Littérature scientifique sur le sujet « Safety protocol »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Safety protocol ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Safety protocol"
M Baiju, Nithya, Aboobacker Mohamed Rafi, Nittin Henry, Ramesh Bhaskaran, Susheela Jacob Innah et Athira Sasidharan. « Is It Time to Switch from Conventional Coombs Crossmatching to the Type and Screen Protocol ? » Malaysian Journal of Medical Sciences 30, no 2 (18 avril 2023) : 124–30. http://dx.doi.org/10.21315/mjms2023.30.2.11.
Texte intégralPARKER, BARBARA, et YVONNE ULRICH. « A Protocol of Safety ». Nursing Research 39, no 4 (juillet 1990) : 248???249. http://dx.doi.org/10.1097/00006199-199007000-00016.
Texte intégralKalla, G. N. « A protocol for safety ». Anaesthesia 42, no 6 (juin 1987) : 667. http://dx.doi.org/10.1111/j.1365-2044.1987.tb03101.x.
Texte intégralNeal-Kluever, April, Queenster Nartey, Jason Aungst, Federica Basso, Karen Davis-Bruno, Ikram Elayan, Jie Liu, Arippa Ravindran et Yen-Ching Wu. « Utility of generational developmental and reproductive toxicity and juvenile animal study protocols for the infant safety assessment of food contact materials ». Toxicology Research and Application 2 (1 janvier 2018) : 239784731880604. http://dx.doi.org/10.1177/2397847318806043.
Texte intégralDu, Jinze, Chengtai Gao et Tao Feng. « Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service ». Future Internet 15, no 1 (31 décembre 2022) : 24. http://dx.doi.org/10.3390/fi15010024.
Texte intégralPaterson, Barbara L., David Gregory et Sally Thorne. « A Protocol for Researcher Safety ». Qualitative Health Research 9, no 2 (mars 1999) : 259–69. http://dx.doi.org/10.1177/104973299129121820.
Texte intégralKishino, Maiko, Teppei Omori, Yukiko Takayama, Shinichi Nakamura et Katsutoshi Tokushige. « Safety protocol of endoscopic examinations ». Progress of Digestive Endoscopy 92, no 1 (15 juin 2018) : 59–63. http://dx.doi.org/10.11641/pde.92.1_59.
Texte intégralŠtohl, R., et K. Stibor. « Safety through Common Industrial Protocol ». IFAC Proceedings Volumes 45, no 7 (2012) : 362–65. http://dx.doi.org/10.3182/20120523-3-cz-3015.00069.
Texte intégralDarmaya, I. Gede, Kadek Ayu Ekasani et Ni Luh Supartini. « Penerapan Cleanliness Health Safety Environmental Sustainability di Sektor Pariwisata ». Jurnal Ilmiah Pariwisata dan Bisnis 2, no 9 (30 septembre 2023) : 1950–60. http://dx.doi.org/10.22334/paris.v2i9.530.
Texte intégralRohman, Hendra. « Health Protocol Implementation on Medical Record Document Management At Primary Health Centre ». JURNAL ILMU KESEHATAN BHAKTI SETYA MEDIKA 6, no 2 (25 décembre 2021) : 64–72. http://dx.doi.org/10.56727/bsm.v6i2.64.
Texte intégralThèses sur le sujet "Safety protocol"
Bennett, Jill M. « Assessing school preparedness an evaluation of a safety assessment protocol / ». Menomonie, WI : University of Wisconsin--Stout, 2007. http://www.uwstout.edu/lib/thesis/2007/2007bennettj.pdf.
Texte intégralNelson, Kevin R. « Critical analysis of XYZ Secondary School's technology education safety protocol ». Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.
Texte intégralMeireles, Tiago Hipkin. « Wireless protocols to support vehicular safety applications ». Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/16287.
Texte intégralIn the last decades the number of vehicles travelling in European road has raised significantly. Unfortunately, this brought a very high number of road accidents and consequently various injuries and fatalities. Even after the introduction of passive safety systems, such as seat belts, airbags, and some active safety systems, such as electronic brake system (ABS) and electronic stabilization (ESP), the number of accidents is still too high. Approximately eight per cent of the fatal accidents occur in motorways, in the Portuguese case, the number of fatalities has remained constant in the first decade of the 21st century. The evolution of wireless communications, along with the north-American and European policies that reserve spectrum near the 5,9GHz band for safety applications in the vehicular environment, has lead to the development of several standards. Many of these applications are based on the possibility of using a wireless communication system to warn drivers and passengers of events occurring on the road that can put at risk their own safety. Some examples of safety applications are the hard-brake warning, the wrong-way warning and the accident warning. This work aims to contribute in defining a communication protocol that guarantees the timely dissemination of safety critical events, occurring in scenarios with a high number of vehicles or in the neighbourhood of so called motorway “blackspots”, to all vehicles in the zone of interest. To ensure information integrity and user trust, the proposed system is based on the motorway infrastructure, which will validate all events reported by the vehicles with the usage of several means, such as video surveillance or other sensors. The usage of motorway infrastructure that has full motorway coverage using fixed stations also known as road side units, allows to have a global vision of the interest zone, avoiding the problems associated to networks that depend solely on vehicle to vehicle communication, generally total ad-hoc networks. By using the infrastructure, it is possible to control medium access, avoiding possible badly intended intrusions and also avoiding the phenomenon known as alarm showers or broadcast storm that occur when all vehicles want to simultaneously access the medium to warn others of a safety event. The thesis presented in this document is that it is possible to guarantee in time information about safety events, using an architecture where the road side units are coordinated among themselves, and communicate with on board units (in vehicles) that dynamically register and deregister from the system. An exhaustive and systematic state of the art of safety applications and related research projects is done, followed by a study on the available wireless communications standards that are able to support them. The set of standards IEEE802.11p and ETSI-G5 was created for this purpose and is found to be the more adequate, but care is taken to define a scenario where WAVE enabled and non-enabled vehicles can coexist. The WAVE medium access control protocol suffers from collision problems that do not guarantee a bounded delay, therefore a new protocol (V-FTT) is proposed, based on the adaptation of the Flexible Time Triggered protocol to the vehicular field. A theoretical analysis of the V-FTT applied to WAVE and ETSI-G5 is done, including quantifying a real scenario based on the A5 motorway from Lisbon to Cascais, one of the busiest Portuguese motorways. We conclude the V-FTT protocol is feasible and guarantees a bounded delay.
Nas últimas décadas tem-se assistido a um aumento do número de veículos a circular nas vias rodoviárias europeias, trazendo consigo um elevado número de acidentes e como consequência muitos feridos e vítimas mortais. Apesar da introdução de sistemas de segurança passivos, tais como cintos de segurança, airbags e de alguns sistemas de segurança activos, tais como o sistema electrónico de travagem (ABS) e o sistema electrónico de estabilidade (ESP), o número de acidentes continua a ser demasiado elevado. Aproximadamente oito por cento dos acidentes fatais na Europa ocorrem em auto-estradas, no caso Português, o número de vítimas mortais tem-se mantido constante ao longo da primeira década do século XXI. A evolução das comunicações sem fios, acompanhada de políticas europeias e norte-americanas no sentido de reservar frequências próximas dos 5,9GHz para aplicações de segurança no ambiente veicular, levou à especificação de várias normas. A maior parte destas aplicações baseiam-se na possibilidade de usar um sistema confiável de comunicação sem fios para alertar os condutores e passageiros de veículos para eventos ocorridos nas estradas que possam colocar em risco a sua segurança. Exemplos de aplicações de segurança crítica são o aviso de travagem brusca, o aviso de veículo em contra mão e o aviso de acidente na estrada. Este trabalho contribui para a definição de protocolos de comunicação capazes de garantir que a informação sobre eventos relacionados com situações de segurança crítica, que ocorram em cenários com um elevado número de veículos em zonas urbanas ou na vizinhança dos chamados “pontos negros” das auto-estradas, é disseminada com pontualidade por todos os veículos localizados na zona de interesse Por uma questão da integridade das comunicações e confiança dos condutores, o sistema proposto baseia-se na infra-estrutura do concessionário da auto-estrada, que validará os eventos reportados pelos veículos usando vários meios à sua disposição, como por exemplo sistemas de videovigilância e outros sensores. O uso de uma infra-estrutura de comunicações, que dispõe de cobertura integral a partir de estações fixas, permite uma visão global da zona coberta, evitando os problemas associados a redes baseadas apenas na comunicação entre veículos, que são em geral totalmente ad-hoc. O uso da infra-estrutura permite, entre outras vantagens, controlar o acesso ao meio, evitando simultaneamente intrusões de estranhos ao sistema e o fenómeno conhecido como “chuva de alarmes” desencadeado quando todos os veículos querem aceder simultaneamente ao meio para avisar os restantes da existência dum evento de segurança crítica. A tese apresentada neste documento defende que é possível garantir informação atempada sobre eventos que põem em risco a segurança dos veículos a partir de uma arquitectura de interligação entre as estações de comunicações fixas, coordenadas entre si, e unidades móveis (veículos) que se registam e se desligam dinamicamente do sistema. Nesta tese faz-se um levantamento exaustivo e sistemático das aplicações de segurança abordando projectos de investigação relacionados, estudam-se as tecnologias de comunicação sem fios disponíveis e a sua possibilidade de suportar aplicações de segurança rodoviária. Desta análise, conclui-se que a norma norte americana WAVE/IEEE802.11p e a europeia ETSI-G5, criadas especificamente para o efeito são as que mais se adequam à finalidade desejada. Considera-se que o cenário de utilização é evolutivo, podendo coexistirem veículos que não dispõem de sistemas de comunicação com outros que suportam a norma WAVE. Dado que o protocolo de acesso ao meio proposto pela norma WAVE não garante um acesso determinístico ao meio partilhado, propõe-se um novo protocolo, o Vehicular Flexible Time-Triggered protocol (VFTT). Faz-se a análise teórica da viabilidade do protocolo proposto para a norma WAVE e respectiva norma europeia (ETSI-G5). Quantifica-se o protocolo VFTT para um cenário real: a auto-estrada A5 Lisboa-Cascais, uma das autoestradas portuguesas mais movimentadas. Conclui-se que o protocolo é viável e garante um atraso restringido temporalmente.
Xie, Hong. « A Protocol Stack in TinyTimber for PIEs that Cooperate for Traffic Safety ». Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17541.
Texte intégralFoster, Nathalie Louise. « The application of software and safety engineering techniques to security protocol development ». Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.
Texte intégralLorenzen, Torsten [Verfasser]. « Design of an adaptive congestion control protocol for reliable vehicle safety communication / Torsten Lorenzen ». Hannover : Technische Informationsbibliothek (TIB), 2018. http://d-nb.info/1166077322/34.
Texte intégralAlsubaihi, Badr. « Semantic and Self-Decision Geocast Protocol for Data Dissemination over Vehicle Ad Hoc Network ». Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31783.
Texte intégralRasoamanana, Aina Toky. « Derivation and Analysis of Cryptographic Protocol Implementation ». Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS005.
Texte intégralTLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus on a specific class of vulnerabilities affecting both protocols implementations, state machine errors. These vulnerabilities are caused by differences in interpreting the standard and correspond to deviations from the specifications, e.g. accepting invalid messages, or accepting valid messages out of sequence.We develop a generalized and systematic methodology to infer the protocol state machines such as the major TLS and SSH stacks from stimuli and observations, and to study their evolution across revisions. We use the L* algorithm to compute state machines corresponding to different execution scenarios.We reproduce several known vulnerabilities (denial of service, authentication bypasses), and uncover new ones. We also show that state machine inference is efficient and practical enough in many cases for integration within a continuous integration pipeline, to help find new vulnerabilities or deviations introduced during development.With our systematic black-box approach, we study over 600 different versions of server and client implementations in various scenarios (protocol versions, options). Using the resulting state machines, we propose a robust algorithm to fingerprint TLS and SSH stacks. To the best of our knowledge, this is the first application of this approach on such a broad perimeter, in terms of number of TLS and SSH stacks, revisions, or execution scenarios studied
Sjödin, Andreas, et Marcus Gruneau. « The ADS-B protocol and its'weaknesses : Exploring potential attack vectors ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.
Texte intégralThe ADS-B protocol is currently in use all around the world. The purpose behind the protocol is to give pilots and traffic control a better picture of the situation in the air. Previous research shows that there exists a vulnerability in the protocol since it lacks authentication. The protocol is solely built upon trust between sender and receiver.Our work is inspired by previous studies made in the area, where it has been demonstrated that one can inject fake aircraft by sending fake ADS-B data using the protocol. The purpose behind this report was to perform a penetration test according to the OSSTMM3, a manual on how to perform scientific penetration tests.We wanted to test a real product (ADS-B receiver) made for pilots and measure if we could manipulate the environment presented to the pilot.Our testing shows that the receiver blindly trusts the protocol without any data validation. We managed to inject fake static aircraft just like previous researchers have done, but also move them around in the environment in a way that breaks the laws of physics and flood the device with fake data, effectively denying the service provided.Since we managed to deny the service, which is to give the user a correct picture of the nearby air traffic, we feel like our tests were successful.
Umeno, Shinya. « Proving safety properties of an aircraft landing protocol using timed and untimed I/O automata : a case study ». Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38920.
Texte intégralPage 222 blank.
Includes bibliographical references (p. 195-196).
This thesis presents an assertional-style verification of the aircraft landing protocol of NASA's SATS (Small Aircraft Transportation System) concept of operation using the timed and untimed I/O automata frameworks. We construct two mathematical models of the landing protocol using the above stated frameworks. First, we study a discrete model of the protocol, in which the airspace of the airport and every movement of the aircraft are all discretized. The model is constructed by reconstructing a mathematical model presented in using the untimed I/O automata framework. Using this model, we verify the safe separation of aircraft in terms of the bounds on the numbers of aircraft in specific discretized areas. In addition, we translate this I/O automaton model into a corresponding PVS specification, and conduct a machine verification of the proof using the PVS theorem prover. Second, we construct a continuous model of the protocol by extending the discrete model using the timed I/O automata framework. A refinement technique has been developed to reason about the external behavior between two systems. We present a new refinement proof technique, a weak refinement using a step invariant.
(cont.) Using this new refinement, we carry over the verification results for the discrete model to the new model, and thus guarantee that the safe separation of aircraft verified for the discrete model also holds for the new model. We also prove properties specific to the new model, such as a lower bound on the spacing of aircraft in a specific area of the airport, using an invariant-proof technique.
by Shinya Umeno.
S.M.
Livres sur le sujet "Safety protocol"
Association, American Industrial Hygiene. Laboratory chemical hygiene : An AIHA protocol guide. Fairfax, VA : American Industrial Hygiene Association, 1995.
Trouver le texte intégralAssociation, American Industrial Hygiene, dir. Confined space entry : An AIHA protocol guide. Fairfax, Va : American Industrial Hygiene Association, 1995.
Trouver le texte intégralAssociation, American Industrial Hygiene, dir. Confined space entry : An AIHA protocol guide. Fairfax, Va : American Industrial Hygiene Association, 2001.
Trouver le texte intégralUnited States. Occupational Safety and Health Administration. Directorate of Compliance Programs, dir. Protocol for safety and health inspections at Superfund incinerator sites. Washington, D.C. (200 Constitution Ave., N.W., Washington 20210) : Occupational Safety and Health Administration, Directorate of Compliance Programs, 1994.
Trouver le texte intégralInc, Joint Commission Resources, dir. Compliance strategies for the Universal Protocol. Oakbrook Terrance, Ill : Joint Commission Resources, 2007.
Trouver le texte intégralUnion, Barbados Workers'. Protocol Four of the Social Partnership 2001-2004. [Bridgetown, Barbados] : Barbados Workers' Union, 2002.
Trouver le texte intégral1969-, Rudnick Lisa B., et United Nations Institute for Disarmament Research, dir. The security needs assessment protocol : Improving operational effectiveness through community security. New York : United Nations, 2008.
Trouver le texte intégralLegal aspects of implementing the Cartagena Protocol on Biosafety. Cambridge : Cambridge University Press, 2012.
Trouver le texte intégralRuth, Mackenzie, Ascencio Alfonso, International Union for Conservation of Nature and Natural Resources., IUCN Environmental Law Centre, Foundation for International Environmental Law and Development. et World Resources Institute, dir. An explanatory guide to the Cartagena Protocol on Biosafety. Gland, Switzerland : IUCN in collaboration with FIELD and WRI, 2003.
Trouver le texte intégralEuropean agreement concerning the international carriage of dangerous goods byroad (ADR) and protocol of signature, done at Geneva on 30 September 1957. New York : United Nations, 1996.
Trouver le texte intégralChapitres de livres sur le sujet "Safety protocol"
Spry, J. Andy. « Sample Safety Assessment Protocol ». Dans Encyclopedia of Astrobiology, 1. Berlin, Heidelberg : Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27833-4_5576-1.
Texte intégralSpry, J. Andy. « Sample Safety Assessment Protocol ». Dans Encyclopedia of Astrobiology, 2713–14. Berlin, Heidelberg : Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-662-65093-6_5576.
Texte intégralStahel, Philip F. « The Universal Protocol : Pitfalls and Pearls ». Dans Patient Safety in Surgery, 175–84. London : Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-4369-7_14.
Texte intégralCansanção, Alvaro, Alexandra Condé-Green, Joshua A. David et Bianca Ohana. « Liposuction : Clinical Management and Safety Protocol ». Dans Gluteal Fat Augmentation, 57–63. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-58945-5_8.
Texte intégralLi, Mushu, Jie Gao, Xuemin Shen et Lian Zhao. « Protocol Design for Safety Message Broadcast ». Dans SpringerBriefs in Computer Science, 17–48. Cham : Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22860-5_3.
Texte intégralCirisci, Berk, Constantin Enea et Suha Orhun Mutluergil. « Quorum Tree Abstractions of Consensus Protocols ». Dans Programming Languages and Systems, 337–62. Cham : Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_13.
Texte intégralBanno, Ryotaro, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga et Kohei Suenaga. « Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption ». Dans Computer Aided Verification, 447–68. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_22.
Texte intégralWang, Dongfeng, Qinghua Li, Fengyin Li, Quanxin Zhang et Banghai Xu. « Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain ». Dans Cyberspace Safety and Security, 274–78. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_22.
Texte intégralZhu, Haojia, Can Cui, Fengyin Li, Zhongxing Liu et Quanxin Zhang. « Design of Anonymous Communication Protocol Based on Group Signature ». Dans Cyberspace Safety and Security, 175–81. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_15.
Texte intégralShen, Jian, Jun Shen, Chen Wang et Anxi Wang. « A Fibonacci Based Batch Auditing Protocol for Cloud Data ». Dans Cyberspace Safety and Security, 215–22. Cham : Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69471-9_16.
Texte intégralActes de conférences sur le sujet "Safety protocol"
Stohl, Radek, et Karel Stibor. « Safety through Common Industrial Protocol ». Dans 2013 14th International Carpathian Control Conference (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/carpathiancc.2013.6560585.
Texte intégralDariz, Luca, Gianpiero Costantino et Ilaria Matteucci. « Full-protocol safety analysis of CINNAMON ». Dans 2022 IEEE 95th Vehicular Technology Conference (VTC2022-Spring). IEEE, 2022. http://dx.doi.org/10.1109/vtc2022-spring54318.2022.9860714.
Texte intégralMegyesi, D., J. Lesko et M. Schreiner. « Evaluation of multihop UAV communication model based on protocol-independent and protocol-dependent methods ». Dans 2019 Modern Safety Technologies in Transportation (MOSATT). IEEE, 2019. http://dx.doi.org/10.1109/mosatt48908.2019.8944102.
Texte intégralMakanda, Kondwani, et Jun-Cheol Jeon. « Efficient Two-Party Quantum Secret Key-Sharing Protocol ». Dans Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.109.03.
Texte intégralFarias, Suzi Maria Fernandes de, Daniel Aragão Machado, Carlos Luiz Dias et Flávio Vaz Machado. « Analgosedation protocol in adult intensive care units : Multidisciplinary approach with a focus on patient safety ». Dans V Seven International Multidisciplinary Congress. Seven Congress, 2024. http://dx.doi.org/10.56238/sevenvmulti2024-138.
Texte intégralHeinrich, Markus, Jannik Vieten, Tolga Arul et Stefan Katzenbeisser. « Security Analysis of the RaSTA Safety Protocol ». Dans 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2018. http://dx.doi.org/10.1109/isi.2018.8587371.
Texte intégralLehmann, Bernd, et Lars Wolf. « Safety Analysis of a Maneuver Coordination Protocol ». Dans 2020 IEEE Vehicular Networking Conference (VNC). IEEE, 2020. http://dx.doi.org/10.1109/vnc51378.2020.9318359.
Texte intégralYoo, Hongseok, Jinhong Kim et Dongkyun Kim. « A dynamic safety interval protocol for VANETs ». Dans the 2012 ACM Research in Applied Computation Symposium. New York, New York, USA : ACM Press, 2012. http://dx.doi.org/10.1145/2401603.2401650.
Texte intégralWang, Zhanjie, Hailong Wang, Kai He, Dexin Sun et Xiaobin Chen. « A safety-critical real-time network protocol ». Dans 2008 IEEE International Conference on Granular Computing (GrC-2008). IEEE, 2008. http://dx.doi.org/10.1109/grc.2008.4664754.
Texte intégralSteenbruggen, I., et P. De Laat. « Methacholine challenge : Safety of the quadrupling protocol ». Dans ERS International Congress 2022 abstracts. European Respiratory Society, 2022. http://dx.doi.org/10.1183/13993003.congress-2022.1063.
Texte intégralRapports d'organisations sur le sujet "Safety protocol"
Brand, L., D. Cautley, D. Bohac, P. Francisco, L. Shen et S. Gloss. Combustion Safety Simplified Test Protocol Field Study. Office of Scientific and Technical Information (OSTI), novembre 2015. http://dx.doi.org/10.2172/1225414.
Texte intégralBrand, L., D. Cautley, D. Bohac, P. Francisco, L. Shen et S. Gloss. Combustion Safety Simplified Test Protocol Field Study. Office of Scientific and Technical Information (OSTI), novembre 2015. http://dx.doi.org/10.2172/1226482.
Texte intégralBurgess, R., C. Blake et C. E. Tracy. Test Protocol Document, Hydrogen Safety Sensor Testing ; Phase I : Non-Flammable Mixtures. Office of Scientific and Technical Information (OSTI), septembre 2008. http://dx.doi.org/10.2172/938567.
Texte intégralMsuha, Basil, Luitfred D. Kissoly et Arnold Kihaule. Design and implementation of Social Safety Nets in Tanzania : A protocol for a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, août 2022. http://dx.doi.org/10.37766/inplasy2022.8.0074.
Texte intégralChoi, Geunjoo, HyoJin Kim et Hyun Kang. Comparison of efficacy and safety of perioperaive sufentanil and remifentanil : a protocol for systematic review and meta-analysis protocol and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, juillet 2022. http://dx.doi.org/10.37766/inplasy2022.7.0070.
Texte intégralWang, Zhao, Fengting Zhai, Xiaomin Zhao, Guizhi Zhao, Na Li, Fang Zhang et Jinxing Liu. The efficacy and safety of acupuncture for perimenopausal insomnia : a network meta-analysis protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, novembre 2020. http://dx.doi.org/10.37766/inplasy2020.11.0047.
Texte intégralYan, Huixin, Yun An, Tao Zhao, Jiangna Zhao et Juntao Yan. Therapeutic effect and safety of Tuina on Sciatica : A protocol for systematic review and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, octobre 2021. http://dx.doi.org/10.37766/inplasy2021.10.0034.
Texte intégralZhou, Zhongyu. Efficacy and safety of Moxibustion for obesity A protocol for systematic review and meta analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, novembre 2020. http://dx.doi.org/10.37766/inplasy2020.11.0140.
Texte intégralHuang, Chunhua, Rongfang Xie, Liting Liu et Ruiqi Wang. Efficacy and safety of Buzhong-Yiqi Decoction for Myasthenia gravis:study protocol for a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, mai 2020. http://dx.doi.org/10.37766/inplasy2020.5.0080.
Texte intégralZhang, Zhi-hui, Lei Yin, Ling-ling Zhang et Jing Song. Efficacy and safety of Bacillus Calmette-Guerin for bladder cancer : A protocol of systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, juillet 2020. http://dx.doi.org/10.37766/inplasy2020.7.0042.
Texte intégral