-
3261
Effect of Aspect Ratio, Channel Orientation, Rib Pitch-to-Height Ratio, and Number of Ribbed Walls on Pressure Drop Characteristics in a Rotating Channel with Detached Ribs
Published 2007-01-01“…Pitch-to-rib height ratios (P/e) of 5 and 10 at constant rib height-to-hydraulic diameter ratio (e/D) of 0.1 and a clearance ratio (C/e) of 0.38 are considered. The rib angle of attack with respect to mainstream flow is 90∘. The channel orientation at which the ribbed wall becomes trailing surface (pressure side on which the Coriolis force acts) is considered as the 0∘ orientation angle. …”
Get full text
Article -
3262
Counteracting Mobbing in Labor Legal Relations
Published 2020-09-01“…Harassment at the workplace can provoke feelings of social inferiority, leads to a number of nervous diseases, nervous breakdowns, sleep problems, depression, heart attacks and possible suicide. It has been noted that one of the most important current tasks of labor protection at enterprises is to create a proper psychological climate for each employee at his workplace. …”
Get full text
Article -
3263
Joint Analysis of Morphological Parameters and In Silico Haemodynamics of the Left Atrial Appendage for Thrombogenic Risk Assessment
Published 2022-01-01“…Statistical analysis, regression models, and random forests were used to analyse the differences between morphological and haemodynamics parameters, extracted from computational simulations built on 3D rotational angiography images, between patients with and without transient ischemic attack (TIA) or cerebrovascular accident (CVA). Results. …”
Get full text
Article -
3264
Effect of perampanel in reducing depression in patients with focal epilepsy
Published 2025-06-01“…Multiple Regression Analysis was found that annual family income, etiology, the frequency of attacks in recent years, types of ASMs and the age were the influence factors of pirampanel in reducing depression (P<0.05). …”
Get full text
Article -
3265
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform
Published 2022-03-01“…Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.…”
Get full text
Article -
3266
Strange features are no better than no features: predator recognition by untrained birds
Published 2025-01-01“…We presented an unmodified kestrel dummy and two modified kestrel dummies (one with pigeon key features, the other lacking key features) to wild red-backed shrikes defending their nest. The shrikes attacked the unmodified dummy kestrel more intensively than both kestrel modifications when defending the nest. …”
Get full text
Article -
3267
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy
Published 2020-01-01“…In this context, by explaining the importance of cyber power, the need for cyber power to be considered as one of the elements of national power and the importance of providing security against cyber attacks with deterrence by cyber power are discussed, while a new and integrated approach for the creation and implementation of a NCSS and an authoritarian organizational structure responsible for this strategy is proposed. …”
Get full text
Article -
3268
THE ROLE OF ACUPUNCTURE THERAPY TO OVERCOME ONE-SIDE HEAD PAIN (MIGRAINE)
Published 2022-03-01“…Background: Migraine is a primary headache, usually described as pain attacks lasting 4 - 72 hours, unilateral, throbbing, with moderate to severe pain intensity that can be exacerbated by activity, and can be accompanied by nausea and vomiting, photophobia and phonophobia. …”
Get full text
Article -
3269
Maternal and fetal arrhythmia as a sign of hemodynamic deterioration: a case report
Published 2024-02-01“…However, fetal heart rate was 209 beats/min. The transplacental attack of oral sotalol 80 mg thrice daily was prescribed. …”
Get full text
Article -
3270
Borax and Boric Acid Combination As Fire Retardant and Anti-termite Agents on Red Meranti Wood
Published 2012-01-01“…The results showed that the combination of borax: boric acid (1: 1) could improve the quality of red meranti samples against the fire and termite attacks. The most effective impregnation process were 2 hours of pressing time to obtain the 331 kg/ m3 of absorption; actual retention of 28.8 kg/ m3; burnt intensity of 10.9%; maximum combustion temperature of 140ºC; glowing time of 1.03 minutes, termite mortality of 100%; mass loss of 0.002%; and mild degrees of damage category.…”
Get full text
Article -
3271
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01“…Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. Currently, there are around 8 billion devices online, and by the beginning of 2025, there will likely be 25 to 35 billion IoT devices globally. …”
Get full text
Article -
3272
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01“… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
Get full text
Article -
3273
An insight into the genome-wide analysis of bacterial defense mechanisms in a uropathogenic Morganella morganii isolate from Bangladesh.
Published 2025-01-01“…The genome contained mobile genetic components and defense mechanisms, such as restriction modification and CRISPR-Cas systems, indicating the bacterium's ability to defend itself against viral attacks. This thorough investigation sheds important light on M. morganii's pathogenicity and adaptive tactics by revealing its genetic characteristics, AMR, virulence components, and defense mechanisms. …”
Get full text
Article -
3274
Analyzing the Mechanical, Durability, and Microstructural Impact of Partial Cement Replacement with Pumice Powder and Bamboo Leaf Ash in Concrete
Published 2024-01-01“…It also improved resistance to sulfuric acid attack, and Mix-3 had the least strength reduction of 9.59%. …”
Get full text
Article -
3275
Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies
Published 2025-01-01“…Data and model manipulation, data theft, and adversarial attacks as well as model inference threats which we do a systematic analysis to disrupt the integrity, confidentiality as well as availability of AI models. …”
Get full text
Article -
3276
Ethanol Extracts Test of Kumis Kucing (Orthosiphon sp.) Leaves as Natural Preservative of Wood
Published 2013-04-01“…The degree of damage due to termite attacks at the treatment from the lowest (1:12) to the highest (1:4) concentration could be classified as heavy to light. …”
Get full text
Article -
3277
Proactive assessment of a native North American egg parasitoid, Anastatus reduvii (Hymenoptera: Eupelmidae), as a potential biological control agent of Lycorma delicatula (Hemipter...
Published 2025-01-01“…These observed rates are comparable to that of A. orientalis attacking L. delicatula egg masses. Rearing A. reduvii from eggs of five different host species did not significantly affect parasitism or L. delicatula mortality, although parasitism was substantially higher compared to previous work using A. reduvii reared exclusively on Pentatomidae eggs. …”
Get full text
Article -
3278
Connotation and practice of the integration of academic field based on Bourdieu’s theory——taking the cultivation of cyberspace security talents as an example
Published 2023-08-01“…The deployment of network security has become a crucial strategy for the development of modern nations, with skilled professionals serving as the core driving force behind cybersecurity efforts.Cultivating cybersecurity talents and fostering team building are essential for China's talent reserves and strategic capital accumulation.With economic globalization, 0-day vulnerabilities have constantly emerged in information systems, attack chains have become increasingly complex, threat targets were difficult to detect, and hidden viruses varied over time.Talents trained by traditional universities for network security were unable to adapt to innovative production and practical activities in the new fields, as it was confined to their training structure system.In order to break through the shackles of the internal administrative structure and traditional curriculum system of universities, and ease the contradiction between the uncertainty of cyberspace security situation and the standardization of talent cultivation, the talent cultivation models based on Bourdieu's theory were studied, the fusion meaning of cultural capital in the academic field was analyzed and three practical standards were put forward in terms of teaching content, cultivation model and teaching opportunity of cyberspace security talents in combination with the actual cases of the “Fang class”.In terms of education content, standards and open knowledge systems were established to meet the differentiated needs of students.The mentorship approach was employed to construct habitus, fostering students’ ability to adapt flexibly to problems by adopting different cognitive thinking modes.Favorable teaching opportunities were utilized by tutors in various roles to promote efficient integration of individuals and fields, helping students establish a valuable and stable mindset.By leveraging Bourdieu's theory to explore the integration path of academic fields, it has leveraged the advantages of independently cultivating high-quality talents, vigorously promoting technological innovation and the healthy ecological development of the industry.…”
Get full text
Article -
3279
Special International Tribunal on the investigation of the russian aggression against Ukraine: legal analysis, international jurisdiction and challenges
Published 2023-09-01“…It has been noted that the establishment of a Special International Tribunal to investigate the crime of russian aggression against Ukraine should become an effective mechanism for investigating and documenting violations of International Human Rights Law and International Humanitarian Law committed by russia on the territory of Ukraine with the identification of those responsible; compensation for victims and restoration of justice for the Ukrainian people from russia's full-scale armed attack; deterrence of aggressive and destabilising actions of the russian federation, which violates the sovereignty and territorial integrity of Ukraine. …”
Get full text
Article -
3280
Two Faces of Transcendental Empiricism: Gilles Deleuze and John McDowell
Published 2024-12-01“…It is motivated by Sellar’s critique of “the Myth of the Given” and McDowell’s attack on the “third dogma of empiricism”. These projects show the inconsistency of traditional empiricism. …”
Get full text
Article