-
2181
Cardiac Calcified Amorphous Tumor in the Neonatal Period
Published 2022-01-01“…In this report, we presented a 4-month-old male baby with repeated attacks of cyanosis and a cardiac murmur. Echocardiography revealed a tumoral noncircumscribed mass in the right atrium adhering to the interatrial septum which extends to the inferior vena cava. …”
Get full text
Article -
2182
Password-based three-party authenticated key exchange protocol from lattices
Published 2018-11-01“…Password-based three-party authenticated key exchange protocol allow clients to establish a protected session key through a server over insecure channels.Most of the existing PAKE protocols on lattices were designed for the two parties,which could not be applied to large-scale communication systems,so a novel three-party PAKE protocol from lattices was proposed.The PAKE protocol was constructed by using a splittable public-key encryption scheme and an associated approximate smooth projective Hash function,and message authentication mechanism was introduced in the protocol to resist replay attacks.Compared with the similar protocols,the new protocol reduces the number of communication round and improves the efficiency and the security of protocol applications.…”
Get full text
Article -
2183
Synaptic Plasticity and Neurological Disorders in Neurotropic Viral Infections
Published 2015-01-01“…Based on the type of cells or tissues they tend to harbor or attack, many of the viruses are characterized. But, in case of neurotropic viruses, it is not possible to classify them based on their tropism because many of them are not primarily neurotropic. …”
Get full text
Article -
2184
Methodical Contributions Regarding the Improvement of Physical Training in U16 Female Volleyball Players
Published 2024-07-01“…The victory of the team can only be achieved if the ratios between the motor qualities, the height of the players, and the overall effectiveness of the team are optimized in the two fundamental phases: attack and defense. A selection of the means applied in physical training must be made in accordance with the technical needs imposed by the sports branch, in order that the muscle groups involved in the achievement of specific movements to be well prepared, and the technical-tactical actions can be performed at their maximum potential.…”
Get full text
Article -
2185
Numerical Analysis for a Fractional Differential Time-Delay Model of HIV Infection of CD4+ T-Cell Proliferation under Antiretroviral Therapy
Published 2014-01-01“…At last, we extend the model to incorporate the term which we consider the loss of virion and a bilinear term during attacking the target cells.…”
Get full text
Article -
2186
Completed local binary pattern based speech anti-spoofing
Published 2021-05-01“…In view of the fact that the disguised speech detection algorithm based on local binary pattern (LBP) is not effective in detecting the spoofing attack from voice conversion, an anti-spoofing method based on completed local binary pattern (CLBP) was proposed.In this method, the spectrogram of speech signals is generated by the variable Q transformation (VQT) and used to train the true/spoofed speech classifier, so as to perform the detection of disguised speech.The experimental results demonstrate that the proposed anti-spoofing method based on the CLBP in the detection of voice conversion deception is better than the LBP-based algorithm, and when the parameter γ in VQT is set to 50, the detection system based on CLBP and SVM-RBF has the best performance for anti-spoofing the disguise speech.…”
Get full text
Article -
2187
Architecture and mechanisms for secure and efficient internetworking of heterogeneous network
Published 2022-04-01“…An architecture named CoLoR (coupling service location and inter-domain routing) was introduced to securely and efficiently interconnect networks with different architectures (called heterogeneous networks below).First, the fundamental challenges and scientific problems that have to be addressed by CoLoR were raised.Then, the core aspects of CoLoR were described, including how to characterize and represent the cyberphysical system comprised by heterogeneous networks, the network architecture, the basic communication model and how secure internetworking was achieved.After that, results from prototype implementation were presented to demonstrate the feasibility and capability of CoLoR, including defending against attacks and preventing data leakage.Finally, some open issues were outlined for future studies.…”
Get full text
Article -
2188
N.P. VAN WYK LOUW AS SATIRIKUS
Published 2019-12-01“…The definition of satire proposed in this article is that satire is an implied or explicit attack on a satirical object, but also with the suggestion at least of an explicit satirical norm. …”
Get full text
Article -
2189
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
Published 2014-11-01“…Trojans inject systems and launch various attacks, such as eavesdropping secret information, tampering with system configuration etc., which threats to system security seriously. …”
Get full text
Article -
2190
La lettre perdue
Published 2010-12-01“…These three types of readings all attacked the orthodoxy: Strauss dismantled the historical foundations of the origins of Christianity. …”
Get full text
Article -
2191
Proactive migration model of SWIM service based on situation awareness
Published 2019-08-01“…To solve the problem that in the system wide information management (SWIM) network,the SWIM service provider suffers from SWIM service interruption,service delay increase or service quality degradation due to malicious attack or self-failure.Therefore,a proactive migration model of SWIM service was proposed on the basis of situation awareness,which used the random forest algorithm to timely judge the SWIM service provider security situation.SWIM service authority was actively migrated according to security situation,and the emergencies impact on SWIM services were reduces.Experimental results show that the proposed model can guarantee services continuity in an emergency event,which has higher reliability and stability than SWIM network in which the service migration model is not deployed.…”
Get full text
Article -
2192
Implementation and evaluation of big data desensitization system based on format-preserving encryption
Published 2017-03-01“…Data desensitization is a process that makes some special transformations on sensitive data in order to protect the secrecy and privacy from being acquired by malicious attackers.Format-preserving encryption is one of the techniques of data desensitization, which has the advantage of keeping data format unchanged so that the upper layer applications are not affected.Along with the coming of big data and the wide application of the Hadoop platform, data desensitization techniques for traditional relational database management systems cannot satisfy the need of production. …”
Get full text
Article -
2193
Study on user behavior profiling in insider threat detection
Published 2018-12-01“…Behavior profiling technic using no-labeled historical data to build normal behavior model is an effective way to detect insider attackers. The state-of-the-art labeled profile methods extract features artificially and process data by simple statistical methods, whose incomplete behavior model lacks details. …”
Get full text
Article -
2194
Two Cases of Schimmelpenning Syndrome
Published 2025-01-01“…A 3-year-old girl has a large sebaceous nevus on her scalp and face, along with seizures and transient ischemic attacks. Examination and tests reveal coarctation of the aorta, eyelid colobomas, and other findings. …”
Get full text
Article -
2195
Anonymous survey system based on NIZK
Published 2016-12-01“…Aiming at the security problem that the existing in electronic surveys,such as information fraud,privacy security etc.An anonymous electronic survey scheme based on non-interactive zero knowledge proofs (NIZK) was constructed,which had the characteristics of self-organization,non-interactive,anti-replay,and high efficiency.The system uses the NIZK protocol and the Boneh-Boyen signature scheme to verify the user's identity in non-interactive manner,which guarantees the authenticity of the scheme.The system also uses the Pedersen commitment scheme and the pseudo random function to hide the user's identity and the related information,which guarantees the ano-nymity.Security analysis show that the system has security features such as malicious users attack resistance and anonymity.Finally,the function of the system was also verified and the result show that the system can accomplish all the functions correctly and guarantee the anonymity and authenticity of the system effectively.…”
Get full text
Article -
2196
Dynamic trust evaluation model based on evaluation credibility in cloud computing
Published 2013-08-01“…Simulation results show that the model results are closer to the cloud service provider's actual trust value, and can resist the attack of malicious cloud users effectively.…”
Get full text
Article -
2197
Caribbean Fruit Fly, Anastrepha suspensa (Loew) (Insecta: Diptera: Tephritidae)
Published 2004-04-01“…It is a near relative of the Mexican fruit fly, Anastrepha ludens (Loew), and is one of several species of fruit flies which are indigenous to the West Indies and the larvae of which attack several kinds of tropical and subtropical fruits. …”
Get full text
Article -
2198
Acaro del coco, Aceria guerreronis Keifer (Arácnidae: Acari: Eriophyidae)
Published 2007-10-01“…It describes one of the worst arthropod pests of coconut palms, which attacks the young fruits and can cause scarring and distortion and premature fruit drop. …”
Get full text
Article -
2199
Message encryption and authentication mechanism based on wireless physical layer key
Published 2018-08-01“…In order to solve the problem of hidden key leakage in traditional high-level message authentication and passive eavesdropping in physical layer message authentication,a message encryption and authentication mechanism based on the characteristics of wireless physical layer was proposed.By extracting the characteristics of the wireless channel,the physical layer key was generated and the seed key was generated by combining the identity key.The key stream generator then generated the key stream to decrypt the message according to the extracted seed,protects the privacy of the transmitted data,and the final receiver authenticated the authenticity and integrity of the received message through the CRC verification result.Simulation results show that the proposed method has better performance in preventing passive eavesdropping and active attack,and the randomness of key stream is greatly improved and the rate of authentication leak detection is reduced by half.…”
Get full text
Article -
2200
Diversity of controllable anonymous communication system
Published 2015-06-01“…With the development of network communication technology,the Tor anonymous communication system has been widely used.However,there are also some unsafe factors such as insufficient anonymity which deserves to be noticed.Thus,a diversified controllable anonymous communication system (DC-ACS) was proposed based on the node regional management strategy.The diversified anonymous link establishment mechanism chooses nodes in the corresponding field to build the anonymous communication link according to users’ needs,controls users’ malicious anonymous activities,and ensures the anonymity of senders and receivers to the first and last node of anonymous communication link.Compared with the Tor anonymous communication system,DC-ACS not only has anonymity,but also has higher security and anti-attack capability,which eliminated potential security risks existed in the Tor anonymous communications system.…”
Get full text
Article