نتایج جستجو برای: روش mac

تعداد نتایج: 398235  

Journal: :INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 2013

Journal: :International Journal of Distributed Sensor Networks 2013

Journal: :International journal of Computer Networks & Communications 2010

Journal: :Antimicrobial agents and chemotherapy 1994
L E Bermudez L S Young C B Inderlied

Organisms of the Mycobacterium avium complex (MAC) cause disseminated disease in patients with AIDS, and evidence points to the gastrointestinal tract as the major route of infection. Since MAC can bind to and invade intestinal mucosal cells, we examined whether subinhibitory concentrations of antibiotics which have anti-MAC activity in vitro affect the interaction between MAC and HT-29 intesti...

2010
Isha Batra Ritu Malik Meenakshi Mittal

A Mobile Sensor Network is a geographically distributed network which owes its name to the presence of mobile sink or sensor nodes within the network. In this paper we will present and discuss the energy-efficient contention-based and scheduled based medium access control (MAC) protocols for mobile sensor networks (MSNs). Most of the MAC protocols such as T-MAC , D-MAC, and the more commonly ut...

Journal: :British journal of anaesthesia 1977
C A Hirshman R E McCullough P J Cohen J V Weil

The ventilatory responses to isocapnic hypoxia and hypercapnia were studied in six dogs each with a tracheostomy, awake and during anaesthesia with halothane, enflurane and isoflurane (1-2.5 MAC). Isocapnic hypoxic ventilatory response (HVR) was expressed as the parameter A, such that the greater the value of A, the greater the hypoxic response. In the anaesthetized dogs HVR (A) was reduced sig...

Journal: :IACR Cryptology ePrint Archive 2015
Avijit Dutta Goutam Paul

In CRYPTO 1999, J. An and M. Bellare proposed a MerkleDamg̊ard iteration based MAC construction called NI-MAC in order to avoid constant re-keying on multiblock messages in NMAC and to ease the security proof. In CRYPTO 2014, Gazi et al. revisited the proof of NI-MAC in the view of structure graph introduced by Bellare et al. in CRYPTO 2005 and gave a tight bound of order lq 2 2n , which is an i...

Journal: :Journal of leukocyte biology 2003
Joseph P Lopez Emily Clark Virginia L Shepherd

Mycobacterium avium complex (MAC) is a significant cause of opportunistic infection in patients with acquired immunodeficiency syndrome. Although the major route of entry of MAC is via the gastrointestinal tract, MAC can infect humans through the respiratory tract and eventually encounter alveolar macrophages within the lung. Once in the lung, MAC can potentially interact with surfactant protei...

Journal: : 2022

هدف: این پژوهش با هدف ارائه مدل چالش‌های پرورش کودکان کم‌شنوای پیش‌دبستانی از دیدگاه مادران و متخصصان بر اساس نظریه داده‌بنیاد انجام ‌شده است. روش: نمونه 15 مادر کودک کم‌شنوا 4 تا 6 ساله انجمن والدین شهر تهران 5 متخصص حوزه ناشنوا بودند که در سال 1400 استفاده روش نمونه‌گیری هدفمند انتخاب شدند. چالش ­های طریق مصاحبه نیمه ساختاریافته عمیق رسیدن به اشباع نظری جمع‌آوری کدگذاری (کدگذاری باز، محوری ان...

Journal: :Electronics 2022

The Internet of Things (IoT) connects our world in more ways than we imagine. Wireless sensor network (WSN) technology is at the core implementing IoT architectures. Although WSN applications give us enormous opportunities, their deployment challenging because energy constraint nodes. primary design objective WSNs therefore to maximize efficiency. Enhancing quality service (QoS), such as latenc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید