Showing 3,241 - 3,260 results of 3,648 for search '"Attacker"', query time: 0.09s Refine Results
  1. 3241

    Bariatric surgery and HIV: Joint venture between family, primary care, and HIV physicians by Ceren Aydemir, Raniah Al Saidi, Ji Soo Choi, Mohamed H. Ahmed, Dushyant Mital

    Published 2024-12-01
    “…She has a history of type II diabetes, hypertension, bipolar manic depression, endometriosis, recurrent herpes simplex attacks, arthritis in both shoulders, irritable bowel syndrome (IBS), and nonalcoholic fatty liver disease (NAFLD). …”
    Get full text
    Article
  2. 3242

    Comparison of two bolus doses of dexmedetomidine for prophylaxis against postoperative nausea and vomiting in highly susceptible patients: A randomized controlled trial by Maha Mohamed Ismail Youssef, Amr Raafat Mahmoud Seif, Kareem Nagy Abbass Ahmed, Ghada Abo Bakr, Gihan Mohamed Obayah, Mohamed Ramadan Ahmed Mohamed

    Published 2024-04-01
    “…The time to give the first rescue antiemetic was significantly higher in group D75 compared to group D50 and in group D50 and group D75 compared to group C. The number of attacks and postoperative consumption of Ondansetron was significantly lower in group D50 and group D75 compared to group C. …”
    Get full text
    Article
  3. 3243

    Implementasi Mekanisme End-To-End Security pada IoT Middleware by Eko Sakti Pramukantoro, Fariz Andri Bakhtiar, Ahmad Lutfi Bayu Aji, Deny Hari Prasetya Dewa

    Published 2019-05-01
    “…However, a vulnerability that can lead to the eavesdropping attack exist. there is no security mechanism in the communication system among middleware with other parties like node sensors and subscribers. …”
    Get full text
    Article
  4. 3244

    Enhancing concealed object detection in active THz security images with adaptation-YOLO by Aiguo Cheng, Shiyou Wu, Xiaodong Liu, Hangyu Lu

    Published 2025-01-01
    “…Abstract The terahertz (THz) security scanner offers advantages such as non-contact inspection and the ability to detect various types of dangerous goods, playing an important role in preventing terrorist attacks. We aim to accurately and quickly detect concealed objects in THz security images. …”
    Get full text
    Article
  5. 3245

    The influence of meteorological factors on the technical performance of football teams during matches by Yonghan Zhong, Shaoliang Zhang, Qing Yi, Miguel Ángel Gómez Ruano

    Published 2024-04-01
    “…Notably, “shot from counter attack” was the most significantly affected variable, being exclusively influenced by air temperature (OR = 0.55, 95% CI: 0.30 to 0.98). …”
    Get full text
    Article
  6. 3246

    Knowledge, Attitude, and Practice of Community towards an Onchocerciasis Elimination Program from South West Ethiopia by Haile Worku, Misganaw Mola, Bizuwork Derebew Alemu, Sebwedin Surur Jemal, Aklilu Ayiza, Samuel Getachew, Nitin Mahendra Chauhan, Sunil Tulshiram Hajare, Suresh Chandra Singh, Mohammed Kuddus, Vijay J. Upadhye

    Published 2022-01-01
    “…As a result, the respondent demonstrates that covering the lower body part lessens the black fly’s vulnerability because they may attack below the knee. In general, community awareness and attitude are required to eradicate this disease from the district. …”
    Get full text
    Article
  7. 3247

    A novel RFE-GRU model for diabetes classification using PIMA Indian dataset by Mahmoud Y. Shams, Zahraa Tarek, Ahmed M. Elshewey

    Published 2025-01-01
    “…It can lead to a variety of complex disorders such as stroke, renal failure, and heart attack. Diabetes requires the most machine learning help to diagnose diabetes illness at an early stage, as it cannot be treated and adds significant complications to our health-care system. …”
    Get full text
    Article
  8. 3248

    Collaborative security assessment of cloud-edge-device distributed systems based on order parameters by FAN Qigang, JIANG Zhongyuan, LI Xinghua, MA Jianfeng

    Published 2024-06-01
    “…However, in recent years, frequent attacks on cloud-edge-device systems have resulted in serious security risks and significant economic losses for users. …”
    Get full text
    Article
  9. 3249

    The ‘envers du décor’ of Suffragette Imagery: Anti-Suffrage Caricature by Abby Franchitti

    Published 2008-12-01
    “…They launched a counter attack using numerous propaganda techniques. Among those were representations of the Suffragette and her goals, which they satirised by caricatures in their newspaper, The Anti-Suffrage Review, posters designed for their campaign and postcards.The specific aspect of the anti-suffrage campaign that I will examine in this paper is the use of caricature. …”
    Get full text
    Article
  10. 3250

    A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics by Gerardo Iovane, Riccardo Amatore

    Published 2025-01-01
    “…The solution is broken down into four main components, considered four levels of security against attackers: (i) defocusing, (ii) fogging, (iii) puzzling, and (iv) crypto agility. …”
    Get full text
    Article
  11. 3251

    Evaluating the Combined Effects of Transverse Pitch Ratio and Flow Arrangement on the Thermo-Hydraulic Performance of a Novel Inclined Delta Winglet by Hüseyin Zahit Demirağ

    Published 2024-12-01
    “…In accordance with the objective of this investigation, the combined effects of the positioning of the NIDW in common-flow-down (NIDW-CFlowD) and common-flow-up (NIDW-CFlowU) orientations together with two transverse pitch ratios [Pt=0.333 and 0.166] are investigated and the resulting data are presented in a comparative manner. The angle of attack [α=30°] and the angle of inclination [β=30°] of the NIDW are kept constant. …”
    Get full text
    Article
  12. 3252

    The Durability of High-Strength Concrete Containing Waste Tire Steel Fiber and Coal Fly Ash by Babar Ali, Erol Yilmaz, Ahmad Raza Tahir, Fehmi Gamaoun, Mohamed Hechmi El Ouni, Syed Muhammad Murtaza Rizvi

    Published 2021-01-01
    “…The studied durability parameters included rapid chloride permeability (RCP) and chloride penetration depth (CPD) by immersion method (28 and 120 days) and acid attack resistance (AAR) (28 and 120 days). Various basic mechanical properties of HSC were also analyzed, such as compressive strength (fCM), modulus of elasticity (ECM), splitting-tensile strength (fCTM), and modulus of rupture (fCRM). …”
    Get full text
    Article
  13. 3253

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…The rapid growth of the Internet of Medical Things (IoMT) is changing healthcare data management, but it also brings serious issues like data privacy, malicious attacks, and service quality. In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. …”
    Get full text
    Article
  14. 3254

    University proceedings. Volga region. Social sciences by A.A. Nerush

    Published 2024-11-01
    “…Possible resolution strategies include: confrontation (attacks, creating conditions for defeat) or avoidance (blocking, exclusion from the group), and the involvement of external arbitration. …”
    Article
  15. 3255

    Generative Image Steganography via Encoding Pose Keypoints by Yi Cao, Wentao Ge, Chengsheng Yuan, Quan Wang

    Published 2024-12-01
    “…This method is robust against common image attacks, such as salt and pepper noise, median filtering, compression, and screenshots, with an average bit error rate of less than 0.87%. …”
    Get full text
    Article
  16. 3256

    A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing by Canling Wang, Wei Wu, Fulong Chen, Hong Shu, Ji Zhang, Yuxuan Zhang, Taochun Wang, Dong Xie, Chuanxin Zhao

    Published 2024-01-01
    “…Considering the cost of permissions management and the problem of insider malicious node attacks, users hope to implement authorization constraints within the authorized institutions. …”
    Get full text
    Article
  17. 3257

    The End of Akıncı Corps in The Ottoman Empire by Mustafa Alkan

    Published 2013-12-01
    “…The number of Akıncıs continued to increase until the 16th Century. In 1595, during the attacks carried out against Walachia Voivodina Mihail, who rebelled, the Akıncıs which stayed behind the Ottoman army, which was retreating over the wooden bridge, were nearly destroyed due to the inconsiderate act of Grand Vizier Sinan Pasha. …”
    Get full text
    Article
  18. 3258

    Wireless body area network: Architecture and security mechanism for healthcare using internet of things by Arun Kumar, Ritu Dewan, Wisam Subhi Al-Dayyeni, Bharat Bhushan, Jayant Giri, Sardar MN Islam, Ahmed Elaraby

    Published 2025-01-01
    “…But if the Server is exposed to a malicious attack (i.e., flooded with ClientHello messages, the DTLS protocol may no longer serve the purpose) as it may lead to Denial-of-Service (DoS). …”
    Get full text
    Article
  19. 3259

    Joint analysis of blood pressure changes over time and survival of hypertensive patients under treatment at Sawula hospital in Southern Ethiopia by Markos Abiso Erango, Tademe Fiseha, Galgalo Jaba Nura

    Published 2025-01-01
    “…High blood pressure, or hypertension, has been associated with severe health consequences, including death, aneurysms, stroke, chronic renal disease, eye damage, heart attack, heart failure, peripheral artery disease, and vascular dementia. …”
    Get full text
    Article
  20. 3260

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. We also implement MASIT and other existing typical identity-based encryption schemes and evaluate their performance in real platforms. …”
    Get full text
    Article