نتایج جستجو برای: long protocol

تعداد نتایج: 1006085  

Journal: :Pharmacotherapy 2000
R MacLaren J M Plamondon K B Ramsay G M Rocker W D Patrick R I Hall

STUDY OBJECTIVE To compare empiric and protocol-based therapies of sedation and analgesia in terms of pharmacologic cost, effects on mechanical ventilation and intensive care unit (ICU) stay, and quality of sedation and analgesia. DESIGN Prospective study. SETTING A 24-bed medical-surgical-neurologic ICU. PATIENTS Seventy-two patients evaluated during empiric therapy and 86 during protoco...

2016
Giovanni Ferri Kimmo Kansanen

1 1. Motivations 5 2. Traffic characterization 8 2.1. Machine Traffic Communication scenario 8 2.2. Traffic models 9 The 3GPPP Model 11 2.3. Transmission Control Protocol 12 2.3.1. TCP segment 14 2.3.2. Congestion control 15 3. Long Term Evolution Networks 17 3.1. Architectural Overview 17 3.2. Underlined technologies 20 3.2.1. LTE air interface 20 3.2.2. Radio protocol 21 Medium Access Control...

Journal: :journal of reproduction and infertility 0

background: globozoospermia is a rare (incidence of 0.1% among andrological patients) and poorly understood condition, but a severe disorder in male infertility. this case report detailed the course of treatment and protocol of a patient with type 1 globozoospermia using intracytoplasmic sperm injection (icsi) and oocyte activation by calcium ionophore, which yielded conception and birth of a h...

1998
Rob Jerdonek Peter Honeyman Kevin Coffman Jim Rees Kip Wheeler

We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card to generate and distribute session keys securely. The designers of the protocol provide a mathematical proof of its security, using techniques pioneered by Bellare and Rogaway. Combining this theoretical strength with o...

1998
M. Ardehali

We describe an efficient protocol for quantum oblivious transfer. The protocol, which can be implemented with present technology, is secure against cheaters with unlimited computing power and with the ability to store the particles for an arbitrarily long period of time. The protocol is based on the following two entangled states: | Φ〉 = 1 √ 2 (|↑↑〉+ |↓ x〉) and |Ψ〉 = 1 √ 2 (|↑↑〉+ |↓ −x〉). PACS ...

Journal: :international journal of reproductive biomedicine 0
batool rashidi haleh rahmanpour ensieh shahrokh tehraninejad deldar maryam

background: the differential efficacy between long gnrh agonist with antagonist can partly be due to the preexisting differences in the early antral follicles before ovarian stimulation. objective: to compare the effect of pretreatment by estradiol with gnrh antagonist on antral follicular size coordination and basal hormone levels in gnrh antagonist protocol. materials and methods: on cycle da...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید