戻る
「早戻しボタン」を押すと検索画面に戻ります。 [閉じる]

コーパス検索結果 (1語後でソート)

通し番号をクリックするとPubMedの該当ページを表示します
1 s: Future Perspectives of Food and Nutrition Security".
2 ng natural resources negatively impacts food security.
3  challenge to the community to determine its security.
4  uncertain outcomes for food and nutritional security.
5 e show that differential privacy implies PSO security.
6  losses worldwide, which affects global food security.
7  gained increasing attention for information security.
8 ion does not impact natural systems and food security.
9 egies to sustain livelihoods and ensure food security.
10 nd diminishing resources pose to global food security.
11 y to meet the 21st-century challenge of food security.
12 l safety, mission success, and even national security.
13 ring allowing consequent improvement in food security.
14 ents, nuclear power, space and international security.
15 engthen adaptive capacity, and increase food security.
16 nd their mitigation with food production and security.
17 e sensing, information storage and trademark security.
18 ials, with important implications for supply security.
19 h as Ug99, are a major threat to global food security.
20 ensing, biomedical imaging, spectroscopy and security.
21 d US regulatory requirements for privacy and security.
22 e its importance as a diagnostic for nuclear security.
23 tion of isotopic sensitivity and information security.
24 smatch between regional biocapacity and food security.
25 d released in the sub-region to improve food security.
26 irus and a potential threat to global health security.
27  SEMAR, and PEMEX), and women without social security.
28 opulation health services, and global health security.
29 ant crop losses world-wide, threatening food security.
30 the social and nonproduction aspects of food security.
31  the most important threats to global health security.
32  production is needed for future global food security.
33 s threats to crop production and global food security.
34 le assets for logistics, transportation, and security.
35  significant threat to that continent's food security.
36 e Sahel, thus contributing to water and food security.
37 tem's function, organization, robustness and security.
38 of applications extending from healthcare to security.
39 rice yields necessary for future global food security.
40  climate change is expected to threaten food security.
41 h is an integral aspect of public safety and security.
42 nt agricultural system, while promoting food security.
43 ditional benefits to lake fisheries and food security.
44 rovement may help contribute to greater food security.
45 imately contributing to food and nutritional security.
46 ally contribute to global food and nutrition security.
47 significant radiation which also compromises security.
48 lants is a promising strategy to ensure food security.
49 tain terrestrial biodiversity and human food security.
50 children younger than 5 years without social security.
51 ficant threats to pollinator health and food security.
52 nto agricultural weeds threatens global food security.
53 tial applications in information storage and security.
54 d pests are a constant threat to global food security.
55  issues, including trade, climate change and security.
56 cultural production, endangering global food security.
57  pathogens to potentially affect global food security.
58 ern Africa, with severe consequences to food security.
59 s of vital importance for food and nutrition security.
60 or a healthy life and the core tenet of food security.
61  future agricultural sustainability and food security.
62 lience, climate change adaptability and food security.
63 ent options for increased food and nutrition security.
64 igate GHG emissions and sustain China's food security.
65 critical in many sectors, including national security(1,2), medicine(3), crystallography(4) and astro
66  changing climate is required to ensure food security(1,2).
67 nt for irrigation, and hence for global food security(1-3).
68 d QKD, which has inherent source-independent security(19,20).
69 so they are widely used in gas detection(1), security(2), terahertz imaging(3), astrophysical observa
70 trategies without compromising unconditional security(8).
71                 To impart both intricacy and security, a synergistic approach was implemented resulti
72 dations regarding (1) study design; (2) data security, access, and sharing; (3) legal issues; (4) com
73 e schemas have precisely defined measures of security against all adversaries, human and/or machine.
74                                          The security agent's management of the situation reported by
75 hem but also have instructions regarding how security agents may verify their (131)I therapy.
76 us methods of management of the situation by security agents, and the spectrum of physician documenta
77 nificantly impact ecosystems, food and water security, agriculture, hydropower, and the socioeconomic
78 ote responsible innovation and international security alike.
79                   Results are similar for US Securities and Exchange Commission (SEC) defendants accu
80               Data were accessed from the US Securities and Exchange Commission, Drugs@FDA database,
81                   In order to address energy security and air quality concerns, China issued the Dual
82 d aquifer recharge (MAR) enhances freshwater security and augments local groundwater supplies.
83 r profound implications for ecosystems, food security and biosphere-atmosphere feedbacks.
84 gens to fungicides poses a challenge to food security and compels discovery of new antifungal compoun
85 , and tactical objectives that support their security and defence missions, which can conflict with h
86 e populations across the world threaten food security and ecosystem function.
87 fish aquaculture's potential to deliver food security and environmental sustainability.
88 crobiome relationships is important for food security and food safety in the face of a changing clima
89 isease vectors and are vital for global food security and health.
90  way to carry out the purposes of the Energy Security and Independence Act in the corn stover-based b
91                                       Public security and law enforcement have a crucial but often la
92 limate niche of any crop, and discusses food security and legume biodiversity in Sub-Saharan Africa.
93 ill limited despite their importance to food security and livelihoods.
94 ries, with significant implications for food security and livelihoods.
95 vegetable is safe and can contribute to food security and nutritional improvement in the sub-Saharan
96 al resources to handle an oversized problem, security and privacy concerns, and the interest in the a
97 onomics and makes the trade-off between food security and protection of biodiversity explicit.
98 at conserve genetic resources, guaranty food security and provide agroecosystem services.
99 n products and processes, traceability, food security and quality control are inherent challenges in
100  interactions, coevolutionary dynamics, food security and resource management, and provide guidance a
101 rition, learning, responsive caregiving, and security and safety.
102  Fungicides are indispensable to global food security and their use is forecasted to intensify.
103 k of diversity in Big Data research, and the security and transparency risks posed by machine learnin
104  and integrated investments in global health security and universal health coverage) in their respons
105 oaches to global health policy-global health security and universal health coverage-important lessons
106 utilization of fish in achieving nutritional security and will be helpful in prioritizing species for
107 k (for privacy); having an outside lock (for security); and having a sealed toilet (to reduce smell a
108 l agrifood trade is playing in regional food security, and 3) a mismatch between regional biocapacity
109 nnected and automotive vehicles, defense and security, and agriculture and mining.
110 ecoming major threats to global health, food security, and development.
111 dangers to patients, population health, food security, and economic stability worldwide.
112                         Climate change, food security, and environmental sustainability are pressing
113  approach to dealing with entrenched social, security, and health issues.
114 rrorism is a rapidly growing threat to world security, and increases the risk of bioterrorism.
115 , including poverty reduction, improved food security, and introduction of land and health reforms ha
116 its neighbors in terms of landed value, food security, and jobs.
117 ent limitations, including bias, privacy and security, and lack of transparency, along with the futur
118 n, increased migration and remittances, food security, and maternal nutrition as key drivers of stunt
119 ve a wide range of applications in industry, security, and medicine.
120 andomised controlled trial), on income, food security, and mental health a median of 1 year and 2 yea
121 sible co-benefits for improved food and soil security, and reduced ocean acidification(2-4).
122 responding economic, health equity, national security, and sustainability implications; 2) the curren
123 irds and poses hazards to human health, food security, and wildlife conservation globally.
124  hierarchy privileges conformity, order, and security; and individualism embraces freedom, speed, and
125 95%CI 1.07-2.62), and working in cleaning or security (aOR of 10.1;95%CI 3.40-26.9).
126 pharmaceutical anti-counterfeiting and other security applications requiring immediate destruction or
127  is relevant to radiation identification for security applications.
128 gnostic, air quality, food safety and border security applications.
129 etection for both public health and national security applications.
130  detection of nuclear materials for national security applications.
131 ndestructive inspection, as well as national security applications.
132  computing platforms using best-practice Web security approaches and thereby minimize risks of unauth
133 rotecting the environment and enhancing food security are among the world's greatest challenges.
134 ity - strategies that might enhance national security around the globe.
135 lopment of water resources, food, and energy security, as these sectors are often in competition, esp
136 positive and supervisory caregiving and food security at home are associated with reduced risk of mul
137 positive and supervisory caregiving and food security at home are likely to support further efficienc
138 arental monitoring and supervision, and food security at home were each associated with lower odds of
139 g, parental monitoring and supervision, food security at home, basic economic security at home, free
140 ision, food security at home, basic economic security at home, free schooling, free school meals, and
141  substantial economic losses and reduce food security at household, national and global levels.
142 on Construction and Protection of Ecological Security Barriers on the Tibetan Plateau.
143                                         Food security benefits from MPAs can be obtained from species
144 debt: 1) a severe contrast in diets and food security between regions, 2) a concern about the role th
145 llenges, ranging from climate change to food security, biodiversity declines and extinction, and poli
146 s, border checkpoints, and entrances to high-security buildings.
147 ic yield potential is crucial to ensure food security, but efforts are thwarted by an apparent trade-
148  will play a pivotal role in supporting food security by enabling germination of seeds in degraded en
149 pment goal for any country is to ensure food security by producing a sufficient and safe food supply.
150 gh the Coronavirus Aid, Relief, and Economic Security (CARES) Act.
151  Research Program on Climate Change and Food Security (CCAFS).
152 sation; Climate Change, Agriculture and Food Security (CGIAR) Research Program on Climate Change, Agr
153 gram on Climate Change, Agriculture and Food Security; CGIAR Research Program on Policy, Institutions
154                                        A key security challenge involves attribution: determining, in
155 ificant economic, humanitarian, and national-security challenges.
156 e detection of radioactivity at a variety of security checkpoints at public facilities after(131)I th
157 nts treated with (131)I may be identified at security checkpoints at various public facilities.
158 aquaculture contributing to sustainable food security, comes the need to better understand seafood as
159  resulted in unintended ecological and water security concerns at the regional scale.
160 climate change is essential to mitigate food security concerns.
161 , with important environmental, economic and security consequences.
162                       Global health and food security constantly face the challenge of emerging human
163 ding viral disease that affects a major food security crop in sub-Saharan Africa.
164 cosum (Musaceae, enset) is an Ethiopian food security crop.
165 y was assessed through linkage to the Social Security Death Index and cause of death from the Nationa
166  promoting rural agriculture to improve food security; decentralization of the health system, incorpo
167 and the disproportionate attention of health security decision makers, planners, and practitioners, o
168 butions of crop wild relatives (CWR) to food security depend on their conservation and accessibility
169                         Conventional optical security devices provide authentication by manipulating
170 ram, variable outcomes across divergent food security dimensions, and synergies and trade-offs betwee
171 ture makes an important contribution to food security directly (by increasing food availability and a
172 ngle quantum system as these offer intrinsic security due to the sub-Poissonian nature of the photon
173  which marriage promotes economic and social security, early marriage may be better understood as ser
174                     Dams contribute to water security, energy supply, and flood protection but also f
175 erged in a complex and violent political and security environment.
176 in urban food production for reasons of food security, environmental sustainability, social and healt
177 ng adaptation strategies and increasing food security, especially in dryland cropping systems across
178 ajor crop for worldwide food and nutritional security, especially in sub-Saharan Africa, that is resi
179 rastructure systems become more intelligent, security experts point to the growing threat of targeted
180  enable future integrated bioelectronics and security features.
181 tools represents a critical point within the security field, in order to provide early alarm systems.
182 rnet of Things is a key concern in the cyber-security field.
183 m aestivum L.) is essential to maintain food security for a large proportion of the world's populatio
184                        Achieving global food security for the estimated 9 billion people by 2050 is a
185 to ascribe value, give autonomy, and provide security for the future, and we show how each of these f
186 eld potential is a major goal to ensure food security for the growing global population.
187 onounced dry and wet seasons, affecting food security for two-thirds of the world's population.
188                     In August, 2017, Myanmar security forces initiated a widespread response against
189 esh, following escalated violence by Myanmar security forces.
190 tribute to broadening the debate beyond food security from a social-ecological perspective, incorpora
191        This study includes women with social security from the majority of public health institutions
192 thereby enhancing crop productivity and food security globally.
193 f water scarcity to crop production and food security has been globally recognized as a pivotal susta
194 is for five major crops globally and in food security hotspots.
195 mong crop pathogens and pests and among food security hotspots.
196 ing capabilities and discuss their potential security implications to the international community.
197  pathology must contribute to improving food security in a safe operating space, which is shrinking a
198 tentially biasing future projections of food security in a warming world.
199 rsely reduces maize yield and threatens food security in Africa.
200  (Delile) Benth., a major constraint to food security in Africa.
201 lenging to emulate, and can provide enhanced security in anti-counterfeiting applications.
202 increasing challenges of water resources and security in China.
203 stitutes a vital resource in addressing food security in developing countries.
204 production and nonproduction aspects of food security in future roles for integrated assessment model
205                Offal, may contribute to food security in marginalised communities and information on
206 itative guidance for designing MPAs for food security in open-access fisheries.
207 categorically from measures determining food security in other species.
208 sing applications of information storage and security in spatial and temporal domains.
209 n to identify strategies for expanding water security in the face of drought and other water hazards.
210 rance in plants is essential to provide food security in the face of increasingly harsh climatic cond
211 ff (Eragrostis tef) is a cornerstone of food security in the Horn of Africa, where it is prized for s
212 of the great challenges facing global health security in the modern era.
213 and bananas (RTB) are vital staples for food security in the world's poorest nations.
214  B(1) in plants from the perspective of food security, including its roles in plant disease resistanc
215 nited States is a critical economic and food security industry, yet there is currently no large-scale
216 itutional Review Board of the Mexican Social Security Institute (12CEI 09 006 14), and the National I
217 tching in a finite state machine for network security intrusion detection and definable inexact patte
218                            We argue that PSO security is a mathematical concept with legal consequenc
219                                        Water security is a top concern for social well-being, and dra
220 antum communication without compromising its security is satellite-based QKD, but so far satellite-ba
221 ecological and economic conditions when food security is the objective.
222 oducibility and-depending on the application-security issues.
223 ions are often vulnerable due to the limited security levels.
224         Small pelagic fisheries provide food security, livelihood support and economic stability for
225                                         Food security may be an important point of intervention for e
226 have an enormous impact on civilian national security, military applications, and environmental monit
227  be of enormous benefit to civilian national security, military applications, and environmental monit
228 , plutonium...) would be useful for national security missions involving inspection, emergency respon
229 st, people who value achievement, power, and security more and live in countries and regions where pe
230 ing at an alarming rate threatening the food security needs of a booming world population.
231 applications ranging from medical imaging to security, non-proliferation, high-energy physics and ast
232  fundamental human right, essential to human security, nutrition and health, and a core objective of
233 rakoram (HK) are critical for ensuring water-security of a large fraction of world's population that
234 een validated, and may give a false sense of security of being "immune" to SARS-CoV-2.
235 their significant application in healthcare, security of food and medicine, and nondestructive inspec
236                                          The security of groundwater supplies is of critical importan
237                                   The future security of Internet of Things is a key concern in the c
238 done locally by the user's CPU to ensure the security of patient data.
239 und tenfold but also increases the practical security of QKD to an unprecedented level.
240                     Endeavours to ensure the security of supply of elements critical to modern techno
241                               We discuss the security of this protocol for an attacker with unlimited
242  can now be used to increase yields and food security on acidic soils.
243 rt of any assessment of water scarcity, food security, or bioenergy potential.
244    The Coronavirus Aid, Relief, and Economic Security, or CARES, Act provides multiple means of direc
245 importantly, our finding points to the "Food Security Paradox", food insecurity in areas with high fo
246 Guard Police, and military posts, killing 12 security personnel on Aug 25, 2017.
247 irect abuse and/or neglect by camp staff and security personnel, and unsafe situations in accessing h
248      Counterfeit medicines are a fundamental security problem.
249 at of a malicious attack is one of the major security problems in complex networks.
250 ion owing to their potential applications in security protection because the information recorded dir
251 g-distance migration of insects impacts food security, public health, and conservation-issues that ar
252 ion and desertification, and delivering food security (referred to hereafter as "land challenges").
253 Interpretation, Resource Identification, and Security-Regolith Explorer (OSIRIS-REx) mission provides
254 Interpretation, Resource Identification, and Security-Regolith Explorer (OSIRIS-REx) spacecraft surve
255 Interpretation, Resource Identification, and Security-Regolith Explorer) spacecraft.
256 rticle, we discuss the different privacy and security-related problems revolving around human genomic
257 etter self-reported health, and greater food security relative to existing recipients, and were more
258                             Classical sensor security relies on cryptographic algorithms executed on
259                                         Food security relies on the resilience of staple food crops t
260                                         Food security remains a principal challenge in the developing
261 ndicated that land reforms and improved food security represented important factors.
262 tions from finance to epidemiology and cyber-security require accurate forecasts of dynamic phenomena
263                         However, relays pose security risks, which can be avoided by using entangleme
264 edia sensitive to neutrons for use in a high-security scenario: the inspection of a military facility
265 scientific research and applications such as security screening, communications, quality control, and
266 in professional settings such as medical and security screening.
267                                 Although the security sector is a key partner in many specific public
268             We analyze the properties of PSO security, showing that it fails to compose.
269 ium has been observed at the Nevada National Security Site (NNSS) and attributed to colloids.
270 u) has been deposited in the Nevada National Security Site (NNSS) subsurface as a result of undergrou
271  member for past UNEs at the Nevada National Security Site.
272 cation, household income, and household food security status.
273 re US "supply side" drug policy and national security strategy.
274 , with stronger investments in global health security, stronger investments in universal health cover
275 ity was measured using the US Household Food Security Survey Module.
276 s that the DAS technique can be an effective security technology to detect and to identify highly sim
277 d demonstrate a different approach to sensor security that does not rely on classical cryptography an
278 c health, particularly by affecting the food security, the diet quality, and, subsequently, the healt
279 trust is impacting law enforcement, national security, the media, e-commerce, and more.
280 ience to climate change and to underpin food security, through initiatives such as international '4p1
281 information science, promising unconditional security to classical communication and providing the bu
282 ects the quality of aged cachacas, affording security to consumers and regulatory agencies.
283 ts application in a wide range of areas from security to healthcare.
284 tant goal with applications from biology and security to metrology.
285                             From global food security to textile production and biofuels, the demands
286 mate change while maintaining regional water security, to be effective on a large scale.
287 provement is crucial to ensuring global food security under climate change, and hence there is a pres
288 ditions in order to tackle the issue of food security under the threat of climate change.
289 ld have adverse consequences for global food security unmatched in modern history.
290 quality of schools and activities, financial security, urbanization and pollution, drugs, cultural pr
291 uirements, ameliorate food dietary value and security using sustainable and economically feasible agr
292 haran Africa and now threatens regional food security, we illustrate the method of matching gradients
293  determined their combined influence on food security when MPAs are implemented in an open-access set
294 rall conclusion is that agriculture and food security, which are two of the most central, critical, a
295 lenges of modern agriculture: improving food security while reducing environmental impacts.
296 dapting to climate change, and ensuring food security, while any increase in SOC storage is a co-bene
297  However, the impact of the pandemic on food security will linger after social-distancing policies ar
298 f implementing direct quantum physical layer security within a conventional classical communications
299 lant growth and crop yield and ensuring food security worldwide.
300 s a major threat to pig populations and food security worldwide.

 
Page Top