Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,252,480 papers from all fields of science
Search
Sign In
Create Free Account
BAG,BEDSIDE,CURITY 2000ML,W/O VALVE KENDALL #3057
Known as:
BAG,BEDSIDE CURITY 2000ML KENDALL #3057
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
2 relations
Bag device
Broader (1)
Medical Devices
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
Implementing bedside rounds to improve patient-centred outcomes: a systematic review
J. Ratelle
,
Adam P. Sawatsky
,
+5 authors
C. West
BMJ Quality & Safety
2018
Corpus ID: 52286940
Background Bedside rounds (BR) have been proposed as an ideal method to promote patient-centred hospital care, but there is…
Expand
2015
2015
Military-Industrial aspects of Turkish defence policy
R. Wiśniewski
2015
Corpus ID: 41247897
This paper aims to analyse the military-industrial aspects of Turkish defence policy. A sophisticated and profitable defence…
Expand
2013
2013
Impact analysis of transient stability due to cyber attack on FACTS devices
Bo Chen
,
K. Butler-Purry
,
D. Kundur
North American Power Symposium
2013
Corpus ID: 8600059
The innovations in information and communication technologies (ICT) and digital computer controllers are increasingly integrated…
Expand
2012
2012
Denmark a Nordic Welfare State - Are the Active Labour Market Policy Withering Away?
B. Greve
2012
Corpus ID: 14300043
Denmark has been portrayed as a country with a focus on full employment, gender equality and high level of participation on the…
Expand
Review
2011
Review
2011
Cyberethics, Cybersafety, and Cybersecurity
Portia Pusey
,
W. Sadera
2011
Corpus ID: 145147054
Abstract In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related…
Expand
2010
2010
Challenges to Defining Biosecurity and Accurately Capturing Biosecurity Costs
K. Wilhelm
2010
Corpus ID: 133483891
Increasingly over the past few years I have been asked to define biosecurity and to provide cost estimates for implementing a…
Expand
2006
2006
How to Construct Double-Block-Length Hash Functions ∗
Shoichi Hirose
2006
Corpus ID: 11797691
In this article, it is discussed how to construct a com pression function with 2n-bit output using a com ponent function with n…
Expand
1995
1995
Evaluation of different methods of securing intravenous catheters: measurement of forces during simulated accidental pullout
N. Patel
,
Charles E. Smith
,
A. Pinchak
,
D. Hancock
Canadian Journal of Anaesthesia-journal Canadien…
1995
Corpus ID: 22964666
The purpose of the study was to compare the relative effectiveness of several combinations of tapes and taping methods with…
Expand
1990
1990
The Causal Relationship Between Social Security and the Federal Budget
Mark W. Crain
,
Michael L. Marlow
1990
Corpus ID: 150417184
As the 1990s begin, social security is once again at the center of public debate. Under current projections social security is…
Expand
1955
1955
The new emotionalism in research.
A. Brues
Cancer Research
1955
Corpus ID: 40749740
Each year at about this time, usually within a week or so of Easter, this Association retires a presi dent with appropriate…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE