-
3241
Bariatric surgery and HIV: Joint venture between family, primary care, and HIV physicians
Published 2024-12-01“…She has a history of type II diabetes, hypertension, bipolar manic depression, endometriosis, recurrent herpes simplex attacks, arthritis in both shoulders, irritable bowel syndrome (IBS), and nonalcoholic fatty liver disease (NAFLD). …”
Get full text
Article -
3242
Comparison of two bolus doses of dexmedetomidine for prophylaxis against postoperative nausea and vomiting in highly susceptible patients: A randomized controlled trial
Published 2024-04-01“…The time to give the first rescue antiemetic was significantly higher in group D75 compared to group D50 and in group D50 and group D75 compared to group C. The number of attacks and postoperative consumption of Ondansetron was significantly lower in group D50 and group D75 compared to group C. …”
Get full text
Article -
3243
Implementasi Mekanisme End-To-End Security pada IoT Middleware
Published 2019-05-01“…However, a vulnerability that can lead to the eavesdropping attack exist. there is no security mechanism in the communication system among middleware with other parties like node sensors and subscribers. …”
Get full text
Article -
3244
Enhancing concealed object detection in active THz security images with adaptation-YOLO
Published 2025-01-01“…Abstract The terahertz (THz) security scanner offers advantages such as non-contact inspection and the ability to detect various types of dangerous goods, playing an important role in preventing terrorist attacks. We aim to accurately and quickly detect concealed objects in THz security images. …”
Get full text
Article -
3245
The influence of meteorological factors on the technical performance of football teams during matches
Published 2024-04-01“…Notably, “shot from counter attack” was the most significantly affected variable, being exclusively influenced by air temperature (OR = 0.55, 95% CI: 0.30 to 0.98). …”
Get full text
Article -
3246
Knowledge, Attitude, and Practice of Community towards an Onchocerciasis Elimination Program from South West Ethiopia
Published 2022-01-01“…As a result, the respondent demonstrates that covering the lower body part lessens the black fly’s vulnerability because they may attack below the knee. In general, community awareness and attitude are required to eradicate this disease from the district. …”
Get full text
Article -
3247
A novel RFE-GRU model for diabetes classification using PIMA Indian dataset
Published 2025-01-01“…It can lead to a variety of complex disorders such as stroke, renal failure, and heart attack. Diabetes requires the most machine learning help to diagnose diabetes illness at an early stage, as it cannot be treated and adds significant complications to our health-care system. …”
Get full text
Article -
3248
Collaborative security assessment of cloud-edge-device distributed systems based on order parameters
Published 2024-06-01“…However, in recent years, frequent attacks on cloud-edge-device systems have resulted in serious security risks and significant economic losses for users. …”
Get full text
Article -
3249
The ‘envers du décor’ of Suffragette Imagery: Anti-Suffrage Caricature
Published 2008-12-01“…They launched a counter attack using numerous propaganda techniques. Among those were representations of the Suffragette and her goals, which they satirised by caricatures in their newspaper, The Anti-Suffrage Review, posters designed for their campaign and postcards.The specific aspect of the anti-suffrage campaign that I will examine in this paper is the use of caricature. …”
Get full text
Article -
3250
A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics
Published 2025-01-01“…The solution is broken down into four main components, considered four levels of security against attackers: (i) defocusing, (ii) fogging, (iii) puzzling, and (iv) crypto agility. …”
Get full text
Article -
3251
Evaluating the Combined Effects of Transverse Pitch Ratio and Flow Arrangement on the Thermo-Hydraulic Performance of a Novel Inclined Delta Winglet
Published 2024-12-01“…In accordance with the objective of this investigation, the combined effects of the positioning of the NIDW in common-flow-down (NIDW-CFlowD) and common-flow-up (NIDW-CFlowU) orientations together with two transverse pitch ratios [Pt=0.333 and 0.166] are investigated and the resulting data are presented in a comparative manner. The angle of attack [α=30°] and the angle of inclination [β=30°] of the NIDW are kept constant. …”
Get full text
Article -
3252
The Durability of High-Strength Concrete Containing Waste Tire Steel Fiber and Coal Fly Ash
Published 2021-01-01“…The studied durability parameters included rapid chloride permeability (RCP) and chloride penetration depth (CPD) by immersion method (28 and 120 days) and acid attack resistance (AAR) (28 and 120 days). Various basic mechanical properties of HSC were also analyzed, such as compressive strength (fCM), modulus of elasticity (ECM), splitting-tensile strength (fCTM), and modulus of rupture (fCRM). …”
Get full text
Article -
3253
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…The rapid growth of the Internet of Medical Things (IoMT) is changing healthcare data management, but it also brings serious issues like data privacy, malicious attacks, and service quality. In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. …”
Get full text
Article -
3254
University proceedings. Volga region. Social sciences
Published 2024-11-01“…Possible resolution strategies include: confrontation (attacks, creating conditions for defeat) or avoidance (blocking, exclusion from the group), and the involvement of external arbitration. …”
Article -
3255
Generative Image Steganography via Encoding Pose Keypoints
Published 2024-12-01“…This method is robust against common image attacks, such as salt and pepper noise, median filtering, compression, and screenshots, with an average bit error rate of less than 0.87%. …”
Get full text
Article -
3256
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…Considering the cost of permissions management and the problem of insider malicious node attacks, users hope to implement authorization constraints within the authorized institutions. …”
Get full text
Article -
3257
The End of Akıncı Corps in The Ottoman Empire
Published 2013-12-01“…The number of Akıncıs continued to increase until the 16th Century. In 1595, during the attacks carried out against Walachia Voivodina Mihail, who rebelled, the Akıncıs which stayed behind the Ottoman army, which was retreating over the wooden bridge, were nearly destroyed due to the inconsiderate act of Grand Vizier Sinan Pasha. …”
Get full text
Article -
3258
Wireless body area network: Architecture and security mechanism for healthcare using internet of things
Published 2025-01-01“…But if the Server is exposed to a malicious attack (i.e., flooded with ClientHello messages, the DTLS protocol may no longer serve the purpose) as it may lead to Denial-of-Service (DoS). …”
Get full text
Article -
3259
Joint analysis of blood pressure changes over time and survival of hypertensive patients under treatment at Sawula hospital in Southern Ethiopia
Published 2025-01-01“…High blood pressure, or hypertension, has been associated with severe health consequences, including death, aneurysms, stroke, chronic renal disease, eye damage, heart attack, heart failure, peripheral artery disease, and vascular dementia. …”
Get full text
Article -
3260
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. We also implement MASIT and other existing typical identity-based encryption schemes and evaluate their performance in real platforms. …”
Get full text
Article