نتایج جستجو برای: mac method

تعداد نتایج: 1654775  

Journal: :British journal of anaesthesia 1992
D M Gaumann J P Mustaki E Tassonyi

End-tidal anaesthetic concentrations at first eye opening in response to a verbal command during recovery from anaesthesia (MAC-awake), were measured for isoflurane (n = 16), enflurane (n = 16) and halothane (n = 14). MAC-awake was measured during either slow or fast alveolar washout. Slow washout was obtained by decreasing anaesthetic concentrations in predetermined steps of 15 min, assuming e...

Journal: :IET Information Security 2010
Joan Daemen Vincent Rijmen

We present three security claims for iterated MAC functions. Next, we propose Alred, a construction method for MAC functions based on a block cipher that has provable security in the absence of internal collisions. We apply this construction to AES resulting in two MAC functions: Alpha-MAC and Pelican. We provide a model for describing different types of internal collisions in Alred and provide...

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

2012
Fanbao Liu Tao Xie Changxiang Shen

In this paper, we propose an efficient method to break H2-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance). We can successfully recover the equivalent key of H2-MAC in about 2n/2 on-line MAC queries and 2n/2 off-line hash computations with great probability. This attack shows that t...

2007
NATASA ZIVIC CHRISTOPH RULAND

In this work, channel decoding is considered as a promising way for improvement of cryptographic functions. Use of MAC/H-MAC values and digital signatures is analyzed in a context of code concatenation, together with convolutional codes using MAP decoding algorithm. Soft Input Decryption method, which uses L-values from channel decoder, presents an efficient method for integrating cryptography ...

2010
Robert Michael Foster

A new method for generating the stem components of Multiple Alternate Choice (MAC) test items is proposed which makes use of a theory about causal coherence relation primitives. A trial of the Causal Relation Explication, Addition and Manipulation (CREAM) method is described which uses a domain specific evaluation method. The domain expert assigns a usability category to each MAC stem from a ba...

ژورنال: :سلامت کار ایران 0
علی درمحمدی a dormohammadi hamadan university of medical sciencesدانشگاه علوم پزشکی همدان مجید معتمد زاده m motamedzade hamadan university of medical sciencesدانشگاه علوم پزشکی همدان حسین امجد سردرودی h amjad sardrudi no 23, nasrolah zade alley, emam st, sardrod, tabriz, iranتبریز- سردرود- خیابان امام- کوچه نصرالله زاده- پلاک 23 اسماعیل زارعی e zarei nayshabur university of medical sciencesدانشگاه علوم پزشکی نیشابور مهدی اصغری m asghari tehran university of medical sciencesدانشگاه علوم پزشکی تهران سعید موسوی s musavi hamadan university of medical sciencesدانشگاه علوم پزشکی همدان

زمینه و هدف: حمل دستی بار از جمله وظایفی است که می­تواند سبب ایجاد اختلالات اسکلتی- عضلانی مرتبط با کار گردد و یکی از رایج­ترین اختلالات ناشی از حمل دستی بار، کمردردهای شغلی است. مطالعه حاضر به منظور تعیین میزان ناراحتی­های اسکلتی- عضلانی، ارزیابی وظایف حمل دستی بار با دو روش mac و معادله niosh و مقایسه نتایج این دو روش، انجام گرفت.   روش بررسی: این مطالعه توصیفی- تحلیلی در سال 1390 بر روی 30 ک...

Journal: :international journal of hematology-oncology and stem cell research 0
kamran alimoghaddam hematology-oncology and stem cell transplantation research center, tehran university of medical sciences, tehran, iran mohammad jahani hematology-oncology and stem cell transplantation research center, tehran university of medical sciences, tehran, iran seyyedasadollah mousavi hematology-oncology and stem cell transplantation research center, tehran university of medical sciences, tehran, iran babak bahar hematology-oncology and stem cell transplantation research center, tehran university of medical sciences, tehran, iran masoud iravani hematology-oncology and stem cell transplantation research center, tehran university of medical sciences, tehran, iran roshanak derakhshandeh hematology-oncology and stem cell transplantation research center, tehran university of medical sciences, tehran, iran

introduction: allogeneic hematopoietic stem cell transplantation (hsct) has been reported to be a successful curative treatment in aml patients. myeloablative conditioning (mac) is used more frequent as a preparing regimen. this study attempts to compare the outcome of patients who has received mac and reduced- intensity conditioning (ric). methods: totally, 618 patients with aml underwent hsct...

Journal: :Electr. Notes Theor. Comput. Sci. 2001
Moonjoo Kim Sampath Kannan Insup Lee Oleg Sokolsky Mahesh Viswanathan

We describe Java-MaC, a prototype implementation of the Monitoring and Checking (MaC) architecture for Java programs. The MaC architecture provides assurance about the correct execution of target programs at run-time. Monitoring and checking is performed based on a formal speci cation of system requirements. MaC bridges the gap between formal veri cation, which ensures the correctness of a desi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید