نتایج جستجو برای: eap articles

تعداد نتایج: 107749  

2016
Sheng-feng Lu Yan Huang Ning Wang Wei-xing Shen Shu-ping Fu Qian Li Mei-ling Yu Wan-xin Liu Xia Chen Xin-yue Jing Bing-mei Zhu

Objectives. Our previous study has used RNA-seq technology to show that apoptotic molecules were involved in the myocardial protection of electroacupuncture pretreatment (EAP) on the ischemia/reperfusion (I/R) animal model. Therefore, this study was designed to investigate how EAP protects myocardium against myocardial I/R injury through antiapoptotic mechanism. Methods. By using rats with myoc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract in written mode of language, metadiscourse markers are used commonly to help writers in general and academic writers in particular to produce coherent and professional texts. the purpose of the present study was to compare introduction sections of applied linguistics and physics articles regarding their use of interactive and interactional metadiscourse markers based on the model pro...

2005
J. Walker

Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Pro...

1999
D Simon

The EAP-TLS Authentication Protocol Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstr...

2014
Devane Satish

Remote EAP-SIM authentication has an overwhelming impact on the authentication delay. RADIUS protocol can be used for local authentication which reduces authentication latency. However, in case of EAP-SIM authentication, where triplets are to be retrieved from a remote authentication gateway (AuC), this does not help much. An Improved EAP-SIM authentication method was proposed in [2]. In this p...

2006
T. Clancy

Extensible Authentication Protocol (EAP) Password Authenticated Exchange Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document defines an Extensible Authentication Protocol (EAP) method called EAP-PAX (Password Authenticated eXchange). This method is a li...

Journal: :دانش و پژوهش در آموزش زبان انگلیسی 0
nafiseh hosseinpour english group, falavarjan islamic azad university, daneshgah blvd, basij blvd, falavarjan, isfahan, iran mansoor koosha department of english language, khorasgan islamic azad university, arghavanie blvd, khorasgan, isfahan, iran

english for academic purposes (eap) is a significant part of the curriculum in iranian universities. however, it seems that eap programs have been developed without a systematic needs analysis. the purpose of this study was assessing the present and target situation needs of two groups of undergraduates of computer science. a total of 320 students and 44 instructors participated in this triangu...

Journal: :Brazilian journal of otorhinolaryngology 2005
Mariana Cardoso Guedes Rubens V Brito Neto Maria Valéria S Goffi Gomez Sandra B Giorgi Sant'Anna Cristina G Ornelas Peralta Arthur Menino Castilho Ricardo Ferreira Bento

UNLABELLED Cochlear implantation has been recommended for children under 24 months of age. The use of objective measures is needed to help speech processor programming. The electrically evoked compound potential (EAP), which can be assessed by neural response telemetry (NRT), is one of those objective measures. AIM to determine how often the EAP can be recorded by NRT system during surgery an...

Journal: :IJICS 2007
Khidir M. Ali Thomas J. Owens

IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication method to ...

2016
Natalia M. Arzeno Haris Vikalo

When data are acquired at multiple points in time, evolutionary clustering can provide insights into cluster evolution and changes in cluster memberships while enabling performance superior to that obtained by independently clustering data collected at different time points. Existing evolutionary clustering methods typically require additional steps before and after the clustering stage to appr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید