1977
DOI: 10.1159/000169842
|View full text |Cite
|
Sign up to set email alerts
|

Bilateral Bundle Branch Block

Abstract: This report describes the clinical and electrocardiographic features in 30 cases of complete right bundle branch block associated with a block of the anterior fascicle of the left bundle branch, 7 of which also featured a block of the posterior fascicle of the left bundle branch (trifascicular block). The majority of the patients suffered from coronary atherosclerotic heart disease and/or hypertensive heart disease. Complete right bundle branch block associated with fascicular block of the left bundle branch c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2010
2010
2013
2013

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…In order to protect the client against forgery or replay attack, replace the standard's authentication scheme with a scheme providing mutual authentication. Researchers have proposed variety of authentication schemes [11] and these are:…”
Section: Authentication Schemesmentioning
confidence: 99%
“…In order to protect the client against forgery or replay attack, replace the standard's authentication scheme with a scheme providing mutual authentication. Researchers have proposed variety of authentication schemes [11] and these are:…”
Section: Authentication Schemesmentioning
confidence: 99%
“…Conversely, the user/device should also be capable of verifying the authenticity of the network to which it is connected. Together, the two are referred to as mutual authentication [8]. …”
Section: Authorization Requestmentioning
confidence: 99%
“…In order toprotect the client against forgery or replay attack, replace the standard's authentication scheme with a scheme providing mutual authentication. Some different types of authentication schemes [8] used are:…”
Section: 2authentication Schemesmentioning
confidence: 99%
See 1 more Smart Citation
“…The block diagram of this proposed device has been shown in the figure .3 as the transponder block diagram of machine learning controller. A similar communication system has been also shown in [5]. This has been explained as a bee hive queen bee gives order to the remaining public bees through the colony queen bee, in the algorithm.…”
Section: • Introduction To Machine Learning Controllermentioning
confidence: 99%