نتایج جستجو برای: quadruple adaptive version numbering scheme
تعداد نتایج: 608154 فیلتر نتایج به سال:
abstract background: triple therapy with a proton pump inhibitor, clarithromycin and amoxicillin and quadruple therapy with a proton pump inhibitor, bismuth citrate, metronidazole and amoxicillin have been proposed in maastricht 2000 as the optimal treatment of helicobacter pylori infection. we aimed to compare these two regimens in iranian pediatric patients. methods: a randomized clinical tri...
We construct an efficient identity based encryption scheme from pairing. The basic version of the new scheme is provably secure against chosen plaintext attack, and the full version of the new scheme is provably secure against adaptive chosen ciphertext attack. Our scheme is based on a new assumption (decision weak bilinear Diffie-Hellman assumption ) which is no stronger than decision bilinear...
ABSTRACT Background: Triple therapy with a proton pump inhibitor, clarithromycin and amoxicillin and quadruple therapy with a proton pump inhibitor, bismuth citrate, metronidazole and amoxicillin have been proposed in Maastricht 2000 as the optimal treatment of Helicobacter pylori infection. We aimed to compare these two regimens in Iranian pediatric patients. Methods: A randomized clinical tr...
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...
The SUSY Les Houches Accord (SLHA) 2 extended the first SLHA to include various generalisations of the Minimal Supersymmetric Standard Model (MSSM) as well as its simplest next-to-minimal version. Here, we propose further extensions to it, to include the most general and well-established see-saw descriptions (types I/II/III, inverse, and linear) in both an effective and a simple gauged extensio...
certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...
The NRMD is a database for nuclear receptor mutation information. It includes mutation information from SWISS-PROT/TrEMBL, several web-based mutation data resources, and data extracted from the literature in a fully automatic manner. Because it is also possible to add mutations manually, a hundred mutations were added for completeness. At present, the NRMD contains information about 893 mutatio...
In this work we investigate some computational aspects of the eigenvalue calculation with edge elements; those include: the importance of the grid generator and nodeedge numbering. As the examples show, the sparse structure of the mass and stiffness matrices is highly influenced by the edge numbering. Tetrahedral grid generators are mainly designed for nodal based finite elements so an edge num...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید