نتایج جستجو برای: protocol
تعداد نتایج: 250013 فیلتر نتایج به سال:
یکی از حملات شایع در شبکه های بی سیم شنود به منظور افشای ارتباطات کاربران شبکه است. با توجه به طبیعت امواج رادیویی، ارتباطات درونی شبکه های بی سیم براحتی برای یک دشمن خارجی قابل شنود است. اگرچه تعداد پروتکلهای مسیریابی امنی که برای شبکه های موردی طراحی شده اند بسیار زیاد می باشد اما تعداد اندکی از آنها مباحث ناشناسی را در طراحی مد نظر قرار داده اند. در این پایان نامه سعی برآن بوده است تا با ا...
new-onset diabetes after transplantation (nodat) is one of the frequent complications following kidney transplantation. patients were randomized to receive cyclosporine a- or tacrolimus-based immunosuppression. fasting and oral glucose tolerance tests were performed, and the patients were assigned to one of the following three groups based on the results: normal, impaired fasting glucose/impair...
mathematical models can simulate the growth and proliferation of cells in the interaction with healthy cells, the immune system and measure the toxicity of drug and its effects on healthy tissue pay. one of the main goals of modeling the structure and growth of cancer cells is to find a control model suitable for administration among patients. in this study, a new mathematical model is designed...
because of high speed, efficiency, robustness and flexibility of multi-agent systems, in recent years there has been an increasing interest in the art of these systems. in competitive multi agent systems, a mechanism is required via which the agents can come to reach an agreement. contract net protocols are one of the well-known negotiation protocols in multi-agent systems. in contract net pro...
abstract in a protocol analysis of second language writing from 20 adult english as a foreign language (efl) iranian students, this research observed how language-switching (l-s), i.e., first language use in l2 writing, was affected by l2 proficiency. switching interactively between first (l1) and second (l2) languages has been recognized as one of the salient characteristics of l2 writing....
this study explored reading strategy use of tefl ma students when they read academic research articles in english. the purpose of this study was to investigate how this group of readers typically approaches reading academic research articles related to their field of study, and also what they do in reading such research articles. the aim of the present study was bilateral. first, the researcher...
شبکه های بی سیم بر اساس معماری شبکه به دو دسته شبکه های حاوی زیر ساختار و شبکه های بدون زیر ساختار (اقتضایی) تقسیم می شوند. در شبکه های حاوی زیر ساختار، ادوات بی سیم معمولی به زیر ساختار مربوطه متصل می شوند. اما در شبکه های بدون زیر ساختار، ادوات بی سیم به طور خودکار به یکدیگر وصل می شوند و هیچ زیر ساختاری برای کمک به این ارتباط ها وجود ندارد. یکی از این نوع شبکه های بدون زیرساخت شبکه های اقتضا...
the aim of this study was to investigate the effect of taurine supplementation for two weeks and three sessions of 90 minutes of intense intermittent exercise on some serum cytokines responses in well-trained soccer players. therefore, 24 football players under 24 years old from soccer league were selected and divided randomly into taurine (tg=8), placebo (pg=8) and control (cg=8) groups. tg co...
During the last three decades, especially 1980's, language learning specialists have been busy discovering the nature of language learning strategies, describing them, and formulating their relationships with other language learning factors. In line with these studies, the field of translation studies has undergone a complete revolution in terms of its perspective toward its research prioritie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید