戻る
「早戻しボタン」を押すと検索画面に戻ります。

今後説明を表示しない

[OK]

コーパス検索結果 (1語後でソート)

通し番号をクリックするとPubMedの該当ページを表示します
1 ompared to non-modified Ad or conventionally stealthed Ad-poly[N-(2-hydroxypropyl)methacrylamide] (Ad
2 a protective shell, which imparts biological stealth and dictates the pharmacokinetics.
3 cattering of EM wave, which is important for stealth and other microwave applications in the future.
4 , infrared detectors, stray light reduction, stealth and others.
5                                         This stealthing and density-increasing technology could ultim
6 ted targets; similarly viral vectors can be 'stealthed' and their physical properties modulated by su
7 ve in vivo, with active targeting, increased stealth, and controlled drug-release properties.
8 atalysis, surface enhanced Raman scattering, stealth, antireflection, IR sensors, telecommunications,
9 rable and disposable infrared camouflage for stealth applications.
10 odel, synthetic biomarkers that circulate in stealth but then activate at sites of disease have the t
11 ogenicity of drug-carrier complexes, imparts stealth by preventing opsonization and removal by phagoc
12  responses in order to either provide rapid 'stealth clearance' of cellular debris or to initiate the
13 thylene glycol (PEG) is the most widely-used stealth coating and facilitates particle accumulation in
14 trategy to overcome this barrier, the use of stealth coatings can reduce immune clearance and prolong
15  intrageneric horizontal gene transfer and a stealth conduit for intergeneric gene transfer; they are
16          We engineered nanomedicine with the stealth corona made up of densely packed bone seeking li
17                             We show that the Stealth domain harbors the catalytic site, as some mutat
18  for MDR cells, with approximately 4 min for Stealth-DOX and for TSL-e.
19 -i, but was the major delivery mechanism for Stealth-DOX and for TSL-e.
20                                        While Stealth-DOX resulted in high tumor tissue concentrations
21               Consistent with clinical data, Stealth-DOX resulted in similar tumor intracellular conc
22  chemotherapy (Free-DOX), Stealth liposomes (Stealth-DOX), temperature sensitive liposomes (TSL) with
23 me constants for maximum cellular uptake for Stealth-DOX, TSL-e, and TSL-i were 45 min, 11 min, and <
24 ular tumor drug concentrations for Free-DOX, Stealth-DOX, TSL-i, and TSL-e were 3.4, 0.4, 100.6, and
25 lu family may be driven at least in part by "stealth-driver" elements that maintain low retrotranspos
26                                         This stealth echolocation allows the barbastelle to exploit f
27 notherapeutic agents, resulting in a "cancer-stealth" effect.
28 , which are distinct from commonly leveraged stealth engineering approaches such as nanoparticle surf
29 pondingly, vaccines may be directed against "stealth" epitopes, overriding viral chicanery.
30             Sequence comparison of these two stealth family proteins revealed a C-terminal extension
31         The efficacy and versatility of this stealth feeding mechanism has enabled M. leidyi to be no
32 st that endogenously generated H2S acts as a stealth hyperpolarizing factor on smooth muscle cells to
33 ducts has been viewed as a safeguard against stealth infections; however, this hypothesis has never b
34  the response, we propose that T. cruzi is a stealth invader, largely avoiding recognition by compone
35                             HAV infects in a stealth-like manner and replicates efficiently in the li
36 olymer chain of molecular weight 2000 confer stealth-like properties.
37 o its biocompatibility and ability to convey stealth-like properties.
38                                              Stealth liposomal doxorubicin (Alzal Corp, Palo Alto, CA
39                                              Stealth liposomal doxorubicin has activity in refractory
40 d dose (MTD) and define the toxic effects of stealth liposomal doxorubicin in combination with gemcit
41 udy was developed to examine the activity of Stealth liposomal doxorubicin in platinum- and paclitaxe
42                                              Stealth liposomal doxorubicin was administered at 50 mg/
43 dron-phospholipid constructs that form super stealth liposomes (SSLs).
44 (DOX): conventional chemotherapy (Free-DOX), Stealth liposomes (Stealth-DOX), temperature sensitive l
45 s can be used to predict adhesive forces for STEALTH liposomes and other targeted and self-assembled
46 e conclude that peroxide-generating, anionic Stealth liposomes can eradicate plasmacytomas infiltrate
47  ml of hydrogen peroxide-generating, anionic Stealth liposomes containing 50 micrograms of glucose ox
48  approach to evaluate the tumor targeting of stealth liposomes in vivo, which may enable personalized
49  lipids, thereby differing from conventional stealth liposomes where a PEG chain is attached to a sin
50 s coated with the state-of-the-art synthetic stealth materials.
51               The need to approach prey with stealth may have selected for a head shape that produces
52 vements in our understanding of these fungal stealth mechanisms should provide new options for future
53 ce imaging guided techniques combined with a Stealth Navigation system (Medtronics Inc.).
54 potency, inflammatory resilience, and immune stealth of isolated islets; 2) inhibiting the thrombotic
55                                             "Stealthing" of Ad5 using hydrophilic polymers may enable
56 ere is now extensive literature available on stealth organic adlayers able to minimize fouling down t
57 nd IL-18 genes, which might make Ehrlichia a stealth organism for the macrophage.
58 other intracellular pathogens, T. cruzi is a stealth parasite that elicits few changes in host cell t
59      T. pallidum has long been regarded as a stealth pathogen because of its poorly antigenic and non
60 and the basis for the syphilis spirochete's "stealth pathogenicity," we used a dual-label, 3-step amp
61 hosts, restricting their virulence to become stealth pathogens capable of causing long-term chronic i
62                 Brucellae are thought of as "stealth pathogens" that escape recognition by the host i
63                                 This form of stealth predation enables M. leidyi to feed as a general
64 cture of transmembrane proteins, artificial "stealth" probes spontaneously insert and anchor within t
65 ing, respectively, controlled drug release, "stealth" properties for immune evasion, and cell-specifi
66      We demonstrate that nanoparticles with 'stealth' properties mostly avoid internalization by all
67 (CPs) of these serogroups are members of the Stealth protein family comprising d-hexose-1-phosphate t
68 is serogroup L, is one of the smallest known Stealth proteins and caught our attention for structure-
69 n points with a data fusion method to reduce stealth regions, and a frequency modulated continuous wa
70 elatively small apertures and unrecoverable "stealth" regions due to the specularity of most objects
71 he NPs were maximally targeted and maximally stealth, resulting in most efficient PCa cell uptake in
72                        Nucleofection(R) with Stealth RNAi siRNA reduced HeLa Synt5 levels to 4.6 +/-
73 tive immune response that targeted bacterial stealth siderophores and protected against UTI.
74                    These pathogen-associated stealth siderophores evade host immune defenses and enha
75 e oligonucleotide CRTAS121 (250 nmol/ml) and stealth small interfering RNA CRT_siR479 (150 pm/ml) for
76  be a valuable complement/supplement to the "stealth" strategies.
77  several pathogens modify their lipid-A as a stealth strategy to avoid recognition by the innate immu
78                     Here we describe a novel stealthing strategy which addresses both these limitatio
79 ong-awaited functionality range from various stealth technologies to recently proposed cloaking devic
80      However, these approaches do not ensure stealth--that the mere presence of message-bearing trans
81 me specialists that typically use mimicry or stealth to enter ant colonies to exploit the rich, but f
82 chanism initiating antiviral immunity during stealth viral replication is unknown, but recent data de
83 ring entry and expansion, suggesting it is a stealth virus early in the infection.
84 epatitis B virus (HBV) has been described as stealth virus subverting immune responses initially upon
85 e of infection (8 weeks), suggesting it is a stealth virus.
86  the H3N8 subtype since they could behave as stealth viruses in pigs.
87        The result is 'semantic annotation by stealth', with an annotation process that is less error-

WebLSDに未収録の専門用語(用法)は "新規対訳" から投稿できます。