نتایج جستجو برای: treatment failures
تعداد نتایج: 1428794 فیلتر نتایج به سال:
126 female patients with proven gonococcal infection were treated with 4 g. spectinomycin bihydrochloride given intramuscularly in a single does. In 120 cases followed up there were four possible treatment failures, giving a cure rate of 97-6 per cent. 99 male patients with acute gonococcal urethritis were treated with a single dose of 2, g. sectinomycin bihydrochloride. Of 88 cases followed up...
Spinal cord stimulation (SCS) has become an established clinical option for treatment of refractory chronic pain. Current hardware and implantation techniques for SCS are already highly developed and continuously improving; however, equipment failures over the course of long-term treatment are still encountered in a relatively high proportion of the cases treated with it. Percutaneous SCS leads...
BACKGROUND Although congenital syphilis usually occurs as a result of a failure to detect and treat syphilis in pregnant women, failures of the currently recommended regimen to prevent congenital syphilis have been reported. CASE This report describes an infant with congenital syphilis despite maternal treatment with a regimen exceeding current CDC guidelines. CONCLUSION Regardless of the r...
Reliability Analysis of 2-Component Standby Redundant System with Priority under Limited Information
Some theoretical evaluation methods of mean time to failure (MTTF) in 2-component standby redundant system with priority have been suggested under the prerequisite that the probability distributions of failure and repair times in each component are respectively specified by the explicit functions. However, this prerequisite might be considerably strict in practical scenes. If we cannot identify...
The paper was conducted to assess the importance and challenges encountered in the current machine evaluation system in an electronics company as perceived by the respondents. In addition, it also sought to understand the acceptability of the new developed Real-Time Auto-locked Software for Electronics Company (RT-ASEC). The new automated machine evaluation software can detect any irregular mac...
Today the Chaumian Mix idea is not only an academic approach for anonymous communication, it is also a practical system with many variants used in real-world scenarios. It is therefore important to find an appropriate measure for the anonymity provided by these approaches. Many measurement approaches have been proposed that consider only the static state of the system without accounting for pas...
Dependable systems are characterized by a number of attributes including: reliability, availability, safety and security. For some attributes (namely for reliability, availability, safety), there exist probability-based theoretic foundations, enabling the application of dependability analysis techniques. The goal of dependability analysis is to forecast the values of dependability attributes, b...
In this paper, the authors examine UK mobile users’ perceptions of m-commerce utilization. For this purpose, the authors devise a Mobile Network Utilization Model empirically tested in experimental settings. The empirical findings reveal strong support for the capability of the proposed utilization model in measuring the concept of Mobile Task-Technology Fit (MTTF) and explaining the utilizatio...
Fault observability based on the behavior of memory references is studied. Traditional studies view memory as one monolithic entity that must completely work to be considered reliable. The usage patterns of a particular program’s memory are emphasized here. This paper develops a new model for the successful execution of a program taking into account the usage of the data by extending a cache me...
A resilience analysis of protection cycles (p-cycle) configurations for Double Rings with Dual Attachment (DRDAs) architectures is presented in this work. DRDAs are composed of two rings with corresponding nodes connected by two separated links. There are several possible configurations of p-cycles, which may be used in DRDAs for improving link or node protection upon link failure. The values o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید