Gotowa bibliografia na temat „Safety protocol”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Safety protocol”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Safety protocol"
M Baiju, Nithya, Aboobacker Mohamed Rafi, Nittin Henry, Ramesh Bhaskaran, Susheela Jacob Innah i Athira Sasidharan. "Is It Time to Switch from Conventional Coombs Crossmatching to the Type and Screen Protocol?" Malaysian Journal of Medical Sciences 30, nr 2 (18.04.2023): 124–30. http://dx.doi.org/10.21315/mjms2023.30.2.11.
Pełny tekst źródłaPARKER, BARBARA, i YVONNE ULRICH. "A Protocol of Safety". Nursing Research 39, nr 4 (lipiec 1990): 248???249. http://dx.doi.org/10.1097/00006199-199007000-00016.
Pełny tekst źródłaKalla, G. N. "A protocol for safety". Anaesthesia 42, nr 6 (czerwiec 1987): 667. http://dx.doi.org/10.1111/j.1365-2044.1987.tb03101.x.
Pełny tekst źródłaNeal-Kluever, April, Queenster Nartey, Jason Aungst, Federica Basso, Karen Davis-Bruno, Ikram Elayan, Jie Liu, Arippa Ravindran i Yen-Ching Wu. "Utility of generational developmental and reproductive toxicity and juvenile animal study protocols for the infant safety assessment of food contact materials". Toxicology Research and Application 2 (1.01.2018): 239784731880604. http://dx.doi.org/10.1177/2397847318806043.
Pełny tekst źródłaDu, Jinze, Chengtai Gao i Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service". Future Internet 15, nr 1 (31.12.2022): 24. http://dx.doi.org/10.3390/fi15010024.
Pełny tekst źródłaPaterson, Barbara L., David Gregory i Sally Thorne. "A Protocol for Researcher Safety". Qualitative Health Research 9, nr 2 (marzec 1999): 259–69. http://dx.doi.org/10.1177/104973299129121820.
Pełny tekst źródłaKishino, Maiko, Teppei Omori, Yukiko Takayama, Shinichi Nakamura i Katsutoshi Tokushige. "Safety protocol of endoscopic examinations". Progress of Digestive Endoscopy 92, nr 1 (15.06.2018): 59–63. http://dx.doi.org/10.11641/pde.92.1_59.
Pełny tekst źródłaŠtohl, R., i K. Stibor. "Safety through Common Industrial Protocol". IFAC Proceedings Volumes 45, nr 7 (2012): 362–65. http://dx.doi.org/10.3182/20120523-3-cz-3015.00069.
Pełny tekst źródłaDarmaya, I. Gede, Kadek Ayu Ekasani i Ni Luh Supartini. "Penerapan Cleanliness Health Safety Environmental Sustainability di Sektor Pariwisata". Jurnal Ilmiah Pariwisata dan Bisnis 2, nr 9 (30.09.2023): 1950–60. http://dx.doi.org/10.22334/paris.v2i9.530.
Pełny tekst źródłaRohman, Hendra. "Health Protocol Implementation on Medical Record Document Management At Primary Health Centre". JURNAL ILMU KESEHATAN BHAKTI SETYA MEDIKA 6, nr 2 (25.12.2021): 64–72. http://dx.doi.org/10.56727/bsm.v6i2.64.
Pełny tekst źródłaRozprawy doktorskie na temat "Safety protocol"
Bennett, Jill M. "Assessing school preparedness an evaluation of a safety assessment protocol /". Menomonie, WI : University of Wisconsin--Stout, 2007. http://www.uwstout.edu/lib/thesis/2007/2007bennettj.pdf.
Pełny tekst źródłaNelson, Kevin R. "Critical analysis of XYZ Secondary School's technology education safety protocol". Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.
Pełny tekst źródłaMeireles, Tiago Hipkin. "Wireless protocols to support vehicular safety applications". Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/16287.
Pełny tekst źródłaIn the last decades the number of vehicles travelling in European road has raised significantly. Unfortunately, this brought a very high number of road accidents and consequently various injuries and fatalities. Even after the introduction of passive safety systems, such as seat belts, airbags, and some active safety systems, such as electronic brake system (ABS) and electronic stabilization (ESP), the number of accidents is still too high. Approximately eight per cent of the fatal accidents occur in motorways, in the Portuguese case, the number of fatalities has remained constant in the first decade of the 21st century. The evolution of wireless communications, along with the north-American and European policies that reserve spectrum near the 5,9GHz band for safety applications in the vehicular environment, has lead to the development of several standards. Many of these applications are based on the possibility of using a wireless communication system to warn drivers and passengers of events occurring on the road that can put at risk their own safety. Some examples of safety applications are the hard-brake warning, the wrong-way warning and the accident warning. This work aims to contribute in defining a communication protocol that guarantees the timely dissemination of safety critical events, occurring in scenarios with a high number of vehicles or in the neighbourhood of so called motorway “blackspots”, to all vehicles in the zone of interest. To ensure information integrity and user trust, the proposed system is based on the motorway infrastructure, which will validate all events reported by the vehicles with the usage of several means, such as video surveillance or other sensors. The usage of motorway infrastructure that has full motorway coverage using fixed stations also known as road side units, allows to have a global vision of the interest zone, avoiding the problems associated to networks that depend solely on vehicle to vehicle communication, generally total ad-hoc networks. By using the infrastructure, it is possible to control medium access, avoiding possible badly intended intrusions and also avoiding the phenomenon known as alarm showers or broadcast storm that occur when all vehicles want to simultaneously access the medium to warn others of a safety event. The thesis presented in this document is that it is possible to guarantee in time information about safety events, using an architecture where the road side units are coordinated among themselves, and communicate with on board units (in vehicles) that dynamically register and deregister from the system. An exhaustive and systematic state of the art of safety applications and related research projects is done, followed by a study on the available wireless communications standards that are able to support them. The set of standards IEEE802.11p and ETSI-G5 was created for this purpose and is found to be the more adequate, but care is taken to define a scenario where WAVE enabled and non-enabled vehicles can coexist. The WAVE medium access control protocol suffers from collision problems that do not guarantee a bounded delay, therefore a new protocol (V-FTT) is proposed, based on the adaptation of the Flexible Time Triggered protocol to the vehicular field. A theoretical analysis of the V-FTT applied to WAVE and ETSI-G5 is done, including quantifying a real scenario based on the A5 motorway from Lisbon to Cascais, one of the busiest Portuguese motorways. We conclude the V-FTT protocol is feasible and guarantees a bounded delay.
Nas últimas décadas tem-se assistido a um aumento do número de veículos a circular nas vias rodoviárias europeias, trazendo consigo um elevado número de acidentes e como consequência muitos feridos e vítimas mortais. Apesar da introdução de sistemas de segurança passivos, tais como cintos de segurança, airbags e de alguns sistemas de segurança activos, tais como o sistema electrónico de travagem (ABS) e o sistema electrónico de estabilidade (ESP), o número de acidentes continua a ser demasiado elevado. Aproximadamente oito por cento dos acidentes fatais na Europa ocorrem em auto-estradas, no caso Português, o número de vítimas mortais tem-se mantido constante ao longo da primeira década do século XXI. A evolução das comunicações sem fios, acompanhada de políticas europeias e norte-americanas no sentido de reservar frequências próximas dos 5,9GHz para aplicações de segurança no ambiente veicular, levou à especificação de várias normas. A maior parte destas aplicações baseiam-se na possibilidade de usar um sistema confiável de comunicação sem fios para alertar os condutores e passageiros de veículos para eventos ocorridos nas estradas que possam colocar em risco a sua segurança. Exemplos de aplicações de segurança crítica são o aviso de travagem brusca, o aviso de veículo em contra mão e o aviso de acidente na estrada. Este trabalho contribui para a definição de protocolos de comunicação capazes de garantir que a informação sobre eventos relacionados com situações de segurança crítica, que ocorram em cenários com um elevado número de veículos em zonas urbanas ou na vizinhança dos chamados “pontos negros” das auto-estradas, é disseminada com pontualidade por todos os veículos localizados na zona de interesse Por uma questão da integridade das comunicações e confiança dos condutores, o sistema proposto baseia-se na infra-estrutura do concessionário da auto-estrada, que validará os eventos reportados pelos veículos usando vários meios à sua disposição, como por exemplo sistemas de videovigilância e outros sensores. O uso de uma infra-estrutura de comunicações, que dispõe de cobertura integral a partir de estações fixas, permite uma visão global da zona coberta, evitando os problemas associados a redes baseadas apenas na comunicação entre veículos, que são em geral totalmente ad-hoc. O uso da infra-estrutura permite, entre outras vantagens, controlar o acesso ao meio, evitando simultaneamente intrusões de estranhos ao sistema e o fenómeno conhecido como “chuva de alarmes” desencadeado quando todos os veículos querem aceder simultaneamente ao meio para avisar os restantes da existência dum evento de segurança crítica. A tese apresentada neste documento defende que é possível garantir informação atempada sobre eventos que põem em risco a segurança dos veículos a partir de uma arquitectura de interligação entre as estações de comunicações fixas, coordenadas entre si, e unidades móveis (veículos) que se registam e se desligam dinamicamente do sistema. Nesta tese faz-se um levantamento exaustivo e sistemático das aplicações de segurança abordando projectos de investigação relacionados, estudam-se as tecnologias de comunicação sem fios disponíveis e a sua possibilidade de suportar aplicações de segurança rodoviária. Desta análise, conclui-se que a norma norte americana WAVE/IEEE802.11p e a europeia ETSI-G5, criadas especificamente para o efeito são as que mais se adequam à finalidade desejada. Considera-se que o cenário de utilização é evolutivo, podendo coexistirem veículos que não dispõem de sistemas de comunicação com outros que suportam a norma WAVE. Dado que o protocolo de acesso ao meio proposto pela norma WAVE não garante um acesso determinístico ao meio partilhado, propõe-se um novo protocolo, o Vehicular Flexible Time-Triggered protocol (VFTT). Faz-se a análise teórica da viabilidade do protocolo proposto para a norma WAVE e respectiva norma europeia (ETSI-G5). Quantifica-se o protocolo VFTT para um cenário real: a auto-estrada A5 Lisboa-Cascais, uma das autoestradas portuguesas mais movimentadas. Conclui-se que o protocolo é viável e garante um atraso restringido temporalmente.
Xie, Hong. "A Protocol Stack in TinyTimber for PIEs that Cooperate for Traffic Safety". Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-17541.
Pełny tekst źródłaFoster, Nathalie Louise. "The application of software and safety engineering techniques to security protocol development". Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.
Pełny tekst źródłaLorenzen, Torsten [Verfasser]. "Design of an adaptive congestion control protocol for reliable vehicle safety communication / Torsten Lorenzen". Hannover : Technische Informationsbibliothek (TIB), 2018. http://d-nb.info/1166077322/34.
Pełny tekst źródłaAlsubaihi, Badr. "Semantic and Self-Decision Geocast Protocol for Data Dissemination over Vehicle Ad Hoc Network". Thesis, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31783.
Pełny tekst źródłaRasoamanana, Aina Toky. "Derivation and Analysis of Cryptographic Protocol Implementation". Electronic Thesis or Diss., Institut polytechnique de Paris, 2023. http://www.theses.fr/2023IPPAS005.
Pełny tekst źródłaTLS and SSH are two well-known and thoroughly studied security protocols. In this thesis, we focus on a specific class of vulnerabilities affecting both protocols implementations, state machine errors. These vulnerabilities are caused by differences in interpreting the standard and correspond to deviations from the specifications, e.g. accepting invalid messages, or accepting valid messages out of sequence.We develop a generalized and systematic methodology to infer the protocol state machines such as the major TLS and SSH stacks from stimuli and observations, and to study their evolution across revisions. We use the L* algorithm to compute state machines corresponding to different execution scenarios.We reproduce several known vulnerabilities (denial of service, authentication bypasses), and uncover new ones. We also show that state machine inference is efficient and practical enough in many cases for integration within a continuous integration pipeline, to help find new vulnerabilities or deviations introduced during development.With our systematic black-box approach, we study over 600 different versions of server and client implementations in various scenarios (protocol versions, options). Using the resulting state machines, we propose a robust algorithm to fingerprint TLS and SSH stacks. To the best of our knowledge, this is the first application of this approach on such a broad perimeter, in terms of number of TLS and SSH stacks, revisions, or execution scenarios studied
Sjödin, Andreas, i Marcus Gruneau. "The ADS-B protocol and its'weaknesses : Exploring potential attack vectors". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280283.
Pełny tekst źródłaThe ADS-B protocol is currently in use all around the world. The purpose behind the protocol is to give pilots and traffic control a better picture of the situation in the air. Previous research shows that there exists a vulnerability in the protocol since it lacks authentication. The protocol is solely built upon trust between sender and receiver.Our work is inspired by previous studies made in the area, where it has been demonstrated that one can inject fake aircraft by sending fake ADS-B data using the protocol. The purpose behind this report was to perform a penetration test according to the OSSTMM3, a manual on how to perform scientific penetration tests.We wanted to test a real product (ADS-B receiver) made for pilots and measure if we could manipulate the environment presented to the pilot.Our testing shows that the receiver blindly trusts the protocol without any data validation. We managed to inject fake static aircraft just like previous researchers have done, but also move them around in the environment in a way that breaks the laws of physics and flood the device with fake data, effectively denying the service provided.Since we managed to deny the service, which is to give the user a correct picture of the nearby air traffic, we feel like our tests were successful.
Umeno, Shinya. "Proving safety properties of an aircraft landing protocol using timed and untimed I/O automata : a case study". Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/38920.
Pełny tekst źródłaPage 222 blank.
Includes bibliographical references (p. 195-196).
This thesis presents an assertional-style verification of the aircraft landing protocol of NASA's SATS (Small Aircraft Transportation System) concept of operation using the timed and untimed I/O automata frameworks. We construct two mathematical models of the landing protocol using the above stated frameworks. First, we study a discrete model of the protocol, in which the airspace of the airport and every movement of the aircraft are all discretized. The model is constructed by reconstructing a mathematical model presented in using the untimed I/O automata framework. Using this model, we verify the safe separation of aircraft in terms of the bounds on the numbers of aircraft in specific discretized areas. In addition, we translate this I/O automaton model into a corresponding PVS specification, and conduct a machine verification of the proof using the PVS theorem prover. Second, we construct a continuous model of the protocol by extending the discrete model using the timed I/O automata framework. A refinement technique has been developed to reason about the external behavior between two systems. We present a new refinement proof technique, a weak refinement using a step invariant.
(cont.) Using this new refinement, we carry over the verification results for the discrete model to the new model, and thus guarantee that the safe separation of aircraft verified for the discrete model also holds for the new model. We also prove properties specific to the new model, such as a lower bound on the spacing of aircraft in a specific area of the airport, using an invariant-proof technique.
by Shinya Umeno.
S.M.
Książki na temat "Safety protocol"
Association, American Industrial Hygiene. Laboratory chemical hygiene: An AIHA protocol guide. Fairfax, VA: American Industrial Hygiene Association, 1995.
Znajdź pełny tekst źródłaAssociation, American Industrial Hygiene, red. Confined space entry: An AIHA protocol guide. Fairfax, Va: American Industrial Hygiene Association, 1995.
Znajdź pełny tekst źródłaAssociation, American Industrial Hygiene, red. Confined space entry: An AIHA protocol guide. Fairfax, Va: American Industrial Hygiene Association, 2001.
Znajdź pełny tekst źródłaUnited States. Occupational Safety and Health Administration. Directorate of Compliance Programs, red. Protocol for safety and health inspections at Superfund incinerator sites. Washington, D.C. (200 Constitution Ave., N.W., Washington 20210): Occupational Safety and Health Administration, Directorate of Compliance Programs, 1994.
Znajdź pełny tekst źródłaInc, Joint Commission Resources, red. Compliance strategies for the Universal Protocol. Oakbrook Terrance, Ill: Joint Commission Resources, 2007.
Znajdź pełny tekst źródłaUnion, Barbados Workers'. Protocol Four of the Social Partnership 2001-2004. [Bridgetown, Barbados]: Barbados Workers' Union, 2002.
Znajdź pełny tekst źródła1969-, Rudnick Lisa B., i United Nations Institute for Disarmament Research, red. The security needs assessment protocol: Improving operational effectiveness through community security. New York: United Nations, 2008.
Znajdź pełny tekst źródłaLegal aspects of implementing the Cartagena Protocol on Biosafety. Cambridge: Cambridge University Press, 2012.
Znajdź pełny tekst źródłaRuth, Mackenzie, Ascencio Alfonso, International Union for Conservation of Nature and Natural Resources., IUCN Environmental Law Centre, Foundation for International Environmental Law and Development. i World Resources Institute, red. An explanatory guide to the Cartagena Protocol on Biosafety. Gland, Switzerland: IUCN in collaboration with FIELD and WRI, 2003.
Znajdź pełny tekst źródłaEuropean agreement concerning the international carriage of dangerous goods byroad (ADR) and protocol of signature, done at Geneva on 30 September 1957. New York: United Nations, 1996.
Znajdź pełny tekst źródłaCzęści książek na temat "Safety protocol"
Spry, J. Andy. "Sample Safety Assessment Protocol". W Encyclopedia of Astrobiology, 1. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27833-4_5576-1.
Pełny tekst źródłaSpry, J. Andy. "Sample Safety Assessment Protocol". W Encyclopedia of Astrobiology, 2713–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-662-65093-6_5576.
Pełny tekst źródłaStahel, Philip F. "The Universal Protocol: Pitfalls and Pearls". W Patient Safety in Surgery, 175–84. London: Springer London, 2014. http://dx.doi.org/10.1007/978-1-4471-4369-7_14.
Pełny tekst źródłaCansanção, Alvaro, Alexandra Condé-Green, Joshua A. David i Bianca Ohana. "Liposuction: Clinical Management and Safety Protocol". W Gluteal Fat Augmentation, 57–63. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-58945-5_8.
Pełny tekst źródłaLi, Mushu, Jie Gao, Xuemin Shen i Lian Zhao. "Protocol Design for Safety Message Broadcast". W SpringerBriefs in Computer Science, 17–48. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22860-5_3.
Pełny tekst źródłaCirisci, Berk, Constantin Enea i Suha Orhun Mutluergil. "Quorum Tree Abstractions of Consensus Protocols". W Programming Languages and Systems, 337–62. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-30044-8_13.
Pełny tekst źródłaBanno, Ryotaro, Kotaro Matsuoka, Naoki Matsumoto, Song Bian, Masaki Waga i Kohei Suenaga. "Oblivious Online Monitoring for Safety LTL Specification via Fully Homomorphic Encryption". W Computer Aided Verification, 447–68. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-13185-1_22.
Pełny tekst źródłaWang, Dongfeng, Qinghua Li, Fengyin Li, Quanxin Zhang i Banghai Xu. "Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain". W Cyberspace Safety and Security, 274–78. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37337-5_22.
Pełny tekst źródłaZhu, Haojia, Can Cui, Fengyin Li, Zhongxing Liu i Quanxin Zhang. "Design of Anonymous Communication Protocol Based on Group Signature". W Cyberspace Safety and Security, 175–81. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_15.
Pełny tekst źródłaShen, Jian, Jun Shen, Chen Wang i Anxi Wang. "A Fibonacci Based Batch Auditing Protocol for Cloud Data". W Cyberspace Safety and Security, 215–22. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69471-9_16.
Pełny tekst źródłaStreszczenia konferencji na temat "Safety protocol"
Stohl, Radek, i Karel Stibor. "Safety through Common Industrial Protocol". W 2013 14th International Carpathian Control Conference (ICCC). IEEE, 2013. http://dx.doi.org/10.1109/carpathiancc.2013.6560585.
Pełny tekst źródłaDariz, Luca, Gianpiero Costantino i Ilaria Matteucci. "Full-protocol safety analysis of CINNAMON". W 2022 IEEE 95th Vehicular Technology Conference (VTC2022-Spring). IEEE, 2022. http://dx.doi.org/10.1109/vtc2022-spring54318.2022.9860714.
Pełny tekst źródłaMegyesi, D., J. Lesko i M. Schreiner. "Evaluation of multihop UAV communication model based on protocol-independent and protocol-dependent methods". W 2019 Modern Safety Technologies in Transportation (MOSATT). IEEE, 2019. http://dx.doi.org/10.1109/mosatt48908.2019.8944102.
Pełny tekst źródłaMakanda, Kondwani, i Jun-Cheol Jeon. "Efficient Two-Party Quantum Secret Key-Sharing Protocol". W Security, Reliability, and Safety 2015. Science & Engineering Research Support soCiety, 2015. http://dx.doi.org/10.14257/astl.2015.109.03.
Pełny tekst źródłaFarias, Suzi Maria Fernandes de, Daniel Aragão Machado, Carlos Luiz Dias i Flávio Vaz Machado. "Analgosedation protocol in adult intensive care units: Multidisciplinary approach with a focus on patient safety". W V Seven International Multidisciplinary Congress. Seven Congress, 2024. http://dx.doi.org/10.56238/sevenvmulti2024-138.
Pełny tekst źródłaHeinrich, Markus, Jannik Vieten, Tolga Arul i Stefan Katzenbeisser. "Security Analysis of the RaSTA Safety Protocol". W 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2018. http://dx.doi.org/10.1109/isi.2018.8587371.
Pełny tekst źródłaLehmann, Bernd, i Lars Wolf. "Safety Analysis of a Maneuver Coordination Protocol". W 2020 IEEE Vehicular Networking Conference (VNC). IEEE, 2020. http://dx.doi.org/10.1109/vnc51378.2020.9318359.
Pełny tekst źródłaYoo, Hongseok, Jinhong Kim i Dongkyun Kim. "A dynamic safety interval protocol for VANETs". W the 2012 ACM Research in Applied Computation Symposium. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2401603.2401650.
Pełny tekst źródłaWang, Zhanjie, Hailong Wang, Kai He, Dexin Sun i Xiaobin Chen. "A safety-critical real-time network protocol". W 2008 IEEE International Conference on Granular Computing (GrC-2008). IEEE, 2008. http://dx.doi.org/10.1109/grc.2008.4664754.
Pełny tekst źródłaSteenbruggen, I., i P. De Laat. "Methacholine challenge: Safety of the quadrupling protocol". W ERS International Congress 2022 abstracts. European Respiratory Society, 2022. http://dx.doi.org/10.1183/13993003.congress-2022.1063.
Pełny tekst źródłaRaporty organizacyjne na temat "Safety protocol"
Brand, L., D. Cautley, D. Bohac, P. Francisco, L. Shen i S. Gloss. Combustion Safety Simplified Test Protocol Field Study. Office of Scientific and Technical Information (OSTI), listopad 2015. http://dx.doi.org/10.2172/1225414.
Pełny tekst źródłaBrand, L., D. Cautley, D. Bohac, P. Francisco, L. Shen i S. Gloss. Combustion Safety Simplified Test Protocol Field Study. Office of Scientific and Technical Information (OSTI), listopad 2015. http://dx.doi.org/10.2172/1226482.
Pełny tekst źródłaBurgess, R., C. Blake i C. E. Tracy. Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures. Office of Scientific and Technical Information (OSTI), wrzesień 2008. http://dx.doi.org/10.2172/938567.
Pełny tekst źródłaMsuha, Basil, Luitfred D. Kissoly i Arnold Kihaule. Design and implementation of Social Safety Nets in Tanzania: A protocol for a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, sierpień 2022. http://dx.doi.org/10.37766/inplasy2022.8.0074.
Pełny tekst źródłaChoi, Geunjoo, HyoJin Kim i Hyun Kang. Comparison of efficacy and safety of perioperaive sufentanil and remifentanil: a protocol for systematic review and meta-analysis protocol and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, lipiec 2022. http://dx.doi.org/10.37766/inplasy2022.7.0070.
Pełny tekst źródłaWang, Zhao, Fengting Zhai, Xiaomin Zhao, Guizhi Zhao, Na Li, Fang Zhang i Jinxing Liu. The efficacy and safety of acupuncture for perimenopausal insomnia: a network meta-analysis protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, listopad 2020. http://dx.doi.org/10.37766/inplasy2020.11.0047.
Pełny tekst źródłaYan, Huixin, Yun An, Tao Zhao, Jiangna Zhao i Juntao Yan. Therapeutic effect and safety of Tuina on Sciatica: A protocol for systematic review and meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, październik 2021. http://dx.doi.org/10.37766/inplasy2021.10.0034.
Pełny tekst źródłaZhou, Zhongyu. Efficacy and safety of Moxibustion for obesity A protocol for systematic review and meta analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, listopad 2020. http://dx.doi.org/10.37766/inplasy2020.11.0140.
Pełny tekst źródłaHuang, Chunhua, Rongfang Xie, Liting Liu i Ruiqi Wang. Efficacy and safety of Buzhong-Yiqi Decoction for Myasthenia gravis:study protocol for a systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, maj 2020. http://dx.doi.org/10.37766/inplasy2020.5.0080.
Pełny tekst źródłaZhang, Zhi-hui, Lei Yin, Ling-ling Zhang i Jing Song. Efficacy and safety of Bacillus Calmette-Guerin for bladder cancer: A protocol of systematic review. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, lipiec 2020. http://dx.doi.org/10.37766/inplasy2020.7.0042.
Pełny tekst źródła