نتایج جستجو برای: emptive attack
تعداد نتایج: 82661 فیلتر نتایج به سال:
Arch Bone Joint Surg. 2014;2(1): 82-83. http://abjs.mums.ac.ir the online version of this article abjs.mums.ac.ir To the Editor Mardani-Kivi et al presented results about a triple blinded randomized controlled trial with gabapentin in patients that underwent anterior cruciate ligament (ACL) reconstruction (1). In their manuscript, the introduction section is very illustrative about the subject....
Invasive mould disease is a growing threat for immunocompromised patients. The optimum time to use mould-active antifungal agents is much debated. Current approaches to antifungal prophylaxis, early treatment (empirical and pre-emptive therapy) and treatment of documented mould infections in onco-haematology patients are discussed.
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
INTRODUCTION Rapid diagnostic tests may allow early identification of previously unknown methicillin-resistant Staphylococcus aureus (MRSA) carriers at intensive care unit (ICU) admission. The aim of this study was twofold: first, to assess whether a new molecular MRSA screening test can substantially decrease the time between ICU admission and identification of MRSA carriers; and, second, to e...
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...
An ad-hoc network will often change rapidly in topology, this courses for routes in the network to often disappear and new to arise. The Ad-hoc On-Demand Distance Vector Routing Protocol(AODV), is based on the principle of discover routes as needed. In this paper we will extend the definition of AODV with the ability to discover multiple routes to a host and switch between them, if an active ro...
BACKGROUND Fentanyl-induced cough is not an uncommon phenomenon during the induction of general anesthesia. A preliminary randomized controlled study was designed to observe the effects of different priming doses of fentanyl on fentanyl-induced cough during induction of anesthesia. METHODS Four hundred patients were randomized into four groups (n = 100 for each). Group I received 5 ml saline ...
BACKGROUND AND OBJECTIVES Although alemtuzumab (campath-1H) has been successfully used in patients with untreated or previously treated chronic lymphocytic leukemia (CLL), a variable incidence of cytomegalovirus (CMV) reactivation has been described. No prospective reports currently provide results of the use of oral ganciclovir as pre-emptive therapy in patients with CMV reactivation during al...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید