-
3581
Privacy-preserving approach for IoT networks using statistical learning with optimization algorithm on high-dimensional big data environment
Published 2025-01-01“…The current solution is primarily server-assisted and fails to address collusion attacks among servers or data owners. Additionally, it needs to adequately account for the complex dynamics of the IoT environment. …”
Get full text
Article -
3582
Antihypertensive strategies for the prevention of secondary stroke: a systematic review and meta-analysis
Published 2025-01-01“…Hypertension is a main risk factor for recurrent stroke in patients with ischemic and hemorrhagic stroke or transient ischemic attack. Higher systolic blood pressure, diastolic blood pressure, pulse pressure and mean arterial pressure at admission are independently associated with the risk of stroke recurrence. …”
Get full text
Article -
3583
Non-medical treatment for late age-related macular degeneration
Published 2021-12-01“…Gene therapy affecting the complement system to deactivate its end product, the membrane attack complex, is reasonable in late atrophic AMD. …”
Get full text
Article -
3584
Patrimoine juif, pouvoir marocain
Published 2024-12-01“…This article suggests that the patrimonialization of Judaism in Morocco carries political implications that go beyond the goal of promoting Jewish history, and that touch upon the King’s role in today’s political system.Since his enthronement in 1999, the King Mohammed VI has had to face religious and political challenges (terrorist attacks in Casablanca in 2003, the 20th February Movement in 2011). …”
Get full text
Article -
3585
First results of the EuroHeart program
Published 2024-12-01“…One in five patients (20.2%) had a history of heart attack, 6.2% had a stroke. Abnormal kidney function was confirmed in 7.5% of patients. …”
Get full text
Article -
3586
Increased PD-1 expression in livers associated with PD-1-antibody-induced hepatotoxicity
Published 2025-01-01“…Our findings suggest that VBDS is not due to direct cytotoxicity of checkpoint inhibitors and that the immunological attack against livers induced by these drugs is different from other cholestatic liver conditions. …”
Get full text
Article -
3587
Non‐invasive telemedical care in heart failure patients and stroke: post hoc analysis of TIM‐HF and TIM‐HF2 trials
Published 2020-06-01“…We aimed to identify the incidence rate and factors associated with ischaemic stroke or transient ischaemic attack (TIA) in CHF patients as well as the impact of non‐invasive telemedical care (NITC) on acute stroke/TIA. …”
Get full text
Article -
3588
Prevalence of Diabetes and Cardiovascular Comorbidity in the Canadian Community Health Survey 20022003
Published 2006-01-01“…Diabetes mellitus is a major risk factor for heart disease (heart attack, angina, and heart failure), stroke, and hypertension, which shorten the average life expectancy. …”
Get full text
Article -
3589
The Effectiveness of Rapamycin Combined with Eltrombopag in Murine Models of Immune-Mediated Bone Marrow Failure
Published 2020-01-01“…In this study, an immune attack-mediated AA mouse model was constructed by total body irradiation (TBI) and allo-lymphocyte infusion. …”
Get full text
Article -
3590
The Risk of Escalating Cyberattacks and Financial Fraud During Wartime: The Maturity of The County's Judicial System in Combating Cyber and Financial Crimes
Published 2024-12-01“…The rapid digitalization of financial systems and public services during the war has expanded attack surfaces, with cybercriminals exploiting vulnerabilities in digital banking platforms and cryptocurrency transactions. …”
Get full text
Article -
3591
Bernardin de Saint-Pierre’s paratexts: ‘j’ai senti, j’ai aimé, j’ai parlé’
Published 2024-11-01“…There he delights in the reaction of readers of all backgrounds with their ‘témoignages honorables d’amitié’. He attacks the scientific establishment as a closed shop hostile to challenging ideas, but indicates his confidence in the open-minded judgement of his readers. …”
Get full text
Article -
3592
Designing and explaining the political behavior model of managers in government organizations
Published 2024-09-01“…The results showed that the political behavior of managers is, respectively, receiving control of access to information at the highest level, followed by showing calmness, resistance to change, pleasing others, playing with time, forming groups, blaming and attacking others, dealing with the opposite, strengthening a favorable impact, creating a communication network, support and empathy, and presenting oneself through other powerful people in the next priorities. …”
Get full text
Article -
3593
Protocol for Home-Based Solution for Remote Atrial Fibrillation Screening to Prevent Recurrence Stroke (HUA-TUO AF Trial): a randomised controlled trial
Published 2022-07-01“…Secondary endpoints include recurrent stroke or transient ischaemic attack, initiation of long-term anticoagulation therapy, hospitalisation for heart failure, cardiovascular death and all-cause death.Ethics and dissemination The study protocol has been approved by the institutional review board of The University of Hong Kong, and Hong Kong West Cluster, Hospital Authority, Hong Kong SAR, China. …”
Get full text
Article -
3594
Diagnosis and management of type 2 diabetes mellitus in patients with ischaemic heart disease and acute coronary syndromes - a review of evidence and recommendations
Published 2025-01-01“…In the United Kingdom UK alone, around 120 amputations, 770 CVA, 590 heart attacks, and more than 2300 presentations with heart failure per week are attributed to diabetes DM. with One 1 in six 6 hospital beds and around 10% of the healthcare budget may be being spent on managing diabetes DM or its complications. …”
Get full text
Article -
3595
Explainable artificial intelligence in web phishing classification on secure IoT with cloud-based cyber-physical systems
Published 2025-01-01“…The internet plays a prominent role in modern lives, and the cybersecurity challenge caused by phishing attacks is significant. This research presents a novel approach to address this problem using machine learning (ML) methods for phishing website classification. …”
Get full text
Article -
3596
Russian Science Foundation grant No. 20-14-00140 supported this study. The authors are thankful to the multi-access Center “Bioinformatics” for the use of computational resources a...
Published 2023-01-01“…Accordingly, in this paper, albumin, globulin, and βamylase of common wheat Triticum aestivum L. (1753) are analyzed, which have been identified earlier as targets for attacks by human class E immunoglobulins. At the genomic level, we wanted to find signs of past negative selection against the allergenicity of these three proteins (albumin, globulin, and βamylase) during the domestication of ancestral forms of modern food plants. …”
Get full text
Article -
3597
Atrial fibrillation in acute coronary syndrome: clinical and anamnestic features and effects on the course
Published 2019-03-01“…At the same time, among patients of the 1st group, Killip II and III classes of acute heart failure were more often registered, and these patients belonged to the 1a-subgroup, that is, the heart attack during the AF had a more severe course. Among patients of the 1st group, anemia was significantly more frequently recorded (29.2 vs 10 %, p = 0.0109). …”
Get full text
Article -
3598
Pairing regression and configurational analysis in health services research: modelling outcomes in an observational cohort using a split-sample design
Published 2022-06-01“…Background Configurational methods are increasingly being used in health services research.Objectives To use configurational analysis and logistic regression within a single data set to compare results from the two methods.Design Secondary analysis of an observational cohort; a split-sample design involved randomly dividing patients into training and validation samples.Participants and setting Patients who had a transient ischaemic attack (TIA) in US Department of Veterans Affairs hospitals.Measures The patient outcome was the combined endpoint of all-cause mortality or recurrent ischaemic stroke within 1 year post-TIA. …”
Get full text
Article -
3599
Dual-stack host discovery method based on SSDP and DNS-SD protocol
Published 2023-02-01“…With the exhaustion of the IPv4 addresses, the promotion and deployment of IPv6 has been accelerating.Dual-stack technology allows devices to enable both IPv4 and IPv6 protocols, which means that users are facing more security risks.Although the existing work can realize the identification and measurement of some dual-stack servers, the following problems still exist.Dual-stack host identification requires deep protocol identification of host services, but this method consumes too much scanning resources.Besides, network service providers may provide consistent services on distributed hosts, making it difficult to guarantee the accuracy of dual-stack host identification through service fingerprints.To solve these problems, the LAN service discovery protocol was used to bind host services to IP addresses, and a dual-stack host discovery method based on SSDP and DNS-SD protocols was proposed.In IPv4 network environment, the target host was induced to actively send a request to the constructed IPv6 server through SSDP protocol, and then the IPv6 address was extracted from the server’s log.Or the service list of the target host and its corresponding AAAA record was enumerated through the DNS-SD protocol and the IPv6 address of the target host was obtained, in order to realize the discovery of the dual stack address pairs.With this method, IPv6 addresses was obtained directly from the IPv4 host, which ensured the accuracy of the discovered dual-stack host.At the same time, only request packets for specific protocols were needed during the discovery process, which greatly saved scanning resources.Based on this method, the SSDP hosts and DNS-SD hosts accidentally exposed to the global IPv4 network were measured.A total number of 158k unique IPv6 addresses were collected, of which 55k were dual-stack host address pairs with globally reachable IPv6 addresses.Unlike existing work that focused on dual-stack servers, this method mainly targeted end-users and client devices, and built a unique set of active IPv6 devices and dual-stack host address pairs that have not been explored so far.Through the analysis of the obtained IPv6 address addressing type, it shows that IPv6 address is mainly generated in a random manner, which greatly reduces the possibility of IPv6 hosts being discovered by scanning.In particular, by measuring the ports and services of dual-stack hosts, we found that the security policy differences of dual-stack hosts on different protocol stacks.Especially, IPv6 protocol stack exposes more high-risk services, expanding the attack surface of hosts.The research results also show that the infeasibility of IPv6 address space traversal scanning mitigates the security risks of IPv6, but incorrect network configuration greatly increases the possibility of these high-risk IPv6 hosts being discovered and users should revisit IPv6 security strategy on dual-stack hosts.…”
Get full text
Article -
3600
Digital Platform for Pediatric Mental Health Support During Armed Conflicts: Development and Usability Study
Published 2024-12-01“…ObjectivesThis study aimed to describe the rapid development of a digital mental health tool for community pediatricians, created in response to the urgent need for accessible resources following the October 7th terror attack in Israel. The goal was to create a comprehensive resource that addresses a wide range of emotional and behavioral challenges in children and adolescents, with a particular focus on those affected by armed conflict and significant trauma exposure. …”
Get full text
Article