نتایج جستجو برای: nvd
تعداد نتایج: 200 فیلتر نتایج به سال:
Nowadays, the increasing number of devices and services that require a direct Internet access, creates new security challenges. These challenges need to meet user feature-based requirements with the companies’ restrictive security policies. Therefore, security administrators need to adopt novel tools in order to quickly and non-intrusively verify the degree of exposure of Internet-facing servic...
Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the limitations of current intrusion detection and forensic anal ysis tools, reconstructing attack scenarios from evidence left behind by the attackers of an enterprise system is challenging. In particular, re constructing attack scenarios by us...
OBJECTIVE To determine the effect of pregnancy and vaginal delivery on the pelvic floor and levatorani morphology and function. METHODS Design. Cross-sectional study. Setting. Tertiary care teaching hospital. Population. 75 primigravid women were recruited for assessment at 6 weeks postpartum compared with 25 nulliparous women. Hiatal morphology and levator ani muscle avulsion were assessed b...
OBJECTIVE To determine the visual outcome of laser treatment in diabetic retinopathy. DESIGN Prospective, non-comparative case series. MATERIALS AND METHODS A total of 80 eyes of 50 patients with diabetic retinopathy in different stages were photocoagulated using diode green laser. Focal laser only was given in 46 eyes and pan retinal photocoagulation only was given in 29 eyes while 3 eyes ...
OBJECTIVE To determine the level of Anxiety, Depression and Stress among the Husbands of Obstetric Cases. SUBJECTS AND METHODS This hospital-based prospective study was conducted at Karachi, during the year 1998. A semi-structured proforma along with Hospital Anxiety Depression Scale (HAD) and Life Events Scale were administered to the consenting spouses of obstetric cases. RESULTS Only 23%...
Background: Labor dystocia (LD) is defined by the slow and abnormal progress of labor. Failure to in labor leading indication for 1ry cesarean delivery approximately 80% American women will eventually have at least one child, majority these undergo “Labor dystocia” encompasses a variety concepts, ranging from “abnormally” dilation cervix or descent fetus during active entrapment fetal shoulders...
Abstract. The purpose of the research is to develop a comprehensive assessment system with new indicators feed behavior and conversion in Duroc pigs based on selection index. Research methods. Herdsman database was used, which includes processing data fattening characteristics feeding 764 heads that have passed test at automatic stations. 13 were evaluated, 7 6 – characteristics. evaluation bre...
conclusions our study showed severe neonate indirect hyperbilirubinemia is still prevalence in fars province and ethnic and cultural background of the mothers was more effective than school education in preventing hyperbilirubinemia complication. patients and methods all infants less than 28 days referred due to severe indirect hyperbilirubinemia were included. complete history, physical examin...
Spring dampers of torsional vibrations in modern marine diesel engines: advantages and disadvantages
The article presents analysis of the advantages and disadvantages in assembling spring dampers torsional vibrations modern marine diesel engines. There are considered urgent problems using propulsion systems: lack systematized scientific data about damper design, statistics their prevalence engines, breakdowns. It has been stated that today there is no methodology for assessing technical condit...
Cybercrime affects companies worldwide, costing millions of dollars annually. The constant increase threats and vulnerabilities raises the need to handle in a prioritized manner. This prioritization can be achieved through Common Vulnerability Scoring System (CVSS), typically used assign score vulnerability. However, there is temporal mismatch between vulnerability finding assignment, which mot...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید