Showing 221 - 240 results of 1,520 for search '"No Entry"', query time: 0.06s Refine Results
  1. 221

    Determining anatomically-safe corridors for placement of lateral mass screws in the first cervical vertebra of the Emirati population – a CT study by Dineshwary Suresh, Nerissa Naidoo, Rashid AlSharhan, Usama Al Bastaki, Jeyaseelan Lakshmanan, Baylis Vivek Joseph, Ivan James Prithishkumar

    Published 2025-01-01
    “…The objective of this study was to describe ideal screw dimensions, precise entry points, safe bony corridors, and ideal trajectories for placement of lateral mass screws in the Emirati population. …”
    Get full text
    Article
  2. 222
  3. 223

    Gender Inequality and Education Attainment by Male and Female in Higher Institutions: A Case Study of Kabale University. by Twinomujuni, Promise

    Published 2024
    “…Policies and measures that aim to tackle the growing nexus between pre-entry barriers faced by women in their transition from primary to higher levels of education; and entry barriers located at the points of entry in different colleges and fields of study are required. …”
    Get full text
    Thesis
  4. 224

    Volume equations for Scots pine trees in Kastamonu region by Dilara Nur Zaifoğlu, Fadime Sağlam

    Published 2024-12-01
    “…To develop single- and double-entry tree volume equations, the parameters of eight volume equations were estimated. …”
    Get full text
    Article
  5. 225

    Conserved role of spike S2 domain N-glycosylation across betacoronaviruses by Qi Yang, Anju Kelkar, Balaji Manicassamy, Sriram Neelamegham

    Published 2025-01-01
    “…When three or more N-glycans were deleted, spike expression on cell surface and incorporation into virions was both reduced. Viral entry function was progressively lost upon deleting the N1098 glycan in combination with additional glycosite modifications. …”
    Get full text
    Article
  6. 226
  7. 227

    Ion Channel Activities in Neural Stem Cells of the Neuroepithelium by Masayuki Yamashita

    Published 2012-01-01
    “…The Ca2+ release leads to the activation of Ca2+ entry from the extracellular space, which is called capacitative, or store-operated Ca2+ entry. …”
    Get full text
    Article
  8. 228

    Number plate recognition smart parking management system using IoT by Allah Ditta, Muhammad Maroof Ahmed, Tehseen Mazhar, Tariq Shahzad, Yazan Alahmed, Habib Hamam

    Published 2025-02-01
    “…The proposed ANPR system processes vehicle number plates at entry, ensuring seamless identification and eliminating manual registration. …”
    Get full text
    Article
  9. 229

    Characterization of the First Marine Pestivirus, Phocoena Pestivirus (PhoPeV) by Lars Söder, Denise Meyer, Olaf Isken, Norbert Tautz, Matthias König, Alexander Postel, Paul Becher

    Published 2025-01-01
    “…Infection of a CD46-deficient porcine cell line suggested that CD46, which is implicated in the viral entry of several pestiviruses, is not a major factor for the viral entry of PhoPeV. …”
    Get full text
    Article
  10. 230

    High-Fidelity Aerothermal Engineering Analysis for Planetary Probes Using DOTNET Framework and OLAP Cubes Database by Prabhakar Subrahmanyam

    Published 2009-01-01
    “…Framework employs an API (application programming interface) to convert trajectory data into a formatted KML file that is used by Google Earth for simulating Earth-entry fly-by visualizations.…”
    Get full text
    Article
  11. 231

    Are You My Host? An Overview of Methods Used to Link Bacteriophages with Hosts by Paul Hyman

    Published 2025-01-01
    “…For example, the ability to effect genome entry (penetrative host range) is different than the ability to produce progeny (productive host range). …”
    Get full text
    Article
  12. 232

    Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method by Udaya Suriya Raj Kumar Dhamodharan, Rajamani Vayanaperumal

    Published 2015-01-01
    “…The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. …”
    Get full text
    Article
  13. 233

    Consequences appraisal on India’s opting out of the Regional Comprehensive Economic Partnership Agreement by L. N. Talalova, Chu Thanh Hang, A. V. Morozova

    Published 2021-08-01
    “…The experts’ forecasts is evaluated for India’s entry into third place in the world economy in terms of the gross domestic product contribution and the prerequisites for this are studied. …”
    Get full text
    Article
  14. 234

    Forecasting Natural Gas Consumption of China Using a Novel Grey Model by Chengli Zheng, Wen-Ze Wu, Jianming Jiang, Qi Li

    Published 2020-01-01
    “…This study begins with proving that prediction results are independent of the first entry of original series using the product theory of determinant; on this basis, it is a reliable approach by inserting an arbitrary number in front of the first entry of original series to extract messages, which has been proved that it is an appreciable approach to increase prediction accuracy of the traditional grey model in the earlier literature. …”
    Get full text
    Article
  15. 235

    An Investigation of the Safety Performance of Roundabouts in Korea Based on a Random Parameters Count Model by Minho Park, Dongmin Lee, Je-Jin Park

    Published 2018-01-01
    “…A total of eight variables were determined to be the main influencing factors on traffic accident frequency including the number and width of entry lanes, the presence of pedestrian crossings, the width of the circulatory lanes, the presence of central islands, the radius and number of entry lanes, and traffic volume influence accident frequency. …”
    Get full text
    Article
  16. 236

    Nefret Söylemi Mecrası Olarak Sosyal Medya: Ekşi Sözlük’te “Bizim Çocuklar” Örneği by Samet Gümüş

    Published 2023-08-01
    “…Entry sayısının fazlalığı, denetim mekanizmasının olmaması ve kullanıcıların anonim kimlikli olması Ekşi Sözlük’te nefret söylemi içeren paylaşımların yer almasına neden olmaktadır. …”
    Get full text
    Article
  17. 237

    A dictionary of human resource management /

    Published 2008
    Table of Contents: “…--- Coverage -- Themes -- Types of entry -- Using the dictionary -- The dictionary -- Appendix : classification of key terms.…”
    Table of contents only
    Publisher description
    View in OPAC
    Book
  18. 238

    A dictionary of human resource management / by Heery, Edmund

    Published 2008
    Table of Contents: “…--- Coverage -- Themes -- Types of entry -- Using the dictionary -- The dictionary -- Appendix : classification of key terms.…”
    Table of contents only
    Publisher description
    View in OPAC
    Book
  19. 239

    Identification of cepharanthine as an effective inhibitor of African swine fever virus replication by Chuanxiang Qi, Jiyoung Lee, Yongqiang Zhang, Huan Chen, Jiaxuan Lv, Zhenzhong Wang, Jinming Li, Xiaodong Wu, Yong-Sam Jung, Zhiliang Wang, Yingjuan Qian

    Published 2024-12-01
    “…According to time-of-addition experiments, CEP primarily exerts its antiviral effect during the early stages of ASFV infection, specifically by inhibiting viral entry. Transcriptomic analysis suggested that CEP blocks ASFV entry through the clathrin-mediated endocytosis pathway by increasing EHD2 gene expression in macrophages. …”
    Get full text
    Article
  20. 240