نتایج جستجو برای: a.k.a.
تعداد نتایج: 1885 فیلتر نتایج به سال:
Background and purpose: Rheumatoid Arthritis (RA) is a systemic auto immune Rheumatoid diseases. Auto antibodies are detected in this disease, with diagnostic and prognostic properties. One of them is AKA which reacts with the fibrous keratin in epiderm and the stratum corneum of rat esophageal epithelium. Hence at first AKA – IFA kit was designed, then its sensitivety and specificity was me...
سابقه و هدف: آرتریت روماتویید از بیماری های روماتیسمی منتشر خود ایمن است. اتو آنتی بادی های کشف شده در این بیماری از نظر تشخیص و پیش آگهی با ارزش می باشند. یکی از این آنتی بادی ها، آنتی بادی ضد کراتین (aka). است که با کراتین فیبری در اپیدرم و ضمائم اپیدرمال و لایه های شاخی شده اپی تلیوم مری رت واکنش می دهد. ابتدا کیت aka-ifa طراحی، حساسیت و ویژگی آن محاسبه می شود سپس شیوع آنتی بادی را در بیمارا...
prosthetic joint infection (pji) is a serious complication of total knee arthroplasty (tka). control of infection after a failed two-stage tka is not always possible, and the resolution of infection may require an above-knee amputation (aka) or a the-knee (kf). the purpose of this review is to determine which treatment method (aka or kf) yields better function and ambulatory status for patients...
Prosthetic joint infection (PJI) is a serious complication of total knee arthroplasty (TKA). Control of infection after a failed two-stage TKA is not always possible, and the resolution of infection may require an above-knee amputation (AKA) or a the-knee (KF). The purpose of this review is to determine which treatment method (AKA or KF) yields better function and ambulatory status for patients...
In this paper, we propose an improved and efficient AKA protocol named “NS-AKA” to prevent the 3G UMTS networks from various attacks like man-in-the-middle attack, redirection attack, replay attack and active attacks in the corrupted UMTS networks. This protocol completely eliminates the need of synchronization between a mobile station and its home network, and protects the actual identity of e...
Identification, authentication and key agreement protocol of UMTS networks have some weaknesses to provide DoS-attack resistance, mutual freshness, and efficient bandwidth consumption. In this article we consider UMTS AKA and some other proposed schemes. Then we explain the known weaknesses in the previous frameworks suggested for UMTS AKA protocol. After that we propose a new UMTS AKA protocol...
This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the UMTS AKA authentication mechanism. AKA is based on symmetric keys, and runs typically in a UMTS Subscriber Identity Module, a smart card like device. AKA provides also backward compatibility to GSM authentication, making it possible to use EAP AKA for authentic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید