نتایج جستجو برای: protocols

تعداد نتایج: 100392  

Journal: :Attachment & human development 2014
Miriam Steele Howard Steele Jordan Bate Hannah Knafo Michael Kinsey Karen Bonuck Paul Meisner Anne Murphy

This paper provides an account of multiple potential benefits of using video in clinical interventions designed to promote change in parent-child attachment relationships. The power of video to provide a unique perspective on parents' ways of thinking and feeling about their own behavior and that of their child will be discussed in terms of current attachment-based interventions using video eit...

2008
Irina V Ovsienko LyudmilaYu Matzuy Nykolai I Zakharenko Nykolai G Babich Tetyana A Len Yuriy I Prylutskyy David Hui Yuri M Strzhemechny Peter C Eklund

It is shown that magnetometry can be employed as an effective tool to control the content of a ferromagnetic constituent in nanocarbon materials. We propose a thermochemical treatment protocol to achieve extensive cleaning of the source nanocarbon materials from ferromagnetic refuses.

Journal: :the modares journal of electrical engineering 2003
said jalili behruz - tork ladani

logic analysis and attack construction methods are two major approaches in verification of cryptographic protocols. however, it is almost preferable to use both of them for a complete analysis. in this paper, a generic framework for the integration of the two verification approaches is presented. using the framework we can propose analysis methods in which security properties and breach scenari...

Journal: :iranian journal of medical physics 0
fatemeh seif department of medical physics & khansari hospital, arak university of medical sciences, arak, iran mojtaba karbalayi department of medical physics, faculty of medicine, isfahan university of medical sciences, isfahan, iran. mohamad reza bayatiani department of medical physics & khansari hospital, arak university of medical sciences, arak, iran mitra karbalayi department of medical physics, faculty of medicine, iran university of medical sciences, tehran, iran. mohamad javad tahmasebi-birgani department of medical physics & golestan hospital, medical faculty, ahvaz jundishapur university of medical sciences, ahvaz, iran

introduction for dose measurement in megavoltage (mv) photon beams with ion chambers, the effect of volume occupied by the air cavity is not negligible. therefore, the result of measurement should be corrected with a displacement perturbation correction factor (pdis) or using an effective point of measurement (epom). the aim of this study is to calculate the epom for cylindrical ion chamber and...

Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...

M. Pourpouneh, R. Ramezanian

In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...

Journal: :journal of artificial intelligence in electrical engineering 0

today, one of the new technologies in the modern era is vehicular ad-hoc network which has takenenormous attention in the recent years. because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called v2v orvehicle to vehicle communication and vehicle to roadside infrastructure, called v2i. designin...

In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...

ژورنال: سنجش و ایمنی پرتو 2014

The use of computed tomography (CT) as a diagnostic tool has been considerably increased. Therefore, the controlled and protection-based use of the CT scan is necessary to reduce the detrimental effects of radiation. This study was carried out to determine patient dose level in routine CT protocols and measure CTDIW and DLP in routine CT protocols among adult patients in Kashan Shahid Beheshti ...

Journal: :International journal of engineering research and advanced technology 2022

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید