戻る
「早戻しボタン」を押すと検索画面に戻ります。

今後説明を表示しない

[OK]

コーパス検索結果 (1語後でソート)

通し番号をクリックするとPubMedの該当ページを表示します
1 of uranium enrichment for nuclear safety and security.
2 nditions and plays an important role in food security.
3 ow retention rates, reporting bias, and data security.
4 d as an important crop to improve world food security.
5 ssions and practice concerning global health security.
6 nd concerns about accuracy, reliability, and security.
7 rived foods may reduce GHGs and enhance food security.
8 iration, crop production, and household food security.
9 ted to exacerbate and jeopardize global food security.
10 lications for infrastructure reliability and security.
11 eld loss due to flooding is a threat to food security.
12 e farms have key roles in food and nutrition security.
13 al and unique claim is information theoretic security.
14 ent, and electronic information exchange and security.
15  design of policies that aim to improve food security.
16 efore seen as potential contributors to food security.
17  can significantly contribute to global food security.
18 tropolarimetry, communications, imaging, and security.
19 re seen as a critical step in attaining food security.
20  is thus central for maintaining global food security.
21 of improved millet varieties for global food security.
22  production without compromising global food security.
23 pidemiological risk analysis and compromised security.
24 uction and prices and ensuring regional food security.
25 man health and for drinking water safety and security.
26 tunities, and enhancing food and nutritional security.
27 an play an important role for worldwide food security.
28  economic losses and threatening global food security.
29 unconventional reserve is a matter of energy security.
30 nd maize is the most important crop for food security.
31 reduce crop yields and thereby threaten food security.
32 health services to promote collective health security.
33 an assist government agencies to ensure food security.
34 on future agricultural productivity and food security.
35 aining irrigated agriculture and global food security.
36  promote biodiversity and help maintain food security.
37  increasing a psychological sense of welfare security.
38 c animal protein, such as fish, to meet food security.
39 rld that can improve farmer incomes and food security.
40 nservation, fishery sustainability, and food security.
41 vide the basis for future food and nutrition security.
42 f the main strategies to provide global food security.
43 deas about their incompatibility with prison security.
44 , low job control, high demands, and low job security.
45 nosis, environmental monitoring and homeland security.
46 hich case there is no guarantee of long-term security.
47 household resources are correlated with food security.
48 rge agricultural areas pose a threat to food security.
49 dio channel itself to provide communications security.
50 ontribute to achieving sustainable nutrition security.
51 mpetitiveness, quality of life, and national security.
52 pecies that threatens public health and food security.
53 e this flood pulse, thereby threatening food security.
54  aquatic ecosystems and ensuring human water security.
55 highlighting risks for global food and water security.
56 practices that will enhance oasis ecological security.
57  generations in terms of employment and food security.
58  enhance communication, and improve homeland security.
59 al for agricultural weed management and food security.
60 alth, safety, economic activity and national security.
61 nservation, and for promoting water and food security.
62  temperatures threaten biodiversity and food security [5, 6].
63 ameworks such as the Energy Independence and Security Act (EISA) Section 526, which states that Feder
64 dicare and Medicaid provisions of the Social Security Act.
65                                       Social Security Administration (SSA) disability benefits are an
66 cipation, earnings, and attainment of Social Security Administration (SSA) nonbeneficiary status thro
67 btained from record linkages with the Social Security Administration and commercial databases, and ca
68     Mortality data were obtained from Social Security Administration death records.
69 iable quantum key distribution, studying its security against general eavesdropping strategies.
70 the sustainability, closed-loop and resource-security agendas that evidently sit behind the bioeconom
71 s each year and pose a threat to global food security and agricultural sustainability.
72                                         Food security and agriculture productivity assessments in sub
73 ion of CO2 in saline aquifers, enhancing the security and capacity of storage.
74 wever, the 21st century challenges of energy security and climate change are driving resurgence in it
75  systematically for variables affecting food security and climate change mitigation, within multi-spe
76           With the coming challenges of food security and climate change, and our enhanced knowledge
77 et of the "4p1000 Initiative: Soils for Food Security and Climate".
78 ectrum of applications ranging from national security and demilitarization to environmental monitorin
79  its global leadership role in areas such as security and development.
80 esent a significant threat to global health, security and economic growth, and combatting their emerg
81 , ameliorate climate changes, provide energy security and enable protection of the environment.
82 strial residues curbs issues related to food security and environmental problems.
83 a potential opportunity to enhance both food security and environmental sustainability and therefore
84 o face the great challenges of ensuring food security and environmental sustainability, agricultural
85 o address the Grand Challenge of global food security and environmental sustainability.
86 acks, sexual and gender-based violence, food security and feeding practices, nutritional status, phys
87 t it is a suitable measure to enhance energy security and grid resilience.
88 ourably for bioimaging, in addition to their security and multiplex bioassay application.
89 eved unprecedented gains, despite prevailing security and operational challenges, with no case of wil
90 s computer, a feature that provides improved security and performance.
91  in many aspects of everyday life, as online security and privacy depend ultimately on the quality of
92 gy, and (i) the impact of changing models of security and privacy.
93 agriculture for the purposes of greater food security and production quality.
94 overall fish abundance while increasing food security and profits.
95                This aspect is attractive for security and protection system against unauthorized acce
96 es designed to help workers enhance economic security and reduce dependence on Social Security disabi
97                           To increase energy security and reduce emissions of air pollutants and CO2
98 jor crops, with global implications for food security and rural livelihoods.
99 ramming that incorporates health, nutrition, security and safety, responsive caregiving, and early le
100 ined considerable interest for ensuring food security and safety.
101 l counterparts in the fields of computation, security and sensing.
102 ste treatment facilities, and improving food security and social equity.
103 y associated with greater toddler attachment security and social-emotional competence and fewer behav
104 e associated with lower levels of attachment security and social-emotional competence.
105                                         Food security and soil fertility could be significantly impro
106  environmental planning to protect both food security and species diversity.
107 ominent role in maintaining oasis ecological security and stability.
108 es has compromised human health, nutritional security and sustainable food production.
109  pathway has the potential to provide supply security and to significantly reduce greenhouse gas emis
110 lies that claims of necessary conditions for security (and sufficient conditions for insecurity) are
111 e searching large image data (e.g., medical, security, and aerial imagery), but the expected benefits
112 hild health and educational attainment, food security, and agriculture in studies from seven countrie
113 NCS-when constrained by food security, fiber security, and biodiversity conservation-is 23.8 petagram
114 s wireless connections for wireless sensors, security, and control networks.
115  fields such as health diagnostics, safety & security, and environment monitoring.
116 sensor technologies for medical diagnostics, security, and food safety.
117 hreat agents remain important to US Homeland Security, and many of these pharmaceuticals could have d
118 for global data sharing, addressing privacy, security, and other legitimate concerns, and investigati
119 l applications in wearable electronics, home security, and personalized healthcare.
120 ed to benefit crop productivity, global food security, and renewable energy storage.
121 for food analysis, environmental monitoring, security, and safety applications.
122 e weather conditions, the need for increased security, and the high sample volume.
123 th, sustainable food production, global food security, and the resilience of current agricultural sys
124 cendent values/goals, increase felt personal security, and/or block materialistic messages from the e
125 st of growing threats-risks to global health security, antimicrobial resistance, non-communicable dis
126 ile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and ter
127 ork paves the way for memristors in hardware security applications for the era of the Internet of Thi
128 rve-agent vapors in variety of decentralized security applications.
129 clinical diagnostics, food safety, water and security applications.
130 e nature demonstrated here is attractive for security applications.
131 for clinical, diagnostic, environmental, and security applications.
132 ronics, the proposed device is targeting for security applications.
133 recording film and a flexible microphone for security applications.
134 , setting the stage for its wide adoption in security applications.
135  chemical analysis, especially during border security applications.
136 es for diverse biomedical, environmental and security applications.
137 l stochasticity can be valuable for hardware security applications.
138 nd signing officials to ensure all levels of security are implemented at their institution.
139 h stop signs (OR, 4.34; 95% CI, 1.40-13.45), security bars/gratings on houses (OR, 9.23; 95% CI, 2.45
140      Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly gr
141 as there was a negligible (1%) difference in security between intervention and control group individu
142               Global challenges such as food security, biodiversity loss, water scarcity and human he
143 or QKD systems to be demonstrated to provide security both in the theoretical and physical implementa
144                                          The security challenge has led to the killing of health work
145            The strategies implemented in the security-challenged states improved the quality of polio
146 veillance and notification officers in the 3 security-challenged states now receive annual training,
147 missions(1-3), and therefore delivering food security challenges not only the capacity of our agricul
148                 Socioeconomic, logistic, and security challenges required remediation and medical pro
149 sparency, despite persistent operational and security challenges.
150 ue to widespread poliovirus transmission and security challenges.
151 such as unmet health needs and low uptake in security-compromised and underserved communities.
152  acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using
153 et al This article has been retracted due to security concerns raised by NASA, the sponsoring agency.
154             However, in light of privacy and security concerns with regard to collection, use, and di
155 munication among clinicians, and privacy and security concerns, among others.
156 nature of biotechnology raises unprecedented security concerns.
157  There were both genetic data and attachment security data for 220 children (110 intervention and 110
158 of applications such as microscopy, display, security, data storage, and information processing.Reali
159             The national Death Index, Social Security Death Index and medical records were used for m
160                                   The social security death index was used to identify deaths.
161  mortalities were checked against the Social Security Death Index.
162  and determined death dates using the Social Security Death Index.
163 vely) to the US Renal Data System and Social Security Death Index; 397 patients had ESRD and 475 deat
164 plications in optical data storage, document security, diagnostics, and therapeutics.
165 mic security and reduce dependence on Social Security disability benefits.
166 red to prepare ink-free rewritable paper for security documentation.
167 lant metabolites are important to world food security due to their roles in crop yield and nutritiona
168      AIT faces pitfalls related to efficacy, security, duration, and patient compliance.
169 creased lodging greatly improved global food security during the 'green revolution' in the 1960-1970s
170 al using environmental data (related to food security, economic activity, and accessibility to facili
171 populations and returning refugees, physical security, economic productivity, child health and educat
172 er real world impact for ongoing global food security efforts.
173 cost and energy inputs while increasing food security, especially for banana (Musa acuminata), which
174 and environmental monitoring, forensics, and security, etc.
175                  Border control for homeland security faces major challenges worldwide due to chemica
176 to society in terms of contributions to food security, farmer and beekeeper livelihoods, social and c
177 chitecture, semitransparent solar cells, and security features in anticounterfeiting materials.
178 seen many countries rush to construct border security fencing to divert or control the flow of people
179 um potential of NCS-when constrained by food security, fiber security, and biodiversity conservation-
180 nge and the nature of social change and food security following a challenge.
181 achieve agricultural sustainability and food security for a growing world population.
182 ety is ensuring adequate food production and security for a rapidly growing population under changing
183 loss, questioning the sustainability of food security for the 300 million people currently living in
184 rd care of 5.5 percentage points), financial security (for example, an estimated reduction in debts s
185 al health spending channelled through social security funds and other government agencies.
186 al health spending channelled through social security funds and other government agencies.
187  of total health expenditure spent by social security funds, other government agencies, private insur
188 nsumption and quantum Internet with absolute security guaranteed by the laws of quantum mechanics.
189 ernatively, quantum digital signatures offer security guaranteed by the physical laws of quantum mech
190 sure on resources, and as a consequence food security has become an important challenge for the 21st
191                           Concerns over food security have prompted the Chinese government to impleme
192 productive freshwater fisheries and low food security highlights the critical role of rivers and lake
193 ounts, indicating these areas as future food security 'hot spots'.
194 s climate change, biodiversity loss and food security, improving our understanding of the complex dyn
195                               Achieving food security in an era of rapid urbanization will require co
196 climate change mitigation and advancing food security in China.
197 rtant role in supplying food and nutritional security in developing countries in Asia, Africa and the
198  potential of these tubers is vital for food security in developing countries.
199 nd protect natural lands could increase food security in developing nations and preserve much of Eart
200 , while allowing for unprecedented levels of security in genomic data storage.
201 e impacts of CC on maize production and food security in Malawi's dominant cereal producing region, L
202 ms and hatcheries and poses a threat to food-security in many developing countries.
203 epletion, socioeconomic development and food security in Saudi Arabia will require policy that promot
204  grain base of China, posing threats to food security in the context of growing national population.
205 r crops substantially contribute to the food security in the developing countries.
206 n is required to ensure food and nutritional security in the face of global climate change.
207                               To ensure food security in the face of population growth, decreasing wa
208 overage and equity and enhance global health security in the focus countries.
209 c ecosystems is integral to achieve resource security in the food-energy-water (FEW) nexus.
210                                              Security in wireless networks has traditionally been con
211 y of the so-called physical layer to provide security in wireless networks.
212 vices, bio-medical applications, luminescent security ink and enhanced energy harvesting in photovolt
213 namically and reversibly tunable fluorescent security inks.
214 ng that one-size fits all approaches to food security interventions are likely ineffective, and place
215                                      Housing security is an important determinant of mental ill healt
216                                  In addition security is demonstrated against coherent attacks that a
217 es are most critical for food and livelihood security is largely unknown.
218                                  Nutritional security is now a global challenge which can be addresse
219 afe recycling operations that consider broad security issues for people who rely on e-waste processin
220 eeding of improved varieties to address food security issues related to limited-input small-holder fa
221 ive, requires low maintenance, and decreases security issues significantly, compared to commercial av
222 hotonic pigments in coatings, cosmetics, and security labeling.
223 current concerns over food, water and energy securities, land degradation, and climate change.
224 ch research has focused on questions of food security, less has been devoted to assessing the wider h
225                Despite impacting global food security, little is known about the pathogenicity mechan
226                               To ensure food security, maize (Zea mays) is a model crop for understan
227 ations related to nonproliferation, homeland security, medical imaging, and gamma-ray telescopes.
228  the Malawi Ministry of Agriculture and Food Security (MoAFS) and the National Statistical Office (NS
229  Health Administration, Medicare, and Social Security National Death Index records.
230 extension, flexible adaption to personal and security needs, and sophisticated analyses that are inde
231 s in high data rate wireless communications, security, night-vision, biomedical or video-imaging and
232  to Medicare claims data according to Social Security number, sex, and date of birth.
233 irthdate, and 94% provided a complete social security number.
234 linked with Medicare claims by use of Social Security numbers.
235 here is an increasing understanding that the security of a QKD system relies not only on theoretical
236 tivity are unclear and could weaken the food security of hundreds of millions of people who depend on
237    The improved cycling stability and system security of lithium ion batteries is attributed to the e
238  contribute significantly to the nutritional security of mankind across the globe.
239 ica) is an orphan crop essential to the food security of many small farmers in Asia and Africa and is
240                                              Security of maternal-infant attachment was the main outc
241                         In terms of physical security of memory devices, prompt abrogation of a memor
242  fundamental concept, with implications from security of modern data systems, to fundamental laws of
243            Cryptography is essential for the security of online communication, cars and implanted med
244 ined to improve effectiveness and assure the security of postharvest food as the human population inc
245                    The threat to global food security of stagnating yields and population growth make
246 jectively perceived threats to the safety or security of the child's bodily integrity, family, or soc
247 on of temporal steering inequalities, of the security of two quantum key distribution protocols again
248 rey sleeping area because of the privacy and security of upstairs bedrooms.
249 ital Admission Database, the National Health Security Office (NHSO).
250 logies that have been developed for in-field security operations, but laboratory developed techniques
251 ng researchers integrate their own data with security options to keep them private or make them publi
252  agriculture in the provision of future food security, particularly in the Middle East and North Afri
253 ction of natural resources required for food security, patterns of disease transmission, and processe
254 citly prove that this mechanism enhances the security performance, no matter if the eavesdropper perf
255 p wild relatives (CWR) in international food security policy and research.
256   To address the multiple challenges to food security posed by global climate change, population grow
257 rming systems, and associated risks for food security posed by rumen fluke infection, it is imperativ
258 stics, complicating permeability and storage security predictions.
259  a QKD system relies not only on theoretical security proofs, but also on how closely the physical sy
260  in agriculture may be in conflict with food security related targets.
261 ionality underlying a variety of health- and security-related applications.
262 ociated with a 26% higher rate of attachment security relative to controls (OR = 3.86, p = 0.008, 95%
263 tro diagnostic (IVD), research-use-only, and Security-Relevant databases, as applicable, to accuratel
264                                  Global food security remains a worldwide concern due to changing cli
265 do-random number generators, but information security requires true random numbers for sensitive appl
266 ween many parties with information-theoretic security, requiring both quantum digital signatures (QDS
267   Indeed, SSA is the region at greatest food security risk because by 2050 its population will increa
268 lorant, but there is debate on its potential security risk.
269                                  To mitigate security risks and reduce operational costs, the WHO and
270               Proliferation and expansion of security risks necessitates new measures to ensure authe
271  translation into application fields such as security screening, industrial inspections and large FOV
272  properties of RLGs are extended to design a security sensor which can detect and count intruders in
273 o ensure parity for different geographic and security settings.
274 n those in maize, suggesting that wheat food security should be prioritized.
275 regnant women and their toddlers' attachment security, social-emotional, and behavioral adjustment.
276                                Recent energy security strategies, investment opportunities and energy
277       This is particularly true for areas of security, such as airports, and recent terrorist attacks
278  The median annual cost reimbursed by social security system for a patient with PAR, and no AA was 15
279  daily life such as infrared sensors in home security systems, particle sensors for environmental mon
280 ncluding multiple from the public and social security systems.
281 mits in practice and of techniques for other security tasks such as authentication.
282 keys provide a significantly higher level of security than conventional binary-bit architecture with
283 nities is a better strategy to increase food security than focusing on agricultural production and cl
284              One major threat to global food security that requires immediate attention, is the incre
285 te the important impacts of biofuels on food security, the food-energy nexus needs to be investigated
286 potential impact of dam-building on the food security these rivers provide.
287   There is an inherent asymmetry in computer security: Things can be declared insecure by observation
288 divided ethnic affiliations, and existential security threats, leads us to propose that extension of
289 w the general superadditivity of the two-way security thresholds, which are proven to be higher than
290  adaptation strategies to ensure global food security under climate change.
291 iga-resistant genotypes contributed to yield security under Striga-infested conditions, although grai
292                                  Information security underpins many aspects of modern society.
293                                              Security variables included intraocular pressure, lisami
294 erventions were sustained in states in which security was compromised and the risk of polio was high,
295 nd improving agricultural productivity, food security, water supply, and sanitation.
296 tologists and the Chinese Ministry of Public Security, we trained and used a detection dog to find sc
297  18 mo, whereas child sex and household food security were not associated with MDD.
298 he food-system is necessary to increase food security whilst reducing emissions.
299 fungi reduce crop yields, which affects food security worldwide.
300 olicy that has transformed the nation's food security, yet irreconcilable differences exist between m

WebLSDに未収録の専門用語(用法)は "新規対訳" から投稿できます。
 
Page Top