نتایج جستجو برای: Protocols
تعداد نتایج: 100392 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
0
given preliminary evidence of timed, sequential chemotherapy of high dose cytosine arabinoside the current study was initiated to assess the side effects and efficacy of this regimen in patients with newly acute myelocytic leukemia (aml). nineteen adults who referred to hematology-oncology and bone marrow transplantation (bmt) research center of tehran university of medical sciences were enroll...
background:acute poisoning with organophosphorus (op) pesticides is a common method of suicide and entails considerable mortality in bangladesh. the objective of this study was to evaluate the effects and outcomes of a protocol for treatment of op poisoning that included titrated incremental atropine as loading dose and slow infusion for maintenance. methods:in this prospective descriptive cas...
the main objective of the current study is to investigate the impacts of environmental evolutionsat global scale on iran’s environmental planning. thereby, all political movements towards solving environmental issues in iran were accurately reviewed to find out the impressibility of the events by the global environmental evolutions. the findings indicated that iran has joined the conventions an...
conclusions the results illustrate that the iranian version of the aep (ir-aep) could be a reliable and valid instrument for assessing the level of inappropriate acute hospital admissions and days of care in the iranian context. results inter-rater and intra-rater reliability testing revealed an excellent level of consensus between the two nurses employing the aep in all the studied departments...
as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...
in vehicular ad hoc networks there is the ability to communicate between vehicles. this communication which is wireless should be rapid and reliable. these networks have unique characteristic. this communication among vehicles has many advantages in safety and comfort applications. since, the roads are always encountered to accidents and risks, using optimized tools could be useful in these sit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید