نتایج جستجو برای: fixed protocol
تعداد نتایج: 441915 فیلتر نتایج به سال:
objective: this study was conducted to compare the results of fixed versus flexible gnrh antagonist protocols in controlled ovarian stimulation for intra cytoplasmic sperm injection (icsi) in patients with pcos. materials and methods: a randomized clinical trial was performed on 100 pcos women, who were admitted to a tertiary infertility clinic and were candidate for ivf/icsi. they were divided...
in this thesis we will present three topics. we define approximate fixed points in fuzzy normed spaces. also we obtain some necessary and sufficient conditions on the existence of? -fixed points for ? > 0. at the continue some results about approximate fixed points for a class of non-expansive maps on g-metric spaces are obtained and we define approximate fixed points in partial metric spa...
background: to compare a flexible, multi-dose gnrh antagonist protocol with a long gnrh .agonist protocol in poor respo materials and methods: a randomized clinical trial of 70 poor responder patients (35 patients in gnrh antagonist protocol and 35 patients in long gnrh agonist protocol) was performed at royan institute, tehran, iran. both groups were given a fixed dose of human menopausal gona...
Background To compare a flexible, multi-dose GnRH antagonist protocol with a long GnRH .agonist protocol in poor respo MaterialsAndMethods A randomized clinical trial of 70 poor responder patients (35 patients in GnRH antagonist protocol and 35 patients in long GnRH agonist protocol) was performed at Royan Institute, Tehran, Iran. Both groups were given a fixed dose of human menopausal gonadotr...
Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computation preserves the privacy of input data using cryptographic protocols, allowing the parties to obtain the benefits of data sharing and at the same time avoid the associated risks. These business applications need protocols that s...
In this paper we present the Umbrella protocol, a novel distributed hash table architecture that supports key publishing and retrieval on top of an overlay network for content distribution. The Umbrella protocol provides a scalable environment with efficient algorithms based on a distributed routing table of constant size for each node, thus minimizing traffic load and scalability problems. Thr...
Quantification of the setup errors is vital to define appropriate setup margins preventing geographical misses. The no-action-level (NAL) correction protocol reduces the systematic setup errors and, hence, the setup margins. The manual entry of the setup corrections in the record-and-verify software, however, increases the susceptibility of the NAL protocol to human errors. Moreover, the impact...
PURPOSE To investigate four different contrast protocols to detect hypervascular hepatocellular carcinoma (HCC) most adaptable for patients at any body weight (BW) in clinical practice. MATERIALS AND METHODS A post-marketing surveillance of liver dynamic CT was prospectively performed by four different protocols in 415 patients: Protocol-A, BW-tailored dose of contrast media (CM: iohexol 300 ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید