-
1841
Complexity in Individual Trajectories toward Online Extremism
Published 2018-01-01“…By quantifying the trajectories that individuals follow on their journey toward expressing high levels of pro-ISIS support—irrespective of whether they then carry out a real-world attack or not—our findings can help move safety debates beyond reliance on static watch-list identifiers such as ethnic background or immigration status and/or postfact interviews with already convicted individuals. …”
Get full text
Article -
1842
TITO DORČIĆ AS A FORERUNNER OF THE IRONIC MODE
Published 2020-01-01“…The text, or the narrator, kills him, in the last step in the long procedure of attacking the protagonist.…”
Get full text
Article -
1843
Securing Urban Landscape: Cybersecurity Mechanisms for Resilient Smart Cities
Published 2025-01-01“…Additionally, the framework achieves a 45% improvement in system resilience during attacks and optimizes defense strategies to reduce deployment costs while increasing overall effectiveness. …”
Get full text
Article -
1844
Potensi Eugenol Fraksi Etil Asetat Bunga Cengkeh terhadap Proliferasi Kanker Serviks (HeLa Cell Line)
Published 2024-09-01“…<p>Cervix cancer, also known as cervical cancer, is a type of cancer that is caused mainly by oncogenic Human Papillomavirus (HPV), which attacks the cervix. One of the plants that can be used in medicine is clove. …”
Get full text
Article -
1845
Background predation risk induces anxiety-like behaviour and predator neophobia in zebrafish
Published 2024-10-01“…., injured conspecific cues that indicate a predator attack) or a low-risk water control stimulus. In Experiment 1, when tested in a novel tank, zebrafish exposed to high predation risk displayed anxiety-like responses (reduced activity and increased bottom time spent) compared to their low-risk counterparts. …”
Get full text
Article -
1846
Conflicts between indigenous and scientific concepts of landscape management for wildlife conservation: human-chimpanzee politics of coexistence at Bossou, Guinea
Published 2014-02-01“…The agricultural environment is valued by a chimpanzee “conservation model” based on indigenous experience and knowledge, which is in conflict with models introduced by outsiders (scientists and public administrations).The indigenous conservation model revealed by this case study may better help to prevent epidemics of zoonoses and injury and deaths due to chimpanzee attacks, compared with the outsiders’ conservation approach based on general knowledge drawn from conservation ecology. …”
Get full text
Article -
1847
Combination of functional dyspepsia syndrome and irritable bowel syndrome
Published 2011-06-01“…Patient complained of weakness, drowsiness, dizziness, attacks of subfebrile fever, accompanied by bone aching, frequent painless micturition. …”
Get full text
Article -
1848
Ensuring Cybersecurity in the Context of Digital Economy Development
Published 2020-11-01“…Cybersustainability implies the ability of a system to perform its functions under successful attacks on its resources (probably less effectively within in a short period of time necessary to neutralize cyberthreats and their impacts).Turning to the issue of ensuring cybersustainability of the emerging digital economy of the Russian Federation, the author examines the main types of system-destructing cyberattacks and highlights the steps taken by the Russian government to tackle these threats. …”
Get full text
Article -
1849
Theoretical Study of C2H5 + NCO Reaction: Mechanism and Kinetics
Published 2018-01-01“…The calculated results show that both the N and O atoms of the NCO radical can attack the C atom of C2H5 via a barrierless addition mechanism to form two energy-rich intermediates IM1 C2H5NCO (89.1 kcal/mol) and IM2 C2H5OCN (64.7 kcal/mol) on the singlet PES. …”
Get full text
Article -
1850
An approach for multipath optimal selection of network service combinations based on golden eagle optimizer with double learning strategies
Published 2025-01-01“…The algorithm modeled the hunting tactics of wild golden eagles, efficiently targeting the best prey in minimal time by dynamically adjusting two critical components, such as the attack and cruising strategies. In GEO-DLS, the enhanced GEO significantly broadened the search scope for food sources by using personalized learning and mirror reflection techniques. …”
Get full text
Article -
1851
Role of Accumulated Calcium in Alleviating Aluminum Injury in Wheat Plants
Published 2014-01-01“…Aluminum concentration in the apoplastic fluid was very high at 125 μM Ca probably because the plasma membrane of some of the cells was destroyed due to the attack of 100 μM Al. Aluminum content in roots decreased with increasing supply of Ca before Al treatment. …”
Get full text
Article -
1852
Depth Penetration and Scope Extension of Failures in the Cascading of Multilayer Networks
Published 2020-01-01“…Real-world complex systems always interact with each other, which causes these systems to collapse in an avalanche or cascading manner in the case of random failures or malicious attacks. The robustness of multilayer networks has attracted great interest, where the modeling and theoretical studies of which always rely on the concept of multilayer networks and percolation methods. …”
Get full text
Article -
1853
Beyond nutritional immunity: immune-stressing challenges basic paradigms of immunometabolism and immunology
Published 2025-02-01“…Since immune cells actively controlling pathogens (effector cells) typically do not proliferate at infected sites, there is a “stress vulnerability gap” wherein proliferating pathogens are more vulnerable to any type of stress than are the attacking effector cells. Hosts actively stress vulnerable proliferating pathogens by restricting resources (resource-limiting stress) and generating noxious waste products (damaging/disruptive stress) in a fundamental defense here-in termed “immune-stressing.” …”
Get full text
Article -
1854
Родоплемінна географія трипільських поселень Середнього Подніпров'я
Published 2024-12-01“…Based on the results of long-term research conducted by Ukrainian archaeologists at sites in the Cherkasy region, the author identifies the location of 95 nests of settlements of tribes of the Trypillia culture and the directions of their forced migration as a result of the attack of nomads of the Sredniy Stog and Yamna cultures. …”
Get full text
Article -
1855
Modernization of the mechanism of the financial services market cybersecurity legal support
Published 2021-09-01“…It is proposed to create a mechanism for the state to guarantee partial compensation to financial market entities for losses caused by cyber attacks, and to form a separate state body that will determine the amount of compensation, compile a list of critical entities for the financial services market, and establish criteria that will provide appropriate financial assistance. …”
Get full text
Article -
1856
The functioning of the Crimean Tatar language in the authorities and administration of the Crimean Autonomous Soviet Socialist Republic in the context of the policy of indigenizati...
Published 2024-09-01“…The author proposes a periodization of the implementation of national policy, which is divided into four stages. 1) 1917–1923 – search for conceptual principles for the implementation of ethnopolicy; 2) 1923–1928 – official proclamation of indigenization and an attack on national communists in the Turkic republics; 3) 1928–1934 – administrative stage; 4) 1934–1938 – formation of national collective farms and the Crimean Tatar proletariat. …”
Get full text
Article -
1857
Integrating PCA and DEA techniques for strategic assessment of network security
Published 2023-03-01“…The primary objective of network security is to protect data from cyber-attacks and ensure the overall reliability of the network. …”
Get full text
Article -
1858
Neural Networks Application for the Data of PID Controller for Acrobot
Published 2022-01-01“…The purpose of this method is to increase the security of the system against the attack of hackers on facilities of the automatic control system. …”
Get full text
Article -
1859
Predict Diabetes Using Voting Classifier and Hyper Tuning Technique
Published 2023-01-01“…Today, diabetes is one of the most common chronic diseases in the world due to the people’s sedentary lifestyle which led to many health issues like heart attack, kidney frailer and blindness. Additionally, most of the people are unrealizable about the early-stage diabetes symptoms to prevent it. …”
Get full text
Article -
1860
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. …”
Get full text
Article