نتایج جستجو برای: protocols
تعداد نتایج: 100392 فیلتر نتایج به سال:
This paper provides an account of multiple potential benefits of using video in clinical interventions designed to promote change in parent-child attachment relationships. The power of video to provide a unique perspective on parents' ways of thinking and feeling about their own behavior and that of their child will be discussed in terms of current attachment-based interventions using video eit...
It is shown that magnetometry can be employed as an effective tool to control the content of a ferromagnetic constituent in nanocarbon materials. We propose a thermochemical treatment protocol to achieve extensive cleaning of the source nanocarbon materials from ferromagnetic refuses.
logic analysis and attack construction methods are two major approaches in verification of cryptographic protocols. however, it is almost preferable to use both of them for a complete analysis. in this paper, a generic framework for the integration of the two verification approaches is presented. using the framework we can propose analysis methods in which security properties and breach scenari...
introduction for dose measurement in megavoltage (mv) photon beams with ion chambers, the effect of volume occupied by the air cavity is not negligible. therefore, the result of measurement should be corrected with a displacement perturbation correction factor (pdis) or using an effective point of measurement (epom). the aim of this study is to calculate the epom for cylindrical ion chamber and...
Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
today, one of the new technologies in the modern era is vehicular ad-hoc network which has takenenormous attention in the recent years. because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called v2v orvehicle to vehicle communication and vehicle to roadside infrastructure, called v2i. designin...
In recent years, determining the common information privately and efficiently between two mutually mistrusting parties have become an important issue in social networks. Many Private set intersection (PSI) protocols have been introduced to address this issue. By applying these protocols, two parties can compute the intersection between their sets without disclosing any information about compone...
The use of computed tomography (CT) as a diagnostic tool has been considerably increased. Therefore, the controlled and protection-based use of the CT scan is necessary to reduce the detrimental effects of radiation. This study was carried out to determine patient dose level in routine CT protocols and measure CTDIW and DLP in routine CT protocols among adult patients in Kashan Shahid Beheshti ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید