نتایج جستجو برای: 0237 and 0064

تعداد نتایج: 16827220  

2007
Keiji Hirata Yasunori Harada Toshihiro Takada Shigemi Aoyagi Yoshinari Shirai Naomi Yamashita Junji Yamato

The t-Room is a remote computer supported cooperative work (CSCW) system that we are developing. Our approach is to build rooms with an identical layout, including walls of display screens on which users and physical or virtual objects are all shown at life size, and to provide symmetry of awareness and immersion in each other’s physical space. This allows users in the t-Rooms to feel as if the...

2013
Leslie S. Kersun Anne Reilly Susan E. Coffin Jean Boyer Eline T. Luning Prak Kenyetta McDonald Xiaoling Hou Abbas F. Jawad Kathleen E. Sullivan

BACKGROUND Pediatric oncology patients represent a cohort of individuals uniquely at risk of complications from influenza, yet less likely to respond to the vaccine. It is not yet clear how to best protect this vulnerable population. METHODS We performed a prospective analysis of 177 pediatric oncology patients to define the predictors of influenza vaccine responses. Each variable was examine...

2010

Polihexanide is an antimicrobial compound suitable for clinical use in critically colonized or infected acute and chronic wounds. Its beneficial characteristic is attributable particularly to its broad antimicrobial spectrum, good cell and tissue tolerability, ability to bind to the organic matrix, low risk of contact sensitization, and wound healing promoting effect. In addition, no developmen...

Journal: :Clinical infectious diseases : an official publication of the Infectious Diseases Society of America 2011
Marieke S Sanders Gijs Th J van Well Sander Ouburg Patric S J Lundberg A Marceline van Furth Servaas A Morré

BACKGROUND Bacterial meningitis (BM) is a severe infection mainly caused by Streptococcus pneumoniae and Neisseria meningitidis (NM). However, genetically determined susceptibility to develop severe infections by these microorganisms is variable between individuals. Toll-like receptor 9 (TLR9) recognizes bacterial DNA leading to intracellular inflammatory signaling. Single nucleotide polymorphi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده علوم 1389

this research concentrates on the lithostratigraphy, biostratigraphy, microfacies and sedimentary environment of the asmari and gachsaran formations at southwest firuzabad. the thickness of the studied section in all 608.95 meters that 220.8 meters belong to the asmari formation and 387.95 meters belong to the gachsaran formation (champe and mol members). in the study area, the asmari formation...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1390

abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...

Journal: :Chemistry of Materials 2022

ADVERTISEMENT RETURN TO ISSUEPREVAddition/CorrectionNEXTORIGINAL ARTICLEThis notice is a correctionCorrection to “Surface Stabilization with Fluorine of Layered Ultrahigh-Nickel Oxide Cathodes for Lithium-Ion Batteries”Lalit SharmaLalit SharmaMore by Lalit Sharma, Michael YiMichael YiMore Yi, Eunmi JoEunmi JoMore Jo, Hugo CelioHugo CelioMore Celio, and Arumugam Manthiram*Arumugam ManthiramMore ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

2005
Iliano Cervesato Catherine Meadows Dusko Pavlovic

We apply the derivational method of protocol verification to key distribution protocols. This method assembles the security properties of a protocol by composing the guarantees offered by embedded fragments and patterns. It has shed light on fundamental notions such as challenge-response and fed a growing taxonomy of protocols. Here, we similarly capture the essence of key distribution, authent...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید