Showing 3,141 - 3,160 results of 3,965 for search 'GCOB~', query time: 1.03s Refine Results
  1. 3141

    Transseksüel Cerrahide Ürogenital ve Ekstra Genital Sakatlanma: İlgili Literatür Eşliğinde Bir Olgu Sunumu by Zeki Bayraktar

    Published 2024-06-01
    “…Transseksüel cerrahi prosedürler pek çok olguda femininizasyon veya maskülinizasyondan ziyade mutilasyon ile sonuçlanır; erkekten-kadına geçiş [MtF] olgularında ürogenial mutilasyon, kadından-erkeğe geçiş [FtM] olgularında hem ürogenital hem ekstra-genital mutilasyon. …”
    Get full text
    Article
  2. 3142

    Determining the Heterotic Groups of Selected Grain Maize (Zea mays L.) Inbred Lines using Morphological and Phenological Traits by Mahnaz Oroojloo, Sara Dezhsetan, Behzad Ahmadi, Mohammadreza Shiri, Ali Moghaddam

    Published 2024-11-01
    “…The highest percentage genotypic coefficient of variation was obtained for kernel yield (31.77%), ear height (20.07%), percentage of cob wood (19.96%), the number of kernels per row (17.35%), and 1000-kernel weight (16.8%) traits. …”
    Get full text
    Article
  3. 3143
  4. 3144
  5. 3145
  6. 3146
  7. 3147
  8. 3148

    In vivo monitoring of leukemia-niche interactions in a zebrafish xenograft model. by Anja Arner, Andreas Ettinger, Bradley Wayne Blaser, Bettina Schmid, Irmela Jeremias, Nadia Rostam, Vera Binder-Blaser

    Published 2024-01-01
    “…ALL prognosis after initial diagnosis is generally good; however, patients suffering from relapse have a poor outcome. …”
    Get full text
    Article
  9. 3149
  10. 3150
  11. 3151
  12. 3152
  13. 3153
  14. 3154
  15. 3155
  16. 3156

    Research progress on secure data deduplication in cloud by Jin-bo XIONG, Yuan-yuan ZHANG, Feng-hua LI, Su-ping LI, Jun REN, Zhi-qiang YAO

    Published 2016-11-01
    “…Furthermore, focusing on the realization mechanism of secure data deduplica-tion, the thorough analyses were carried on and reviews for the related research works in recent years from content-based encryption, proof of ownership and privacy protection for secure deduplication, then the advantages and common prob-lems of various key technologies and methods were summed up. …”
    Get full text
    Article
  17. 3157
  18. 3158
  19. 3159
  20. 3160