Showing 1,981 - 2,000 results of 2,093 for search '"Attacker"', query time: 0.06s Refine Results
  1. 1981

    A Pilot Study of Hemoglobin A1C Levels in Patients with Type 2 Diabetes after Creation of a Patient Assistance Program Enrollment Committee at a Student-Run Free Clinic by John D. Salvemini, Gregory R. Vance, Amanda Pham, Garner Fincher, Johnny Yang, Harshin Sanjanwala, Leonna Conley, Alan Penman, James Pitcock

    Published 2025-01-01
    “…ED visits and hospital admissions for heart attacks occurred only in the non-PAP group. Conclusion: While patients enrolled in PAPs showed a greater average reduction in A1C, the difference was not statistically significant. …”
    Get full text
    Article
  2. 1982

    Face Boundary Formulation for Harmonic Models: Face Image Resembling by Hung-Tsai Huang, Zi-Cai Li, Yimin Wei, Ching Yee Suen

    Published 2025-01-01
    “…The boundary and numerical techniques of face images in this paper can be used not only for pattern recognition but also for face morphing, morphing attack detection (MAD), and computer animation as Sora to greatly enhance further developments in AI.…”
    Get full text
    Article
  3. 1983

    Regional Arterial Stiffness in Patients with Inflammatory Bowel Disease by V. V. Genkel, R. G. Portnova, T. V. Antipina, I. I. Shaposhnik

    Published 2019-06-01
    “…To study muscular (brachial and radial arteries) and elastic (aorta) regional arterial stiffness in IBD patients in comparison with those without IBD, as well as to establish the relationship between arterial stiffness and the characteristics of the IBD course (the duration of illness, severity of attack, activity of systemic inflammation). Materials and methods. …”
    Get full text
    Article
  4. 1984

    An Autonomous Underwater Vehicle Navigation Technique for Inspection and Data Acquisition in UWSNs by Arif Wibisono, Md. Jalil Piran, Hyoung-Kyu Song, Byung Moo Lee

    Published 2024-01-01
    “…Furthermore, in the inspection and data acquisition mission in UWSN simulated as node points (o) in pink, AUV (&#x002A;) in blue effectively follows the predetermined points while acquiring data, as indicated by green lines (-) within just 5 seconds, achievable by increasing the value of <inline-formula> <tex-math notation="LaTeX">$\alpha $ </tex-math></inline-formula> (angle of attack) of the target node to reduce delay time. The evaluation of the experimental simulations has raised issues and future research challenges, including the development of environmental simulation challenges that can closely resemble real conditions, the measurement of energy usage effectiveness to reach each target point, and the potential development of underwater recharging techniques. …”
    Get full text
    Article
  5. 1985

    2D physically unclonable functions of the arbiter type by V. N. Yarmolik, A. A. Ivaniuk

    Published 2023-03-01
    “…It seems promising to further develop the ideas of constructing two-dimensional physically unclonable functions of the arbiter type, as well as experimental study of their characteristics, as well as resistance to various types of attacks, including using machine learning.…”
    Get full text
    Article
  6. 1986

    Prehospital video triage of suspected stroke patients in Greater Manchester: pilot project report by Christopher Ashton, Adrian R Parry-Jones, Lisa Brunton, Ibrahim Alghamdi, David A Jenkins

    Published 2025-01-01
    “…Final diagnosis for PHVT patients was stroke in 15 (33%) of cases, non-stroke in 20 (43%) and transient ischaemic attack in 11 (24%).Patients/caregivers found PHVT beneficial in directing them to appropriate hospitals and streamlining admission and treatment. …”
    Get full text
    Article
  7. 1987

    Legal aspects of functional security standardisation of the Internet of Things by P. S. Klimushyn, V. Ye. Roh, T. P. Kolisnyk

    Published 2023-09-01
    “…A review of existing security infrastructures for IoT-based intelligent environments shows that every connected device can be a potential entry point for an attack. An overview of the key aspects of security standards for smart environments based on the Internet of Things has been provided in the following areas: potential solutions, intelligent environments, limits of security assessment, open issues and challenges. …”
    Get full text
    Article
  8. 1988

    Assessing the inflammation in pediatric MOGAD: Significance of CSF HMGB1 and related biomarkers by Xin Wang, Ruibin Zhao, Jiayu Fan, Chong Liu, Li Zhang, Huafang Yang, Weiyi Wang

    Published 2025-02-01
    “…IL-6 levels were significantly correlated with the total number of attacks (P &lt; 0.05), but not with EDSS scores.ConclusionsThese findings suggest that NLRP3, HMGB1, and IL-6 in the CSF may be potential therapeutic targets and are at least partly involved in the pathogenesis of pediatric MOGAD. …”
    Get full text
    Article
  9. 1989

    Did Hospital Admissions Caused by Respiratory Infections and Asthma Decrease During the COVID-19 Pandemic? by Zeynep Reyhan ONAY, Deniz MAVI, Yetkin AYHAN, Sinem CAN OKSAY, Gulay BILGIN, Saniye GIRIT

    Published 2022-03-01
    “…Conclusions: The decrease in viruses that cause acute bronchiolitis and asthma attacks lead to a reduction in admissions to ED of this patient group. …”
    Get full text
    Article
  10. 1990

    Social and psychological features of the mental component of the modern hybrid war against Ukraine by N. V. Bobro

    Published 2024-06-01
    “…The author’s definition of the concept of “mental war” is formulated as a complex psychological influence by the aggressor country on the consciousness of the population of the country that was attacked, using changes in its national outlook, historical memory, values, national-historical identity in the interests of the aggressor country. …”
    Get full text
    Article
  11. 1991

    Development of the US Plans for Post-War Japan during World War II by A. A. Sidorov

    Published 2020-11-01
    “…In that regard, the author pays particular attention to the staff shortage, which forced the Department of State to strengthen partnership with private research organizations and involve them in long-term planning.The author emphasizes that if before the United States entered the war the US planners adopted a rather tough stance on Japan, after the attack on Pearl Harbor their approaches paradoxically changed. …”
    Get full text
    Article
  12. 1992

    Area postrema syndrome in patients with autoimmune glial fibrillary acidic protein astrocytopathy by Qingchen Li, Junfang Teng

    Published 2025-01-01
    “…In addition, 5 patients presented with longitudinally extensive linear or patchy lesions in cervical spinal cord extending to area postrema on sagittal images. All APS attacks completely disappeared after immunotherapy. …”
    Get full text
    Article
  13. 1993

    Performance of Ultrasound in the Clinical Evaluation of Gout and Hyperuricemia by Ling Cao, Tianyi Zhao, Chunmei Xie, Shucong Zheng, Weiguo Wan, Hejian Zou, Xiaoxia Zhu

    Published 2021-01-01
    “…In the joints with MSU crystal deposition, 77.37% (277/358) had a history of attacks. Among the joints of gouty arthritis, double contour sign (DCS), hyperechoic aggregate (HAG), and tophi were found in 32.65% (159/487), 7.80% (38/487), and 24.64% (120/487) of the joints, respectively. …”
    Get full text
    Article
  14. 1994

    Safety of Rimegepant in Adults with Migraine and Anxiety, Depression, or Using Antidepressants: Analysis of a Multicenter, Long-Term, Open-Label Study by David Kudrow, Susan Hutchinson, Glenn C. Pixton, Terence Fullerton

    Published 2024-11-01
    “…Participants with a history of 2–14 migraine attacks per month of moderate or severe pain intensity self-administered rimegepant 75 mg as needed up to once daily for up to 52 weeks. …”
    Get full text
    Article
  15. 1995

    Experimental study on the impact of perpendicular and parallel bedding planes on the physical and geomechanical characteristics of carbonate rocks by Ahmed K. Abd El-Aal, Ahmed E. Radwan, Jabir Hussain, Mahrous A. M. Ali

    Published 2025-02-01
    “…Drilling wells into the subsurface should be performed at a lower attack angle to enable easier drilling and more stable holes. …”
    Get full text
    Article
  16. 1996

    Elucidation of novel, alternative, fiber-reinforced iron-based pozzolanic composites as SCMs by Hafiz Muhammad Nadir, Ash Ahmed, Ikram Moshi

    Published 2024-07-01
    “…NAFRIC specimens demonstrated minimal surface deterioration/elongation and negligible/no strength reduction after 270 days of concentrated sulfate attack. The microstructural analysis using X-ray diffraction/fluorescence, scanning electron microscopy/energy-dispersive analysis with X-ray spectroscopy supported the strength and durability parameters by showing minimal/no ettringite formation and increased calcium silicate hydrates gel formation due to the use of FeCO3 and pozzolans. …”
    Get full text
    Article
  17. 1997

    Blockchain-Driven Optimized Chaotic Encryption Scheme for Medical Image Transmission in IoT-Edge Environment by Goli Archana, Rajeev Goyal, K. M. V. Madan Kumar

    Published 2025-01-01
    “…Traditional IoT architecture is heavily centralized, where it stores the most sensitive information that creates the multiple threats and security breaches as the attackers target towards these centralized cloud systems. …”
    Get full text
    Article
  18. 1998

    Developing a Predictive Tool for Hospital Discharge Disposition of Patients Poststroke with 30-Day Readmission Validation by Jin Cho, Krystal Place, Rebecca Salstrand, Monireh Rahmat, Misagh Mansouri, Nancy Fell, Mina Sartipi

    Published 2021-01-01
    “…The top five risk scores were admission from a skilled nursing facility, acute heart attack, intracerebral hemorrhage, admission from “other” source, and an age of 75 or older. …”
    Get full text
    Article
  19. 1999

    Unraveling the risk of dredging on river bars for mineral sand mining: an engineering geological approach by Md. Shohel Rana, A.T.M. Shakhawat Hossain, Md. Fuad Hasan, Md. Aminur Rahman, Pradip Kumar Biswas, Mohammad Nazim Zaman

    Published 2025-02-01
    “…The non-cohesive granular soil in the area may liquefy or be susceptible to erosion, wave attack, bank slope failures, and seepage development during and after dredging as indicated from GSD and direct shear test results. …”
    Get full text
    Article
  20. 2000

    The Impact of Ischaemic Stroke Subtype on 30-day Hospital Readmissions by Anna Therese Bjerkreim, Andrej Netland Khanevski, Henriette Aurora Selvik, Ulrike Waje-Andreassen, Lars Thomassen, Halvor Naess, Nicola Logallo

    Published 2018-01-01
    “…Stroke aetiology may affect the risk and causes of readmission after ischaemic stroke (IS) and transient ischaemic attack (TIA) due to differences in risk factors, functional outcome, and treatment. …”
    Get full text
    Article