نتایج جستجو برای: network protocol

تعداد نتایج: 879051  

Journal: :international journal of reproductive biomedicine 0
ensieh shahrokh tehrani nejad behnaz attar shakeri batool hoseini rashidi fatemeh ramezanzade mamak shariat

background: recently different studies suggested that discontinuation of gonadotrophin releasing hormone analogue (gnrha) at beginning of ovarian stimulation (improvement of ovarian response to gonadotrophins) may have some benefit to poor responder patients in invitro fertilization (ivf) cycles. objective:the efficacy of gnrha stop protocol in poor responder patients in ivf cycles was assessed...

Journal: :journal of family and reproductive health 0
batool hossein rashidi reproductive health research center, tehran university of medical sciences, tehran, iran tahereh behrouzi lak reproductive health research center, department of infertility, urmia university of medical sciences, urmia, iran ensiyeh shahrokh tehrani reproductive health research center, tehran university of medical sciences, tehran, iran fatemeh davari tanha department of obstetrics and gynecology, mohebeyas hospital, tehran university of medical sciences, tehran, iran

objective: this study was conducted to compare the results of fixed versus flexible gnrh antagonist protocols in controlled ovarian stimulation for intra cytoplasmic sperm injection (icsi) in patients with pcos. materials and methods: a randomized clinical trial was performed on 100 pcos women, who were admitted to a tertiary infertility clinic and were candidate for ivf/icsi. they were divided...

Javad Taheri, Mohammad Kazem Akbari,

Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...

Journal: :international journal of communications and information technology 2011
s. ehrampoosh a. mahani

in mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.since all nodes in the manets would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. so evaluating the perf...

2017
Shameng Wen Qingkun Meng Chao Feng Chaojing Tang

Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep state...

H. Bakhshi, M. Bajelan

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

2011
Shunichi Tsunoda Nattapong Kitsuwan Takashi Miyamura

This paper proposes a protocol proxy scheme that can emulate the open shortest path first (OSPF) protocol in an effective and flexible manner. It is implemented in our developed network emulator, which is used to test network controllers for IP optical network management. In the protocol scheme, OSPF protocol emulation is achieved by combining an OSPF protocol proxy (introduced here) and an OSP...

B. Abdolmaleki K. Baghery M. J. Emadi

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید