نتایج جستجو برای: protocol analysis

تعداد نتایج: 3017806  

Journal: :journal of advances in computer research 2014
iman zangeneh sedigheh navaezadeh abolfazl jafari

wireless ad hoc networks are composed of independent nodes managing the network without any infrastructure. the connection between nodes is provided by sending packages and by trusting to each other. therefore, using efficient and certain protocols is the essential requirement of these networks. due to special characteristics of wireless ad hoc networks such as lack of a fixed infrastructure, t...

Ali Amanati, Zahra Razavi,

OBJECTIVES: To evaluate the effect of two simultaneous protocols in reducing recovery time and assessment of adverse effects of different fluid replacement therapy in management of diabetic ketoacidosis. MATERIALS AND METHODS: In this randomized clinical trial study, two standard protocols were chosen to evaluate recovery time and incidence of DKA complications. RESULTS: 18 subjects who had ...

Journal: :journal of research in rehabilitation sciences 0
امیر گلپریان محمّدرضا امیر سیف الدینی فریبرز محمّدی¬پور amir golparian mohammad reza amirseyfadini fariborz mohammadipour

purpose : this study intended to the effect of exercise protocol on 11 – 13 years old students’ dynamic balance while walking on balance beam. materials and methods: 30 non-athlete male students were equally and randomly assigned to an experimental (weight: 400.43 ± 8.34; height: 148.20 ± 6.87) and a control group (weight: 425.56 ± 7.25; height: 148.46 ± 7.28). the experimental group participat...

Journal: :iranian journal of diabetes and obesity 0
zahra razavi ali amanati

objectives: to evaluate the effect of two simultaneous protocols in reducing recovery time and assessment of adverse effects of different fluid replacement therapy in management of diabetic ketoacidosis. materials and methods: in this randomized clinical trial study, two standard protocols were chosen to evaluate recovery time and incidence of dka complications. results: 18 subjects who had sev...

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

Journal: :journal of family and reproductive health 0
shamim pilehvari reproductive health research center, tehran university of medical sciences, tehran, iran ensieh shahrokh tehraninejad reproductive health research center, tehran university of medical sciences, tehran, iran batool hosseinrashidi reproductive health research center, tehran university of medical sciences, tehran, iran fatemeh keikhah reproductive health research center, tehran university of medical sciences, tehran, iran fedyeh haghollahi reproductive health research center, tehran university of medical sciences, tehran, iran elham aziminekoo reproductive health research center, tehran university of medical sciences, tehran, iran

objective: to compare the pregnancy outcomes achieved by in vitro fertilization (ivf) between minimal stimulation and conventional antagonist protocols in poor ovarian responders (pors). materials and methods: in this randomized controlled trial, 77 pors undergoing ivf were selected and divided into two groups. first group was the minimal stimulation group (n = 42) receiving 100 mg/day clomiphe...

Journal: :journal of advances in computer research 2014
azin azizifard mohamad qermezkon tahereh postizadeh hamid barati

today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when  there is a connection between user a and b, user a shoul...

Journal: :journal of computer and robotics 0
shahrzad shirazipourazad computer engineering department, amirkabir university of technology, tehran, iran

quorum-based power saving (qps) protocols allow “asynchronous” wireless hosts, operating in a multi-hop ad-hoc network, to tune to the low power mode conceived in ieee 802.11 mac standard. qps schemes guarantee that the wake-up schedule for every two neighboring hosts would ultimately overlap within a bounded latency so as to be able to accomplish their reciprocal “unicast” communications. a ma...

Journal: :international journal of environmental research 2015
r. alizadeh m. majidpour r. maknoon j. salimi

the aim of this paper is to assess the adaptation of iran’s energy policies to the kyoto protocol. in the past two decades, iran has experienced a considerable increase in greenhouse gas (ghg) emissions; in 2013 it was the world’s ninth largest emitter. although adapting to this protocol in iran’s energy and climate policies seems vital and urgent, its recent status is not promising. this paper...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید