نتایج جستجو برای: conyainer port

تعداد نتایج: 27373  

Journal: :iranian journal of pediatric hematology and oncology 0
h esfahani department of pediatric hematology/oncology, besat hospital, hamedan university of medical sciences, hamedan, iran. m ghorbanpor department of surgery, besat hospital, hamedan university of medical sciences, hamedan, iran. a tanasan department of pediatrics, besat hospital, hamedan university of medical sciences, hamedan, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی همدان (hamadan university of medical sciences)

abstract background peripheral blood vessels, due to availability are used for many years in cancer patients, however in patients with potentially harmful drugs to skin (vesicant drugs) or difficult accessibility to vessels, the use of implantable port (totally implantable venous access port-tivap)devices with central vascular access are important.  materials and methods in this retrospective s...

2016
Yihan Chen Zhonghua Jin Xuejun Liu

When the service region of ports overlap, consignors’ selecting behaviors for shipping ports become homogeneous to commuters’ choosing behaviors on trips. The commuters’ travel behaviors can be described through a probabilistic model in transportation planning. In this study, we adopt the transportation probabilistic forecast model to forecast port throughput. First, we amend the model with a p...

Journal: :Comput. J. 2011
Monowar H. Bhuyan Dhruba Kumar Bhattacharyya Jugal K. Kalita

Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of IP addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is a very difficult task to recognize instances of malicious port scanning. In general...

2002
T.-T. WU S.-M. WANG Y.-Y. CHEN T.-Y. WU P.-Z. CHANG L.-S. HUANG C.-L. WANG C.-W. WU C.-K. LEE

Extraction of coupling of modes (COM) parameters from the manufacturing process of a surface acoustic wave device (SAW) is important in practice. In this study, we employed an inverse algorithm to recover the COM parameters from the measured admittance of a one-port SAW resonator. For completeness, the COM equations, the P-matrix representation and the related COM parameters have been summarize...

2014
Yasser Bayoumi Tarek Heikal Hossam Darweish

BACKGROUND Radical cystectomy (RC) with or without neoadjuvant chemotherapy is the standard treatment for muscle-invasive bladder cancers. However, the locoregional recurrence rate is still significantly higher for locally advanced cases post-RC. The underuse of postoperative radiotherapy (PORT) in such cases after RC is related mainly to a lack of proven survival benefit. Here we are reporting...

Journal: :SIAM J. Comput. 2010
Robert M. Hierons

Some systems interact with their environment at physically distributed interfaces, called ports, and in testing such a system it is normal to place a tester at each port. Each tester observes only the events at its port and it is known that this limited observational power introduces additional controllability and observability problems into testing. Given a multi-port finite state machine (FSM...

2011
Yu Zhang Bharat Bhargava

Most network attackers perform port scanning individually, without synchronization, to find victim hosts. Such port scanning schemes suffer from two problems: first, there are too many duplicate scannings and too much contention among different port scanners; second, a complete port scanning takes a long time to finish. In this paper, we present a fast DHT-based collaborative port scanning sche...

2013
Evangelos I. Kaisar

Due to its high capital investment, operating and maintenance cost, a port should be managed as efficiently as possible. Learning from the best practices ports operating under similar conditions is a very useful strategy for maintaining competiveness. Under such a competitive environment, port performance measurement is not only a powerful management tool for port operations, but also constitut...

Journal: :Chirurgia 2013
E Orozakunov C Akyol S I Kayilioglu U Tantoglu Si Basceken A Cakmak

BACKGROUND single-port laparoscopic surgery has gained popularity over the last decade. This technique is used for several surgical procedures. This paper documents a new and cheaper access method known as "surgical glove port" or "homemade single-port", and describes our initial experience with 25 cases. METHOD Eleven cholecystectomies, eight totally extraperitoneal inguinal hernia repairs, ...

2013
Priyanka Sahu Megha Singh Deepak Kulhare Hussein Al-Bahadili Ali H. Hadi Ali Hussein

Port Knocking is an important concept to secure services provided by the servers. By a predefined port knocking sequence server identify whether the request is a legitimate request for a service. This paper presents an analyzing the network security concept of Port Knocking and assesses their suitability as firewall authentication mechanisms for opening network ports or performing certain actio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید