نتایج جستجو برای: search protocols
تعداد نتایج: 391475 فیلتر نتایج به سال:
given preliminary evidence of timed, sequential chemotherapy of high dose cytosine arabinoside the current study was initiated to assess the side effects and efficacy of this regimen in patients with newly acute myelocytic leukemia (aml). nineteen adults who referred to hematology-oncology and bone marrow transplantation (bmt) research center of tehran university of medical sciences were enroll...
background:acute poisoning with organophosphorus (op) pesticides is a common method of suicide and entails considerable mortality in bangladesh. the objective of this study was to evaluate the effects and outcomes of a protocol for treatment of op poisoning that included titrated incremental atropine as loading dose and slow infusion for maintenance. methods:in this prospective descriptive cas...
the main objective of the current study is to investigate the impacts of environmental evolutionsat global scale on iran’s environmental planning. thereby, all political movements towards solving environmental issues in iran were accurately reviewed to find out the impressibility of the events by the global environmental evolutions. the findings indicated that iran has joined the conventions an...
The recent growth of the Internet and its increased het erogeneity have increased the complexity of network proto col design and testing In addition the advent of multipoint multicast based applications has introduced new challenges that are qualitatively di erent in nature than the traditional point to point protocols Multipoint applications typically in volve a group of participants simultane...
In their web search processes users apply multiple types of search strategies, which consist of different search tactics. This paper identifies eight types of information search strategies with associated cases based on sequences of search tactics during the information search process. Thirty-one participants representing the general public were recruited for this study. Search logs and verbal ...
Mobile agent systems incur resource overheads as they acquire and maintain knowledge about their network environment. This paper presents a technique that, for a speci c set of cases, optimises network resource consumption through dynamic selection of agent interaction protocols. This process is made possible through learning on the part of static knowledge agents, which can then predict the li...
The logical correctness of security protocols is important. So are efficiency and cost. This paper shows that meta-heuristic search techniques can be used to synthesise protocols that are both provably correct and satisfy various non-functional efficiency criteria. Our work uses a subset of the SVO logic, which we view as a specification language and proof system and also as a “protocol program...
Mobile agent systems incur resource overheads as they acquire and maintain knowledge about their network environment. This paper presents a technique that, for a speci c set of cases, optimises network resource consumption through dynamic selection of agent interaction protocols. This process is made possible through learning on the part of static knowledge agents, which can then predict the li...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید