Kazuko Inoue (1919–2017)
نویسندگان
چکیده
منابع مشابه
Inoue 26_8
The combination of irinotecan and a fluoropyrimidine is widely accepted as a treatment for advanced colorectal cancer. However, evaluable data on the feasibility of these combinations has not been presented, and an optimal sequence for administration has not been experimentally and clinically determined. The sequential effect of a combination of 5-FU and CPT-11 in the human colon cancer cell li...
متن کامل71 Inoue
Considerable increase in cancer deaths has been observed since 1995, after when the tenth version of the international classification of disease (ICD) was introduced in Japan according with the revision of a death certificate form at the same time. We assessed the contributing factors for this unnatural fluctuation, using a population-based cancer registry data as a model. All deaths of the pre...
متن کاملHanafusa and Hirochika Inoue
The conflict in designing a robot which is fast for large motions and small motions as well as accurate can be alleviated by strategies of operation such as the one described in this paper, called the bracing strategy. Large motions are assigned to joints which move the major links. When these motions are completed the arm is "braced" against the workpiece or a passive workbench. The small moti...
متن کاملAutomorphisms of Parabolic Inoue Surfaces
We determine explicitly the structure of the automorphism group of a parabolic Inoue surface. We also describe the quotients of the surface by typical cyclic subgroups of the automorphism group. 1. Statement of Results In this note we determine the automorphism group AutS of a parabolic Inoue surface S. The corresponding result for a hyperbolic Inoue surface (Inoue-Hirzebruch surface) was obtai...
متن کاملOn Chikazawa-Inoue ID based key system
In this paper, we show that Chikazawa-Inoue ID-based key system is insecure by collusion, where Chikazawa-Inoue ID-based key system means the key parameters established during the initiation phase. We describe an algorithm factorizing a public key of Trust Center. Since our attack is based on only the key system and has no relation with specific key sharing protocols, it can be applied to all v...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ENGLISH LINGUISTICS
سال: 2018
ISSN: 0918-3701,1884-3107
DOI: 10.9793/elsj.34.2_398