نتایج جستجو برای: weakcut node
تعداد نتایج: 170463 فیلتر نتایج به سال:
background: sentinel node biopsy (slnb) is the standard of care for breast cancer treatment and it is getting wide acceptance in iran. the radiation safety of the procedure has been investigated under controlled conditions, but the standard dose of radiotracer and techniques are not always observed in the community setting. the aim of this study was to assess the magnitude of the absorbed doses...
endometrial adenocarcinoma is uncommon in fewer than 40-year-old people. the first common sign and symptoms are abnormal vaginal bleeding and discharge. metastasis is occurred in the late stage. here we present a 31-year-old nullipar woman who was admitted to surgical ward with enlarged right inguinal lymphnode from one month ago. she had no history of previous malignancy, infectious condition,...
Cooperative Orthogonal Space-Time-Frequency Block Codes over a MIMO-OFDM Frequency Selective Channel
In this paper, a cooperative algorithm to improve the orthogonal space-timefrequency block codes (OSTFBC) in frequency selective channels for 2*1, 2*2, 4*1, 4*2 MIMO-OFDM systems, is presented. The algorithm of three node, a source node, a relay node and a destination node is formed, and is implemented in two stages. During the first stage, the destination and the relay antennas receive the sym...
It is very difficult and expensive to replace sensor node battery in wireless sensor network in many critical conditions such as bridge supervising, resource exploration in hostile locations, and wildlife safety, etc. The natural choice in such situations is to maximize network lifetime. One such approach is to divide the sensing area of wireless sensor network into clusters to achieve high ene...
Objective(s): Lymph node metastases are the most significant prognostic factor in localized non-small cell lung cancer (NSCLC). Identification of the first nodal drainage site (sentinel node) may improve detection of metastatic nodes. Extended surgeries, such as lobectomy or pneumonectomy with lymph node dissection, are among the therapeutic options of higher acceptab...
kawasaki disease (kd) is an acute vasculitis syndrome of unknown etiology. it occurs in infants and young children, affecting mainly small and medium-sized arteries, particularly the coronary arteries. generalized microvasculitis occurs in the first 10 days, and the inflammation persists in the walls of medium and small arteries, especially the coronary arteries, and changes to coronary artery ...
adenosquamous carcinomas of stomach are rare entities comprising 0.5% of stomach carcinomas. here, we report a case of a 50-year-old female, who presented with weakness, pallor, and symptoms of gastric outlet obstruction. a partial gastrectomy was done and histology showed evidence of adenosquamous carcinoma of the antrum with metastasis to the perigastric lymph nodes. the patient condition imp...
Herein, we report a case of sentinel lymph node mapping in a uterine cervix cancer patient, referring to the nuclear medicine department of our institute. Lymphoscintigraphy images showed inappropriate intra‐cervical injection of radiotracer. Blue dye technique was applied for sentinel lymph node mapping, using intra‐cervical injection of methylene blue. Two blue/cold sentinel lymph nodes, with...
This paper investigates the use of redundancy and self repairing against node failures indistributed storage systems using a novel non-MDS erasure code. In replication method, accessto one replication node is adequate to reconstruct a lost node, while in MDS erasure codedsystems which are optimal in terms of redundancy-reliability tradeoff, a single node failure isrepaired after recovering the ...
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید