نتایج جستجو برای: long protocol

تعداد نتایج: 1006085  

Journal: :journal of advances in computer engineering and technology 2015
forouz ghaffarizadeh ahmad khademzadeh

mobile ad hoc networks (manet) are constructed by mobile nodes without access point. since manet has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. the olsr protocol is an optimization of the classical link state algorithm. olsr introduces an interesting concept, the multipoint r...

Journal: :journal of advances in computer research 2015
hamidreza alrezaamiri mehdi golsorkhtabaramiri masoud farmanbar hamed naeemaeiaali

a typical radio frequency identification system (rfid) includes one reader and a number of tags. the reader transmit to commands to the tags with interrogation radio signals, and tags receive the command and then respond with their identification. readers with interrogation signals can read tags’ responses. in rfid systems, when multiple tags respond to one reader simultaneously, tag collision ...

Farin Soleimani, Mahmoud Beyki, Mohammaad Mousavi, Mohsen Abedi, Reza Roghani,

Objectives: To compare the outcomes of prone and supine lumbar traction in patients with chronic discogenic low back pain. Methods: The test was prospective and randomized control trial. The structure of trial was Urban Physical Medicine and Rehabilitation clinic. Participants was included of A total of 124 subjects with chronic low back pain (LBP) and evidence of a degenerative and/or herni...

Journal: :Ginekologia polska 2016
Milan Trenkić Jasmina Popović Vesna Kopitović Artur Bjelica Radomir Živadinović Sonja Pop-Trajković

OBJECTIVES Polycystic ovary syndrome (PCOS) is a common endocrine disorder, primarily affecting women of the reproductive age. The aim of the study was to assess the clinical efficacy and embryo quality in flexible gonadotropin-releasing hormone (GnRH) antagonist protocol in comparison to the long GnRH agonist protocol in PCOS women undergoing in vitro fertilization (IVF). MATERIAL AND METHOD...

2013
Zheng Yang

The extended Canetti–Krawczyk (eCK) security models, are widely used to provide security arguments for authenticated key exchange protocols that capture leakage of various kinds of secret information like the long-term private key and session-specific secret state. In this paper, we study the open problem on constructing eCK secure AKE protocol without random oracles and NAXOS like trick. A gen...

2013
Armstrong Kadyamatimba Zenzo Ncube

-Wireless Mesh Networks (WMNs) are the set of wireless nodes that can communicate with each other and forwarding each other’s packets. WMNs are multi-hop networks consisting of routers, gateways and mobile nodes, they aim at guarantee connectivity. They act as a key technology for next generation WMNs due to their low cost and relative ease of deployment they are an attractive paradigm and are ...

2005
L. Childress J. M. Taylor A. S. Sørensen

We describe a novel protocol for a quantum repeater which enables long distance quantum communication through realistic, lossy photonic channels. Contrary to previous proposals, our protocol incorporates active purification of arbitrary errors at each step of the protocol using only two qubits at each repeater station. Because of these minimal physical requirements, the present protocol can be ...

Journal: :International journal of developmental neuroscience : the official journal of the International Society for Developmental Neuroscience 2015
Ana M Daugherty Qijing Yu Robert Flinn Noa Ofen

There is a growing interest in characterizing functional specialization along the long axis of the hippocampus in humans. Variability in volumetry along the long axis of the hippocampus may be of functional relevance in human development, and in a number of clinical populations. However, there is a lack of consistent definitions for measurements of regional volumetry along the hippocampal long ...

Journal: :RFC 2003
Tmima Koren Stephen L. Casner John Geevarghese Bruce Thompson Patrick Ruddy

Enhanced Compressed RTP (CRTP) for Links with High Delay, Packet Loss and Reordering Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protoc...

2014
Gen-Hong Mao Zonggang Feng Yan He Yu-Rong Huang

INTRODUCTION The aim was to compare the efficacy of long-acting and short-acting gonadotropin-releasing hormone (GnRH) agonists by long protocol on embryo quality, endometrial thickness and pregnancy rate in in vitro fertilization. MATERIAL AND METHODS In this retrospective study, long-term pituitary downregulation, achieved with long- and short-acting GnRH agonists (GnRHa), was performed for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید