-
3481
Lebanon: An Ordinary “Consociational Democracy” in the Regional Context
Published 2019-09-01“…Heightened relations with Syria by 2005, the Israeli attack in 2006, the gravest threat from jihadi-caliphatists – all these factors have negatively affected intra-civil and inter-group relations. …”
Get full text
Article -
3482
Efficient task scheduling and computational offloading optimization with federated learning and blockchain in mobile cloud computing
Published 2025-03-01“…The Android platform is more vulnerable to attacks since it is open-source, allows third-party app stores and it has extensive app screening. …”
Get full text
Article -
3483
PoWBWM: Proof of work consensus cryptographic blockchain-based adaptive watermarking system for tamper detection applications
Published 2025-01-01“…In comparison with the existing system, the experimental findings of the suggested model show an effective tamper detection watermarking system as well as a robust against both intentional and unintentional attacks with an average NCC value of 0.98.…”
Get full text
Article -
3484
Scabies Outbreak Investigation and Risk Factors in East Badewacho District, Southern Ethiopia: Unmatched Case Control Study
Published 2018-01-01“…A total of 4,532 scabies cases line listed with overall attack rate of 110/1,000 population. The mean age was 12 years, and most affected age group was 5–14 years. …”
Get full text
Article -
3485
Main threats to the state’s interests in the sphere of information security of Ukraine
Published 2024-03-01“…For the purpose of more comprehensive understanding of the main threats to the interests of the state in the field of information security of Ukraine, the following threats are identified: the use of information influence to distort political opinion and attitudes of the population to certain phenomena, processes, public authorities, political forces and individuals; imperfect regulatory and legal support for the information security of the state; deliberate distortion of information at the level of state leaders and diplomatic representatives and their negative impact on the opinion of the international community; insufficient participation of the Ukrainian population in countering information attacks; insufficient institutional and organisational support for information security education and the formation of an information security culture in society. …”
Get full text
Article -
3486
Explosive Performance Assessment of Buried Steel Pipeline
Published 2021-01-01“…It is so important to consider the passive defense problem in any places there have been attacks by varies kinds of military threats and terrorists. …”
Get full text
Article -
3487
Assessing the Adherence of ChatGPT Chatbots to Public Health Guidelines for Smoking Cessation: Content Analysis
Published 2025-01-01“…All chatbots showed resilience to adversarial attacks that were intended to derail the conversation. …”
Get full text
Article -
3488
A high-throughput ResNet CNN approach for automated grapevine leaf hair quantification
Published 2025-01-01“…A high leaf hair density present on the abaxial surface of the grapevine leaves influences their wettability by repelling forces, thus preventing pathogen attack such as downy mildew and anthracnose. Moreover, leaf hairs as a favorable habitat may considerably affect the abundance of biological control agents. …”
Get full text
Article -
3489
Coping, meaning in life, and quality of life during ongoing conflict: insights from Israeli populations
Published 2025-01-01“…Methods In May 2024, seven months post–October 7th attacks, we conducted a cross-sectional study with 366 participants (221 evacuated, 145 non-evacuated) via a survey company. …”
Get full text
Article -
3490
The Analysis of Dynamic Changes and Prognosis of Posner–Schlossman Syndrome with Cytomegalovirus Infection and Antiviral Therapy
Published 2021-01-01“…Clinical retrospective cohort study in the Eye & ENT Hospital of Fudan University, Shanghai, China. The attacked eyes of 98 eligible subjects diagnosed unilateral PSS were enrolled between 2016 and 2019. …”
Get full text
Article -
3491
A Pilot Study of Hemoglobin A1C Levels in Patients with Type 2 Diabetes after Creation of a Patient Assistance Program Enrollment Committee at a Student-Run Free Clinic
Published 2025-01-01“…ED visits and hospital admissions for heart attacks occurred only in the non-PAP group. Conclusion: While patients enrolled in PAPs showed a greater average reduction in A1C, the difference was not statistically significant. …”
Get full text
Article -
3492
Face Boundary Formulation for Harmonic Models: Face Image Resembling
Published 2025-01-01“…The boundary and numerical techniques of face images in this paper can be used not only for pattern recognition but also for face morphing, morphing attack detection (MAD), and computer animation as Sora to greatly enhance further developments in AI.…”
Get full text
Article -
3493
Mechanistic insights and atmospheric implications of the degradation reaction of 3-methoxy-1-propanol by reaction with hydroxyl radicals and identification of the end products in t...
Published 2025-01-01“…The rate coefficient for 3M1P degradation was calculated from the sum of the rate coefficients corresponding to the removal of H-atoms from primary (–CH3), secondary (–CH2–), tertiary (–CH< ), and alcohol (–ΟH) groups. The primary attack by hydroxyl radicals occurs at the hydrogen atom bonded to carbon atoms adjacent to the oxygen atom in the ether group, leading to the formation of alkyl radicals. …”
Get full text
Article -
3494
Regional Arterial Stiffness in Patients with Inflammatory Bowel Disease
Published 2019-06-01“…To study muscular (brachial and radial arteries) and elastic (aorta) regional arterial stiffness in IBD patients in comparison with those without IBD, as well as to establish the relationship between arterial stiffness and the characteristics of the IBD course (the duration of illness, severity of attack, activity of systemic inflammation). Materials and methods. …”
Get full text
Article -
3495
An Autonomous Underwater Vehicle Navigation Technique for Inspection and Data Acquisition in UWSNs
Published 2024-01-01“…Furthermore, in the inspection and data acquisition mission in UWSN simulated as node points (o) in pink, AUV (*) in blue effectively follows the predetermined points while acquiring data, as indicated by green lines (-) within just 5 seconds, achievable by increasing the value of <inline-formula> <tex-math notation="LaTeX">$\alpha $ </tex-math></inline-formula> (angle of attack) of the target node to reduce delay time. The evaluation of the experimental simulations has raised issues and future research challenges, including the development of environmental simulation challenges that can closely resemble real conditions, the measurement of energy usage effectiveness to reach each target point, and the potential development of underwater recharging techniques. …”
Get full text
Article -
3496
One size does not fit all: Classical weed biological control across continents
Published 2025-01-01“…To evaluate the risk of non-target attack by P. ichini on three Australian native non-target species (Rhus taitensis, Pleiogynium timoriense, and Euroschinus falcatus), we performed a two-phase open-field experiment to simulate the spillover risk of the biological control agent in both the presence and absence of their preferred host, S. terebinthifolia. …”
Get full text
Article -
3497
2D physically unclonable functions of the arbiter type
Published 2023-03-01“…It seems promising to further develop the ideas of constructing two-dimensional physically unclonable functions of the arbiter type, as well as experimental study of their characteristics, as well as resistance to various types of attacks, including using machine learning.…”
Get full text
Article -
3498
Prehospital video triage of suspected stroke patients in Greater Manchester: pilot project report
Published 2025-01-01“…Final diagnosis for PHVT patients was stroke in 15 (33%) of cases, non-stroke in 20 (43%) and transient ischaemic attack in 11 (24%).Patients/caregivers found PHVT beneficial in directing them to appropriate hospitals and streamlining admission and treatment. …”
Get full text
Article -
3499
Legal aspects of functional security standardisation of the Internet of Things
Published 2023-09-01“…A review of existing security infrastructures for IoT-based intelligent environments shows that every connected device can be a potential entry point for an attack. An overview of the key aspects of security standards for smart environments based on the Internet of Things has been provided in the following areas: potential solutions, intelligent environments, limits of security assessment, open issues and challenges. …”
Get full text
Article -
3500
Inhibition of Tannerpin-M encoded by periodontal pathogens on serine proteases released by granulocytes
Published 2024-12-01“…It revealed that Tannerpin-M possessed a significantly elongated reactive center loop and could undergo the classical conformational transition from a stressed to a relaxed state.Conclusion·Tannerpin-M, derived from oral pathogenic bacteria, is a typical inhibitory Serpin, and can effectively inhibit the serine protease released by granulocytes, by which it may protect the oral pathogenic bacteria from attacks of the human immune system.…”
Get full text
Article