نتایج جستجو برای: ie not becoming something

تعداد نتایج: 2995161  

Journal: :Journal of Ambient Intelligence and Smart Environments 2019

Journal: :Cell stem cell 2016
Deborah J Sweet

What to look for? ✔ Person(s) taking notes, drawings, photos, or videos of your business ✔ Person(s) attempting to gain information in person, by phone, or by email about your business operations (specifically about security measures and personnel) ✔ Person(s) conducting surveillance of self-service areas (i.e., salad bars, condiment areas, and open bulk containers) ✔ Person(s) attempting to ga...

Journal: :American journal of physiology. Lung cellular and molecular physiology 2007
Simon A Hirota Luke J Janssen

Some early studies have called attention to the potential contribution of sodium (both dietary and serum levels) in airway-related disease, although the picture was not entirely clear. Two recent developments may now allow a more careful consideration of this: first, the greatly improved understanding of the role of salt in hypertension (particularly the identification of subgroups of salt-sens...

Journal: :Neurology 2014
Peter J Goadsby

Stress seems inescapable, or is that just my perception? This could be a statement about clinical practice, particularly completion of documentation; politics; modern life; or here, the pathophysiology of migraine. Only last year,Neurology® published a very challenging study demonstrating that alleged migraine triggers— flickering lights and strenuous exercise—were only about 10% likely to prec...

Journal: :Circulation 2002
Paul Hjemdahl

Modern society has brought with it profound changes in lifestyle and an increased incidence of atherosclerotic vascular disease. Body weights are on the rise, diets are becoming less healthy, and people are becoming increasingly sedentary, resulting in elevations of blood pressure and metabolic alterations that increase atherothrombotic risk. In fact, obesity, insulin resistance, and diabetes a...

Journal: :Evidence-based nursing 2004
Gertrude Cetinski

MAIN FINDINGS Participant’s accounts of their awareness of memory changes resulted in a tension between a self maintaining stance (ie, maintaining continuity with a prior sense of self) and a self adjusting stance (ie, confronting difficulties and adjusting sense of self accordingly). Patients exhibited 5 processes in an ongoing, reiterative cycle of developing memory difficulties. (1) Register...

Journal: :Simmel studies 2021

The article advances a type of relational sociology that is sensitive to the continually ongoing formation beings and relations over course time. While dynamic fluid character has been stressed by other scholars as well, suggests drawing from work Simmel anthropologist Tim Ingold attend coming-into-being change relations, we need alter very grammar considering relations: instead fathoming them ...

Journal: :Acta physiologica 2007
R J Lefkowitz

Receptors for hormones, neurotransmitters, drugs, sensory stimuli and many other agents represent the gateway to cellular metabolism and activity. They regulate virtually all physiological processes in mammals. Yet as recently as 40 years ago their very existence was still in question. One class of receptors, those coupled to G proteins (also known as GPCRs or seven transmembrane receptors) com...

1946
C. C. Murison

The boy stated that at about 8 P.M. as he stepped out of his house, which is near a well, he felt that something had given him a sharp bite on the back of the right foot. On looking round he found that it was a snake and shouted to his sister who killed it. He did not trouble about *oing to hospital as the people living in the neighbourhood said it was a harmless snake. Soon after the bite he f...

Journal: :WMJ : official publication of the State Medical Society of Wisconsin 2015
Jay A Gold Brad Trudell

• Vulnerability identification—Identify system’s weaknesses. • Control analysis—Analyze controls in place to prevent vulnerabilities from being exploited. • Likelihood determination—Determine probability of a vulnerability being exploited. • Impact analysis—Analyze impact on organization should a vulnerability be exploited. • Risk determination—Develop prioritized listing of risks (ie, gaps in ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید