-
641
A Secure Object Detection Technique for Intelligent Transportation Systems
Published 2024-01-01Subjects: Get full text
Article -
642
-
643
Investigating the Relationship Between Clinical Characteristics, Mental Health, and Vascular Function in Minor Ischemic Stroke or Transient Ischemic Attack Patients
Published 2024-06-01“…However, there is a notable gap in research focusing on the mental and vascular conditions of minor ischemic stroke or transient ischemic attack (TIA) patients, particularly within the Thai population…”
Get full text
Article -
644
Efficient detection technology of DDoS attacks based onBF-DT-CUSUM algorithm in smart grid industrial control system
Published 2015-12-01Subjects: Get full text
Article -
645
Risk stratification for acute stroke development after a transient ischemic attack and the use of scoring systems in pre-hospital scenarios
Published 2024-01-01“…Introduction:Transient Ischemic Attack (TIA) is a temporary cerebral circulation disorder manifested by a neurological deficit that usually resolves within 60 minutes, as opposed to cerebrovascular insult, where the cerebral circulation disorder is permanent, and the neurological deficit doesn't resolve. …”
Get full text
Article -
646
-
647
-
648
Enhancing security and efficiency in Mobile Ad Hoc Networks using a hybrid deep learning model for flooding attack detection
Published 2025-01-01“…However, their wireless architecture makes them highly vulnerable to flooding attacks, which can disrupt communication, deplete energy resources, and degrade network performance. …”
Get full text
Article -
649
The BBC, Daily Telegraph and Wikinews timelines of the terrorist attacks of 7th July 2006 in London: a comparison with contemporary discussions
Published 2006-01-01“…We compared published media timelines with blog postings and news stories related to the London attacks of July, 2005. Rich Site Summary (RSS) technology was used to gather data from 19,587 blog and news sites. …”
Get full text
Article -
650
Psychological Support for Individuals Experiencing Acute Trauma (Based on Experience Working with Victims of a Terrorist Attack at Crocus City Hall)
Published 2024-05-01“…The article analyzes domestic and international literature on the psychological consequences of terrorist attacks, considering the main mental disorders and symptoms associated with the trauma of being a witness, as well as methods and techniques for working with individuals who have experienced mental trauma. …”
Get full text
Article -
651
-
652
Transient Ischemic Attack and Ischemic Stroke in Danon Disease with Formation of Left Ventricular Apical Thrombus despite Normal Systolic Function
Published 2017-01-01“…Subsequently, her neurological manifestation progressed to transient ischemic attack (TIA) and eventually to ischemic stroke confirmed by CT scan with 1-day history of expressive aphasia followed by persistent left side weakness and numbness. …”
Get full text
Article -
653
Abdominal attack in a patient with hereditary angioedema due to C1 inhibitor deficiency complicated by a perforated peptic ulcer
Published 2024-02-01“…Differential diagnosis of reasons other than HAE attack should be made.…”
Get full text
Article -
654
-
655
The effectiveness of honey supplementation in feed for improving goldfish fingerling Carassius auratus immune system against Aeromonas hydrophila bacteria attack
Published 2019-01-01“…ABSTRACT The attack of Aeromonas hydrophila bacteria can cause mortality in goldfish approximately 100%. …”
Get full text
Article -
656
Experiencing Traumatic Violence: An Interpretative Phenomenological Analysis of One Man’s Lived Experience of a Violent Attack Involving a Knife
Published 2025-01-01“…Participant ‘J’ is the survivor of an extremely violent attack, involving the use of a knife, in his own home. …”
Get full text
Article -
657
CYBER SECURITY ANALYSIS OF IOT DEVICES TRANSMITTING DATA IN THE THINGSPEAK PLATFORM CLOUD
Published 2022-10-01Subjects: “…IoT security, sniffing IoT attacks, ThingSpeak, IoT, IoT attacks…”
Get full text
Article -
658
High order DPA with profiling
Published 2018-09-01Subjects: “…side channel attack…”
Get full text
Article -
659
Finite-Time Synchronization of Fractional-Order Complex-Valued Multi-Layer Network via Adaptive Quantized Control Under Deceptive Attacks
Published 2025-01-01Subjects: Get full text
Article -
660