نتایج جستجو برای: bilateral authentication
تعداد نتایج: 117646 فیلتر نتایج به سال:
identification, authentication and quality control are essential to ensure safety, therapeutic potency, efficacy and reproducible quality of herbal medicines. The aim of this study is to use taxonomic method for authentication of traditional herbal drugs which are commonly sold in herbal shops in Iran. In this regard, twenty-seven cases of herbal drugs suspected to be adulterated were investiga...
hemimelia as a congenital anomaly is a failure of development of extremities formation in embryonic period. this anomaly is defined as complete absence of the part of extremities and different forms were explained for hemimelia. adactyly is an alternative name for transverse hemimelia and is a rare disorder in the most of animal species. a two months old male lamb with normal vital signs was re...
simultaneous fractures of the femoral neck and shaft are not common injuries, though they cannot be considered rare. herein, we report our experience with a patient with bilateral occurance of this injury. up to the best of our knowkedge this is the first case reported in literature in which correct diagnosis was made initially. both femurs were fixed using broad 4.5 mm dynamic compression plat...
the male breast cancer (mbc) is a very rare neoplasm which accounts for 0.5-1% of the total cases of breast cancer. bilateral involvement is reported to occur in fewer than 2% of all the diagnosed cases of mbc, and synchronous tumors are very rare. because of its rarity, little is known about mbc etiology, its clinical findings and treatment. most patients present with a painless breast mass. t...
The purpose of this paper is to present the design for providing security and higher authentication scheme for executing secure data transaction in an Organization field over Internet. There has been incessant change in technology day by day, so security mechanisms like authentication schemes are also required to be updated. Authentication schemes that involve more than single level for authent...
Remote EAP-SIM authentication has an overwhelming impact on the authentication delay. RADIUS protocol can be used for local authentication which reduces authentication latency. However, in case of EAP-SIM authentication, where triplets are to be retrieved from a remote authentication gateway (AuC), this does not help much. An Improved EAP-SIM authentication method was proposed in [2]. In this p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید