نتایج جستجو برای: most importantly

تعداد نتایج: 1514991  

Realistic mobility models can demonstrate more precise evaluation results because their parameters are closer to the reality. In this paper a realistic Fuzzy Mobility Model has been proposed. This model has rules which are changeable depending on nodes and environmental conditions. It seems that this model is more complete than other mobility models.After simulation, it was found out that not o...

Journal: :middle east journal of digestive diseases 0
hedyeh ebrahimi mohammadreza naderian amir ali sohrabpour

liver fibrosis is a potentially reversible response to hepatic insults, triggered by different chronic diseases most importantly viral hepatitis, alcoholic, and non-alcoholic fatty liver disease. in the course of the chronic liver disease, hepatic fibrogenesis may develop, which is attributed to various types of cells, molecules, and pathways. activated hepatic stellate cell (hsc), the primary ...

Larijani, Bagher, Ghafourifard, Soudeh, Zahedi, Farzaneh,

Background: Medical students at all levels of experience, encounter learning opportunities in a wide variety of clinical settings. There are some ethical dilemmas a student may face and possibly carry the burden throughout his file. Most of formal medical ethics teaching focuses on dilemmas that students may face in their future practice, rather than the ethical problems they encounter as med...

Journal: :J. Informetrics 2010
Marko A. Rodriguez Joshua Shinavier

Many, if not most network analysis algorithms have been designed specifically for single-relational networks; that is, networks in which all edges are of the same type. For example, edges may either represent “friendship,” “kinship,” or “collaboration,” but not all of them together. In contrast, a multi-relational network is a network with a heterogeneous set of edge labels which can represent ...

2014
Ramandeep kaur Jitender Sharma

Today, communication is main part of everybody’s life. Security is the most important issue in any communication. So we need a secured system to exchange data securely between users. For this purpose of security there are various techniques like cryptography, watermarking and steganography. Steganography is used to transmit information in covered form. In steganography we hide the presence of d...

Journal: :Int. Journal of Network Management 2009
Damien Leroy Olivier Bonaventure

The difficulty of renumbering a network – i.e., adding and removing an IP prefix due to a provider change or a network merging – is a real issue for most network administrators. It is even considered by a lot of people as a bottleneck issue in adopting Provider Aggregatable addressing for IPv6. In this paper, we propose a set of macros that can be used in configuration files to permit network a...

Differences in public health approaches to control the coronavirus disease 2019 (COVID-19) pandemic could largely explain substantial variations in epidemiological indicators (such as incidence and mortality) between the West and the East. COVID-19 revealed vulnerabilities of most western countries’ healthcare systems in their response to the ongoing public health crisi...

ژورنال: ارمغان دانش 2023

The beginning of the coronavirus epidemic was in China, this epidemic changed the lifestyle in different countries. One of the most significant changes was in the field of education. Many educations around the world have changed to non-face-to-face and virtual. Students were forced to spend too much time at home looking at digital screens. Long-term presence in the closed environment of houses ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید