コーパス検索結果 (1語後でソート)
通し番号をクリックするとPubMedの該当ページを表示します
1 of uranium enrichment for nuclear safety and security.
2 nditions and plays an important role in food security.
3 ow retention rates, reporting bias, and data security.
4 d as an important crop to improve world food security.
5 ssions and practice concerning global health security.
6 nd concerns about accuracy, reliability, and security.
7 rived foods may reduce GHGs and enhance food security.
8 iration, crop production, and household food security.
9 ted to exacerbate and jeopardize global food security.
10 lications for infrastructure reliability and security.
11 eld loss due to flooding is a threat to food security.
12 e farms have key roles in food and nutrition security.
13 al and unique claim is information theoretic security.
14 ent, and electronic information exchange and security.
15 design of policies that aim to improve food security.
16 efore seen as potential contributors to food security.
17 can significantly contribute to global food security.
18 tropolarimetry, communications, imaging, and security.
19 re seen as a critical step in attaining food security.
20 is thus central for maintaining global food security.
21 of improved millet varieties for global food security.
22 production without compromising global food security.
23 pidemiological risk analysis and compromised security.
24 uction and prices and ensuring regional food security.
25 man health and for drinking water safety and security.
26 tunities, and enhancing food and nutritional security.
27 an play an important role for worldwide food security.
28 economic losses and threatening global food security.
29 unconventional reserve is a matter of energy security.
30 nd maize is the most important crop for food security.
31 reduce crop yields and thereby threaten food security.
32 health services to promote collective health security.
33 an assist government agencies to ensure food security.
34 on future agricultural productivity and food security.
35 aining irrigated agriculture and global food security.
36 promote biodiversity and help maintain food security.
37 increasing a psychological sense of welfare security.
38 c animal protein, such as fish, to meet food security.
39 rld that can improve farmer incomes and food security.
40 nservation, fishery sustainability, and food security.
41 vide the basis for future food and nutrition security.
42 f the main strategies to provide global food security.
43 deas about their incompatibility with prison security.
44 , low job control, high demands, and low job security.
45 nosis, environmental monitoring and homeland security.
46 hich case there is no guarantee of long-term security.
47 household resources are correlated with food security.
48 rge agricultural areas pose a threat to food security.
49 dio channel itself to provide communications security.
50 ontribute to achieving sustainable nutrition security.
51 mpetitiveness, quality of life, and national security.
52 pecies that threatens public health and food security.
53 e this flood pulse, thereby threatening food security.
54 aquatic ecosystems and ensuring human water security.
55 highlighting risks for global food and water security.
56 practices that will enhance oasis ecological security.
57 generations in terms of employment and food security.
58 enhance communication, and improve homeland security.
59 al for agricultural weed management and food security.
60 alth, safety, economic activity and national security.
61 nservation, and for promoting water and food security.
63 ameworks such as the Energy Independence and Security Act (EISA) Section 526, which states that Feder
66 cipation, earnings, and attainment of Social Security Administration (SSA) nonbeneficiary status thro
67 btained from record linkages with the Social Security Administration and commercial databases, and ca
70 the sustainability, closed-loop and resource-security agendas that evidently sit behind the bioeconom
74 wever, the 21st century challenges of energy security and climate change are driving resurgence in it
75 systematically for variables affecting food security and climate change mitigation, within multi-spe
78 ectrum of applications ranging from national security and demilitarization to environmental monitorin
80 esent a significant threat to global health, security and economic growth, and combatting their emerg
83 a potential opportunity to enhance both food security and environmental sustainability and therefore
84 o face the great challenges of ensuring food security and environmental sustainability, agricultural
86 acks, sexual and gender-based violence, food security and feeding practices, nutritional status, phys
89 eved unprecedented gains, despite prevailing security and operational challenges, with no case of wil
91 in many aspects of everyday life, as online security and privacy depend ultimately on the quality of
96 es designed to help workers enhance economic security and reduce dependence on Social Security disabi
99 ramming that incorporates health, nutrition, security and safety, responsive caregiving, and early le
103 y associated with greater toddler attachment security and social-emotional competence and fewer behav
109 pathway has the potential to provide supply security and to significantly reduce greenhouse gas emis
110 lies that claims of necessary conditions for security (and sufficient conditions for insecurity) are
111 e searching large image data (e.g., medical, security, and aerial imagery), but the expected benefits
112 hild health and educational attainment, food security, and agriculture in studies from seven countrie
113 NCS-when constrained by food security, fiber security, and biodiversity conservation-is 23.8 petagram
117 hreat agents remain important to US Homeland Security, and many of these pharmaceuticals could have d
118 for global data sharing, addressing privacy, security, and other legitimate concerns, and investigati
123 th, sustainable food production, global food security, and the resilience of current agricultural sys
124 cendent values/goals, increase felt personal security, and/or block materialistic messages from the e
125 st of growing threats-risks to global health security, antimicrobial resistance, non-communicable dis
126 ile organic compounds (VOCs) associated with security applications (e.g., illegal, hazardous, and ter
127 ork paves the way for memristors in hardware security applications for the era of the Internet of Thi
139 h stop signs (OR, 4.34; 95% CI, 1.40-13.45), security bars/gratings on houses (OR, 9.23; 95% CI, 2.45
140 Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly gr
141 as there was a negligible (1%) difference in security between intervention and control group individu
143 or QKD systems to be demonstrated to provide security both in the theoretical and physical implementa
146 veillance and notification officers in the 3 security-challenged states now receive annual training,
147 missions(1-3), and therefore delivering food security challenges not only the capacity of our agricul
152 acute flaccid paralysis surveillance in the security-compromised states between 2009 and 2014, using
153 et al This article has been retracted due to security concerns raised by NASA, the sponsoring agency.
157 There were both genetic data and attachment security data for 220 children (110 intervention and 110
158 of applications such as microscopy, display, security, data storage, and information processing.Reali
163 vely) to the US Renal Data System and Social Security Death Index; 397 patients had ESRD and 475 deat
167 lant metabolites are important to world food security due to their roles in crop yield and nutritiona
169 creased lodging greatly improved global food security during the 'green revolution' in the 1960-1970s
170 al using environmental data (related to food security, economic activity, and accessibility to facili
171 populations and returning refugees, physical security, economic productivity, child health and educat
173 cost and energy inputs while increasing food security, especially for banana (Musa acuminata), which
176 to society in terms of contributions to food security, farmer and beekeeper livelihoods, social and c
178 seen many countries rush to construct border security fencing to divert or control the flow of people
179 um potential of NCS-when constrained by food security, fiber security, and biodiversity conservation-
182 ety is ensuring adequate food production and security for a rapidly growing population under changing
183 loss, questioning the sustainability of food security for the 300 million people currently living in
184 rd care of 5.5 percentage points), financial security (for example, an estimated reduction in debts s
187 of total health expenditure spent by social security funds, other government agencies, private insur
188 nsumption and quantum Internet with absolute security guaranteed by the laws of quantum mechanics.
189 ernatively, quantum digital signatures offer security guaranteed by the physical laws of quantum mech
190 sure on resources, and as a consequence food security has become an important challenge for the 21st
192 productive freshwater fisheries and low food security highlights the critical role of rivers and lake
194 s climate change, biodiversity loss and food security, improving our understanding of the complex dyn
197 rtant role in supplying food and nutritional security in developing countries in Asia, Africa and the
199 nd protect natural lands could increase food security in developing nations and preserve much of Eart
201 e impacts of CC on maize production and food security in Malawi's dominant cereal producing region, L
203 epletion, socioeconomic development and food security in Saudi Arabia will require policy that promot
204 grain base of China, posing threats to food security in the context of growing national population.
212 vices, bio-medical applications, luminescent security ink and enhanced energy harvesting in photovolt
214 ng that one-size fits all approaches to food security interventions are likely ineffective, and place
219 afe recycling operations that consider broad security issues for people who rely on e-waste processin
220 eeding of improved varieties to address food security issues related to limited-input small-holder fa
221 ive, requires low maintenance, and decreases security issues significantly, compared to commercial av
224 ch research has focused on questions of food security, less has been devoted to assessing the wider h
227 ations related to nonproliferation, homeland security, medical imaging, and gamma-ray telescopes.
228 the Malawi Ministry of Agriculture and Food Security (MoAFS) and the National Statistical Office (NS
230 extension, flexible adaption to personal and security needs, and sophisticated analyses that are inde
231 s in high data rate wireless communications, security, night-vision, biomedical or video-imaging and
235 here is an increasing understanding that the security of a QKD system relies not only on theoretical
236 tivity are unclear and could weaken the food security of hundreds of millions of people who depend on
237 The improved cycling stability and system security of lithium ion batteries is attributed to the e
239 ica) is an orphan crop essential to the food security of many small farmers in Asia and Africa and is
242 fundamental concept, with implications from security of modern data systems, to fundamental laws of
244 ined to improve effectiveness and assure the security of postharvest food as the human population inc
246 jectively perceived threats to the safety or security of the child's bodily integrity, family, or soc
247 on of temporal steering inequalities, of the security of two quantum key distribution protocols again
250 logies that have been developed for in-field security operations, but laboratory developed techniques
251 ng researchers integrate their own data with security options to keep them private or make them publi
252 agriculture in the provision of future food security, particularly in the Middle East and North Afri
253 ction of natural resources required for food security, patterns of disease transmission, and processe
254 citly prove that this mechanism enhances the security performance, no matter if the eavesdropper perf
256 To address the multiple challenges to food security posed by global climate change, population grow
257 rming systems, and associated risks for food security posed by rumen fluke infection, it is imperativ
259 a QKD system relies not only on theoretical security proofs, but also on how closely the physical sy
262 ociated with a 26% higher rate of attachment security relative to controls (OR = 3.86, p = 0.008, 95%
263 tro diagnostic (IVD), research-use-only, and Security-Relevant databases, as applicable, to accuratel
265 do-random number generators, but information security requires true random numbers for sensitive appl
266 ween many parties with information-theoretic security, requiring both quantum digital signatures (QDS
267 Indeed, SSA is the region at greatest food security risk because by 2050 its population will increa
271 translation into application fields such as security screening, industrial inspections and large FOV
272 properties of RLGs are extended to design a security sensor which can detect and count intruders in
275 regnant women and their toddlers' attachment security, social-emotional, and behavioral adjustment.
278 The median annual cost reimbursed by social security system for a patient with PAR, and no AA was 15
279 daily life such as infrared sensors in home security systems, particle sensors for environmental mon
282 keys provide a significantly higher level of security than conventional binary-bit architecture with
283 nities is a better strategy to increase food security than focusing on agricultural production and cl
285 te the important impacts of biofuels on food security, the food-energy nexus needs to be investigated
287 There is an inherent asymmetry in computer security: Things can be declared insecure by observation
288 divided ethnic affiliations, and existential security threats, leads us to propose that extension of
289 w the general superadditivity of the two-way security thresholds, which are proven to be higher than
291 iga-resistant genotypes contributed to yield security under Striga-infested conditions, although grai
294 erventions were sustained in states in which security was compromised and the risk of polio was high,
296 tologists and the Chinese Ministry of Public Security, we trained and used a detection dog to find sc
300 olicy that has transformed the nation's food security, yet irreconcilable differences exist between m
WebLSDに未収録の専門用語(用法)は "新規対訳" から投稿できます。