-
1821
A model for developing dependable systems using a component‐based software development approach (MDDS‐CBSD)
Published 2023-02-01“…The MDDS‐CBSD may be used to create web application systems and to protect them from attacks. Model developers may use CBSD to describe and assess dependability attributes at any point during the model development process. …”
Get full text
Article -
1822
PRAPD: A novel received signal strength–based approach for practical rogue access point detection
Published 2018-08-01“…Rogue access point attack is one of the most important security threats for wireless local networks and has attracted great attention from both academia and industry. …”
Get full text
Article -
1823
Population Distribution of Rats (Rattus argentiventer) and the Damage Intensity on Rice and Other Crops in Pleret, Yogyakarta, Indonesia
Published 2023-12-01“…There was no damage on rice crops around the TBS. Rats also attacked corn and sugarcane which caused heavy damage to these crops. …”
Get full text
Article -
1824
A PROBLEM OF OPENING OF THE SECOND FRONT IS IN EUROPE: LOOK AFTER SEVEN DECADES
Published 2014-06-01“…The author associate himself with those historians, who support the origin of idea about the efficient strategy of attack against enemy simultaneously from different directions by the defeat of Germany, against which in the years of world war first two-front war was going: Russian army - from the east and Anglo-Franco-American soldiers from the west. …”
Get full text
Article -
1825
Viral and Nonviral Engineering of Natural Killer Cells as Emerging Adoptive Cancer Immunotherapies
Published 2018-01-01“…As effectors of cancer immunotherapy, NK cells are attractive as they do not attack healthy self-tissues nor do they induce T cell-driven inflammatory cytokine storm, enabling their use as allogeneic adoptive cellular therapies. …”
Get full text
Article -
1826
Detection and localization of indigenous economic grasses in depth-color close-range aerial images, using a novel trainingless data-to-decision approach (DIKD Hierarchy), for the S...
Published 2025-03-01“…They are associated with fatigue, dehydration, animals' attacks, etc. Plant detection is a pillar of precision agriculture. …”
Get full text
Article -
1827
Investigating the mechanisms of resveratrol in the treatment of gouty arthritis through the integration of network pharmacology and metabolics
Published 2024-10-01“…Through related metabolic pathway analysis, the most affected metabolic pathways were found to be Sphingolipid metabolism, Glycerophospholipid metabolism, Phenylalanine, tyrosine and tryptophan biosynthesis, Pantothenate and CoA, Citrate cycle (TCA cycle), and Arachidonic acid metabolism.ConclusionResveratrol can regulate the biosynthetic pathways of arachidonic acid, phenylalanine, tyrosine, and tryptophan, pantothenic acid and CoA biosynthesis pathways, TCA cycle, and other metabolic pathways, thereby regulating the NF-κB, MAPK, and JAK/STAT3 signaling pathways, and inhibiting the acute inflammatory response during GA attacks, showing characteristics of multi-pathway and multi-target action.…”
Get full text
Article -
1828
Blood-Brain Barrier Abnormalities Caused by HIV-1 gp120: Mechanistic and Therapeutic Implications
Published 2012-01-01“…These target laminin and attack the tight junctions between endothelial cells and BBB basal laminae. …”
Get full text
Article -
1829
Robust Malware identification via deep temporal convolutional network with symmetric cross entropy learning
Published 2023-08-01“…Nowadays, researchers have made many efforts concerning supervised machine learning methods to identify malicious attacks. High‐quality labels are of great importance for supervised machine learning, but noises widely exist due to the non‐deterministic production environment. …”
Get full text
Article -
1830
Transient epileptic amnesia
Published 2018-09-01“…Treatment with monotherapy often helps totally prevent recurrence of attacks. In the paper we review two case reports of patients with transient epileptic amnesia. …”
Get full text
Article -
1831
Mechanical and durability properties of coal cinder concrete: Experimental study and GPR-based analysis
Published 2025-07-01“…Various CC compositions (ranging from 10 % to 30 %) were analyzed for their effects on compressive strength, splitting tensile strength, flexural tensile strength, density, open porosity, water absorption, and resistance to freezing-thawing and salt attacks. Results showed that as CC content increased, absorptivity and open porosity also rose, while compressive strength improved, peaking at 77.4 MPa with 30 % CC. …”
Get full text
Article -
1832
Odevixibat treatment in a child with hypoplastic left heart syndrome and severe cholestatic pruritus: a case report
Published 2025-01-01“…Portal hypertension was evident on imaging, and the patient was experiencing severe itching attacks that did not respond to treatment with naltrexone, ursodeoxycholic acid, dimetindene, or rifampicin. …”
Get full text
Article -
1833
A Comprehensive Review of Key Cyber-Physical Systems, and Assessment of Their Education Challenges
Published 2025-01-01“…The industrial metaverse for smart manufacturing and its novel characteristics require new types of advanced cyber-physical coordinated situational awareness and active defense against cyber-attacks. These new challenges raise the profile of engineering education at the university level, while the addition of new skills requires rigorous preparatory work and the development of tailored requirements for effective knowledge transfer methods that meet the educational needs of the current environment. …”
Get full text
Article -
1834
Variant of Organizational and Functional Adaptation Structures of a Typical Situational Centre to the Emergence of Crisis Situations
Published 2024-10-01“… Due to the growing number of crisis situations (CS) in the modern world, such as natural disasters, man-made accidents, pandemics, cyber-attacks, financial crises, wars, and other negative events, it is important for the state to develop and adapt the organizational and functional structures of information and analytical units, including situation centers (SC), to respond effectively to such cases, thereby ensuring the country’s resilience in the face of negative circumstances. …”
Get full text
Article -
1835
The Effect of Different Vegetable Oils on Cedar Wood Surface Energy: Theoretical and Experimental Fungal Adhesion
Published 2022-01-01“…Despite having been used for ages to preserve wood against several effects (biological attack and moisture effects) that cause its degradation, the effect of vegetable oils on the cedar wood physicochemical properties is poorly known. …”
Get full text
Article -
1836
Promoting Internal Armed Conflict Resolution and Peacebuilding: The Case of the US–Colombia Relations (Part I)
Published 2020-11-01“…The beginning of the 2000s was yet another pivotal point in the development of bilateral interaction aimed at cessation of hostilities, marked by the 9/11 terrorist attacks, the failure of negotiations between the Colombian government and the opposition, and the implementation of a ‘democratic security’ policy. …”
Get full text
Article -
1837
Carotid endarterectomy outcomes according to anesthesia method: General anesthesia or regional anesthesia?
Published 2024-03-01“…Results: There was no statistically significant difference in postoperative stroke, transient ischemic attack (TIA) and cardiovascular mortality (p: 0.48; p: 0.30; p: 0.63, respectively). …”
Get full text
Article -
1838
EEG reveals brain network alterations in chronic aphasia during natural speech listening
Published 2025-01-01“…Differences in network geometry were assessed by means of graph theory and a targeted node-attack approach. Group-classification accuracy was obtained with a support vector machine classifier. …”
Get full text
Article -
1839
Some Customary Law Nuance on that Hagiography: Attempt of Interpretations
Published 2004-06-01“…Vaitiekus came from Polish lands, he was attacked as a Polish agent or ally. Another motive—he was murdered as he was recognized as a person who was dipping people into water (baptizing) or torturing them in other ways. …”
Get full text
Article -
1840
Designing an internet of things laboratory to improve student understanding of secure IoT systems
Published 2024-01-01“…We also demonstrate potential vulnerabilities of these databases to SQL injection attacks.We administered these labs and collected survey data from the students. …”
Get full text
Article