Showing 3,261 - 3,280 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 3261

    Effect of Aspect Ratio, Channel Orientation, Rib Pitch-to-Height Ratio, and Number of Ribbed Walls on Pressure Drop Characteristics in a Rotating Channel with Detached Ribs by K. Arun, S. V. Prabhu

    Published 2007-01-01
    “…Pitch-to-rib height ratios (P/e) of 5 and 10 at constant rib height-to-hydraulic diameter ratio (e/D) of 0.1 and a clearance ratio (C/e) of 0.38 are considered. The rib angle of attack with respect to mainstream flow is 90∘. The channel orientation at which the ribbed wall becomes trailing surface (pressure side on which the Coriolis force acts) is considered as the 0∘ orientation angle. …”
    Get full text
    Article
  2. 3262

    Counteracting Mobbing in Labor Legal Relations by V. V. Honcharuk

    Published 2020-09-01
    “…Harassment at the workplace can provoke feelings of social inferiority, leads to a number of nervous diseases, nervous breakdowns, sleep problems, depression, heart attacks and possible suicide. It has been noted that one of the most important current tasks of labor protection at enterprises is to create a proper psychological climate for each employee at his workplace. …”
    Get full text
    Article
  3. 3263

    Joint Analysis of Morphological Parameters and In Silico Haemodynamics of the Left Atrial Appendage for Thrombogenic Risk Assessment by Maria Isabel Pons, Jordi Mill, Alvaro Fernandez-Quilez, Andy L. Olivares, Etelvino Silva, Tom de Potter, Oscar Camara

    Published 2022-01-01
    “…Statistical analysis, regression models, and random forests were used to analyse the differences between morphological and haemodynamics parameters, extracted from computational simulations built on 3D rotational angiography images, between patients with and without transient ischemic attack (TIA) or cerebrovascular accident (CVA). Results. …”
    Get full text
    Article
  4. 3264

    Effect of perampanel in reducing depression in patients with focal epilepsy by Min Ming, Long Chen, Jian Huang, Ying Huang, Jiali Yin

    Published 2025-06-01
    “…Multiple Regression Analysis was found that annual family income, etiology, the frequency of attacks in recent years, types of ASMs and the age were the influence factors of pirampanel in reducing depression (P<0.05). …”
    Get full text
    Article
  5. 3265

    Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform by Ka‐Wing Tse, Kevin Hung

    Published 2022-03-01
    “…Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.…”
    Get full text
    Article
  6. 3266

    Strange features are no better than no features: predator recognition by untrained birds by Ondřej Fišer, Irena Strnadová, Petr Veselý, Michaela Syrová, Michal Němec, Barbora Kamišová, Josef Šalom, Roman Fuchs

    Published 2025-01-01
    “…We presented an unmodified kestrel dummy and two modified kestrel dummies (one with pigeon key features, the other lacking key features) to wild red-backed shrikes defending their nest. The shrikes attacked the unmodified dummy kestrel more intensively than both kestrel modifications when defending the nest. …”
    Get full text
    Article
  7. 3267

    Creating and Implementing an Effective and Deterrent National Cyber Security Strategy by Mustafa Senol, Ertugrul Karacuha

    Published 2020-01-01
    “…In this context, by explaining the importance of cyber power, the need for cyber power to be considered as one of the elements of national power and the importance of providing security against cyber attacks with deterrence by cyber power are discussed, while a new and integrated approach for the creation and implementation of a NCSS and an authoritarian organizational structure responsible for this strategy is proposed. …”
    Get full text
    Article
  8. 3268

    THE ROLE OF ACUPUNCTURE THERAPY TO OVERCOME ONE-SIDE HEAD PAIN (MIGRAINE) by Mut Mainnah, Wurlina Wurlina, Maya Septriana

    Published 2022-03-01
    “…Background: Migraine is a primary headache, usually described as pain attacks lasting 4 - 72 hours, unilateral, throbbing, with moderate to severe pain intensity that can be exacerbated by activity, and can be accompanied by nausea and vomiting, photophobia and phonophobia. …”
    Get full text
    Article
  9. 3269

    Maternal and fetal arrhythmia as a sign of hemodynamic deterioration: a case report by I.V. Lakhno, I.M. Sykal, S.M. Korovai, V.M. Korotych, A.E. Tkachov

    Published 2024-02-01
    “…However, fetal heart rate was 209 beats/min. The transplacental attack of oral sotalol 80 mg thrice daily was prescribed. …”
    Get full text
    Article
  10. 3270

    Borax and Boric Acid Combination As Fire Retardant and Anti-termite Agents on Red Meranti Wood by Mahdi Santoso, Sutjipto A. Hadikusumo, Abdul Aziz

    Published 2012-01-01
    “…The results showed that the combination of borax: boric acid (1: 1) could improve the quality of red meranti samples against the fire and termite attacks. The most effective impregnation process were 2 hours of pressing time to obtain the 331 kg/ m3 of absorption; actual retention of 28.8 kg/ m3; burnt intensity of 10.9%; maximum combustion temperature of 140ºC; glowing time of 1.03 minutes, termite mortality of 100%; mass loss of 0.002%; and mild degrees of damage category.…”
    Get full text
    Article
  11. 3271

    Framework to analyze and exploit the smart home IoT firmware by Keshav Kaushik, Akashdeep Bhardwaj, Susheela Dahiya

    Published 2025-02-01
    “…Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. Currently, there are around 8 billion devices online, and by the beginning of 2025, there will likely be 25 to 35 billion IoT devices globally. …”
    Get full text
    Article
  12. 3272

    New Heuristics Method for Malicious URLs Detection Using Machine Learning by Maher Kassem Hasan

    Published 2024-09-01
    “… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
    Get full text
    Article
  13. 3273

    An insight into the genome-wide analysis of bacterial defense mechanisms in a uropathogenic Morganella morganii isolate from Bangladesh. by Syed Muktadir Al Sium, Barna Goswami, Sanjana Fatema Chowdhury, Showti Raheel Naser, Mihir Kanti Sarkar, Md Jobaid Faruq, Md Ahashan Habib, Shahina Akter, Tanjina Akhtar Banu, Md Murshed Hasan Sarkar, Md Salim Khan

    Published 2025-01-01
    “…The genome contained mobile genetic components and defense mechanisms, such as restriction modification and CRISPR-Cas systems, indicating the bacterium's ability to defend itself against viral attacks. This thorough investigation sheds important light on M. morganii's pathogenicity and adaptive tactics by revealing its genetic characteristics, AMR, virulence components, and defense mechanisms. …”
    Get full text
    Article
  14. 3274

    Analyzing the Mechanical, Durability, and Microstructural Impact of Partial Cement Replacement with Pumice Powder and Bamboo Leaf Ash in Concrete by Haris Hassen Adem, Fikreyesus Demeke Cherkos

    Published 2024-01-01
    “…It also improved resistance to sulfuric acid attack, and Mix-3 had the least strength reduction of 9.59%. …”
    Get full text
    Article
  15. 3275

    Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies by Alaa Omran Almagrabi, Rafiq Ahmad Khan

    Published 2025-01-01
    “…Data and model manipulation, data theft, and adversarial attacks as well as model inference threats which we do a systematic analysis to disrupt the integrity, confidentiality as well as availability of AI models. …”
    Get full text
    Article
  16. 3276

    Ethanol Extracts Test of Kumis Kucing (Orthosiphon sp.) Leaves as Natural Preservative of Wood by Abdul Azis, T.A. Prayitno, Sutjipto A Hadikusumo, Mahdi Santoso

    Published 2013-04-01
    “…The degree of damage due to termite attacks at the treatment from the lowest (1:12) to the highest (1:4) concentration could be classified as heavy to light. …”
    Get full text
    Article
  17. 3277

    Proactive assessment of a native North American egg parasitoid, Anastatus reduvii (Hymenoptera: Eupelmidae), as a potential biological control agent of Lycorma delicatula (Hemipter... by Mari West, Marco Molfini, Mark S. Hoddle

    Published 2025-01-01
    “…These observed rates are comparable to that of A. orientalis attacking L. delicatula egg masses. Rearing A. reduvii from eggs of five different host species did not significantly affect parasitism or L. delicatula mortality, although parasitism was substantially higher compared to previous work using A. reduvii reared exclusively on Pentatomidae eggs. …”
    Get full text
    Article
  18. 3278

    Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example by Qian ZHOU, Haiping HUANG, Le WANG, Yanchun ZHANG, Fu XIAO

    Published 2023-08-01
    “…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
    Get full text
    Article
  19. 3279

    Special International Tribunal on the investigation of the russian aggression against Ukraine: legal analysis, international jurisdiction and challenges by A. V. Voitsikhovskyi, O. S. Bakumov

    Published 2023-09-01
    “…It has been noted that the establishment of a Special International Tribunal to investigate the crime of russian aggression against Ukraine should become an effective mechanism for investigating and documenting violations of International Human Rights Law and International Humanitarian Law committed by russia on the territory of Ukraine with the identification of those responsible; compensation for victims and restoration of justice for the Ukrainian people from russia's full-scale armed attack; deterrence of aggressive and destabilising actions of the russian federation, which violates the sovereignty and territorial integrity of Ukraine. …”
    Get full text
    Article
  20. 3280

    Two Faces of Transcendental Empiricism: Gilles Deleuze and John McDowell by Danila A. Volkov, Maksim D. Evstigneev

    Published 2024-12-01
    “…It is motivated by Sellar’s critique of “the Myth of the Given” and McDowell’s attack on the “third dogma of empiricism”. These projects show the inconsistency of traditional empiricism. …”
    Get full text
    Article