نتایج جستجو برای: protocol

تعداد نتایج: 250013  

Quantum dialogue is a type of quantum communication in which users can simultaneously send messages to each other. The earliest instances of quantum dialogue protocols faced security problems such as information leakage and were vulnerable to intercept and resend attacks. Therefore, several protocols have been presented that try to solve these defects. Despite these improvements, the quantum di...

Journal: :journal of the iranian chemical research 0
ming lu chemical engineering college, nanjing university of sciece & technology, nanjing 210094, china xiaobing liu chemical engineering college, nanjing university of sciece & technology, nanjing 210094, china yu wang chemical engineering college, nanjing university of sciece & technology, nanjing 210094, china

an efficient protocol for the selective oxidation of primary alcohols to aldehydes withh5io6/v2o5 in ionic liquid [bmpy][pf6] has been developed. high yields of the products, mildreaction conditions and simple experimental procedure make this protocol complementary tothe existing methods. the catalyst can be reused for several times without obvious loss of thecatalytic activity.

A GHASSEMI NEJAD, H DABIRASHRAFI, K MOHAMAD, M BIGDELI, N MOGHADAMI TABRIZI, S VAKILI,

Regarding the false negative results of culdocentesis, it is believed that the protocol of B-hCG, sonography, D&C and free use of laparoscopy gives more reliable information to the physician than the protocol of B-hCG, sonography and culdocentesis. We used the former protocol on 50 patients suspected of having ectopic pregnancy. The most common diagnoses were EP (48%) and PID (16%), respec...

Journal: :international journal of communications and information technology 2011
m. najimi m. sayad haghighi

many performance evaluations for ieee 802.11distributed coordination function (dcf) have been previouslyreported in the literature. some of them have clearly indicatedthat 802.11 mac protocol has poor performance in multi-hopwireless ad hoc networks due to exposed and hidden nodeproblems. although rts/cts transmission scheme mitigatesthese phenomena, it has not been successful in thoroughlyomit...

Journal: :تحقیقات نوین در برق 0
عبدالمجید جعفرخادم abdolmajid jafarkhadem افشین لشکر آرا afshin lashkar ara

abstract: nowadays due to developing the information technology, buildings are equipped to this technology in order to reduce energy consumption and make more convenient for inhabitants. the popularity of smart home has been increasing greatly in recent years due to much higher affordability and simplicity through android smartphone connectivity. this paper prepares a review of smart home and h...

Introduction:Pre conception care is set of care services to assess the risks for pregnancy, it provide training and diagnostic measures, therapeutic and pharmaceutical interventions for improving health woman. In addition to improving health and performing medical care in Pre conception care, main point is to empower individual to maintain their health through providing education and counseling...

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we c...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

Journal: :iranian journal of allergy, asthma and immunology 0
mohammad hassan bemanian abolhassan farhoudi zahra pourpak mohammad gharagozlou masoud movahedi mohammad nabavi

severe allergic reactions during specific immunotherapy may occur in the treatment of hymenoptera sting allergy. the objective of the present study was to examine the characteristics of allergic reactions during specific immunotherapy in patients with allergy towards hymenoptera venom in the iranian population. a prospective study was performed using the clinical reports of 27 patients with ana...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید