-
621
Prevalence and intensity of ectoparasites attacked goonch (Bagarius yarelli) captured from Perjaya Dam, Komering River, South Sumatra
Published 2024-10-01“…Another aspect that needs to concern in domestication is the defense of domesticated species from several pathogens, especially parasites because most of wild fish captured from natural habitats are attacked by several parasites. This study aimed to determine the prevalence and intensity of ectoparasites attacked goonch captured from Perjaya Dam. …”
Get full text
Article -
622
An intelligent hybrid approach combining fuzzy C-means and the sperm whale algorithm for cyber attack detection in IoT networks
Published 2025-01-01“…In the first step, we use a novel SWA optimization algorithm to enhance the FCM performance and provide effective defenses against various types of smart city attacks. Next, we propose an adaptive threshold strategy to enhance the global search capability of SWA and prevent the algorithm from settling into local optima. …”
Get full text
Article -
623
Semiochemical Diversity in Practice: Antiattractant Semiochemicals Reduce Bark Beetle Attacks on Standing Trees—A First Meta-Analysis
Published 2012-01-01“…Reduction of tree mortality caused by bark beetle attacks is not only important for forestry, but also essential for the preservation of biodiversity and forest carbon sinks in the face of climate change. …”
Get full text
Article -
624
Short-Lasting Unilateral Neuralgiform Headache Attacks with Conjunctival Injection and Tearing in a Patient with Varicella-Zoster Virus Encephalomyelitis
Published 2017-01-01“…Short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing syndrome (SUNCT) is a type of trigeminal autonomic cephalalgia. …”
Get full text
Article -
625
Practical security of twin-field quantum key distribution with optical phase-locked loop under wavelength-switching attack
Published 2025-01-01“…Here, by identifying vulnerabilities of an acousto-optic modulator (AOM) in the OPLL scheme, we propose and demonstrate a wavelength-switching attack on a TF-class QKD system. This attack involves Eve deliberately manipulating the wavelength of the reference light to increase mean photon number of prepared quantum states, while maintaining stable interference between Alice and Bob as required by TF-class QKD protocols. …”
Get full text
Article -
626
A PRELIMINARY RESULTS ON THE CONTROL OF CERCOSPORA LEAF SPOT ATTACK IN SOME SUGAR BEET HYBRIDS WITH DIFFERENT DOSES OF FUNGICIDES
Published 2024-05-01“…The assessment of Cercospora leaf spot attack intensity were made using a scale of 1 to 9. …”
Get full text
Article -
627
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Published 2025-01-01Subjects: “…DDoS attack detection…”
Get full text
Article -
628
Development of Hybrid Intrusion Detection System Leveraging Ensemble Stacked Feature Selectors and Learning Classifiers to Mitigate the DoS Attacks
Published 2025-02-01Subjects: “…DoS attacks…”
Get full text
Article -
629
-
630
Association of Slender Patent Ductus Arteriosus Combined With PFO Related to the Transient Ischemic Attack: A Rare Case Report
Published 2025-01-01Subjects: Get full text
Article -
631
Effect of Flow Attack Angle for V-Wavy Plate on Flow and Heat Transfer in a Square Channel Heat Exchanger
Published 2018-01-01“…Effects of flow attack angles of the V-wavy plate on flow and heat transfer in a square channel heat exchanger are investigated numerically. …”
Get full text
Article -
632
Influence of Water Pressure on the Mechanical Properties of Concrete after Freeze-Thaw Attack under Dynamic Triaxial Compression State
Published 2019-01-01“…This study aims at determining the effect of water pressure on the mechanical properties of concrete subjected to freeze-thaw (F-T) attack under the dynamic triaxial compression state. …”
Get full text
Article -
633
Effects of nano-SiO2 on sulfate attack resistance of multi-solid waste-based alkali-activated mortar
Published 2025-07-01Subjects: Get full text
Article -
634
Attacking scheme against the permutation-based multi-polynomial scheme for pair-wise key establishment in wireless sensor networks
Published 2015-08-01Subjects: Get full text
Article -
635
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01Subjects: Get full text
Article -
636
Neural networks-based event-triggered consensus control for nonlinear multiagent systems with communication link faults and DoS attacks
Published 2024-06-01Subjects: Get full text
Article -
637
The feasibility of assessing prognosis over 3 years in persons with a previous stroke/transient ischemic attack in general practice
Published 2025-01-01“…We aim to assess whether it is feasible to assess prognosis in persons, with a previous stroke or transient ischemic attack (TIA), in general practice, and whether a well-powered observational study is possible. …”
Get full text
Article -
638
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
Published 2025-02-01Subjects: Get full text
Article -
639
Design and implementation of OSPF vulnerability analysis and detection system
Published 2013-09-01Subjects: Get full text
Article -
640