Amir Hossein Tabatabaee

Learn More
BACKGROUND The use of complementary and alternative medicine (CAM) techniques has been growing. The National Center for Complementary and Alternative Medicine places therapeutic touch (TT) into the category of bio field energy. This literature review is aimed at critically evaluating the data from clinical trials examining the clinical efficacy of(More)
There are various cryptographic protocols in which 160-bit message digest is required. SHA-1is the most well-known 160-bit hash function which is still used in protocols despite of its vulnerabilities against collision attacks. Lack of 160-bit hash function structures and disadvantages of truncating outputs of other secure hash functions (security problems(More)
INTRODUCTION In patients with cancer, pain may influence their life style, and feeling of satisfaction and comfort, leading to fatigue, and cause impairment of their quality of life, personal relationships, sleep and daily activities. The aim of this study was to evaluate the effect of therapeutic touch (TT) on pain related parameters of in patients with(More)
  • 1