نتایج جستجو برای: long protocol
تعداد نتایج: 1006085 فیلتر نتایج به سال:
1. The present study aimed to investigate the influence of isometric training protocols with long- and short-duration contractions on the elasticity of human tendon structures in vivo. The elasticity was assessed through in vivo determination of the elongation (L) of the tendons and aponeuroses using ultrasonography, while the subjects performed ramp isometric exercise up to maximum voluntary c...
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., s...
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., s...
For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and operational for a very long time (i.e., s...
This paper present a new protocol based on symmetric encryption, which has quasi-forward secrecy and resistance to quasi-key compromise impersonation. It is a protocol suitable for computation-limited devices. Also by blinding the long-term key, we make the attack to long-term key harder.We have done the theoretical analysis and will finish the simulation and implementation.
OBJECTIVE To evaluate the effectiveness and safety of gonadotropin-releasing hormone antagonist (GnRH-ant) protocol and gonadotropin-releasing hormone agonist (GnRH-a) long protocol in patients with normal ovarian reserve. METHODS We searched the PubMed (1992-2016), Cochrane Library (1999-2016), Web of Science (1950-2016), Chinese Biomedical Database (CBM, 1979-2016), and China National Knowl...
The present study investigated the acute and short-term effects of oral feeding of jujube solution on blood platelets and its morphological indices in response to circuit resistance exercise. Fourteen young male volunteer students were randomly divided into the placebo and jujube solution groups. All participants performed one circuit resistance exercise[9stations/nonstop, 30 seconds for each s...
BACKGROUND AND OBJECTIVES The aim of this study was to compare the in vitro fertilization (IVF) outcomes of long gonadotropin-releasing hormone agonist (GnRH-a) and GnRH-antagonist (GnRH-ant) protocols in endometriosis patients who have undergone laparoscopic endometrioma resection surgery. To our knowledge, there is no study in the current literature that compares the effectiveness of long GnR...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید