-
1801
Wireless body area network: Architecture and security mechanism for healthcare using internet of things
Published 2025-01-01“…But if the Server is exposed to a malicious attack (i.e., flooded with ClientHello messages, the DTLS protocol may no longer serve the purpose) as it may lead to Denial-of-Service (DoS). …”
Get full text
Article -
1802
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…Theoretically, we prove that MASIT is existential unforgeable secure under adaptively chosen message and identity Attacks. We also implement MASIT and other existing typical identity-based encryption schemes and evaluate their performance in real platforms. …”
Get full text
Article -
1803
Effect of Aspect Ratio, Channel Orientation, Rib Pitch-to-Height Ratio, and Number of Ribbed Walls on Pressure Drop Characteristics in a Rotating Channel with Detached Ribs
Published 2007-01-01“…Pitch-to-rib height ratios (P/e) of 5 and 10 at constant rib height-to-hydraulic diameter ratio (e/D) of 0.1 and a clearance ratio (C/e) of 0.38 are considered. The rib angle of attack with respect to mainstream flow is 90∘. The channel orientation at which the ribbed wall becomes trailing surface (pressure side on which the Coriolis force acts) is considered as the 0∘ orientation angle. …”
Get full text
Article -
1804
Counteracting Mobbing in Labor Legal Relations
Published 2020-09-01“…Harassment at the workplace can provoke feelings of social inferiority, leads to a number of nervous diseases, nervous breakdowns, sleep problems, depression, heart attacks and possible suicide. It has been noted that one of the most important current tasks of labor protection at enterprises is to create a proper psychological climate for each employee at his workplace. …”
Get full text
Article -
1805
Joint Analysis of Morphological Parameters and In Silico Haemodynamics of the Left Atrial Appendage for Thrombogenic Risk Assessment
Published 2022-01-01“…Statistical analysis, regression models, and random forests were used to analyse the differences between morphological and haemodynamics parameters, extracted from computational simulations built on 3D rotational angiography images, between patients with and without transient ischemic attack (TIA) or cerebrovascular accident (CVA). Results. …”
Get full text
Article -
1806
Effect of perampanel in reducing depression in patients with focal epilepsy
Published 2025-06-01“…Multiple Regression Analysis was found that annual family income, etiology, the frequency of attacks in recent years, types of ASMs and the age were the influence factors of pirampanel in reducing depression (P<0.05). …”
Get full text
Article -
1807
Framework for user behavioural biometric identification using a multimodal scheme with keystroke trajectory feature and recurrent neural network on a mobile platform
Published 2022-03-01“…Thus, the proposed mobile identification system is capable of resisting attacks that standard mechanisms may be vulnerable to and represents a valuable contribution to cyber security.…”
Get full text
Article -
1808
Creating and Implementing an Effective and Deterrent National Cyber Security Strategy
Published 2020-01-01“…In this context, by explaining the importance of cyber power, the need for cyber power to be considered as one of the elements of national power and the importance of providing security against cyber attacks with deterrence by cyber power are discussed, while a new and integrated approach for the creation and implementation of a NCSS and an authoritarian organizational structure responsible for this strategy is proposed. …”
Get full text
Article -
1809
THE ROLE OF ACUPUNCTURE THERAPY TO OVERCOME ONE-SIDE HEAD PAIN (MIGRAINE)
Published 2022-03-01“…Background: Migraine is a primary headache, usually described as pain attacks lasting 4 - 72 hours, unilateral, throbbing, with moderate to severe pain intensity that can be exacerbated by activity, and can be accompanied by nausea and vomiting, photophobia and phonophobia. …”
Get full text
Article -
1810
Framework to analyze and exploit the smart home IoT firmware
Published 2025-02-01“…Thousands of smart gadgets are linked to the internet each month, and due to various privacy and security issues, such devices may be vulnerable to evil attackers. Currently, there are around 8 billion devices online, and by the beginning of 2025, there will likely be 25 to 35 billion IoT devices globally. …”
Get full text
Article -
1811
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01“… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
Get full text
Article -
1812
An insight into the genome-wide analysis of bacterial defense mechanisms in a uropathogenic Morganella morganii isolate from Bangladesh.
Published 2025-01-01“…The genome contained mobile genetic components and defense mechanisms, such as restriction modification and CRISPR-Cas systems, indicating the bacterium's ability to defend itself against viral attacks. This thorough investigation sheds important light on M. morganii's pathogenicity and adaptive tactics by revealing its genetic characteristics, AMR, virulence components, and defense mechanisms. …”
Get full text
Article -
1813
Analyzing the Mechanical, Durability, and Microstructural Impact of Partial Cement Replacement with Pumice Powder and Bamboo Leaf Ash in Concrete
Published 2024-01-01“…It also improved resistance to sulfuric acid attack, and Mix-3 had the least strength reduction of 9.59%. …”
Get full text
Article -
1814
Optimizing Secure AI Lifecycle Model Management With Innovative Generative AI Strategies
Published 2025-01-01“…Data and model manipulation, data theft, and adversarial attacks as well as model inference threats which we do a systematic analysis to disrupt the integrity, confidentiality as well as availability of AI models. …”
Get full text
Article -
1815
Special International Tribunal on the investigation of the russian aggression against Ukraine: legal analysis, international jurisdiction and challenges
Published 2023-09-01“…It has been noted that the establishment of a Special International Tribunal to investigate the crime of russian aggression against Ukraine should become an effective mechanism for investigating and documenting violations of International Human Rights Law and International Humanitarian Law committed by russia on the territory of Ukraine with the identification of those responsible; compensation for victims and restoration of justice for the Ukrainian people from russia's full-scale armed attack; deterrence of aggressive and destabilising actions of the russian federation, which violates the sovereignty and territorial integrity of Ukraine. …”
Get full text
Article -
1816
Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks
Published 2025-01-01“…Yet, decentralization introduces security vulnerabilities, including spoofing, tampering, and denial-of-service attacks, which can compromise the reliability and safety of vehicular communications. …”
Get full text
Article -
1817
Elements of forensic description of threats or violence against a law enforcement officer
Published 2023-07-01“…Proper legal regulation of the protection of law enforcement officers from unlawful attacks should be one of the most important tasks of a developed state governed by the rule of law, especially in the context of active hostilities, because even in peacetime law enforcement officers put their health and lives at risk. …”
Get full text
Article -
1818
Field-scale detection of Bacterial Leaf Blight in rice based on UAV multispectral imaging and deep learning frameworks.
Published 2025-01-01“…Bacterial Leaf Blight (BLB) usually attacks rice in the flowering stage and can cause yield losses of up to 50% in severely infected fields. …”
Get full text
Article -
1819
Synthetic data as external control arms in scarce single-arm clinical trials.
Published 2025-01-01“…Clinical trials typically comprise only a few hundred patients usually with high-cardinality features, which makes individual data instances more exposed to re-identification attacks. We examine whether synthetic data can serve as a proxy for the empirical control arm data by providing the same research outcomes while reducing the risk of information disclosure. …”
Get full text
Article -
1820
Fulminant Diabetes in a Patient with Advanced Melanoma on Nivolumab
Published 2018-01-01“…Fulminant diabetes is an immune endocrinopathy that results from a violent immune attack leading to complete destruction of pancreatic beta cells in genetically predisposed people. …”
Get full text
Article