بر اساس عنوان
21
Second-order theory for the effective behavior and field fluctuations in viscoplastic polycrystals64
Second-trimester vaginal bleeding: Correlation of ultrasonographic findings with perinatal outcome77
Secrecy Systems for Identification Via Channels with Additive-Like Instantaneous Block Encipherers80
Secret and public key image watermarking schemes for image authentication and ownership verification
175
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result179
Secretome Analysis Reveals an Arabidopsis Lipase Involved in Defense against Alternaria brassicicola205
Secretory Protein Profiling Reveals TNF-α Inactivation by Selective and Promiscuous Sec61 Modulators207
Secretory type of recombinant thioredoxin h induces ER stress in endosperm cells of transgenic rice281
Section thickness, macrohardness and yield strength in high-pressure diecast magnesium alloy AZ91324
Sector collapses and large landslides on Late Pleistocene–Holocene volcanoes in Kamchatka, Russia351
Sectoral interactions in the Scottish coastal zone: Measuring sustainability in theory and practice416
Secular stability and reliability of measurements of the percentage of dense tissue on mammograms419
Secular Trend in Thinness Prevalence for 26 Years (1989 - 2014) among High School Runners in Japan421
Secular Trend of Birth Height and Weight in a Population of Iranian Neonates during 1991 and 2011431
SECULAR TRENDS IN GROWTH AMONG SCHOOL CHILDREN OF SHIRAZ (SOUTHERN IRAN) BORN IN THE POST-WAR PERIOD433
Secular trends in mortality associated with new therapeutic strategies in surgical critical illness435
Secular Trends in Nosocomial Bloodstream Infections in a 55-Bed Cardiothoracic Intensive Care Unit528
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures551
Secure medical image communication using ROI based lossless watermarking and novel digital signature611
Secured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks706
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments780
Security Enhancement of Wireless Sensor Networks: A Hybrid Efficient Encryption Algorithm Approach825
Security Market Reaction to Purchase Business Combinations at the First Earnings Announcement Date857
Security of Wang et al.ʹs group-oriented (t,n) threshold signature schemes with traceable signers905
Security weakness in a three-party pairing-based protocol for password authenticated key exchange931
Sedation for cardioversion in the emergency department: Analysis of effectiveness in four protocols959
SEDDS of gliclazide: Preparation and characterization by in-vitro, ex-vivo and in-vivo techniques962
Sedentary behavior and neck pain in children and adolescents; a systematic review and meta-analysis972
Sedentary snakes and gullible geckos: predator–prey coevolution in nocturnal rock-dwelling reptiles973
Sedentary, active and athletic lifestyles: Right and left ventricular long axis diastolic function980
Sediment accumulation in newly constructed vegetative
treatment facilities along a new major road