نتایج جستجو برای: long protocol
تعداد نتایج: 1006085 فیلتر نتایج به سال:
standard protocols should be established for treating eligible stroke patients with tissue plasminogen activator (tpa) (recommendation class i, level of evidence b). the iranian standard protocol of intravenous thrombolysis with recombinant tissue plasminogen activator (ivttpa) is the best possible and easy to use method for performing intravenous thrombolysis in iran. this protocol overcomes p...
background: providing high-quality care in the intensive care units (icus) is a major goal of every medical system. nurses play a crucial role in achieving this goal. one of the most important responsibilities of nurses is sedation and pain control of patients. the present study tried to assess the effect of nurses’ practice of a sedation protocol on sedation and consciousness levels and the do...
BACKGROUND Many factors from the oocyte/sperm or the process of fertilization may affect the zygote formation. The zygote score (Z-score) describes the quality of a human zygote based on its pronuclear morphology, nucleolar precursor bodies, and alignment of polar bodies, and it can be used in the selection process at the zygote stage for embryo transfer or cryopreservation. OBJECTIVE The aim...
We consider the rational secret sharing problem introduced by Halpern and Teague[1], where players prefer to get the secret rather than not to get the secret and with lower preference, prefer that as few of the other players get the secret. Some positive results have been derived by Kol and Naor[3] by considering that players only prefer to learn. They have proposed an efficient m-out-of-n prot...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets...
Security models for two-party authenticated key exchange (AKE) protocols have developed over time to provide security even when the adversary learns certain secret keys. In this work, we advance the modelling of AKE protocols by considering more granular, continuous leakage of long-term secrets of protocol participants: the adversary can adaptively request arbitrary leakage of long-term secrets...
OBJECTIVE To evaluate feasibility, SLN detection rate, and SLN location of lymphoscintigraphy in sentinel lymph node (SLN) biopsy for early cervical cancer. METHODS Ancillary analysis of data from the multicenter prospective SENTICOL study (January 2005-June 2007) of patients with early cervical cancer (FIGO stage IA with emboli to IB1) was conducted. Preoperative lymphoscintigraphy was perfo...
objectives: the objective was to determine the results of early active controlled motion in the patients rehabilitated by our new protocol. methods: 91 fingers in 64 patients with flexor tendon repair in all zones were enrolled in a single group (quasi-experimental) clinical trial. 58 fingers in 43 patients were assessed at least three months postoperatively. outcomes were defined using the ‘wh...
background: the relationship between aerobic capacity (vo2max) and physical activity throughout the world is extensive research. this study aimed to estimate aerobic capacity, and the physical activity and demographic factors that affect the male students. method: in this study, 68 male students of health school in isfahan university of medical sciences had participated voluntarily. subjects s...
purpose : to report a study design for assessing the cataract surgery outcome methods : we conducted the study in an eye hospital in which over 13,300 cataract extractions are performed annually. sampling framework and recruitment included international classification of diseases (icd)-10-based electronic hospital records of patients who underwent age-related cataract extraction within the prec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید