نتایج جستجو برای: curve expert

تعداد نتایج: 201647  

2018

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

2013
Juliana Schussel Xian Chong Zhou Zhe Zhang Kavita Pattani Francisco Bermudez Germain Jean-Charles Thomas McCaffrey Tapan Padhya Joan Phelan Silvia Spivakovsky Mariana Brait Ryan Li Helen Yoo Bowne Judith D. Goldberg Linda Rolnitzky Miriam Robbins David Sirois Joseph A. Califano

Purpose: Promoter hypermethylation has been recently proposed as a means for head and neck squamous cell carcinoma (HNSCC) detection in salivary rinses. In a prospective study of a high-risk population, we showed that endothelin receptor type B (EDNRB) promoter methylation in salivary rinses is a useful biomarker for oral cancer and premalignancy. Experimental Design: Using that cohort, we eval...

2015
Vivian W. Huang Connie Prosser Karen I. Kroeker Haili Wang Carol Shalapay Neil Dhami Darryl K. Fedorak Brendan Halloran Levinus A. Dieleman Karen J. Goodman Richard N. Fedorak

BACKGROUND Infliximab is an effective therapy for inflammatory bowel disease (IBD). However, more than 50% of patients lose response. Empiric dose intensification is not effective for all patients because not all patients have objective disease activity or subtherapeutic drug level. The aim was to determine how an objective marker of disease activity or therapeutic drug monitoring affects clini...

Journal: :Journal of minimally invasive gynecology 2013
Juliënne A Janse Ruben S A Goedegebuure Sebastiaan Veersema Frank J M Broekmans Henk W R Schreuder

STUDY OBJECTIVE To assess the learning curve using a virtual reality simulator for hysteroscopic sterilization with the Essure method. DESIGN Prospective multicenter study (Canadian Task Force classification II-2). SETTING University and teaching hospital in the Netherlands. PARTICIPANTS Thirty novices (medical students) and five experts (gynecologists who had performed >150 Essure steril...

2017

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

2017
Neal Shahidi George Ou Eric Lam Robert Enns Jennifer Telford

Background/Study aim The American Society for Gastrointestinal Endoscopy (ASGE) recommends that trainees complete 150 endoscopic ultrasound (EUS) procedures before assessing competency. However, this recommendation is largely based on limited evidence and expert opinion. With new evidence suggesting that this historical threshold is underestimating training requirements, we evaluated the learni...

2015
Gaetano Luglio Giovanni Domenico De Palma Rachele Tarquini Mariano Cesare Giglio Viviana Sollazzo Emanuela Esposito Emanuela Spadarella Roberto Peltrini Filomena Liccardo Luigi Bucci

BACKGROUND Despite the proven benefits, laparoscopic colorectal surgery is still under utilized among surgeons. A steep learning is one of the causes of its limited adoption. Aim of the study is to determine the feasibility and morbidity rate after laparoscopic colorectal surgery in a single institution, "learning curve" experience, implementing a well standardized operative technique and recov...

2017

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

2017

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید