-
3321
Sex uden samtykke ̶ udviklingen i islandsk ret
Published 2021-02-01“…According to par. 2 of Art. 194 GPC, rape also involves the abuse of the situation of a person, who does not have the same capacities as adults generally do to defend themselves against sexual attacks. This can be the abuse of a victim’s permanent condition, i.e. a mental illness or any other type of psychological disability, to have sex with the victim, or the abuse of a victim’s temporary condition which causes the victim to be unable to defend themselves against the offence, e.g. because the victim is drunk, sleeping, or unconscious because of the use of medicines or drugs. …”
Get full text
Article -
3322
Conflicts between indigenous and scientific concepts of landscape management for wildlife conservation: human-chimpanzee politics of coexistence at Bossou, Guinea
Published 2014-02-01“…The agricultural environment is valued by a chimpanzee “conservation model” based on indigenous experience and knowledge, which is in conflict with models introduced by outsiders (scientists and public administrations).The indigenous conservation model revealed by this case study may better help to prevent epidemics of zoonoses and injury and deaths due to chimpanzee attacks, compared with the outsiders’ conservation approach based on general knowledge drawn from conservation ecology. …”
Get full text
Article -
3323
On Resilience Guarantees by Finite-Time Robust Control Barrier Functions With Application to Power Inverter Networks
Published 2024-01-01“…Finally, the efficacy of the proposed results is advocated using a simulation study showing resilient grid performance in the presence of the ‘worst-case’ power injection attack, as reported in (Lindström et al. 2021).…”
Get full text
Article -
3324
Combination of functional dyspepsia syndrome and irritable bowel syndrome
Published 2011-06-01“…Patient complained of weakness, drowsiness, dizziness, attacks of subfebrile fever, accompanied by bone aching, frequent painless micturition. …”
Get full text
Article -
3325
Ensuring Cybersecurity in the Context of Digital Economy Development
Published 2020-11-01“…Cybersustainability implies the ability of a system to perform its functions under successful attacks on its resources (probably less effectively within in a short period of time necessary to neutralize cyberthreats and their impacts).Turning to the issue of ensuring cybersustainability of the emerging digital economy of the Russian Federation, the author examines the main types of system-destructing cyberattacks and highlights the steps taken by the Russian government to tackle these threats. …”
Get full text
Article -
3326
Theoretical Study of C2H5 + NCO Reaction: Mechanism and Kinetics
Published 2018-01-01“…The calculated results show that both the N and O atoms of the NCO radical can attack the C atom of C2H5 via a barrierless addition mechanism to form two energy-rich intermediates IM1 C2H5NCO (89.1 kcal/mol) and IM2 C2H5OCN (64.7 kcal/mol) on the singlet PES. …”
Get full text
Article -
3327
Clinical Outcomes and Midterm Mortality After Carotid Endarterectomy: A Single Center Study
Published 2023-10-01“…Indications for CEA included transient ischemic attack (TIA) in 21.1% and a history of ischemic stroke in 26.6% of patients. …”
Get full text
Article -
3328
An approach for multipath optimal selection of network service combinations based on golden eagle optimizer with double learning strategies
Published 2025-01-01“…The algorithm modeled the hunting tactics of wild golden eagles, efficiently targeting the best prey in minimal time by dynamically adjusting two critical components, such as the attack and cruising strategies. In GEO-DLS, the enhanced GEO significantly broadened the search scope for food sources by using personalized learning and mirror reflection techniques. …”
Get full text
Article -
3329
Role of Accumulated Calcium in Alleviating Aluminum Injury in Wheat Plants
Published 2014-01-01“…Aluminum concentration in the apoplastic fluid was very high at 125 μM Ca probably because the plasma membrane of some of the cells was destroyed due to the attack of 100 μM Al. Aluminum content in roots decreased with increasing supply of Ca before Al treatment. …”
Get full text
Article -
3330
Depth Penetration and Scope Extension of Failures in the Cascading of Multilayer Networks
Published 2020-01-01“…Real-world complex systems always interact with each other, which causes these systems to collapse in an avalanche or cascading manner in the case of random failures or malicious attacks. The robustness of multilayer networks has attracted great interest, where the modeling and theoretical studies of which always rely on the concept of multilayer networks and percolation methods. …”
Get full text
Article -
3331
Beyond nutritional immunity: immune-stressing challenges basic paradigms of immunometabolism and immunology
Published 2025-02-01“…Since immune cells actively controlling pathogens (effector cells) typically do not proliferate at infected sites, there is a “stress vulnerability gap” wherein proliferating pathogens are more vulnerable to any type of stress than are the attacking effector cells. Hosts actively stress vulnerable proliferating pathogens by restricting resources (resource-limiting stress) and generating noxious waste products (damaging/disruptive stress) in a fundamental defense here-in termed “immune-stressing.” …”
Get full text
Article -
3332
Родоплемінна географія трипільських поселень Середнього Подніпров'я
Published 2024-12-01“…Based on the results of long-term research conducted by Ukrainian archaeologists at sites in the Cherkasy region, the author identifies the location of 95 nests of settlements of tribes of the Trypillia culture and the directions of their forced migration as a result of the attack of nomads of the Sredniy Stog and Yamna cultures. …”
Get full text
Article -
3333
Modernization of the mechanism of the financial services market cybersecurity legal support
Published 2021-09-01“…It is proposed to create a mechanism for the state to guarantee partial compensation to financial market entities for losses caused by cyber attacks, and to form a separate state body that will determine the amount of compensation, compile a list of critical entities for the financial services market, and establish criteria that will provide appropriate financial assistance. …”
Get full text
Article -
3334
The functioning of the Crimean Tatar language in the authorities and administration of the Crimean Autonomous Soviet Socialist Republic in the context of the policy of indigenizati...
Published 2024-09-01“…The author proposes a periodization of the implementation of national policy, which is divided into four stages. 1) 1917–1923 – search for conceptual principles for the implementation of ethnopolicy; 2) 1923–1928 – official proclamation of indigenization and an attack on national communists in the Turkic republics; 3) 1928–1934 – administrative stage; 4) 1934–1938 – formation of national collective farms and the Crimean Tatar proletariat. …”
Get full text
Article -
3335
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01“…The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network. …”
Get full text
Article -
3336
Neural Networks Application for the Data of PID Controller for Acrobot
Published 2022-01-01“…The purpose of this method is to increase the security of the system against the attack of hackers on facilities of the automatic control system. …”
Get full text
Article -
3337
Predict Diabetes Using Voting Classifier and Hyper Tuning Technique
Published 2023-01-01“…Today, diabetes is one of the most common chronic diseases in the world due to the people’s sedentary lifestyle which led to many health issues like heart attack, kidney frailer and blindness. Additionally, most of the people are unrealizable about the early-stage diabetes symptoms to prevent it. …”
Get full text
Article -
3338
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. …”
Get full text
Article -
3339
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.…”
Get full text
Article -
3340
Gambaran Kritik Diri (Self-Criticism) Pada Mahasiswa
Published 2022-04-01“…Teknik pengumpulan data dilakukan dengan menyebarkan angket The Forms Of Self-Criticising/Attacking & Self-Reassuring Scale (FSRCS) yang dikembangkan oleh Gilbert dan sudah di adaptasi, melalui google form. …”
Get full text
Article