نتایج جستجو برای: attacks

تعداد نتایج: 57358  

Wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. Routing attacks on the networks, where a malicious node from sending data to the base station is perceived. In this article, a method that can be used to transfer the data securely to prevent attacks...

Journal: :iranian journal of child neurology 0
afshin fayyazi 1. department of pediatrics, hamedan university of medical sciences, hamedan, iran ali khajeh 2. department of pediatrics, children and adolescent health research center, zahedan university of medical sciences, zahedan, iran ahad ghazavi 3. department of pediatric neurology, urmia university of medical sciences, urmia, iran mahsha sangestani 4. hamedan university of medical sciences, iran

how to cite this article: fayyazi a, khajeh a, ghazavi a, sangestani m. omega 3 in childhood migraines; a double blind randomized clinical trial. iran j child neurol. winter 2016; 10(1):9-13. abstract objective the effect of using omega-3 to prevent migraine attacks has been raised in recent studies. the majority of these studies have been conducted in adults. conversely, other studies have yet...

Background Apnea of prematurity (AOP) is a developmental disorder that affects the premature newborns frequently. One of the new non-drug methods for controlling apnea attacks is olfactory stimulation. The aim of this study was to determine the effect of olfactory stimulation by vanilla on the rate of apnea attacks in neonates with AOP. Materials and Methods: This study is a single-blind random...

Based on historical data, wolf is one of the large carnivores which suffers from human-wildlife conflicts especially in the animal husbandry field. In this research we tried to model wolf attacks to the humans and livestocks in Ardabil Province, and give some relevant recommendations. Focusing on the wolf attacks data (both human and livestocks), recorded during 10 years (2004–2014), we carried...

Journal: :Electronic Notes in Theoretical Computer Science 2008

Journal: :international journal of smart electrical engineering 2013
elham yazdankhah fardad farokhi reza sabbaghi-nadooshan

wireless sensor networks, due to the characteristics of sensors such as wireless communication channels, the lack of infrastructure and targeted threats, are very vulnerable to the various attacks. routing attacks on the networks, where a malicious node from sending data to the base station is perceived. in this article, a method that can be used to transfer the data securely to prevent attacks...

Journal: :International Journal of Research in Engineering and Technology 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید