نتایج جستجو برای: protocol

تعداد نتایج: 250013  

Ghahghaei Nezamabadi A, Rashidi B Shahrokh Tehraninegad E

Background: General concern is that the pregnancy rate is higher with GnRH-agonist as a protocol of pituitary suppression. GnRH-antagonist protocol provides a shorter period of administration and an easy flexible protocol. In this study, the outcomes of GnRH agonist and antagonist in ICSI cycles are compared in normo responder patients. Materials and Methods: In this randomized clinical trial, ...

Journal: :StemBook 2014

Journal: :Nature 2009

Journal: :Nature 2008

Journal: :Vestnik komp'iuternykh i informatsionnykh tekhnologii 2016

Journal: :British Dental Journal 2009

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

B. Abdolmaleki K. Baghery M. J. Emadi

The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...

Aghighi A Saharkhiz N, Tavasoli M

Background: The objective of this study is to evaluate the progesterone level (P Level) on the day of HCG triggering in GnRh agonist and antagonist protocols, and its correlation with clinical pregnancy rate and miscarriage rate. Premature luteinization during in vitro fertilization (IVF) was commonly happened before the introduction of GnRh analogues. High level of unwanted progesterone that i...

An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید