نتایج جستجو برای: protocol analysis
تعداد نتایج: 3017806 فیلتر نتایج به سال:
Background To compare a flexible, multi-dose GnRH antagonist protocol with a long GnRH .agonist protocol in poor respo MaterialsAndMethods A randomized clinical trial of 70 poor responder patients (35 patients in GnRH antagonist protocol and 35 patients in long GnRH agonist protocol) was performed at Royan Institute, Tehran, Iran. Both groups were given a fixed dose of human menopausal gonadotr...
logic analysis and attack construction methods are two major approaches in verification of cryptographic protocols. however, it is almost preferable to use both of them for a complete analysis. in this paper, a generic framework for the integration of the two verification approaches is presented. using the framework we can propose analysis methods in which security properties and breach scenari...
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
abstract physical injuries during taekwondo competitions often happen due to physical contacts during fighting; therefore, a training protocol was designed in line with the physiological stress of a real competition according to la, hr and rpe changes so that the athletes could perform the techniques with a pad instead of a real opponent. for this purpose, 12 professional taekwondo players from...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید