نتایج جستجو برای: protocol analysis
تعداد نتایج: 3017806 فیلتر نتایج به سال:
wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...
OBJECTIVES: To evaluate the effect of two simultaneous protocols in reducing recovery time and assessment of adverse effects of different fluid replacement therapy in management of diabetic ketoacidosis. MATERIALS AND METHODS: In this randomized clinical trial study, two standard protocols were chosen to evaluate recovery time and incidence of DKA complications. RESULTS: 18 subjects who had ...
purpose : this study intended to the effect of exercise protocol on 11 – 13 years old students’ dynamic balance while walking on balance beam. materials and methods: 30 non-athlete male students were equally and randomly assigned to an experimental (weight: 400.43 ± 8.34; height: 148.20 ± 6.87) and a control group (weight: 425.56 ± 7.25; height: 148.46 ± 7.28). the experimental group participat...
objectives: to evaluate the effect of two simultaneous protocols in reducing recovery time and assessment of adverse effects of different fluid replacement therapy in management of diabetic ketoacidosis. materials and methods: in this randomized clinical trial study, two standard protocols were chosen to evaluate recovery time and incidence of dka complications. results: 18 subjects who had sev...
Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...
objective: to compare the pregnancy outcomes achieved by in vitro fertilization (ivf) between minimal stimulation and conventional antagonist protocols in poor ovarian responders (pors). materials and methods: in this randomized controlled trial, 77 pors undergoing ivf were selected and divided into two groups. first group was the minimal stimulation group (n = 42) receiving 100 mg/day clomiphe...
today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when there is a connection between user a and b, user a shoul...
quorum-based power saving (qps) protocols allow “asynchronous” wireless hosts, operating in a multi-hop ad-hoc network, to tune to the low power mode conceived in ieee 802.11 mac standard. qps schemes guarantee that the wake-up schedule for every two neighboring hosts would ultimately overlap within a bounded latency so as to be able to accomplish their reciprocal “unicast” communications. a ma...
the aim of this paper is to assess the adaptation of iran’s energy policies to the kyoto protocol. in the past two decades, iran has experienced a considerable increase in greenhouse gas (ghg) emissions; in 2013 it was the world’s ninth largest emitter. although adapting to this protocol in iran’s energy and climate policies seems vital and urgent, its recent status is not promising. this paper...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید