-
1981
Acupuncture Reversible Effects on Altered Default Mode Network of Chronic Migraine Accompanied with Clinical Symptom Relief
Published 2019-01-01“…The monthly mean visual analog scale (VAS) scores, monthly mean headache attacks, monthly headache days, monthly amount of acute headache medications, and immediate VAS scores were assessed for evaluation of pain. …”
Get full text
Article -
1982
Fast access authentication scheme for mobile IPv6 hierarchical network
Published 2013-08-01“…The analysis of the scheme shows that it is strongly unforgeable, and mean-while it can defend replay attacks and reduce the delay time of the entire authentication process.…”
Get full text
Article -
1983
MANDATORY TECHNICAL ELEMENTS IN THE METAMORPHOSIS OF THE SINGING VOICE
Published 2011-06-01“…Trying to imitate human voice, people invented a variety of musical instruments. The attack and emission of the sound are essential while singing. …”
Get full text
Article -
1984
Football Game and Tactical Training
Published 2024-07-01“…Versatile players are an essential part of modern football, which no longer allows us to talk about attacking or defensive players but rather players with complex talents who can manage any circumstance the game demands. …”
Get full text
Article -
1985
Untangling the Web of Systemic Autoinflammatory Diseases
Published 2014-01-01“…Further research should enhance our understanding of the genetics behind SAIDs, unearth triggers of inflammatory attacks, and result in improvement for their diagnosis and treatment.…”
Get full text
Article -
1986
Research on WiFi Penetration Testing with Kali Linux
Published 2021-01-01“…Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. …”
Get full text
Article -
1987
Personal reboot and survival
Published 2020-10-01“…It is concluded that the main goals of critical attacks of these arguments are the temporal mismatch of psychological connectedness and continuity as well as the reductionist claim that all the facts what matters for survival can be described in an impersonal way…”
Get full text
Article -
1988
An Improved Piecewise Linear Chaotic Map Based Image Encryption Algorithm
Published 2014-01-01“…Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.…”
Get full text
Article -
1989
Topical Treatment of Ulcerative Colitis using Enemas Containing 5-Aminosalicylic Acid and Beclomethasone Dipropionate
Published 1990-01-01“…5-Aminosalicylic acid (5-ASA) enemas constitute a first-line therapy for patients with mild to moderate attacks of ulcerative colitis. To date, based on the results of different studies, 5-ASA enemas appear to be satisfactory in at least two-thirds of patients treated. …”
Get full text
Article -
1990
Research and implementation of safety authentication technology in Internet of vehicles
Published 2021-09-01“…Nowadays, safety certification technology for Internet of vehicles (IoV) cannot well defend the various attacks, and there are also many shortcomings when considering the balance between safety and performance.Based on the in-depth analysis of the research status and security threats for IoV, a hierarchical vehicle-to-vehicle (V2V) safety authentication scheme was proposed.Furthermore, an L-type safety authentication scheme which based on more than one trusted third parties was proposed.Aimed at ensuring the information safety of the communication process and preventing the communication data from being stolen, the schemes were more suitable to IoV.…”
Get full text
Article -
1991
Quantum identity authentication scheme based on measurement-device-independent quantum key distribution protocol
Published 2016-02-01“…The security performance of the proposed scheme is extensively analyzed and accordingly con?rmed in the case of attacks.…”
Get full text
Article -
1992
Autoimmunity against cytokines: Double strike in autoimmune disease, a historical perspective
Published 2024-12-01“…This leads to an effector immune response against tissues expressing antigens, which are later recognized by the host immune system. Host antigens attacked by antibodies are called “autoantigens” and are of different kinds, including receptors, enzymes, and channel proteins. …”
Get full text
Article -
1993
Asian Horntail Eriotremex formosanus (Matsumura) (Insecta: Hymenoptera: Symphyta: Siricidae: Tremicinae)
Published 2015-08-01“…It is not considered an economically important pest because it only attacks dying or dead trees, but the species may someday prove to be a pest and its ecological impacts in North American forests remain unknown. …”
Get full text
Article -
1994
Vibration Performance Redistribution in Heterogeneous Networks
Published 2020-01-01“…Albeit in a simple setup, this paper presents an attempt to attacking this problem. Important results are obtained for performance redistribution under both unitary and specified specifications. …”
Get full text
Article -
1995
Asian Horntail Eriotremex formosanus (Matsumura) (Insecta: Hymenoptera: Symphyta: Siricidae: Tremicinae)
Published 2015-08-01“…It is not considered an economically important pest because it only attacks dying or dead trees, but the species may someday prove to be a pest and its ecological impacts in North American forests remain unknown. …”
Get full text
Article -
1996
ID-based signature without trusted PKG
Published 2008-01-01“…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
Get full text
Article -
1997
A Distortion-Free Data Hiding Scheme for Triangular Meshes Based on Recursive Subdivision
Published 2016-01-01“…Finally, a principal component analysis can make the stego model against similarity transformation and vertex/triangle reordering attacks. Our proposed algorithm can provide a high and adjustable embedding capacity with reversibility. …”
Get full text
Article -
1998
Stable Fly (Dog Fly) Control
Published 2012-09-01“…Stable flies primarily attack animals for a blood meal, but in the absence of an animal host, they will bite people. …”
Get full text
Article -
1999
Stereo robust watermark algorithm based on parameter optimization
Published 2023-07-01“…Aiming at issues such as illegal dissemination of network audio data and privacy leakage, a stereo robust watermark algorithm based on parameter optimization was proposed.Firstly, the watermark was embedded by modifying the singular value ratio of odd segment based on the insensitivity of stereo channels to attack, and aiming at minimizing the relative distortion of the two channels.The embedding process was optimized and the perceived quality of the audio was improved.Then, a parameter optimization method was proposed to find optimal parameters on each audio file, and the imperceptibility and robustness were well balanced.The simulation results show that the proposed algorithm has good imperceptibility and robustness against conventional signal processing.…”
Get full text
Article -
2000
Les chiites et la célébration du gamou au Sénégal
Published 2024-07-01“…I then show how the celebration of this festival by Senegalese Shiites reflects both a desire to draw closer to Sufi brotherhoods, notably in a common opposition to Wahhabi attacks, and a desire to distinguish themselves from the Sunni religious environment.…”
Get full text
Article