-
2121
Proinflammatory Effects of C-Peptide in Different Tissues
Published 2012-01-01“…Atherosclerosis is well known as an inflammatory disease that can lead to clinical complications such as heart attack or stroke. C-peptide as a cleavage product of proinsulin is in the last few decades known as an active peptide with a number of different effects on microvascular and macrovascular complications in type 2 diabetic patients. …”
Get full text
Article -
2122
Sliding Mode Observer and Control Design with Adaptive Parameter Estimation for a Supersonic Flight Vehicle
Published 2010-01-01“…Design and synthesis of a nonlinear generic supersonic flight vehicle longitudinal dynamics control for angle-of-attack, AOA, output tracking in the atmospheric flight is presented based on sliding mode control. …”
Get full text
Article -
2123
A New Impact Time and Angle Control Guidance Law for Stationary and Nonmaneuvering Targets
Published 2016-01-01“…A guidance problem for impact time and angle control applicable to cooperative attack is considered based on the sliding mode control. …”
Get full text
Article -
2124
A novel chaotic system with one absolute term: stability, ultimate boundedness, and image encryption
Published 2025-01-01“…The test results showed that the suggested image scheme is very secure and impervious to differential, statistical analysis, and other types of attacks. Furthermore, the majority assessment shows that the presented approach performs noticeably better than previous techniques.…”
Get full text
Article -
2125
Adsorption and Corrosion Inhibition Effect of N-(l-Morpholinobenzyl)urea onMild Steel in Acidic Medium
Published 2011-01-01“…Protective film formation against the acid attack is confirmed by SEM.…”
Get full text
Article -
2126
Two-factor wearable device authentication protocol based on PUF and IPI
Published 2017-06-01“…Wearable device is pushing the rapid development of mobile health,however,the open architecture of wireless body area network has brought challenges for the security of user data.In order to protect the security of user data,a two-factor authentication protocol between device note and data hub was proposed based on physically unclonable function and interpulse interval.Using dual uniqueness of device physical characteristic and user biometric trait,the protocol can resist compromise and impersonation attacks and was specially suitable for resource constrained wearable devices under body area network.Compared with the existing authentication schemes,the security of the proposed protocol was enhanced.The practicability and effectiveness of the protocol are confirmed by hardware implementation on FPGA.…”
Get full text
Article -
2127
Fever-Associated Supraventricular Tachycardia after 4CMenB Vaccination in an Infant
Published 2019-01-01“…During three months of follow-up, she was free of further SVT attacks. Conclusion. This is the first report of ECG-proven SVT after 4CMenB vaccination. …”
Get full text
Article -
2128
Application of the Gordon Loeb model to security investment metrics: a proposal
Published 2024-12-01“…The consequences of a cyber attack can be quite severe. Investing in security to mitigate the impact of such risks is a crucial task, both in terms of the frequency and the severity of cyber incidents. …”
Get full text
Article -
2129
Research on area-efficient low-entropy masking scheme for AES
Published 2019-05-01“…Based on the rotating S-box masking (RSM) proposed by Nassar et al,a low-entropy masking scheme for the advanced encryption standard (AES) was proposed.Reducing the area complexity by reusing the S-boxes,improving the hardware security by shuffling operation and improving the throughput by pipelining operation were the main idea of the proposed scheme.For the AES,the number of S-boxes could be reduced from 16 to 4 (key expansion module wasn’t included).Compared with the RSM,the combinational logic,the dedicated logic and the memory size are reduced to 69%,60% and 80% respectively.In addition,the theoretical analysis shows that the proposed scheme can resist offset based CPA attack,thus has higher security than the RSM.…”
Get full text
Article -
2130
Diplomacy and Recruitment of Mercenaries before the Battle of Žalgiris
Published 2010-06-01“…Ulrich von Jungingen got this message by the king's emissary on 11 May and immediately stopped the preparations for an intended surprise attack on Poland on 1 June. He had regarded such an attack as legitimate, because the Poles had rejected the arbitration by King Venceslas, and had for that purpose secretly recruited 1,800 mercenaries. …”
Get full text
Article -
2131
Phenotypic and transcriptomic analyses reveal major differences between apple and pear scab nonhost resistance
Published 2023-01-01“…Apple (Malus x domestica Borkh.) have a nonhost resistance to Venturia pyrina, the scab species attacking European pear (Pyrus communis L.). Reciprocally, P. communis have a nonhost resistance to Venturia inaequalis, the scab species attacking apple. …”
Get full text
Article -
2132
Performance Analysis of 2022 Women’s European Football Champion England National Team
Published 2022-12-01“…In addition, considering that the most important factor determining the result in football is goals and that these goals are the result of organized attacks, it is important that the football players other than the strikers contribute to the score, and that the organizational studies are important, therefore it is necessary to plan the technical-tactical studies of the teams accordingly. is thought to be useful.…”
Get full text
Article -
2133
Assessing favipiravir impact on SARS-CoV-2 transmission within households: Insights from a multi-center study (FaviPrev)
Published 2024-12-01“…Favipiravir led to a 58 % secondary attack rate, substantially lower than the 71.8 % observed with standard treatment, representing a 54 % reduction in transmission likelihood, with an odds ratio of 0.46 (95 % confidence interval [CI] [0.23–0.89]). …”
Get full text
Article -
2134
MRI-based analysis of the microstructure of the thalamus and hypothalamus and functional connectivity between cortical networks in episodic cluster headache
Published 2025-01-01“…We investigated differences in resting-state functional connectivity (FC) between brain networks and its relationship with the microstructure of the hypothalamus and thalamus in patients with episodic CH outside attacks and healthy controls (HCs). Methods We collected 3T MRI data from 26 patients with CH during the in-bout period outside the attacks and compared them with data from 20 HCs. …”
Get full text
Article -
2135
A study on sexual violence among women in Northern Ethiopia's 2022 conflict: mixed methods
Published 2025-01-01“…Factors such as being a prostitute, having a lower income, and living in attacked villages were significant predictors of this violence. …”
Get full text
Article -
2136
Applying TTIED-CMYK Algorithm in Wireless Sensor Networks Based on Raspberry pi and DHT-11
Published 2022-09-01“…This paper provided a detailed explanation of the types of attackers according to their layer, in addition to the design of a wireless sensor network consisting of a temperature and humidity sensor called the DHT-11 and a Raspberry Pi to implement the Text-To-Image Encryption/Decryption algorithm based on CMYK mode (TTIED-CMYK) in these networks. …”
Get full text
Article -
2137
Seizures and Blurred Vision as Initial Presentation of Intracerebral Schwannoma: A Rare Tumor of the Brain
Published 2019-01-01“…Here, we are reporting a case of an 18-year-old male who presented with attacks of seizures. MR imaging studies were done and showed right parieto-occipital cortical and subcortical mass lesion with intense enhancement and significant vasogenic oedema with mass effect on the subjacent sulci. …”
Get full text
Article -
2138
Higher-order differences based research on comparison between type-1 generalized Feistel-SP network and Feistel-SPSP network
Published 2014-07-01“…As a result, the dou-ble-SP model is weaker than the single-SP model against the higher-order differential attack under the 4-line type-1 Feis-tel structure.…”
Get full text
Article -
2139
Phytophthora Identification and Sampling in Citrus Nurseries
Published 2019-07-01“… Phytophthora species are important soilborne, fungus-like pathogens that attack the root systems, trunk, and fruit of citrus trees at any age. …”
Get full text
Article -
2140
South American Cucurbit Fruit Fly, Anastrepha grandis (Macquart) (Insecta: Diptera: Tephritidae)
Published 2012-03-01“… This rather large, yellow-brown, fruit fly with yellow and dark-brown markings exists in several South American countries, and attacks watermelon and other fruits of the family Cucurbitaceae. …”
Get full text
Article