-
3361
Study on mechanical, hydrophobic and corrosion resistant properties of methylsiloxan-based mortar modified by micro-nano supplementary cementitious materials
Published 2025-01-01“…Concrete with porous hydrophilic properties is easily attacked by corrosive ions, which seriously affects the durability of concrete structures. …”
Get full text
Article -
3362
Advancing allergic rhinitis research through phenome-wide association studies: Insights from known genetic loci
Published 2025-01-01“…Additionally, potential associations were observed with ulcerative colitis, psoriasis, chalazion, pernicious anemia, glaucoma, multiple sclerosis, arthritis, prostate cancer, varicose veins of lower extremities, and heart attack. LDSC analysis showed that only asthma, eczema, and nasal polyps have significant positive genetic correlations with AR. …”
Get full text
Article -
3363
Estimation of the potential geographical distribution of invasive peach fruit fly under climate change by integrated ecological niche models
Published 2023-10-01“…The peach fruit fly, Bactrocera zonata Saunders, is one of the most economically important Tephritidae species that attack several host plants and causes serious damage in Asia and Africa. …”
Get full text
Article -
3364
Perioperative Management of a Patient with Hereditary Angioedema and Intestinal Obstruction Secondary to an Ileal Tumor: A Case Report
Published 2025-01-01“…Although C1-INH concentrates are the principal treatment for abdominal HAE attacks, other causes of acute abdomen should be considered, particularly in cases of persistent symptoms, to guide appropriate management. …”
Get full text
Article -
3365
Saber With Hybrid Striding Toom Cook-Based Multiplier: Implementation Using Open-Source Tool Flow and Industry Standard Chip Design Tools
Published 2025-01-01“…The Saber is a lattice-based post-quantum cryptographic or quantum-safe algorithm designed as a quantum computing attack-resistant protocol. The hardness of SABER is based on the Rounding with Learning (LWR) problem. …”
Get full text
Article -
3366
Radiofrequency thermocoagulation of Gasserian ganglion in trigeminal neuralgia
Published 2025-01-01“…This condition typically manifests as recurring episodes of sharp, unilateral pain along one or more branches of the trigeminal nerve.The exact mechanism of trigeminal neuralgia remains largely unknown. Most pain attacks are triggered by certain stimuli in the areas served by the trigeminal nerve. …”
Get full text
Article -
3367
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01“…In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. …”
Get full text
Article -
3368
Gradient diffusion entropy corrected ALNS optimization for vegetation topology interaction networks
Published 2025-01-01“…The GDEO-ALNS optimized interaction structure slows down the ECV drop rate in topological attacks by 0.03 and 0.02, respectively, compared to the original interaction structure, which provides better immunity to interference compared to the optimized structure of ALNS. …”
Get full text
Article -
3369
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
Published 2023-01-01“…However, the deployment of these technologies increases the overall attack surface. The MITRE ATT&CK® matrices have been developed to document an adversary’s tactics and techniques based on real-world observations. …”
Get full text
Article -
3370
Oxidation Degradation of Rhodamine B in Aqueous by UV/S2O8 2− Treatment System
Published 2012-01-01“…With the increase of oxidant S2O8 2−, more SO4 •− produced to attack RhB molecules and result in the increase of RhB degradation. …”
Get full text
Article -
3371
Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies
Published 2025-01-01“…In addition, this study addresses vulnerabilities in lightweight AES cryptographic hardware to side-channel attacks (SCA), specifically focusing on Differential Fault Analysis (DFA). …”
Get full text
Article -
3372
Synthesis, Characterization, Semiempirical and Biological Activities of Organotin(IV) Carboxylates with 4-Piperidinecarboxylic Acid
Published 2014-01-01“…HOMO-LUMO calculations show that chlorodiorganotin complexes are more susceptible to nucleophilic attack as compared to triorganotin complexes. Computed negative heat of formation indicates that complexes 1–4 are thermodynamically stable. …”
Get full text
Article -
3373
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
Published 2023-12-01“…When collecting large-scale vehicle-provided data, the data transmitted via autonomous networks are publicly accessible to all attackers, which increases the risk of vehicle exposure. …”
Get full text
Article -
3374
Evaluation of Risk Factors for Antibiotic Resistance in Patients with Nosocomial Infections Caused by Pseudomonas aeruginosa
Published 2016-01-01“…In the multivariate analysis, previous cefazolin use was found as an independent risk factor for the development of imipenem resistance (OR = 3.33; CI 95% [1.11–10.0]; p = 0.03), whereas previous cerebrovascular attack (OR = 3.57; CI 95% [1.31–9.76]; p = 0.01) and previous meropenem use (OR = 4.13; CI 95% [1.21–14.07]; p = 0.02) were independent factors for the development of meropenem resistance. …”
Get full text
Article -
3375
Effects of Coach’s Verbal Encouragement During Small-Sided Volleyball Games on Specific Physical Fitness and Technical-Tactical Behavior of Youth Athletes
Published 2025-01-01“…Physical performance including agility t-test (ATT), 10-m sprint test (10-mST), countermovement jump test (CMJT), medicine ball throw test (MBTT), multistage 20-meter shuttle run test (M20-MSRT), and technical-tactical behavior (serve, reception, sets, attack, defense) were measured in pre-test and post-test. …”
Get full text
Article -
3376
Enhancing heart disease classification based on greylag goose optimization algorithm and long short-term memory
Published 2025-01-01“…Such conditions may consist of coronary artery disease, which is characterized by the narrowing or clotting of the arteries that supply blood to the heart muscle, with the resulting threat of heart attacks. Heart rhythm disorders (arrhythmias), heart valve problems, congenital heart defects present at birth, and heart muscle disorders (cardiomyopathies) are other types of heart disease. …”
Get full text
Article -
3377
Molecular complexity of quantitative immunity in plants: from QTL mapping to functional and systems biology
Published 2024-05-01“…In nature, plants defend themselves against pathogen attack by activating an arsenal of defense mechanisms. …”
Get full text
Article -
3378
Resveratrol Inhibits Hepatic Stellate Cell Activation via the Hippo Pathway
Published 2021-01-01“…Liver fibrosis, which results from chronic liver injury due to factors such as chronic alcohol consumption, hepatitis virus infections, and immune attacks, is marked by excessive deposition of extracellular matrix (ECM). …”
Get full text
Article -
3379
THE TOTAL LEUKOCYTE COUNT OF ELDERLY PATIENTS CONFIRMED COVID-19 WITH/WITHOUT A VENTILATOR IN A SURABAYA GENERAL HOSPITAL IN 2021
Published 2023-07-01“…Background: Coronavirus is a virus that attacks the immune system, especially the human respiratory system. …”
Get full text
Article -
3380
Deep learning technology: enabling safe communication via the internet of things
Published 2025-02-01“…Despite offering many advantages, the diversified architecture and wide connectivity of IoT make it vulnerable to various cyberattacks, potentially leading to data breaches and financial loss. Preventing such attacks on the IoT ecosystem is essential to ensuring its security.MethodsThis paper introduces a software-defined network (SDN)-enabled solution for vulnerability discovery in IoT systems, leveraging deep learning. …”
Get full text
Article