-
3301
Transient epileptic amnesia
Published 2018-09-01“…Treatment with monotherapy often helps totally prevent recurrence of attacks. In the paper we review two case reports of patients with transient epileptic amnesia. …”
Get full text
Article -
3302
Mechanical and durability properties of coal cinder concrete: Experimental study and GPR-based analysis
Published 2025-07-01“…Various CC compositions (ranging from 10 % to 30 %) were analyzed for their effects on compressive strength, splitting tensile strength, flexural tensile strength, density, open porosity, water absorption, and resistance to freezing-thawing and salt attacks. Results showed that as CC content increased, absorptivity and open porosity also rose, while compressive strength improved, peaking at 77.4 MPa with 30 % CC. …”
Get full text
Article -
3303
Odevixibat treatment in a child with hypoplastic left heart syndrome and severe cholestatic pruritus: a case report
Published 2025-01-01“…Portal hypertension was evident on imaging, and the patient was experiencing severe itching attacks that did not respond to treatment with naltrexone, ursodeoxycholic acid, dimetindene, or rifampicin. …”
Get full text
Article -
3304
A Comprehensive Review of Key Cyber-Physical Systems, and Assessment of Their Education Challenges
Published 2025-01-01“…The industrial metaverse for smart manufacturing and its novel characteristics require new types of advanced cyber-physical coordinated situational awareness and active defense against cyber-attacks. These new challenges raise the profile of engineering education at the university level, while the addition of new skills requires rigorous preparatory work and the development of tailored requirements for effective knowledge transfer methods that meet the educational needs of the current environment. …”
Get full text
Article -
3305
Variant of Organizational and Functional Adaptation Structures of a Typical Situational Centre to the Emergence of Crisis Situations
Published 2024-10-01“… Due to the growing number of crisis situations (CS) in the modern world, such as natural disasters, man-made accidents, pandemics, cyber-attacks, financial crises, wars, and other negative events, it is important for the state to develop and adapt the organizational and functional structures of information and analytical units, including situation centers (SC), to respond effectively to such cases, thereby ensuring the country’s resilience in the face of negative circumstances. …”
Get full text
Article -
3306
The Effect of Different Vegetable Oils on Cedar Wood Surface Energy: Theoretical and Experimental Fungal Adhesion
Published 2022-01-01“…Despite having been used for ages to preserve wood against several effects (biological attack and moisture effects) that cause its degradation, the effect of vegetable oils on the cedar wood physicochemical properties is poorly known. …”
Get full text
Article -
3307
Promoting Internal Armed Conflict Resolution and Peacebuilding: The Case of the US–Colombia Relations (Part I)
Published 2020-11-01“…The beginning of the 2000s was yet another pivotal point in the development of bilateral interaction aimed at cessation of hostilities, marked by the 9/11 terrorist attacks, the failure of negotiations between the Colombian government and the opposition, and the implementation of a ‘democratic security’ policy. …”
Get full text
Article -
3308
Carotid endarterectomy outcomes according to anesthesia method: General anesthesia or regional anesthesia?
Published 2024-03-01“…Results: There was no statistically significant difference in postoperative stroke, transient ischemic attack (TIA) and cardiovascular mortality (p: 0.48; p: 0.30; p: 0.63, respectively). …”
Get full text
Article -
3309
EEG reveals brain network alterations in chronic aphasia during natural speech listening
Published 2025-01-01“…Differences in network geometry were assessed by means of graph theory and a targeted node-attack approach. Group-classification accuracy was obtained with a support vector machine classifier. …”
Get full text
Article -
3310
Some Customary Law Nuance on that Hagiography: Attempt of Interpretations
Published 2004-06-01“…Vaitiekus came from Polish lands, he was attacked as a Polish agent or ally. Another motive—he was murdered as he was recognized as a person who was dipping people into water (baptizing) or torturing them in other ways. …”
Get full text
Article -
3311
Designing an internet of things laboratory to improve student understanding of secure IoT systems
Published 2024-01-01“…We also demonstrate potential vulnerabilities of these databases to SQL injection attacks.We administered these labs and collected survey data from the students. …”
Get full text
Article -
3312
Complexity in Individual Trajectories toward Online Extremism
Published 2018-01-01“…By quantifying the trajectories that individuals follow on their journey toward expressing high levels of pro-ISIS support—irrespective of whether they then carry out a real-world attack or not—our findings can help move safety debates beyond reliance on static watch-list identifiers such as ethnic background or immigration status and/or postfact interviews with already convicted individuals. …”
Get full text
Article -
3313
The New “Other” the Endorsement of Islamophobia in American Political Discourse
Published 2022-12-01“… This paper analyses the complexity of problems American Muslims face with Islamophobia by examining (i) how Islamophobic discourse has become an integral part of the American politics; (ii) how the American political discourse on Islam and Muslims has affected the increase of Islamophobia, especially after the 9/11 terrorist attacks; and (iii) how Islamophobia is wielded as a political tool to garner the support of Americans and justify American imperial ambitions including the U.S. invasions and military occupations. …”
Get full text
Article -
3314
Model of the malicious traffic classification based on hypergraph neural network
Published 2023-10-01“…As the use and reliance on networks continue to grow, the prevalence of malicious network traffic poses a significant challenge in the field of network security.Cyber attackers constantly seek new ways to infiltrate systems, steal data, and disrupt network services.To address this ongoing threat, it is crucial to develop more effective intrusion detection systems that can promptly detect and counteract malicious network traffic, thereby minimizing the resulting losses.However, current methods for classifying malicious traffic have limitations, particularly in terms of excessive reliance on data feature selection.To improve the accuracy of malicious traffic classification, a novel malicious traffic classification model based on Hypergraph Neural Networks (HGNN) was proposed.The traffic data was represented as hypergraph structures and HGNN was utilized to capture the spatial features of the traffic.By considering the interrelations among traffic data, HGNN provided a more accurate representation of the characteristics of malicious traffic.Additionally, to handle the temporal features of traffic data, Recurrent Neural Networks (RNN) was introduced to further enhance the model’s classification performance.The extracted spatiotemporal features were then used for the classification of malicious traffic, aiding in the detection of potential threats within the network.Through a series of ablative experiments, the effectiveness of the HGNN+RNN method was verified.These experiments demonstrate the model’s ability to efficiently extract spatiotemporal features from traffic, resulting in improved classification performance for malicious traffic.The model achieved outstanding classification accuracy across three widely-used open-source datasets: NSL-KDD (94% accuracy), UNSW-NB15 (95.6% accuracy), and CIC-IDS-2017 (99.08% accuracy).These results underscore the potential significance of the malicious traffic classification model based on hypergraph neural networks in enhancing network security and its capacity to better address the evolving landscape of network threats within the domain of network security.…”
Get full text
Article -
3315
Method on intrusion detection for industrial internet based on light gradient boosting machine
Published 2023-04-01“…Intrusion detection is a critical security protection technology in the industrial internet, and it plays a vital role in ensuring the security of the system.In order to meet the requirements of high accuracy and high real-time intrusion detection in industrial internet, an industrial internet intrusion detection method based on light gradient boosting machine optimization was proposed.To address the problem of low detection accuracy caused by difficult-to-classify samples in industrial internet business data, the original loss function of the light gradient boosting machine as a focal loss function was improved.This function can dynamically adjust the loss value and weight of different types of data samples during the training process, reducing the weight of easy-to-classify samples to improve detection accuracy for difficult-to-classify samples.Then a fruit fly optimization algorithm was used to select the optimal parameter combination of the model for the problem that the light gradient boosting machine has many parameters and has great influence on the detection accuracy, detection time and fitting degree of the model.Finally, the optimal parameter combination of the model was obtained and verified on the gas pipeline dataset provided by Mississippi State University, then the effectiveness of the proposed mode was further verified on the water dataset.The experimental results show that the proposed method achieves higher detection accuracy and lower detection time than the comparison model.The detection accuracy of the proposed method on the gas pipeline dataset is at least 3.14% higher than that of the comparison model.The detection time is 0.35s and 19.53s lower than that of the random forest and support vector machine in the comparison model, and 0.06s and 0.02s higher than that of the decision tree and extreme gradient boosting machine, respectively.The proposed method also achieved good detection results on the water dataset.Therefore, the proposed method can effectively identify attack data samples in industrial internet business data and improve the practicality and efficiency of intrusion detection in the industrial internet.…”
Get full text
Article -
3316
TITO DORČIĆ AS A FORERUNNER OF THE IRONIC MODE
Published 2020-01-01“…The text, or the narrator, kills him, in the last step in the long procedure of attacking the protagonist.…”
Get full text
Article -
3317
Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities
Published 2025-01-01“…Additionally, the framework achieves a 45% improvement in system resilience during attacks and optimizes defense strategies to reduce deployment costs while increasing overall effectiveness. …”
Get full text
Article -
3318
Potensi Eugenol Fraksi Etil Asetat Bunga Cengkeh terhadap Proliferasi Kanker Serviks (HeLa Cell Line)
Published 2024-09-01“…<p>Cervix cancer, also known as cervical cancer, is a type of cancer that is caused mainly by oncogenic Human Papillomavirus (HPV), which attacks the cervix. One of the plants that can be used in medicine is clove. …”
Get full text
Article -
3319
Background predation risk induces anxiety-like behaviour and predator neophobia in zebrafish
Published 2024-10-01“…., injured conspecific cues that indicate a predator attack) or a low-risk water control stimulus. In Experiment 1, when tested in a novel tank, zebrafish exposed to high predation risk displayed anxiety-like responses (reduced activity and increased bottom time spent) compared to their low-risk counterparts. …”
Get full text
Article -
3320
Theories and Practices of Societal Security in the Scandinavian Countries: A Comparative Analysis
Published 2024-12-01“…Our investigation shows that the Scandinavian way of ensuring security was formed on the basis of the “Scandinavian model”, founded on socialization and integration, and the basis of the new socio-philosophical understanding of security was readiness for broad actions: from military invasion to environmental threats, man-made disasters and terrorist attacks. However, a generally accepted interpretation of societal security among the Scandinavian countries has not yet developed; each country has its own peculiarities. …”
Get full text
Article