Home
Statistics
How It Works
Login
Register
Keyword Connections
-
cure
Keywords
Connection Type
Connection
Journals
Sensors (Basel, Switzerland)
Ecology and evolution
Frontiers in neuroscience
aids and behavior
jama dermatology
trends in immunology
Research Groups
No Research Group Connected
Bibliographies
[1]
Aptamers in Education: Undergraduates Make Aptamers and Acquire 21st Century Skills Along the Way.
[2]
"Cure" Versus "Clinical Remission": The Impact of a Medication Description on the Willingness of People Living with HIV to Take a Medication.
[3]
consideraciones para un retorno al concepto de deseo en la clínica analítica de las psicosis
[4]
criteria of chagas disease cure
[5]
religião e cura: algumas reflexões sobre a experiência religiosa das classes populares urbanas religion and cure: some thoughts on the religious experience of urban popular classes
[6]
la cura chamánica: una interpretación psicosocial the shamanic cure: a psychological interpretation
[7]
Flexible Modeling of Net Survival and Cure by AML Subtype and Age: A French Population-Based Study from FRANCIM
[8]
Biocontrol of aflatoxigenic Aspergillus parasiticus by native Debaryomyces hansenii in dry-cured meat products
[9]
An end to end secure CBIR over encrypted medical database.
[10]
Threat modeling using formal methods: A new approach to develop secure web applications
[11]
Predicting Global Fund grant disbursements for procurement of artemisinin-based combination therapies
[12]
RAMAN SPECTROSCOPY AND CURE KINETICS STUDIES OF A DLS 772 AND 4 4’DDS EPOXY SYSTEM DURING THERMAL AND MICROWAVE CURING
[13]
Approaches to hepatitis C treatment and cure using NS5A inhibitors
[14]
Approaches to hepatitis C treatment and cure using NS5A inhibitors
[15]
RAMAN SPECTROSCOPY AND CURE KINETICS STUDIES OF A DLS 772 AND 4 4’DDS EPOXY SYSTEM DURING THERMAL AND MICROWAVE CURING
[16]
Ethnicity and Immigration Status as Risk Factors for Gestational Diabetes Mellitus, Anemia and Pregnancy Outcomes Among Food Insecure Women Attending the Montreal Diet Dispensary Program.
[17]
In-kind donations, cash transfers and local procurement in the logistics of caring for internally displaced persons: The case of Polish humanitarian NGOs and Ukrainian IDPs
[18]
Assessing the textural defect of pastiness in dry-cured pork ham using chemical, microstructural, textural and ultrasonic analyses
[19]
Long-term effects of cancer treatment and consequences of cure: cancer survivors enjoy quality of life similar to their neighbours.
[20]
The universal standard for safe and secure work with arthropod vectors: The American committee of medical entomology’s arthropod containment guidelines
[21]
[MECHANISM OF PUBLIC PROCUREMENTS IN THE HEALTHCARE SPHERE IN THE EUROPEAN UNION AND UKRAINE: FINANCIAL AND LEGAL ASPECT].
[22]
PUBLIC PROCUREMENT IN THE HEALTHCARE SECTOR: ADAPTATION OF THE ADMINISTRATIVE LEGISLATION OF UKRAINE TO THE EU LEGISLATION.
[23]
Based Medical Systems for Patient's Authentication: Towards a New Verification Secure Framework Using CIA Standard.
[24]
A morphologically robust chaotic map based approach to embed patient's confidential data securely in non-QRS regions of ECG signal.
[25]
An FPGA Implementation of Secured Steganography Communication System
[26]
Discovery and Broad Relevance May Be Insignificant Components of Course-Based Undergraduate Research Experiences (CUREs) for Non-Biology Majors
[27]
Is production system a relevant attribute in consumers' food preferences? The case of Iberian dry-cured ham in Spain.
[28]
Effect of Spanish smoked paprika "Pimentón de La Vera" on control of ochratoxin A and aflatoxins production on a dry-cured meat model system.
[29]
Attacks detection method based on free space quantum secure direct communication
[30]
Why Is There No Cure for Tinnitus?
[31]
Secure Intelligent Vehicular Network Using Fog Computing
[32]
Secure Messaging with Physicians by Proxies for Patients with Diabetes: Findings from the ECLIPPSE Study.
[33]
Secure Anti-Void Energy-Efficient Routing (SAVEER) Protocol for WSN-Based IoT Network
[34]
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks
[35]
Robust Iterative Distributed Minimum Total MSE Algorithm for Secure Communications in the Internet of Things Using Relays.
[36]
Secure information display with limited viewing zone by use of multi-color visual cryptography.
[37]
Secure telemedicine using RONI halftoned visual cryptography without pixel expansion
[38]
Secure E-payment method based on visual cryptography
[39]
Secure image transmission based on visual cryptography scheme and artificial neural network-particle swarm optimization-guided adaptive vector quantization
[40]
Cheat immune visual cryptography for secure transmission of images
[41]
A highly robust and secure image watermarking based on classification and visual cryptography
[42]
Secure data transmission in cloud environment using visual cryptography and genetic algorithm: A review
[43]
Secure data storage based on blockchain and coding in edge computing.
[44]
PLUG-N-HARVEST Architecture for Secure and Intelligent Management of Near-Zero Energy Buildings.
[45]
Secure large-scale genome data storage and query.
[46]
An Effective and Secure Key Management Protocol for Message Delivery in Autonomous Vehicular Clouds.
[47]
A Lightweight Protocol for Secure Video Streaming.
[48]
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System.
[49]
A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries
[50]
Towards an Extensible and Secure Cloud Architecture Model for Sensor Information System
[51]
SSPSoC: A Secure SDN-Based Protocol over MPSoC
[52]
Exploring multiple working arrangements in Norwegian engineering, procurement, and construction industry from a middle manager and supervisor perspective: A sociotechnical system perspective.
[53]
‘Prevention is better than cure’: Assessing Ghana’s preparedness (capacity) for disaster management
[54]
A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
[55]
Occurence of Ochratoxin A and Biogenic Amines in Croatian Commercial Red Wines.
[56]
Vitamins (A&D) and Isoprenoid (Chenodeoxycholic acid) molecules are accompanied by Th1 immunostimulatory response and therapeutic cure in vivo: possible antileishmanial drugs
[57]
Do CHANGE platform: A service-based architecture for secure aggregation and distribution of health and wellbeing data.
[58]
Comparative study of two light cured composite resin for closing the median diastema one year study
[59]
Pharmacotherapy for personality disorder-prescribing practice at a high secure hospital: a preliminary report.
[60]
Longitudinal HCR-20 scores in a high-secure psychiatric hospital.
[61]
Insecure Attachment Predicts History of Divorce, Marriage, and Current Relationship Status
[62]
The Methods to Improve Quality of Service by Accounting Secure Parameters
[63]
Towards corruption-free cities: Measuring the effectiveness of anti-corruption measures in infrastructure project procurement and management in Hong Kong
[64]
Secured Monitoring of an Automated Parking Building System
[65]
Organ Procurement Organization Run Department of Motor Vehicle Registration and Drivers Licensing Offices Leads to Increased Organ Donor First Person Authorization Registrations.
[66]
A case of vitiligo cured with cucumber and sulfur.
[67]
The Role of Social Issues on Food Procurement among Corner Store Owners and Shoppers.
[68]
A Secure Lightweight Three-Factor Authentication Scheme for IoT in Cloud Computing Environment.
[69]
A Secure Charging System for Electric Vehicles Based on Blockchain.
[70]
A secure multi-frequency resonator for printable chipless RFID tag based on multifractal planar geometry
[71]
Fantastic Beasts and How To Sequence Them: Ecological Genomics for Obscure Model Organisms.
[72]
Social cure and social curse: Social identity resources and adjustment to acquired brain injury
[73]
Reproductive CRISPR does not cure disease.
[74]
The Reality and Future of the Secure Mobile Cloud Computing (SMCC): Survey
[75]
Secure Key Agreement Model for Group Data Sharing and Achieving Data Deduplication in Cloud Computing
[76]
Real-Time Secure/Unsecure Video Latency Measurement/Analysis with FPGA-Based Bump-in-the-Wire Security.
[77]
OWASP Risk Analysis Driven Security Requirements Specification for Secure Android Mobile Software Development
[78]
Semantic Analysis for Identifying Security Concerns in Software Procurement Edicts
[79]
A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks
[80]
An incentive-based protection and recovery strategy for secure big data in social networks
[81]
Use of 'eradication' in HIV cure-related research: a public health debate.
[82]
Assessment of Traceability Implementation of a Cross-Institutional Secure Data Collection System Based on Distributed Standardized EMR Storage.
[83]
Blockchains for Secure Digitized Medicine.
[84]
A Secure Communicating Things Network Framework for Industrial IoT using Blockchain Technology
[85]
Application of a Blockchain Platform to Manage and Secure Personal Genomic Data: A Case Study of LifeCODE.ai in China.
[86]
Ethics of organ procurement from the unrepresented patient population.
[87]
Thermoelectric GeTe with Diverse Degrees of Freedom Having Secured Superhigh Performance.
[88]
Correlation analysis of sleep duration, dietary habits, physical activity and knowledge with blood pressure on engineering workers, procurement, and construction (EPC)
[89]
Toward a cure for lumbar spinal stenosis: The potential of interspinous process decompression
[90]
The determinant factors of individual performance from task technology fit and IS success model perspectives: A case of public procurement plan information system (SIRUP)
[91]
Procurement of Category 2 Vaccines in China.
[92]
THE RESEARCH RESULTS OF TENDER PROCUREMENTS OF THE DRUGS FOR CANCER PATIENTS IN UKRAINE
[93]
EFFECT OF LIGHT CURING UNIT CHARACTERISTICS ON LIGHT INTENSITY OUTPUT, DEPTH OF CURE AND SURFACE MICRO-HARDNESS OF DENTAL RESIN COMPOSITE.
[94]
E-Business system development: Review on methods, design factors, techniques and tools with an extensive case study for secure online retail selling industry
[95]
Interior immigration enforcement policy and the subjective well-being of US residents: evidence from secure communities
[96]
SEAT-DSR: Spatial and energy aware trusted dynamic distance source routing algorithm for secure data communications in wireless sensor networks
[97]
Green Procurement Relationships Development under Carbon Emissions Regulations: A Bi-Level Programming Approach.
[98]
Supply chain finance schemes in the procurement of agricultural products
[99]
Prevention is better than cure: Persian Gulf biodiversity vulnerability to the impacts of desalination plants.
[100]
Life Cycle Assessment and Costing Methods for Device Procurement: Comparing Reusable and Single-Use Disposable Laryngoscopes.
[101]
Methods for medical device and equipment procurement and prioritization within low- and middle-income countries: findings of a systematic literature review.