نتایج جستجو برای: implanted port
تعداد نتایج: 55379 فیلتر نتایج به سال:
Despite efficient carbon monitoring system and the commercialization of battery technology for intra-port transportation, port management are found not adopting these environmental yet costly equipments. Port authority who regulates environmental policies lacks leverage to impose tangible reduction on emission through concession. This model integrates sustainability into port equipment expansio...
a digital look-up table adaptive predistortion technique using a six-port receiver for power amplifier linearization is presented. the system is designed in ka-band for a dvb-s2 satellite link. we use a six-port receiver at the linearizationloop in place of classic heterodyne receivers. the six-port receiver is implemented by the use of passive microwavecircuits and detector diodes. this approa...
93 [1]. Unlike permanent devices that have to be implanted surgically under general anesthesia, percutaneous catheter-ports may be installed under local anesthesia, a benefit for the many cancer patients who have already undergone cancer surgery. The subclavian route is also an option; however, there exists a risk of pneumothorax, reported to be around 4%, and also other complications such as l...
Background: Laparoscopic Surgery (LS) may be associated with many port site complications such as hernia, bleeding, infection, subcutaneous emphysema and ugly scars. Some of these complications are serious such as obstructed port site hernia . Rate of these complications is low depending on size and site of the port incision, type of the trocar that it is used, the condition of the patient a...
Background and Objectives: In recent years, due to the strategic importance of Makran coastal zone and new economic approaches for this region, eastern coasts have been identified as development points in the country’s geography and Jask port is turned to be one the most suitable points for economic and commercial activities in this region. In the present paper, the strengths, weaknesses, thre...
شبکه های کامپیوتری و خدمات برخط ارائه شده بر روی آن همواره مستعد ابتلا به انواع حملات هستند. هر نوع از تهاجم، تهدیدی در مقابل حریم خصوصی، محرمانگی، تمامیت و دسترسی پذیری است، که بطور معمول شامل حملات شناسایی، دستیابی و از کار انداختن خدمات می شوند. لذا همواره جستجوی یک راهکار امن از اولویت های دنیای شبکه بوده و می باشد. دیوارة آتش یکی از ابزارهای متدوال امنیتی است که نقش حیاتی برای محافظت از شب...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید