Journal articles on the topic 'NT'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'NT.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Oh, Hyung Jung, Mi Jung Lee, Hye Sun Lee, Jung Tak Park, Seung Hyeok Han, Tae-Hyun Yoo, Yong-Lim Kim, et al. "NT-proBNP." Medicine 93, no. 27 (December 2014): e241. http://dx.doi.org/10.1097/md.0000000000000241.
Full textHowse, Chris. "NT Ombudsman." Alternative Law Journal 26, no. 3 (June 2001): 144–45. http://dx.doi.org/10.1177/1037969x0102600310.
Full textMcKie, Paul M., and John C. Burnett. "NT-proBNP." Journal of the American College of Cardiology 68, no. 22 (December 2016): 2437–39. http://dx.doi.org/10.1016/j.jacc.2016.10.001.
Full textMcClure, Ben. "Target: NT." Computers & Security 17, no. 2 (January 1998): 156. http://dx.doi.org/10.1016/s0167-4048(97)82000-7.
Full textJian-Feng, JIA, and WU Hai-Shun. "Structure and Properties of C-NT@BN-NT." Acta Physico-Chimica Sinica 22, no. 12 (2006): 1520–25. http://dx.doi.org/10.3866/pku.whxb20061217.
Full textRudnicka, A. R., and N. J. Wald. "Choice between using delta-NT or NT MoM." Ultrasound in Obstetrics and Gynecology 22, no. 6 (December 2003): 659. http://dx.doi.org/10.1002/uog.936.
Full textLiang, Deron, P. Emerald Chung, Yennun Huang, Chandra Kintala, Woei-Jyh Lee, Timothy K. Tsai, and Chung-Yih Wang. "NT-SwiFT: software implemented fault tolerance on Windows NT." Journal of Systems and Software 71, no. 1-2 (April 2004): 127–41. http://dx.doi.org/10.1016/s0164-1212(02)00154-1.
Full textYuen, Eric C., and William C. Mobley. "Early BDNF, NT-3, and NT-4 Signaling Events." Experimental Neurology 159, no. 1 (September 1999): 297–308. http://dx.doi.org/10.1006/exnr.1999.7148.
Full textKorošec, Andrej. "NT konferenca 2005." Organizacija znanja 10, no. 2 (2005): 106–8. http://dx.doi.org/10.3359/oz0502106.
Full textVaupotič, Marjan, Daniel Čeh Ambruš, Janko Žigart, and Gorazd Taciga. "Konferenca Microsoft NT." Organizacija znanja 12, no. 3 (2007): 166–69. http://dx.doi.org/10.3359/oz0703166.
Full textLešič, Miran, and Luka Juršnik. "NT konferenca 2016." Organizacija znanja 21, no. 2 (2016): 123–26. http://dx.doi.org/10.3359/oz1602123.
Full textTompkins, Marc, H. Davis Adkisson, and Kevin F. Bonner. "DeNovo NT Allograft." Operative Techniques in Sports Medicine 21, no. 2 (June 2013): 82–89. http://dx.doi.org/10.1053/j.otsm.2013.03.005.
Full textWhite, Ian. "Windows NT security." Information Security Technical Report 2, no. 3 (January 1997): 53–65. http://dx.doi.org/10.1016/s1363-4127(97)89711-7.
Full textClauder, Thomas, and Michael A. Baumann. "ProTaper NT system." Dental Clinics of North America 48, no. 1 (January 2004): 87–111. http://dx.doi.org/10.1016/j.cden.2003.10.006.
Full textHighland, Harold Joseph. "Windows NT registry." Computers & Security 16, no. 2 (January 1997): 88–90. http://dx.doi.org/10.1016/s0167-4048(97)90223-6.
Full textCassady, June R. "V!EWPO!NT." Rehabilitation Nursing 10, no. 1 (January 2, 1985): 32–33. http://dx.doi.org/10.1002/j.2048-7940.1985.tb00394.x.
Full textTaormina, Sheila F. "V!EWPO!NT." Rehabilitation Nursing 10, no. 2 (March 4, 1985): 33–34. http://dx.doi.org/10.1002/j.2048-7940.1985.tb00413.x.
Full textThomas, Lyda R., and Nancy B. Seymour. "V!EWPO!NT." Rehabilitation Nursing 10, no. 3 (May 6, 1985): 38. http://dx.doi.org/10.1002/j.2048-7940.1985.tb00429.x.
Full textJacobs, Mary Ann. "V!EWPO!NT." Rehabilitation Nursing 10, no. 4 (July 8, 1985): 38. http://dx.doi.org/10.1002/j.2048-7940.1985.tb00445.x.
Full textAppel, Sandra E. "V!EWPO!NT." Rehabilitation Nursing 10, no. 5 (September 10, 1985): 35–37. http://dx.doi.org/10.1002/j.2048-7940.1985.tb00462.x.
Full textJensen, Juliana, Li-Ping Ma, Michael L. X. Fu, David Svaninger, Per-Arne Lundberg, and Ola Hammarsten. "Inflammation increases NT-proBNP and the NT-proBNP/BNP ratio." Clinical Research in Cardiology 99, no. 7 (March 13, 2010): 445–52. http://dx.doi.org/10.1007/s00392-010-0140-z.
Full textCarraway, Robert E., Bryant P. Bullock, and Paul R. Dobner. "Induction of the neurotensin (NT) gene in PC12 cells gives rise to NT precursor (∼88%), NT(3–13)-like peptide (∼10%), and NT (∼2%)." Peptides 14, no. 5 (September 1993): 991–99. http://dx.doi.org/10.1016/0196-9781(93)90076-s.
Full textCarraway, Robert E., and Sankar P. Mitra. "Precursor forms of neurotensin (NT) in cat: processing with pepsin yields NT-(3–13) and NT-(4–13)." Regulatory Peptides 18, no. 3-4 (August 1987): 139–54. http://dx.doi.org/10.1016/0167-0115(87)90003-6.
Full textMaymon, R., S. Tercanli, E. Dreazen, G. Sartorius, W. Holzgreve, and A. Herman. "Comparison of pregnancy outcome of euploid fetuses with increased nuchal translucency (NT) expressed in NT MoM or delta-NT." Ultrasound in Obstetrics and Gynecology 23, no. 5 (May 2004): 477–81. http://dx.doi.org/10.1002/uog.1060.
Full textSingh, Sukhdev, and Toseef Ahmed Malik. "Paranormed Norlund Nᵗ- difference sequence spaces and their α-, β- and γ-duals." Proyecciones (Antofagasta) 42, no. 4 (August 1, 2023): 879–92. http://dx.doi.org/10.22199/issn.0717-6279-5289.
Full textBegg, Christopher T., Thomas Hieke, and Fred W. Guyette. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 44, no. 1 (2021): 322–25. http://dx.doi.org/10.1353/ota.2021.0024.
Full textGuyette, Fred W., and Christopher T. Begg. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 45, no. 2 (June 2022): 645–46. http://dx.doi.org/10.1353/ota.2022.0048.
Full textValh, Dejan, Andrej Barovič Karpov, Andrej Korošec, Aljoša Nikl, Marjan Vaupotič, and Janko Žigart. "Microsoftova NT konferenca 2004." Organizacija znanja 9, no. 2 (2004): 77–83. http://dx.doi.org/10.3359/oz0402077.
Full textMeldrum, Brian J., Michael W. Duggan, Christopher T. Begg, Christopher R. Matthews, and Joseph E. Jensen. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 45, no. 1 (2022): 317–19. http://dx.doi.org/10.1353/ota.2022.0024.
Full textBegg, Christopher T., and Todd R. Hanneken. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 44, no. 3 (2021): 982–87. http://dx.doi.org/10.1353/ota.2021.0078.
Full textThiselton, Anthony C. "History of NT Research." Expository Times 114, no. 12 (September 2003): 404. http://dx.doi.org/10.1177/001452460311401203.
Full textBangera, Saritha S. "PS Manageme nt System." International Journal for Research in Applied Science and Engineering Technology 8, no. 6 (June 30, 2020): 2280–82. http://dx.doi.org/10.22214/ijraset.2020.6366.
Full textChatha, Kamaljit, Mahrous Alsoud, Melanie J. Griffiths, Abubaker Elfatih, Richard C. Horton, Simon J. Dunmore, and Rousseau Gama. "NT-proBNP and exercise." Annals of Clinical Biochemistry 43, no. 3 (May 1, 2006): 240. http://dx.doi.org/10.1258/000456306776865124.
Full text&NA;. "NT Articles Win Awards!" Nephrology Times 5, no. 5 (May 2012): 1. http://dx.doi.org/10.1097/01.nep.0000415381.39799.08.
Full textHayday, John. "Windows NT security architecture." Information Security Technical Report 3, no. 3 (January 1998): 15–22. http://dx.doi.org/10.1016/s1363-4127(98)80027-7.
Full textHayday, John. "Windows NT — Remote access." Information Security Technical Report 3, no. 3 (January 1998): 23–30. http://dx.doi.org/10.1016/s1363-4127(98)80028-9.
Full textHayday, John. "Windows NT security architecture." Information Security Technical Report 4 (January 1999): 17–18. http://dx.doi.org/10.1016/s1363-4127(99)80038-7.
Full textHayday, John. "Windows NT — Remote access." Information Security Technical Report 4 (January 1999): 18–19. http://dx.doi.org/10.1016/s1363-4127(99)80039-9.
Full textWebb, Alison. "Auditing NT — Part 1." Network Security 1999, no. 7 (July 1999): 11–15. http://dx.doi.org/10.1016/s1353-4858(00)80013-6.
Full textWebb, Alison. "Auditing NT — Part 2." Network Security 1999, no. 8 (August 1999): 14–18. http://dx.doi.org/10.1016/s1353-4858(00)80036-7.
Full textMeyer, Helen. "Securing windows NT server." Computers & Security 18, no. 3 (January 1999): 236. http://dx.doi.org/10.1016/s0167-4048(99)90947-1.
Full textMcClure, Ben. "NT firewalls: tough enough." Computers & Security 17, no. 3 (January 1998): 227–28. http://dx.doi.org/10.1016/s0167-4048(98)80336-2.
Full textHancock, Bill. "NT passwords for sale." Computers & Security 18, no. 2 (January 1999): 92. http://dx.doi.org/10.1016/s0167-4048(99)90013-5.
Full textNichol, Sandy. "Bug cracks NT open." Computers & Security 18, no. 6 (January 1999): 524. http://dx.doi.org/10.1016/s0167-4048(99)90864-7.
Full textCollinson, Helen. "NT gets more secure." Computers & Security 15, no. 2 (January 1996): 124. http://dx.doi.org/10.1016/0167-4048(96)89330-8.
Full textBegg, Christopher T., and Andrew D. Gross. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 40, no. 3 (2017): 685–86. http://dx.doi.org/10.1353/ota.2017.0024.
Full textBegg, Christopher T., and Brent A. Strawn. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 40, no. 2 (2017): 413–17. http://dx.doi.org/10.1353/ota.2017.0056.
Full textBegg, Christopher T. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 40, no. 1 (2017): 189–91. http://dx.doi.org/10.1353/ota.2017.0084.
Full textBegg, Christopher T., and Bradley C. Gregory. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 41, no. 3 (2018): 733–36. http://dx.doi.org/10.1353/ota.2018.0024.
Full textBegg, Christopher T. "Intertestamental, Apocrypha, NT Use." Old Testament Abstracts 41, no. 2 (2018): 543–44. http://dx.doi.org/10.1353/ota.2018.0050.
Full text