نتایج جستجو برای: protocol analysis

تعداد نتایج: 3017806  

Arash Samiei Azadeh Fazel Batool Rashidi Ensieh Shahrokh Tehraninejad, Kiandokht Kiani

Background To compare a flexible, multi-dose GnRH antagonist protocol with a long GnRH .agonist protocol in poor respo MaterialsAndMethods A randomized clinical trial of 70 poor responder patients (35 patients in GnRH antagonist protocol and 35 patients in long GnRH agonist protocol) was performed at Royan Institute, Tehran, Iran. Both groups were given a fixed dose of human menopausal gonadotr...

Journal: :International Journal of Computer Applications 2016

Journal: :the modares journal of electrical engineering 2003
said jalili behruz - tork ladani

logic analysis and attack construction methods are two major approaches in verification of cryptographic protocols. however, it is almost preferable to use both of them for a complete analysis. in this paper, a generic framework for the integration of the two verification approaches is presented. using the framework we can propose analysis methods in which security properties and breach scenari...

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

Journal: :علوم زیستی ورزشی 0
مهدی صمدی کارشناسی ارشد فیزیولوژی ورزش دانشکدۀ تربیت بدنی دانشگاه بوعلی سینا، همدان فرزاد ناظم دکتری فیزیولوژی ورزش دانشکدۀ تربیت بدنی دانشگاه بوعلی سینا، همدان، ایران

abstract physical injuries during taekwondo competitions often happen due to physical contacts during fighting; therefore, a training protocol was designed in line with the physiological stress of a real competition according to la, hr and rpe changes so that the athletes could perform the techniques with a pad instead of a real opponent. for this purpose, 12 professional taekwondo players from...

Journal: :The Analysis of Verbal Behavior 1998

Journal: :ACM Transactions on Information and System Security 2001

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید