戻る
「早戻しボタン」を押すと検索画面に戻ります。 [閉じる]

コーパス検索結果 (1語後でソート)

通し番号をクリックするとPubMedの該当ページを表示します
1 "secure against predicate singling out" (PSO secure).
2 viduals consider food supply as more or less secure.
3  to declare an arbitrary system or technique secure.
4 differential privacy and k-anonymity are PSO secure.
5 prevent singling out and, hence, must be PSO secure.
6 nd biomedical applications in processing and securing 3D data at the microscopic scale.
7  pathogens is its selection of which host to secure a blood meal from.
8 leted by direct contacts to ALPPS centers to secure a comprehensive cohort.
9 s who should undergo surgical lung biopsy to secure a definitive histological diagnosis of usual inte
10 ction to curb future warming is essential to secure a future for coral reefs.
11 on, so that initially nonessential processes secure a genetic heritage.
12 bout the hiring process or what is needed to secure a job offer.
13 lenium framework are perfectly harmonized to secure a low rate of nonradiative deactivation.
14                                           To secure a polio-free world, the live attenuated oral poli
15 onvolved findings from these studies we have secured a finely detailed picture of the molecular struc
16      In Asia, high-input technology packages secured a tripling of rice output, with germplasm improv
17                        In both cases, the Fc secures a long serum half-life and favourable pharmacoki
18 are, drives the evolution of monogamy, as it secures a partner and ensures paternity certainty in the
19  may translate into disease, and the microbe secures a stable niche in which to survive.
20 idans LOX) that is partially responsible for securing a flexible loop which sequesters the active sit
21 call on all stakeholders to work together in securing a healthy, prosperous future for all women.
22                              This is because securing a sufficiently strong donor-acceptor (D-A) inte
23                         We hypothesized that securing a territory prior to when food resources become
24  we describe structure-guided engineering of SECURE-ABE variants with reduced off-target RNA-editing
25 ovascular disease), PA was measured by waist-secured accelerometers.
26 avi, the Vaccine Alliance, UNICEF set out to secure access to IPV supply for around 100 countries.
27 0917/FIG1F1fig1One of roots' key roles is to secure access to water and nutrients for the plant, ofte
28 le biomedical data on the cloud is providing secure access, especially when datasets are distributed
29                                 Fortunately, securing access to effective antimicrobials has finally
30                                              Securing access to effective antimicrobials is one of th
31 ntroduction of well-designed rights-based or secure-access fisheries and ecosystem service accounting
32 to the Convention on Biological Diversity to secure adequate financing, plan for climate change and m
33         Multiparameter optimization included securing adequate potency in human whole blood, navigati
34 s into nearly perfect random bits, which are secure against a no-signalling adversary.
35                         The protocol remains secure against dishonest behaviour of the source and oth
36 se mechanism that precludes such attacks is "secure against predicate singling out" (PSO secure).
37                            Previously deemed secure against re-identification attacks, beacons were s
38 fluid perfusing through a custom-made device secured against the skin on the dorsal neck.
39  surgery alone is the preferred treatment to secure an optimum outcome, and should be done in a centr
40 tools, the Sentinel System permits rapid and secure analyses, while preserving patient privacy and he
41 rimental results show that PRINCESS provides secure and accurate analyses much faster than alternativ
42 alized at a single site, PRINCESS performs a secure and distributed computation over encrypted data,
43 ped a tablet PC-based solution that provides secure and nearly instantaneous transfer of patient info
44 raphic concepts, which can bring efficacy in secure and private genomic data computation.
45 unch polio endgame activities to permanently secure and sustain the enormous gains of polio eradicati
46 passive sensor media that inherently produce secure and trustworthy data, and whose honest and non-ma
47 o explore the role of expert facilitation in securing and sustaining successful outcomes of Appreciat
48  drug disposal system provides a convenient, secure, and effective method for unused medication.
49 nitude, appropriate temporality is not fully secured, and biological gradient, plausibility, coherenc
50 orted their clinical data into the All-Wales Secure Anonymised Information Linkage (SAIL) Databank (S
51 el combining all three types of similarities secures area under the receiver operating characteristic
52 s implemented by using an inflatable balloon secured around the left coronary artery.
53 on moderately slippery surfaces to find more secure asperities when necessary.
54 approximately 85% of full discharge capacity secured at >0.45 V, and excellent cycling stability for
55  length to restore MV leaflet coaptation and secured at the epicardium.
56 s such as optical countermeasure systems and secure atmospheric transmission lines, as well as for si
57 se with the short allele, the probability of secure attachment being observed in the intervention gro
58 gh oxytocin (OXT) plays an important role in secure attachment formation with a primary caregiver, wh
59                      It also identified that secure attachment positively correlated with lingual gyr
60                                              Secure attachment predicted higher levels of warmth-liki
61               Higher re-experiencing PRS and secure attachment style were independently associated wi
62 vity for forming attachment bonds, including secure attachments to humans [1,3], which could provide
63 ve been shown to be particularly powerful in securing attention, intense emotional involvement, and h
64       While there are open Web protocols for secure authentication and authorization, these protocols
65 le at low pH conditions, which may form more secure barriers to flow, compared to carbonates, which d
66 d selective curbing of unwanted RNA editing (SECURE)-BE3 variants that have reduced unwanted RNA-edit
67                                  We achieved secure bidirectional data flow between investigators and
68 e rhythm generator also direct its output to secure bilaterally coordinated contractions of inspirato
69       Tooth-coloured plastic dental fillings secured by adhesives to tooth structures are widely used
70             The success of T. guizhouense is secured by the excessive production of hydrogen peroxide
71  bearing a beta-amino-alpha-ketone group was secured by X-ray crystallography.
72 iation in the unliganded state but also help secure CD4 binding.
73 thway whose levels are tightly controlled to secure cell homeostasis.
74 t are not amenable to traditional methods of secure communication such as data encryption, there has
75 ative routes to exploitation for example for secure communication systems, novel remote imaging devic
76 n quantum systems for advanced computing and secure communication(1,2).
77 mises capabilities in computing, simulation, secure communication, and metrology beyond what is possi
78 ake advantage of the quantum noise to create secure communication, using continuous variable quantum
79 plications in high-rate quantum networks for secure communications and interconnecting future quantum
80 ution (QKD) provides an attractive means for securing communications in optical fibre networks.
81 ing, we implement metagenomic analyses using secure computation.
82 objective of asking for family consent is to secure consent and donation, some ethical commentary on
83  bifunctional chelators (BFCs), which ensure secure consolidation of the radiometal and targeting vec
84 esults are generalisable for relatively food secure contexts with a young SAM population.
85 d of protecting information using a provably secure cryptographic hash that does not rely on electron
86 search can be eliminated or mitigated by new secure data analytics.
87          A full audit trail is maintained to secure data provenance, governance and ensuring reproduc
88 ed to individual-level PGT results through a secure data transfer process.
89 tient, reliability of connectivity, safe and secure data transmission, and economic feasibility.
90 erface and can also be used in studies where secured data access is an important concern.
91            Our method not only increases the secure distance on the ground tenfold but also increases
92  shares are hypothesized to halt the race by securing each individual's right to a portion of the tot
93                       It prevents data loss, secures easy data finding, use and integration and thus
94 enomic data-sharing beacons aim to provide a secure, easy to implement and standardized interface for
95 cal forest biodiversity similar to those for securing ecosystem services.
96 5 primarily fuels proper mtLSU maturation by securing efficient methylation of two 16S rRNA residues,
97     We have developed htsget, a protocol for secure, efficient and reliable access to sequencing read
98 atforms because of their huge potentials for securing electricity continuously from even tiny heat so
99 licular APCs represent a unique mechanism to secure engagement of TCM during an ongoing effector resp
100 o us a favor over those who agree only after securing enough information to ensure that the favor wil
101                      Cytosolic bacteria must secure entry into the host cytoplasm to facilitate repli
102 ed in April 2016 to stop VDPV2 emergence and secure eradication of all serotype 2 poliovirus.
103          Although source redundancy normally secures essential S1P signaling in developing and mature
104 ical management with hormone substitution to secure euthyroid status in both groups.
105  post-quantum cryptosystems strive to remain secure even in this scenario.
106  of potent naive factors, TBX3 and NANOG, to secure exit from the naive state.
107 lly many exact counts, each individually PSO secure, facilitates predicate singling out.
108  ruthenate pyrochlore oxide) is provided for securing fast OER kinetics.
109                                         They secure flexor-extensor alternations in the intact cord b
110  time, new applications must be developed to secure "floating" (not yet absolutely dated) tree-ring s
111 imals, including carnivores, to store and/or secure food.
112                                              Securing food supply for a growing population is a major
113                       The generated keys are secure for realistic devices, because our ground receive
114  (PI) or university lecturer are formidable: secure funding, recruit staff and students, establish a
115 eveloping national operational switch plans, securing funding, establishing oversight and implementat
116 pools in rice to enhance breeding efforts to secure future climate change adaptation.
117         Crop production needs to increase to secure future food supplies, while reducing its impact o
118 polypharmacology holds enormous potential to secure future therapeutic innovation.
119                                        While securing gas supply is a top priority for the Chinese go
120 alyze their private breeding data within the secure GDR server with an option to release data publicl
121 f xantphos-based ligands and is important in securing good yields for the beta-lactam products.
122 r the "democracy catch-22": How can the poor secure greater democratic influence when the existing de
123 half of NHS England, we created OpenSAFELY-a secure health analytics platform that covers 40% of all
124 ion) is thought to promote wound closure and secure hemostasis while preventing vascular occlusion.
125   Consequently, between 57% and 75% proteins secure higher predictive performance than the currently
126 that inter-connect these CPGs are thought to secure hindlimb-forelimb coordination, ensuring that dia
127 inkers allow the probes to be fine-tuned for securing ideal redox reporter.
128 ocuments to be added to shipments unique and secure identification of aliquots through use of customi
129 ration by preserving bile duct integrity and securing immune cell recruitment and function.
130                                         This secures improved glucose delivery on the one hand and in
131 he long allele, 70% (95% CI [59%, 81%]) were secure in the intervention group, compared to 71% (95% C
132                                 The tube was secured in a 50-mm water bath.
133 emble, with the native mitral valve leaflets secured in between, thereby abolishing MR.
134  predict the proportion of genetic variation secured in randomly generated solutions.
135 oxicity, and acquire novel chemical space to secure intellectual property.
136 beacon' protocol provides a standardized and secure interface for querying the genomic datasets.
137 dye [0.2%]; chromocolonoscopy group) using a secure, internet-based, computerised, randomisation syst
138                          Blockchain provides secure interoperability between siloed stakeholders and
139 software applications, and tools to create a secure, interoperable, and extensible resource for resea
140 e and enhance its persuasiveness in order to secure its preferred policy outcomes.
141 hat the newt has evolved novel strategies to secure its regenerative ability of the limbs after metam
142 or their clients and that they must do so to secure just outcomes.
143            Thus, how to construct a fair and secure key agreement protocol has obtained much attentio
144 d continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 k
145  1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s.
146 ical signals and transmit classical data and secure keys simultaneously over 25 km of optical fibre.
147 of entanglement and generation of completely secure keys.
148 ve patients underwent HBP with a 3830 Select Secure lead (Medtronic, Inc) at 3 centers between Octobe
149 gender was associated with a lower number of secure leadership statements (3 +/- 2 vs 5 +/- 3; p = 0.
150 rea expansion thus emerges as a key area for securing livelihoods in the agrarian economies of the Gl
151               Basalt formations could enable secure long-term carbon storage by trapping injected CO2
152 y after tumor regression, endogenous T cells secured long-term memory with a broad repertoire of anti
153 100 THz), was recently introduced to provide secure low data rate communications links across short d
154  circumspect social behavior advantageous to secure mating opportunities depending on the social back
155 rocessing during sleep can serve not only to secure memory storage but also to weaken it.
156  men and women with mental disorder in three secure mental health hospitals in England.
157 t product labeling and barcoding, as well as secure messaging and authentication when combined with p
158  the diagnosis of sarcoidosis is never fully secure.Methods: Systematic reviews and, when appropriate
159 sed men (aged 16-49 years) who could receive secure mobile phone text messages were randomly assigned
160  the transboundary conservation potential of securing multinational threatened species varied substan
161 acy concerns, cryptographic methods, such as secure multiparty computation (SMC) protocols, have been
162 er than prior state-of-the-art results using secure multiparty computation, which requires continuous
163 rving participant privacy through the use of secure multiparty computation.
164  data highly accessible inside a private and secure network, allowing the data specification in a hum
165 dely believed that the highest likelihood of securing neuroprotective benefit from drugs will be in t
166  installation requirements, and to allow for secure offline use, A-Lister does not validate or impose
167                                  It provides secure on-demand access to data, analysis tools, and com
168                         Cartilage Portion is secured on top of the Bone Portion using mechanical inte
169 ntion (n = 149) or control (n = 151) using a secure online database (REDCap) to achieve allocation co
170  and outcomes (IOP and VA) were entered in a secure online database.
171 culties were randomly allocated (1:1), via a secure online minimisation tool, to receive brief guided
172 e surgeon or surgical resident involved, and secure online randomisation software was used in the ope
173 n mothers completed a 45-question anonymous, secure, online questionnaire regarding the impact of pre
174  estimate that the current global MPA system secures only 1.7% of the Tree of Life for corals, and 17
175 ourse of development, what makes some people secure or insecure in their close relationships, consens
176 signals and internal regulatory circuitry to secure organismal integrity.
177                         Although required to secure our food supply, inorganic phosphate is also link
178 lation of soil phosphatase activity, thereby securing P supply to support plant growth.
179 ts, maintaining a good work-life balance and securing permanent positions.
180 sticated tissue and cellular architecture to secure plant reproductive success.
181                    Altogether, collagen XIII secures postsynaptic, synaptic and presynaptic integrity
182                       Coordinated efforts to secure price reductions beyond the 13 commodities and im
183 y of OO is minimally invasive, effective and secure procedure.
184 hin the UNISEC (Universal Influenza Vaccines Secured) project.
185 ment opens the door to developing other such secure proof-systems for other applications.
186 at involves the formation of dimers of CB[8]-secured Pt dimers (a total of 4 Pt complexes) during the
187       We showed that any pair of these CB[8]-secured Pt(II) complex dimers bearing different tpy "hea
188 ines List; appropriate price reductions were secured; quality manufacturing was improved; a fast-trac
189 , these results can lead to applications for secure quantum communications and quantum engineering.
190 ortant standard needed to be considered in a secure quantum key agreement (QKA) protocol.
191 pplications of quantum communication such as secure quantum key distribution(2,3) are already being s
192 e propose the HEALER framework to facilitate secure rare variants analysis with a small sample size.
193                                   Nucleosome-Secured Regions (NSRs) occupied by polycomb-repressed ch
194 g these effects could help in developing and securing regulatory approval of a new macrolide/ketolide
195 d to RNA and thus provides a larger and more secure repository for genetic information.
196 ggression is a social behavior essential for securing resources and defending oneself and family.
197 s the Food and Drug Administration (FDA), to secure safe use of deep learning methods.
198 LS treatment on hospital arrival by use of a secure schedule generated with permuted blocks of random
199  to strategically conserve ocean areas while securing seafood for the future.
200 t (Asia versus Africa; emergency versus food-secure settings).
201 work that enables responsible, voluntary and secure sharing of clinical and genomic data.
202                   No sutures are required to secure sheets to tissue because sheet extracellular matr
203 e value-added organic oxidation reaction can secure significant economic feasibility.
204  sub-perfluorocarbon liquid injection of OVD secured single-layered flaps intraoperatively and postop
205 ed Reference-oriented Alignment Map) for the secure storage of compressed aligned genomic data.
206 ertwine these two technologies to enable the secure storage of valuable information in synthetic DNA,
207 s that CO(2) injection in oilfields provides secure storage with limited recycling of gas; the inject
208                                    To design secure storage, we need to understand how the fluids are
209 em with its innate signal peptide, bombyxin, secures structural homogeneity at the signal peptide cle
210 plus additional iECGs if symptomatic) onto a secure study server with overread by an automated AF det
211 entative birth cohort at the Trondheim Early Secure Study, Trondheim, Norway, enrolled at age 4 years
212 olutions based only on surrogate information secured substantial amounts of adaptive and neutral gene
213  cholera vaccine, authorities were unable to secure sufficient doses to vaccinate the entire at-risk
214 ff scheduling in anticipation of surges, and securing sufficient personal protective equipment and an
215 ued vaccine development efforts will lead to secure supply of low-cost vaccines, and ongoing vaccine
216      The objective of cancer treatment is to secure survival.
217 ocial issues in children and their families, securing sustainable funding for health promotion and in
218 roperties, by minimizing adverse effects and securing sustained 5-HTExt elevation beyond the SSRI eff
219 the deadenylation and degradation of mRNA to secure T cell quiescence.
220 dothelium and BMD-EPC act as double-locks to secure targeted EPC- endothelium interactions by which t
221 ons by offering environmentally friendly and secure technologies that can contribute to the low-carbo
222 are of interest for applications in hardware secure technologies, temporary biomedical implants, "gre
223 orks will be paramount towards practical and secure telecommunications.
224                   Scalable, inexpensive, and secure testing for SARS-CoV-2 infection is crucial for c
225 esearch in the field of retinal diseases, to secure that patients have the timely and appropriate kno
226 d early parenthood for all cardiologists may secure the best possible candidates to the field of card
227 modate the genome and pp150 helix bundles to secure the capsid via cysteine tetrad-to-SCP interaction
228 uld guide the use of staging terminology and secure the classification of anatomical disease extent a
229 rected assembly of two advanced fragments to secure the congested C3a-C3a' linkage in three steps, fo
230 omb-mediated H3K27me3 chromatin pathways can secure the control of a large spectrum of transposons in
231 irected assembly of two complex fragments to secure the critical C3a-C3a' linkage followed by a guide
232 ld adapt to the changed dynamics in order to secure the ecosystem services provided by urban trees.
233                 These cell-specific networks secure the establishment of the glial fate only in the n
234 fication reaction proved highly effective to secure the F-ring and the fourth contiguous stereocenter
235  of the bivalved carapace may have helped to secure the food items during feeding.
236 e of the causes may be the use of sutures to secure the mesh.
237 tributes to antibiotic diversity, helping to secure the niche.
238 mpairment in microglia-neuron cross-talk may secure the permanence of the failure of synaptic and neu
239                                           To secure the safety of students and staff, the Ministry of
240 n helical propensity as the knot tightens to secure the SAM cofactor.
241  optimally stapled ligand-capping anchor and secure the stability of the entire nanomolecule.
242 to produce functional ribosomal subunits and secure the translational capacity of cells.
243 se two mechanisms may act synergistically to secure the transmission of functional mtDNA through Dros
244 ion of current conservation efforts to fully secure the Tree of Life on coral reefs.
245  of N,O-ketalization and reductive amination secured the chemoselectivity of N-methylation, leading t
246 d binding of pSer16 in each 1433 subunit and secures the correct 2:2 stoichiometry.
247  while the reaction-seeding algorithm of RRS secures the efficiency of random seeding.
248 he TRP helix and the backbone oxygen of L596 secures the helix/linker contact, which acts as a latch
249 namic stability of chelating S-donor ligands secures the redox-active and potentially toxic Cu(I) ion
250      In addition, when a rubber band tightly secures the sensor to the skin, the gap between sensor a
251                                         This secures the two sleeves on the shaft of the trocar, such
252 become stably associated with the P complex, securing the 3' exon and potentially regulating activity
253                                              Securing the airway remains the most important intervent
254  change around the catalytic Mn4CaO5 cluster securing the binding of Ca(2+) and Cl(-) in PSII.
255 nt and social adaptation frameworks aimed at securing the future of coral reefs.
256 hase-specific support across the life cycle, securing the gains of investment in the first 1000 days,
257  conserved across species, as a regulator in securing the identity of ovarian-supporting cells and th
258 , they exercise their hemostatic function by securing the integrity of inflamed blood vessels to prev
259  in the Moremi Game Reserve, Botswana, after securing the relevant permissions.
260  to related crop species like wheat and rice securing the rising global food demand for cereals.
261 ght-fitting surgical mask with adhesive tape securing the superior portion of the mask, N95 mask, and
262 r challenges in designing, implementing, and securing the sustained and exclusive use of scalable int
263 quinoline heterocycle of 21 was essential to securing the targeted potency, pharmacokinetic (PK), and
264 imize 2D-LC separations is a missing link in securing the viability of 2D-LC as a mainstay for indust
265 han previously thought and the importance of securing their future under a changing climate is theref
266 oteins are synthesized with a signal peptide securing them to the cytoplasmic membrane with the lipop
267 e unassessed Western Development of China to secure this endangered crane lineage and other wildlife
268  between dACC and fronto-striatal regions is secured through different pathways, the vast majority of
269  for the implementation of future ubiquitous secure 'THz Torch' wireless communications links; as wel
270 c examination chair with an blood agar plate secured to the forehead and wearing various face masks (
271                               Improvement in secure transmission of information is an urgent need for
272 e at tens of active zones, thereby achieving secure transmission.
273                                          The SECURE trial assessed efficacy and safety of isavuconazo
274  a multicentre, randomized-controlled trial (SECURE-trial) were used.
275 ntext of global and country level efforts to secure universal health coverage in low-income and middl
276                            Findings may help secure urban food supply chains and harmonize nutrients,
277  They enable a more transparent, robust, and secure use of model outputs.
278 at are significantly better than the results secured using sequence alignment.
279  (1:1) by centre in block sizes of four by a secure validated computerised randomisation system to ei
280                     SETTINGS: Low and medium secure wards for men and women with mental disorder in t
281 ion that frontloaded selectivity is the most secure way of advancing knowledge.
282 y distribution (QKD)(1-3) is a theoretically secure way of sharing secret keys between remote users.
283 ts were allocated in a 1:1 ratio by use of a secure web-based computer-generated randomisation sequen
284                                            A secure web-based educational system was created using cl
285 , and 2 experts evaluated each image using a secure web-based module.
286  presenting them in a user-friendly way on a secure web-based platform.
287              Randomisation was managed via a secure web-based randomisation program, with minimisatio
288 a collection methods before implementing the secure web-based registry.
289  randomly allocated participants (1:1) via a secure web-based service to receive intravenous iron or
290                                With use of a secure web-based system that concealed allocation and us
291 s stratified by clinic and performed using a secure web-based system.
292 surgeon, and 1 or both eyes eligible using a secure web-based system.
293                                      In this secure web-based, multiple-reader-multiple-case study, 4
294                  Data were entered through a secure website and were reviewed centrally.
295 rticipants were randomly assigned (1:1) by a secure website to receive hormonal therapy with vigabatr
296 nergy harvester for powering the sensors and secure wireless data transfer electronics, and machine l
297                                            A secure wireless data transfer hardware powered by a piez
298  single chain into a lentiviral backbone and secured with the suicide gene iCASP9/rimiducid system.
299                             A microneedle is secured within the injection station to confine droplets
300 o (Solanum tuberosum L.) is of importance to secure yield even under changing environmental condition

 
Page Top