نتایج جستجو برای: curve expert

تعداد نتایج: 201647  

2017

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

2005
Robert G. Valletta

The Beveridge curve depicts the empirical relationship between job vacancies and unemployment, which in turn reflects the underlying efficiency of the job matching process. Previous analyses of the Beveridge curve suggested deterioration in match efficiency during the 1970s and early 1980s, followed by improved match efficiency beginning in the late 1980s. This paper combines aggregate and regi...

2017

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

Journal: :Ultrasound in obstetrics & gynecology : the official journal of the International Society of Ultrasound in Obstetrics and Gynecology 2010
R Cruz-Martinez F Figueras O Moreno-Alvarez J M Martinez O Gomez E Hernandez-Andrade E Gratacos

OBJECTIVE To assess the learning curve for the fetal lung area to head circumference ratio (LHR) calculation in fetuses with congenital diaphragmatic hernia (CDH). METHODS Three trainees with the theoretical knowledge, but without prior experience in the LHR measurement, were selected. Each trainee and one experienced examiner measured the observed to expected (O/E)-LHR in the lung contralate...

2007
P. Abdolmaleki M. Gity

A hybrid genetic-neural (GA-ANN) model was designed to differentiate malignant from benign in a group of patients with histopathologically proved breast lesions on the base of BI-RADS descriptors and data derived independently from time-intensity curve. We used a database with 117 patients' records each of which consisted of 27 quantitative parameters mostly derived from time-intensity curve, 4...

Journal: :Revista medica de Chile 2004
Rogelio P González Ricardo M Gómez René S Castro Jyh Kae Nien Paulina O Merino Alejandra B Etchegaray Mario R Carstens Luis H Medina Paola G Viviani Iván T Rojas

BACKGROUND The World Health Organization recently defined the criteria for constructing birth weight curves using population based data. AIM To construct a national curve of weight, size and ponderal index at birth for Chile, following the criteria suggested by the World Health Organization (WHO) expert committee report from 1995. MATERIAL AND METHODS A national database from the Chilean Is...

2003

ID: 9182 Title: Automated Segmentation of the Prostrate from Transabdominal Ultrasound Images We are investigating the accuracy with which a unique, semi-automatic segmentation process can outline the prostate on transabdominal ultrasound images. We anticipate that the fully developed method will increase the efficiency and reproducibility of radiation treatment planning and delivery, and may p...

2017

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

2017

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

2018

In this research paper,the authors are addressing the problem of algorithms for Wireless LAN for Secured Transmission. This research work also proposes an overview of some of the major attacks that Blue tooth has faced over the years along with some possible solutions. The main aim of this research work is to investigate security features of Bluetooth using Elliptic Curve Cryptography(ECC). The...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید