Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,179,001 papers from all fields of science
Search
Sign In
Create Free Account
fetal vulnerability
Known as:
fetus vulnerability
National Institutes of Health
Create Alert
Alert
Related topics
Related topics
2 relations
Broader (2)
Disease susceptibility
Fetus
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Detection of web appication vulnerability based on RUP model
Deven Gol
,
Nisharg Shah
National Conference on Recent Advances in…
2015
Corpus ID: 7303885
Web applications become an important part for Communication now days. As the popularity of the web application increases like…
Expand
Review
2012
Review
2012
Recent Subthreshold Design Techniques
Mohsen Radfar
,
K. Shah
,
Jugdutt Singh
2012
Corpus ID: 55837372
Considering the variety of studies that have been reported in low-power designing era, the subthreshold design trend in Very…
Expand
2012
2012
Detection of Javascript Vulnerability At Client Agent
Saurabh Jain
,
D. Tomar
,
Divya Rishi Sahu
2012
Corpus ID: 115743363
2010
2010
Aquifer Vulnerability Assessment Methods: The Non-Independence of Parameters Problem
D. Ducci
2010
Corpus ID: 55983513
This paper investigates the relationship between the two parameters, aquifer media and hydraulic conductiv-ity, and assesses…
Expand
2009
2009
Application and evaluation of shoreline segmentation mapping approaches to assessing response to climate change on the Illawarra Coast, South East Australia
P. Abuodha
2009
Corpus ID: 129325588
Climate change, particularly sea-level rise, threatens many coastal systems around the world. Coastal managers and decision…
Expand
2008
2008
A 3D assessment of urban aquifer vulnerability using geological and buried asset models : a case study from Knowsley Industrial Park, NW England
S. Price
,
R. Terrington
,
J. Ford
,
R. Crofts
,
K. Diamond
,
K. Seymour
2008
Corpus ID: 128654354
Knowsley Industrial Park, NW England and its buried sewerage network presents a potential source of pollution to the underlying…
Expand
2007
2007
A Novel Circuit-Level SEU Hardening Technique for High-Speed SiGe HBT Logic Circuits
T. Mukherjee
,
A. Sutton
,
+4 authors
P. Marshall
IEEE Transactions on Nuclear Science
2007
Corpus ID: 20594638
In this work we present a new circuit-level hardening technique for SEU mitigation in high-speed SiGe BiCMOS digital logic. A…
Expand
2006
2006
Intrinsic aquifer vulnerability assessment: validation by environmental tracers in San Miguel de Allende, Mexico
J. Mahlknecht
,
Ma. Guadalupe Medina-Mejía
,
J. Gárfias-Solis
,
I. Cano‐Aguilera
2006
Corpus ID: 130538198
Vulnerability maps are important tools for water decision makers and land-use planners for protection of aquifers against…
Expand
2005
2005
Software security analysis - execution phase audit
B. Carlsson
,
D. Baca
EUROMICRO Conference on Software Engineering and…
2005
Corpus ID: 8852846
Code revision of a leading telecom product was performed, combining manual audit and static analysis tools. On average, one…
Expand
1998
1998
Analysis of the Impact of Reliability, Availability and Maintainability on Ship Survivability
A. Malakhoff
,
C. McKesson
1998
Corpus ID: 183009651
The JJMA Ship Vulnerability Model is a tool for assessing the survivability of a ship against enemy weapons. We are currently…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE