نتایج جستجو برای: dental leakages
تعداد نتایج: 162691 فیلتر نتایج به سال:
Algebraic side-channel attacks are a type of side-channel analysis which can recover the secret information with a small number of samples (e.g., power traces). However, this type of side-channel analysis is sensitive to measurement errors which may make the attacks fail. In this paper, we propose a new method of algebraic side-channel attacks which considers noisy leakages as integers restrict...
In severe respiratory failure, extracorporal membrane oxygenation support is life-saving, but it has been started to be used in pediatric intensive care units in our country very recently. Here, we present a five-month old girl who developed acute respiratory distress and air leakages following removal of a foreign body obstructing the airway. Mechanical ventilation only increased the air leaks...
Conventional surgical techniques to seal and repair defects in highly stressed elastic tissues are insufficient. Therefore, this study aimed to engineer an inexpensive, highly adhesive, biocompatible, and biodegradable sealant based on a modified and naturally derived biopolymer, gelatin methacryloyl (GelMA). We tuned the degree of gelatin modification, prepolymer concentration, photoinitiator ...
BACKGROUND Preoperative bowel preparation is still routinely used prior to colorectal surgery. This concept is based on traditional and personal empiricism and usually not evidence based. The objective of the present review was to reassess this dogma against the background of the highest level of evidence published thus far. METHODS The Medline database was searched using the search terms 'pr...
Quantitative theories of information flow give us an approach to relax the absolute confidentiality properties that are difficult to satisfy for many practical programs. The classical information-theoretic approaches for sequential programs, where the program is modeled as a communication channel with only input and output, and the measure of leakage is based on the notions of initial uncertain...
In the virtual and widely distributed network, the process of handover sensitive data from the distributor to the trusted third parties always occurs regularly in this modern world. It needs to safeguard the security and durability of service based on the demand of usersA data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked...
The use of pumps working as turbines is a new solution, which has been recently analysed to improve the water management in different systems. improvement sustainability involved with this should be considered these networks, and it focuses on reduction consumption energy well leakages. Both variables have great influence rest economical, technical environmental indicators network behavior, bec...
Given the importance of technologies to organizations, technology leakages can cause considerable financial losses and threaten survival firms. Although organizations use protection diagnostic models prevent such leakages, most focus on cybersecurity, evaluation system is complex, making it difficult for SMEs it. This makes them unsuitable general diagnosis companies. Hence, this study proposes...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید