جستجو برای: has no any definite exegetical literature

تعداد نتایج: 5608637  

2016
Roodrajeetsing Gopaul Wen Shao Xiao Jun Yan Dang Zong Wei

Blood blister-like aneurysms (BBLAs) are aneurysms from the non-branching sites of the internal carotid artery (ICA). Though rare lesions, they pose a high risk of intraoperative aneurysmal rupture. Definite treatment of these types of aneurysms has been debatable, but surgical approach is the ultimate rescue treatment. Microsuture of the intraoperative ruptured BBLA has been reported scarcely ...

Journal: :European journal of cardio-thoracic surgery : official journal of the European Association for Cardio-thoracic Surgery 2006
Ming Wu Xueming He Guangzhao Yang

A hydropneumopericardium is a rare but critical condition, which is mostly ascribed to primary infiltrative lesions from adjacent organs, pericardial infections, or trauma. Although there have been reports about pyopneumopericardium, no case of spontaneous non-purulent hydropneumopericardium has been documented in literature. We report a case of a previously healthy man of spontaneously occurre...

2014
Navjot Kaur Nusrat Shafiq Harish Negi Avaneesh Pandey Srinivas Reddy Harpreet Kaur Neelima Chadha Samir Malhotra

Background. Terminalia arjuna is a popular Indian medicinal plant with its bark been used for over centuries as cardiotonic. The bark has been found to contain several bioactive compounds including saponins and flavonoids. A number of experimental and clinical studies have been conducted to explore therapeutic potential of Terminalia arjuna in cardiovascular ailments specially in patients of co...

Journal: :The Journal of Theological Studies 1904

Journal: :Pediatric Radiology 2009

Journal: :Journal of Vision 2010

Journal: :Int. Arab J. e-Technol. 2011
Diaa Salama Abd Elminaam Hatem Abdual Kader Mohey M. Hadhoud

As the popularity of wireless networks increases, so does the need to protect them. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper illustrates the key concepts of security, wireless networks, and security over wireless networks....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید