نتایج جستجو برای: we can define a gravimetric

تعداد نتایج: 13852148  

Abtine Shahlaee, Ali Manafi, Amir Eslami Shahr Babaki, Amir Manafi, Golnoush Mehrabani,

BACKGROUND The ala of the nose, with its particular texture and characteristics, poses both aesthetically and functionally intriguing challenges and is rather problematic regarding choices for reconstructive methods. Both flaps and grafts have been used to restore natural structure of nasal ala. The present study summarizes a ten-year experience of reconstructive surgery using small composite...

Today, the pressures on the healthcare systems for the controlling of the costs are extreme and all sectors try to demonstrate the value of their services by justifying the activities and expenditures so the value can be describe in terms like quality, efficiency, effectiveness, patient satisfaction, cost effectiveness .The value of the lab testing is generally directed to their costs and the c...

Journal: :Studies in health technology and informatics 2007
Sebastian Garde Carola M. Hullin Rong Chen Thilo Schuler Jana Gränz Petra Knaup-Gregori Evelyn J. S. Hovenga

Health information systems (HIS) in their current form are rarely sustainable. In order to sustain our health information systems and with it our health systems, we need to focus on defining and maintaining sustainable Health Information System building blocks or components. These components need to be easily updatable when clinical knowledge (or anything else) changes, easily adaptable when bu...

Journal: :Philosophical transactions of the Royal Society of London. Series B, Biological sciences 2004
Julian L Griffin

There is an increased reliance on genetically modified organisms as a functional genomic tool to elucidate the role of genes and their protein products. Despite this, many models do not express the expected phenotype thought to be associated with the gene or protein. There is thus an increased need to further define the phenotype resultant from a genetic modification to understand how the trans...

2015
Yasuhiro Yamakoshi

This paper aims to examine the function of participles in Shinekhen Buryat, which is one of the Mongolic languages spoken in Manchuria, and suggests the following two points: first, we cannot define the prototypical participles in Shinekhen Buryat as inflectional verb to adjective transposition, since they contain certain features that differ from adjectives; second, we recommend a recategoriza...

Journal: :Nephron. Clinical practice 2014
John A Kellum

The recent recognition that acute kidney injury (AKI) may lead to the development of chronic kidney disease and end-stage renal disease, with the attendant increase in mortality, has led to interest in the clinical epidemiology and the mechanistic understanding of renal recovery after an episode of AKI. At present, no uniform definition for recovery after AKI exists and various considerations s...

Journal: :Heart 2004
J Herlitz J Engdahl L Svensson M Young K-A Angquist S Holmberg

OBJECTIVE To evaluate whether subgroups of patients with no chance of survival can be defined among patients with out-of-hospital cardiac arrest. PATIENTS Patients in the Swedish cardiac arrest registry who fulfilled the following criteria were surveyed: cardiopulmonary resuscitation (CPR) was attempted; the arrest was not crew witnessed; and patients were found in a non-shockable rhythm. S...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده ادبیات 1390

in the name of allah , the compassionate the merciful abstract shath ( blasphemic utterace made during spiritual ) is a complicated concept that deserves reflection in gnosticism and sufism ( mysticism ) and estem and westem scholars have alwaya paid attention to it. although principal essence of gnostic belief is the holy divine law ,gnosticism has pure and unique thoughts . by glancing at t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :iranian journal of fuzzy systems 2012
halis aygun vildan cetkin s. e. abbas

the aim of this paper is to introduce $(l,m)$-fuzzy closurestructure where $l$ and $m$ are strictly two-sided, commutativequantales. firstly, we define $(l,m)$-fuzzy closure spaces and getsome relations between $(l,m)$-double fuzzy topological spaces and$(l,m)$-fuzzy closure spaces. then, we introduce initial$(l,m)$-fuzzy closure structures and we prove that the category$(l,m)$-{bf fc} of $(l,m...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید