نتایج جستجو برای: ژن re
تعداد نتایج: 191219 فیلتر نتایج به سال:
the purpose of the present randomized clinical trial study was to compare the effectiveness of bovine porous bone mineral (bpbm) with and without plasma rich in growth factors (prgf) in the treatment of mandibular class ii furcation defects.in seven patients, nine pairs of symmetric buccal or lingual mandibular class ii furcation defects were treated. in each patient, one defect received bpbm (...
the objective of this study was to evaluate the impact of short-term starvation and re-feeding on oxidative stress in mesopotamichthys sharpeyi (günther, 1874). after two weeks adaptation to new conditions, a total number of 270 fingerlings were distributed into nine 300-l fiberglass tanks, equipped with aeration system in three treatments including 4, 8 and 16 days starvation (each in 3 replic...
هدف از انجام این مطالعه، تشخیص اندومتریت تحت بالینی در گاوهای واکل با استفاده از روش سیتولوژی و تأثیر این عارضهبر روی میزان باروری در تلقیح بعدی بود. بدین منظور تعداد 77رأس گاو شکم 1-5با سابقه بیش از 3بار تلقیح (میانگینتعداد تلقیح، )3/8و فاصله زمانی 190±40روز از زمان زایمان که ترشحات غیر طبیعی نداشته و در آزمایش رکتال و معاینه باسونوگراف نیز رحمشان طبیعی بوده و در فاز لوتئال سیکل فحلی قرار داشت...
In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for ...
ZHONG-MEI WAN, JIAN WENG, XUE-JIA LAI, SHENG-LI LIU AND JI-GUO LI Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240, P.R. China College of Science Department of Computer Science Hohai University Nanjing 210098, P.R. China E-mail: [email protected] Department of Computer Science Jinan University Guangzhou 510630, P.R. China School of Information System...
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption in the inter-domain setting, where the del...
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an inappropriate disclosure may cause serious problems to an individual. Therefore commercial Web-based PHR systems have to ensure that the patient health data is secured using state-of-the-art mechanisms. In current co...
Introduction: The palliative care in patients with bone metastasis includes variety of techniques such as conventional analgesics, surgery, external beam radiotherapy, hormone therapy, chemotherapy and using bone-seeking radiopharmaceuticals. Even some of the recent works used combined methods like chemotherapy and radionuclide therapy or using radionuclide therapy as adjuvant ...
We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (RedPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model, along with the proofs.
We consider a two-queue polling model with switch-over times and k-limited service (serve at most ki customers during one visit period to queue i) in each queue. The major benefit of the k-limited service discipline is that it besides bounding the cycle time effectuates prioritization by assigning different service limits to different queues. System performance is studied in the heavy-traffic r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید