نتایج جستجو برای: same

تعداد نتایج: 669675  

Journal: :Emerging Infectious Diseases 2008

Journal: :British Dental Journal 2010

Journal: :lambda nordica 2020

Journal: :Cornell Internation Affairs Review 2010

Journal: :Journal of the Atomic Energy Society of Japan 2019

2015
Kathrin Kollndorfer Ksenia Kowalczyk Johannes Frasnelli Elisabeth Hoche Ewald Unger Christian A. Mueller Jacqueline Krajnik Siegfried Trattnig Veronika Schöpf

Intranasal trigeminal sensations are important in everyday life of human beings, as they play a governing role in protecting the airways from harm. Trigeminal sensations arise from the binding of a ligand to various sub-types of transient receptor potential (TRP) channels located on mucosal branches of the trigeminal nerve. Which underlying neural networks are involved in the processing of vari...

2008
Haider A. Naqvi

Much of the current research-work into biological basis of mental disorders is predicted on implicit concept of disease that is less critical and sophisticated as it should be. It is remarkable, how the fundamental conceptual frame work of schizophrenia, as proposed by Professor Emil Kraepelin has stayed the same, since its inception almost 100-years ago. This review explores these issues besid...

2014
Liz Schwarte Samantha Ngo Rajni Banthia George Flores Bob Prentice Maria Boyle Sarah E. Samuels

INTRODUCTION Local health departments (LHDs) are dedicating resources and attention to preventing obesity and associated chronic diseases, thus expanding their work beyond traditional public health activities such as surveillance. This study investigated practices of local health departments in California to prevent obesity and chronic disease. METHODS We conducted a web-based survey in 2010 ...

Journal: :CoRR 2010
A. Balu K. Kuppusamy

In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attributes. In CP-ABE, access policy is sent along with the ciphertext. We propose a method in which the access policy need not be sent along with the ciphertext, by which we are able to preserve the privacy of the encryptor. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید