نتایج جستجو برای: attacks
تعداد نتایج: 57358 فیلتر نتایج به سال:
Recent works have shown that quantum period-finding can be used to break many popular constructions (some block ciphers such as Even-Mansour, multiple MACs and AEs...) in the superposition query model. So far, all broken exhibited a strong algebraic structure, which enables craft periodic function of single input block. Recovering secret period allows recover key, distinguish, confidentiality o...
Abstract Background and purpose: Migraine is a kind of primary headache that involves neurovascular system. Some studies have shown that obesity could affect the severity, frequency and duration of migraine attacks. This study aimed at investigating the association between anthropometric measurements and severity, frequency and duration of headache in patients with migraine. Material and me...
Background and Aim: Migraine headaches, start since adolescence, are often severe and lead to dysfunction in patients. This study was performed to determine the prevalence of migraine and its relationship with educational disability in adolescents of Birjand city in 2010. Materials and Methods: In this descriptive- analytical study, 723 adolescents were selected by cluster sampling metho...
conclusion these data indicate that while ce-mri will depict more positive results, there are cases in which dwi will show a positive result while ce-mri is negative. we suggest that the combination of these two imaging modalities might yield more positive results in diagnosing acute ms attack giving rise to a more accurate diagnosis. results ce-mri yielded positive results for 61 (87%) patient...
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
Abstract Background and Objectives: Today, it is expected that by using molecular nanoelectronic, the symptoms emitted from neurons will be studied. Many studies show that abnormalities in the normal functioning of brain cells can lead to neurological attacks. One of the most common brain system defects is epileptic seizures. In this case, due to the electrical discharge of a group of neurons,...
background as the field of off-road cycling is usually remote areas with limited access to medical care, off-road cyclists are at higher risk of animal attacks and related injuries. case presentation we report two cases of dog attacks in off-road cycling and discuss the basic principles in prevention and management of such incidents. the cyclists received all 5-dose regimen of the rabies vaccin...
Résumé. Nous présentons dans cet article un algorithme inductif semi-supervisé pour la tâche d’ordonnancement bipartite. Les algorithmes semi–supervisés proposés jusqu’à maintenant ont été étudiés dans le cadre strict de la classification. Récemment des travaux ont été réalisés dans le cadre transductif pour étendre les modèles existants en classification au cadre d’ordonnancement. L’originalit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید