-
1781
Wind Tunnel Testing on Start/Unstart Characteristics of Finite Supersonic Biplane Wing
Published 2013-01-01“…The tests were carried out using supersonic and transonic wind tunnels over a Mach number range of 0.3≤M∞≤2.3 with angles of attack of 0°, 2°, and 4°. The Schlieren system was used to observe the flow characteristics around the models. …”
Get full text
Article -
1782
Highly selective deethylation of rhodamine B: Adsorption and photooxidation pathways of the dye on the TiO2/SiO2 composite photocatalyst
Published 2003-01-01“…It is confirmed that visible light-induced photocatalytic degradation of dye proceeds on the surface of catalysts rather than in the bulk solution and active oxygen species preferentially attack the molecular portion that connects directly to the surface of catalysts. …”
Get full text
Article -
1783
A Comprehensive Review of AI’s Current Impact and Future Prospects in Cybersecurity
Published 2025-01-01“…This report synthesizes previous research while identifying gaps and future prospects, including the integration of emerging AI approaches, the enhancement of real-time threat detection capabilities, and the addressing of changing attack vectors. By providing a holistic view of the current state and future potential of AI in cybersecurity, this paper aims to serve as a foundational reference for researchers and practitioners seeking to leverage AI for robust and adaptive security solutions.…”
Get full text
Article -
1784
A phylogenetic epidemiology approach to predicting the establishment of multi-host plant pests
Published 2025-01-01“…For host-specialized pests, epidemiological models of spread through a single host population are well developed. However, most pests attack multiple host species; the challenge is predicting which communities are most vulnerable to infestation. …”
Get full text
Article -
1785
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
Published 2022-01-01“…The scheme has been thoroughly securitized against various attacks. The result shows the efficiency of the proposed algorithm over the existing schemes. …”
Get full text
Article -
1786
Effect of the epidemiological heterogeneity on the outbreak outcomes
Published 2017-05-01“…Three types of responses are observed: dilution, amplification or no effect, corresponding to lower, higher or equal attack rates, respectively, for a host population in an interacting multi-host system compared to the zero-mixing situation. …”
Get full text
Article -
1787
Design of an Evolutionary Approach for Intrusion Detection
Published 2013-01-01“…For intrusion detection problem, the proposed approach could consider conflicting objectives simultaneously like detection rate of each attack class, error rate, accuracy, diversity, and so forth. …”
Get full text
Article -
1788
Video Analysis of 26 Cases of Second ACL Injury Events in Collegiate and Professional Athletes
Published 2023-02-01“…Injuries were distributed between attacking play (n=14) and defending (n=8). Player attention was most commonly focused on the ball (n=12) or an opponent (n=7). …”
Get full text
Article -
1789
Comparison of two bolus doses of dexmedetomidine for prophylaxis against postoperative nausea and vomiting in highly susceptible patients: A randomized controlled trial
Published 2024-04-01“…The time to give the first rescue antiemetic was significantly higher in group D75 compared to group D50 and in group D50 and group D75 compared to group C. The number of attacks and postoperative consumption of Ondansetron was significantly lower in group D50 and group D75 compared to group C. …”
Get full text
Article -
1790
Implementasi Mekanisme End-To-End Security pada IoT Middleware
Published 2019-05-01“…However, a vulnerability that can lead to the eavesdropping attack exist. there is no security mechanism in the communication system among middleware with other parties like node sensors and subscribers. …”
Get full text
Article -
1791
Enhancing concealed object detection in active THz security images with adaptation-YOLO
Published 2025-01-01“…Abstract The terahertz (THz) security scanner offers advantages such as non-contact inspection and the ability to detect various types of dangerous goods, playing an important role in preventing terrorist attacks. We aim to accurately and quickly detect concealed objects in THz security images. …”
Get full text
Article -
1792
The influence of meteorological factors on the technical performance of football teams during matches
Published 2024-04-01“…Notably, “shot from counter attack” was the most significantly affected variable, being exclusively influenced by air temperature (OR = 0.55, 95% CI: 0.30 to 0.98). …”
Get full text
Article -
1793
Knowledge, Attitude, and Practice of Community towards an Onchocerciasis Elimination Program from South West Ethiopia
Published 2022-01-01“…As a result, the respondent demonstrates that covering the lower body part lessens the black fly’s vulnerability because they may attack below the knee. In general, community awareness and attitude are required to eradicate this disease from the district. …”
Get full text
Article -
1794
The ‘envers du décor’ of Suffragette Imagery: Anti-Suffrage Caricature
Published 2008-12-01“…They launched a counter attack using numerous propaganda techniques. Among those were representations of the Suffragette and her goals, which they satirised by caricatures in their newspaper, The Anti-Suffrage Review, posters designed for their campaign and postcards.The specific aspect of the anti-suffrage campaign that I will examine in this paper is the use of caricature. …”
Get full text
Article -
1795
A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics
Published 2025-01-01“…The solution is broken down into four main components, considered four levels of security against attackers: (i) defocusing, (ii) fogging, (iii) puzzling, and (iv) crypto agility. …”
Get full text
Article -
1796
The Durability of High-Strength Concrete Containing Waste Tire Steel Fiber and Coal Fly Ash
Published 2021-01-01“…The studied durability parameters included rapid chloride permeability (RCP) and chloride penetration depth (CPD) by immersion method (28 and 120 days) and acid attack resistance (AAR) (28 and 120 days). Various basic mechanical properties of HSC were also analyzed, such as compressive strength (fCM), modulus of elasticity (ECM), splitting-tensile strength (fCTM), and modulus of rupture (fCRM). …”
Get full text
Article -
1797
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…The rapid growth of the Internet of Medical Things (IoMT) is changing healthcare data management, but it also brings serious issues like data privacy, malicious attacks, and service quality. In this study, we present EdgeGuard, a novel decentralized architecture that combines blockchain technology, federated learning, and edge computing to address those challenges and coordinate medical resources across IoMT networks. …”
Get full text
Article -
1798
University proceedings. Volga region. Social sciences
Published 2024-11-01“…Possible resolution strategies include: confrontation (attacks, creating conditions for defeat) or avoidance (blocking, exclusion from the group), and the involvement of external arbitration. …”
Article -
1799
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Published 2024-01-01“…Considering the cost of permissions management and the problem of insider malicious node attacks, users hope to implement authorization constraints within the authorized institutions. …”
Get full text
Article -
1800
The End of Akıncı Corps in The Ottoman Empire
Published 2013-12-01“…The number of Akıncıs continued to increase until the 16th Century. In 1595, during the attacks carried out against Walachia Voivodina Mihail, who rebelled, the Akıncıs which stayed behind the Ottoman army, which was retreating over the wooden bridge, were nearly destroyed due to the inconsiderate act of Grand Vizier Sinan Pasha. …”
Get full text
Article