Showing 3,541 - 3,560 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 3541
  2. 3542
  3. 3543

    Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal by Chia‐Hung Lin, Jian‐Xing Wu, Neng‐Sheng Pai, Pi‐Yun Chen, Chien‐Ming Li, Ching Chou Pai

    Published 2022-05-01
    “…The average NPCR, UACI, and correlation coefficient (CC) are 96.57%, 35.43%, and 0.005, respectively, between the plain PPG and the encrypted PPG data against hacker attacks. The larger‐the‐better of NPCR and UACI indexes and the smaller‐the‐better of CC index are obtained to evaluate the efficiency of the proposed cryptography method. …”
    Get full text
    Article
  4. 3544

    Information Security and Artificial Intelligence–Assisted Diagnosis in an Internet of Medical Thing System (IoMTS) by Pi-Yun Chen, Yu-Cheng Cheng, Zi-Heng Zhong, Feng-Zhou Zhang, Neng-Sheng Pai, Chien-Ming Li, Chia-Hung Lin

    Published 2024-01-01
    “…In a public channel, IoMTS must ensure information security for protection against hacker attacks. Hence, in this study, a symmetric encryption and decryption protocol was designed to ensure infosecurity of biosignals and medical images and assist in specific purposes in disease diagnosis. …”
    Get full text
    Article
  5. 3545

    Helicobacter mastomyrinus infection induces autoimmune hepatitis in mice by Liqi Zhu, Yuanyuan Liang, Linghan Yang, Qihui Yang, Jun Yin, Tao Wang, Xiangming Xu, Quan Zhang

    Published 2025-06-01
    “…Abstracts: Background: Autoimmune hepatitis (AIH) is a chronic progressive liver disease caused by the immune system mistakenly attacking its own hepatocytes. The role of the gut microbiome in the pathogenesis and progression of AIH is of considerable significance. …”
    Get full text
    Article
  6. 3546

    The Instant Effects of Continuous Transcutaneous Auricular Vagus Nerve Stimulation at Acupoints on the Functional Connectivity of Amygdala in Migraine without Aura: A Preliminary S... by Wenting Luo, Yue Zhang, Zhaoxian Yan, Xian Liu, Xiaoyan Hou, Weicui Chen, Yongsong Ye, Hui Li, Bo Liu

    Published 2020-01-01
    “…A significant positive correlation was observed between the FC of the left amygdala and right SMA and the frequency/total time of migraine attacks during the preceding four weeks. Conclusion. …”
    Get full text
    Article
  7. 3547
  8. 3548

    Research hotspots and frontiers in the tumor microenvironment of colorectal cancer: a bibliometric study from 2014 to 2024 by Xinran He, Tingyi Xie, Li Shi, Xuyi Kuang, Lei Li, Xingyu Shang, Bo Fu

    Published 2025-02-01
    “…This has become a popular direction for researching and attacking cancer. However, to date, there is no bibliometric analysis of colorectal cancer and tumor microenvironment from 2014 to 2024. …”
    Get full text
    Article
  9. 3549

    Inebilizumab treatment in a patient with co-occurring AQP4-IgG positive neuromyelitis optica spectrum disorder and myasthenia gravis: a case report and literature review by Xiaoqian Song, Xiaoqian Song, Jingjiao Chen, Chenyang Jin, Yilong Peng, Yuewen Sun, Xueping Zheng

    Published 2025-01-01
    “…Additionally, of 44 patients with clear records of disease recurrence, 31 patients(70.5%) experienced frequent relapses of optic neuritis and myelitis, ranging from 1 to 15 attacks, averaging five. The manifestations of MG are mainly included fatigability, diplopia, and blepharoptosis, with symptoms well-controlled in most patients. …”
    Get full text
    Article
  10. 3550

    The Impact of Exposure to Indoor Pollutants on Allergy and Lung Inflammation among School Children in Selangor, Malaysia: An Evaluation Using Factor Analysis by Khairul Nizam Mohd Isa, Zailina Hashim, Juliana Jalaludin, Dan Norbäck, Mohammed Abdulrazzaq Jabbar, Jamal Hisham Hashim

    Published 2020-08-01
    “…Moreover, there were associations between self-reported wheezing, daytime and nocturnal attack of breathlessness with doctor’s diagnosed asthma among school children.…”
    Get full text
    Article
  11. 3551

    Nerve regeneration using a Bio 3D conduit derived from umbilical cord-Derived mesenchymal stem cells in a rat sciatic nerve defect model. by Terunobu Iwai, Ryosuke Ikeguchi, Tomoki Aoyama, Takashi Noguchi, Koichi Yoshimoto, Daichi Sakamoto, Kazuaki Fujita, Yudai Miyazaki, Shizuka Akieda, Tokiko Nagamura-Inoue, Fumitaka Nagamura, Koichi Nakayama, Shuichi Matsuda

    Published 2024-01-01
    “…<h4>Results</h4>The mean angle of attack value in the kinematic analysis was significantly better in the Bio 3D group (‒20.1 ± 0.5°) than in the silicone group (‒33.7 ± 1.5°) 8 weeks after surgery. …”
    Get full text
    Article
  12. 3552

    Accelerating the design and discovery of tribocorrosion-resistant metals by interfacing multiphysics modeling with machine learning and genetic algorithms by Yucong Gu, Kaiwen Wang, Zhengyu Zhang, Yi Yao, Ziming Xin, Wenjun Cai, Lin Li

    Published 2025-01-01
    “…However, complex service conditions often result in material degradation due to simultaneous mechanical and corrosion attacks on the metal surfaces, such as tribocorrosion. …”
    Get full text
    Article
  13. 3553

    Effectiveness of Kaempferia galanga extract for the prevention of saprolegniasis on catfish Clarias gariepinus eggs by Arvilia Humsari, , Rosidah, , Junianto

    Published 2017-07-01
    “…ABSTRACT Saprolegniasis is a disease caused by the infection of Saprolegnia sp. Saprolegniasis can attack catfish eggs causing a decrease in hatching rate. …”
    Get full text
    Article
  14. 3554

    A Structural Model of Truncated Gaussia princeps Luciferase Elucidating the Crucial Catalytic Function of No.76 Arginine towards Coelenterazine Oxidation. by Nan Wu, Zhi-Chao Xu, Kai-Dong Du, Shen Huang, Naohiro Kobayashi, Yutaka Kuroda, Yan-Hong Bai

    Published 2025-01-01
    “…Geometry and wavefunction analysis on the pathway indicated that R76 plays a vital role in CTZ oxidation, which first anchors the environmental oxygen molecule and induces it to form a singlet biradical state, facilitating its attack on CTZ. Subsequently, R76 and the adjacent Q88, positioned near R76 through the tGLuc refolding process, stabilize the transition states and facilitate the emergence of radical electrons on CTZ at the onset of the CIEEL reaction, which contributes to the subsequent intramolecular electron transfer and the production of excited amide product. …”
    Get full text
    Article
  15. 3555

    Enhancing Secure Medical Data Communication Through Integration of LSB and DCT for Robust Analysis in Image Steganography by Ramyashree, P. S. Venugopala, S. Raghavendra, Vijay S. Kubihal

    Published 2025-01-01
    “…The overall analysis of proposed work significantly improves result in terms of the security and robustness under various attacks.…”
    Get full text
    Article
  16. 3556

    Neglected Questions on the “Forgotten War”: South Korea and the United States on the Eve of the Korean War by Mark Caprio

    Published 2011-01-01
    “…They strengthened calls for close vigilance lest the communist state launch a second surprise, unprovoked attack against its southern neighbor. The contribution made by these documents, however, is limited to enhanced understanding of relations between members of the northern triangle (the Soviet Union, China, and North Korea); they contribute little to understanding of the southern triangle (the United States, Japan, and South Korea). …”
    Get full text
    Article
  17. 3557

    THE ESSENCE AND COMPONENTS OF THREATS TO THE ECONOMIC SECURITY OF HIGHER EDUCATION INSTITUTIONS by Victoria M. Varenyk, Iryna M. Miro, Zoia S. Pestovska

    Published 2025-01-01
    “…The list of threats has been expanded according to the following criteria: - by the nature of implementation: overt - obsolescence of equipment, programs, technologies; covert - hacker attacks; - by the mechanism of influence: indirect - lack of motivation among teachers for research, advanced training, or the introduction of innovative teaching methods; direct - an overly large administrative apparatus, irrational management structure and division of responsibilities, or insufficient control; - by the place of origin: internal threats, as threats can also originate within the institution - insufficient qualifications of top management, reluctance of teachers to develop, sabotage of new technologies, corruption or bribery, unethical behavior. …”
    Get full text
    Article
  18. 3558

    Initial ASIA impairment scale and its association with improvement in cervical spinal cord injury by Aman Singh, Somil Jaiswal, Anil Chandra, Amit Srivastava, Suresh Jaiswal, Awadhesh Yadav, B.K. Ojha, Chhitij Srivastava

    Published 2024-12-01
    “…Road traffic accidents were the leading cause of injury (41.8%, n=236) but had a lower good outcome rate (22.9%) compared to falls (34.7%, n=196) with a higher good outcome rate (38.3%). Animal attacks showed the highest good outcome rate (66.7%, n=20). …”
    Get full text
    Article
  19. 3559

    AI-Driven Framework for Recognition of Guava Plant Diseases through Machine Learning from DSLR Camera Sensor Based High Resolution Imagery by Ahmad Almadhor, Hafiz Tayyab Rauf, Muhammad Ikram Ullah Lali, Robertas Damaševičius, Bader Alouffi, Abdullah Alharbi

    Published 2021-06-01
    “…Guava, well known to be the tropics’ apple, is one significant fruit cultivated in tropical regions. It is attacked by 177 pathogens, including 167 fungal and others such as bacterial, algal, and nematodes. …”
    Get full text
    Article
  20. 3560

    Influence of Team Ability on Physical and Tactical Performance According to Playing Position in Spanish Soccer LaLiga. by Carlos Lago, Ezequiel Rey, Roberto López del Campo, Ricardo Resta, Yixiong Cui, Miguel Ángel Gómez Ruano

    Published 2024-12-01
    “…The following variables were considered: total distance covered (TD) covered by players, distance covered at high intensity (HIR; >24.0 km · h−1),  number of efforts made at high-intensity running (N of HIR), Average Speed (AvSpeed, km · h−1), Offensive Volume (Off Vol): sum of passes, shots, and dribbles executed by the player; Defensive Volume (Def Vol): sum of recoveries, clearances, opponent attack interruptions, and blocked shots executed by the player; and (iii) Game Volume (Game Vol): sum of offensive actions and defensive actions. …”
    Get full text
    Article