Suggested Topics within your search.
Suggested Topics within your search.
- History 24
- Law 24
- English language 16
- Philosophy 14
- methods 13
- Anesthesia 12
- Biochemistry 10
- Methodology 10
- Research 10
- Criminal law 7
- English 7
- French language 7
- Law and legislation 7
- Management 7
- Molecular biology 7
- Social service 7
- Women 7
- Academic writing 6
- Administrative law 6
- Contracts 6
- Politics and government 6
- Psychology 6
- Social conditions 6
- Social sciences 6
- Study and teaching 6
- literature 6
- Authorship 5
- Constitutional law 5
- Domestic relations 5
- Education, Higher 5
-
202521
-
202522
Unexpected identification of peak systolic velocity in the radial artery as a risk factor for functional primary patency of radiocephalic fistulas
Published 2025-01-01“…Methods: This prospective observational study included consecutive patients referred to the Second Hospital of Dalian Medical University for initial creation of radiocephalic fistula from July 2017 to December 2019. …”
Get full text
Article -
202523
-
202524
-
202525
-
202526
Petrogenesis of Intrusive body in Northeast of Joveinan, North of Isfahan, Urumieh- Dokhtar magmatic zone
Published 2024-10-01Get full text
Article -
202527
-
202528
-
202529
Unexpected identification of peak systolic velocity in the radial artery as a risk factor for functional primary patency of radiocephalic fistulas
Published 2025-01-01“…Methods: This prospective observational study included consecutive patients referred to the Second Hospital of Dalian Medical University for initial creation of radiocephalic fistula from July 2017 to December 2019. …”
Get full text
Article -
202530
-
202531
-
202532
-
202533
-
202534
-
202535
-
202536
-
202537
-
202538
-
202539
-
202540
Optimasi Keamanan Web Server Terhadap Serangan Brute-Force Menggunakan Penetration Testing
Published 2023-02-01“…This penetration test is carried out on a web server which is an Academic Information System at a university. The methods used in this research include Intelligence Gathering, Vulnerability Analysis, Exploitation, Post Exploitation, Reporting. …”
Get full text
Article