نتایج جستجو برای: study protocol

تعداد نتایج: 4128694  

Journal: :journal of family and reproductive health 0
shamim pilehvari reproductive health research center, tehran university of medical sciences, tehran, iran ensieh shahrokh tehraninejad reproductive health research center, tehran university of medical sciences, tehran, iran batool hosseinrashidi reproductive health research center, tehran university of medical sciences, tehran, iran fatemeh keikhah reproductive health research center, tehran university of medical sciences, tehran, iran fedyeh haghollahi reproductive health research center, tehran university of medical sciences, tehran, iran elham aziminekoo reproductive health research center, tehran university of medical sciences, tehran, iran

objective: to compare the pregnancy outcomes achieved by in vitro fertilization (ivf) between minimal stimulation and conventional antagonist protocols in poor ovarian responders (pors). materials and methods: in this randomized controlled trial, 77 pors undergoing ivf were selected and divided into two groups. first group was the minimal stimulation group (n = 42) receiving 100 mg/day clomiphe...

Journal: :journal of advances in computer research 2014
azin azizifard mohamad qermezkon tahereh postizadeh hamid barati

today, optimal performance and cost advantages of using internet telephony are obvious. despite current standardized techniques, voice transferring through protocol (voip) has lower security than traditional telephony. one of the most important security issues which should be noticed in using voip is end -to-end user2 identity, i.e. when  there is a connection between user a and b, user a shoul...

Journal: :journal of computer and robotics 0
shahrzad shirazipourazad computer engineering department, amirkabir university of technology, tehran, iran

quorum-based power saving (qps) protocols allow “asynchronous” wireless hosts, operating in a multi-hop ad-hoc network, to tune to the low power mode conceived in ieee 802.11 mac standard. qps schemes guarantee that the wake-up schedule for every two neighboring hosts would ultimately overlap within a bounded latency so as to be able to accomplish their reciprocal “unicast” communications. a ma...

Journal: :international journal of environmental research 2015
r. alizadeh m. majidpour r. maknoon j. salimi

the aim of this paper is to assess the adaptation of iran’s energy policies to the kyoto protocol. in the past two decades, iran has experienced a considerable increase in greenhouse gas (ghg) emissions; in 2013 it was the world’s ninth largest emitter. although adapting to this protocol in iran’s energy and climate policies seems vital and urgent, its recent status is not promising. this paper...

Journal: :journal of english language teaching and learning 2013
zia tajeddin elham yazdanmehr

this study aims to delve into the unobservable dimensions of deciding and acting in a pragmatically significant speech event. utilizing a discourse completion test questionnaire, it seeks to find out the structure and pragmatic functions that lie behind efl learners’ choice of specific wording while engaged in performing a recurrent speech act in iran i.e. compliments. to this aim, 30 efl learn...

Journal: :iranian journal of blood and cancer 0

background: bone sarcomas are the most common malignancies of bone tissues in children, and are classified intotwo groups as osteosarcoma and ewing’s sarcoma. treatment and prognosis depend on the subtype and grade ofthe tumor. the goal of this study was to evaluate the features bone sarcoma in patients referred to mahak childrenhospital since 2007 to 2009.materials and methods: this was a retr...

Journal: :international journal of electrical and electronics engineering 0
mohammad javad emadi amirkabir university of technology behzad abdolmaleki information systems and security laboratory (issl), sharif university of technology, tehran, iran karim baghery information systems and security laboratory (issl), sharif university of technology, tehran, iran

as a response to a growing interest in rfid systems such as internet of things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. hence, authentication protocols to increase security and privacy in rfid applications have gained much attention in the literature. in this study, security and privac...

Journal: :European Journal of Hospital Pharmacy 2020

Ali Amanati, Zahra Razavi,

OBJECTIVES: To evaluate the effect of two simultaneous protocols in reducing recovery time and assessment of adverse effects of different fluid replacement therapy in management of diabetic ketoacidosis. MATERIALS AND METHODS: In this randomized clinical trial study, two standard protocols were chosen to evaluate recovery time and incidence of DKA complications. RESULTS: 18 subjects who had ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید