-
1881
A Novel Authentication Management for the Data Security of Smart Grid
Published 2024-01-01“…In a wired/wireless medium, however, a man-in-the-middle may seek to disrupt, monitor and manipulate the network, or simply execute a replay attack, revealing its vulnerability. Recognizing this, this study presents a novel authentication management (model) comprised of two layer security schema. …”
Get full text
Article -
1882
Gradient diffusion entropy corrected ALNS optimization for vegetation topology interaction networks
Published 2025-01-01“…The GDEO-ALNS optimized interaction structure slows down the ECV drop rate in topological attacks by 0.03 and 0.02, respectively, compared to the original interaction structure, which provides better immunity to interference compared to the optimized structure of ALNS. …”
Get full text
Article -
1883
Assessment of the Distributed Ledger Technology for Energy Sector Industrial and Operational Applications Using the MITRE ATT&CK® ICS Matrix
Published 2023-01-01“…However, the deployment of these technologies increases the overall attack surface. The MITRE ATT&CK® matrices have been developed to document an adversary’s tactics and techniques based on real-world observations. …”
Get full text
Article -
1884
Oxidation Degradation of Rhodamine B in Aqueous by UV/S2O8 2− Treatment System
Published 2012-01-01“…With the increase of oxidant S2O8 2−, more SO4 •− produced to attack RhB molecules and result in the increase of RhB degradation. …”
Get full text
Article -
1885
Lightweight AES Design for IoT Applications: Optimizations in FPGA and ASIC With DFA Countermeasure Strategies
Published 2025-01-01“…In addition, this study addresses vulnerabilities in lightweight AES cryptographic hardware to side-channel attacks (SCA), specifically focusing on Differential Fault Analysis (DFA). …”
Get full text
Article -
1886
Synthesis, Characterization, Semiempirical and Biological Activities of Organotin(IV) Carboxylates with 4-Piperidinecarboxylic Acid
Published 2014-01-01“…HOMO-LUMO calculations show that chlorodiorganotin complexes are more susceptible to nucleophilic attack as compared to triorganotin complexes. Computed negative heat of formation indicates that complexes 1–4 are thermodynamically stable. …”
Get full text
Article -
1887
VDCM: A Data Collection Mechanism for Crowd Sensing in Vehicular Ad Hoc Networks
Published 2023-12-01“…When collecting large-scale vehicle-provided data, the data transmitted via autonomous networks are publicly accessible to all attackers, which increases the risk of vehicle exposure. …”
Get full text
Article -
1888
Evaluation of Risk Factors for Antibiotic Resistance in Patients with Nosocomial Infections Caused by Pseudomonas aeruginosa
Published 2016-01-01“…In the multivariate analysis, previous cefazolin use was found as an independent risk factor for the development of imipenem resistance (OR = 3.33; CI 95% [1.11–10.0]; p = 0.03), whereas previous cerebrovascular attack (OR = 3.57; CI 95% [1.31–9.76]; p = 0.01) and previous meropenem use (OR = 4.13; CI 95% [1.21–14.07]; p = 0.02) were independent factors for the development of meropenem resistance. …”
Get full text
Article -
1889
Effects of Coach’s Verbal Encouragement During Small-Sided Volleyball Games on Specific Physical Fitness and Technical-Tactical Behavior of Youth Athletes
Published 2025-01-01“…Physical performance including agility t-test (ATT), 10-m sprint test (10-mST), countermovement jump test (CMJT), medicine ball throw test (MBTT), multistage 20-meter shuttle run test (M20-MSRT), and technical-tactical behavior (serve, reception, sets, attack, defense) were measured in pre-test and post-test. …”
Get full text
Article -
1890
Molecular complexity of quantitative immunity in plants: from QTL mapping to functional and systems biology
Published 2024-05-01“…In nature, plants defend themselves against pathogen attack by activating an arsenal of defense mechanisms. …”
Get full text
Article -
1891
Resveratrol Inhibits Hepatic Stellate Cell Activation via the Hippo Pathway
Published 2021-01-01“…Liver fibrosis, which results from chronic liver injury due to factors such as chronic alcohol consumption, hepatitis virus infections, and immune attacks, is marked by excessive deposition of extracellular matrix (ECM). …”
Get full text
Article -
1892
THE TOTAL LEUKOCYTE COUNT OF ELDERLY PATIENTS CONFIRMED COVID-19 WITH/WITHOUT A VENTILATOR IN A SURABAYA GENERAL HOSPITAL IN 2021
Published 2023-07-01“…Background: Coronavirus is a virus that attacks the immune system, especially the human respiratory system. …”
Get full text
Article -
1893
Deep learning technology: enabling safe communication via the internet of things
Published 2025-02-01“…Despite offering many advantages, the diversified architecture and wide connectivity of IoT make it vulnerable to various cyberattacks, potentially leading to data breaches and financial loss. Preventing such attacks on the IoT ecosystem is essential to ensuring its security.MethodsThis paper introduces a software-defined network (SDN)-enabled solution for vulnerability discovery in IoT systems, leveraging deep learning. …”
Get full text
Article -
1894
Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications
Published 2025-01-01“…Distributed Denial of Service (DDoS) attacks, malware infections, and communication abnormalities increase cybersecurity dangers to these networks, threatening operational safety and efficiency. …”
Get full text
Article -
1895
Comparison of Saddle-Shaped Region of Head-Flow Curve between Axial-Flow Pump and Its Corresponding Axial-Flow Pump Device
Published 2021-01-01“…The results show that when the flow rate decreases, the first saddle-shaped region of the axial-flow pump and the saddle-shaped region of the pump device are caused by the decrease of the lift coefficient due to the increase of the attack angle between flow and blade. When the flow rate is less than 0.32Qd, the influence range of backflow in the inlet pipe is large, which leads to the high-pressure zone near the wall of the inlet pressure measurement section during the pump performance test, and hence the second saddle-shaped region of the axial-flow pump is essentially a measurement illusion. …”
Get full text
Article -
1896
Gamification Application for Promoting and Encouraging Physical Activity in the Elderly
Published 2024-06-01“…However, when an application crashes or is infected with a virus, it can provide patients with false information, exposing users to attacks from hackers when they are using it. Incorrect diagnosis poses a risk to a patient's life as risks and ethical considerations due to using gamification applications in physical activity. …”
Get full text
Article -
1897
Clinico¬pathological features and phylogenetic analysis of rabies infection in local Iraqi breed cattle
Published 2025-03-01“…Eighty-one cattle were suspected to have rabies after a history of being attacked and having signs of rabies: rest-lessness, aggression, drooling saliva, hitting head to fences, inappetence, recurrent failed trials of defecation with an opened anus, and fever. …”
Article -
1898
Psychiatric Symptoms in Acute Intermittent Porphyria - Case Report and Course of Treatment Using Placebo
Published 2025-02-01“…Aim: The aim of this paper is to highlight the difficulties in diagnosing psychiatric symptoms during an acute attack of porphyria, which significantly complicate its treatment, and to consider the possibility of using placebo as one of the elements in the diagnostic and therapeutic plan in order to optimize treatment and avoid complications by using smaller doses of narcotic drugs. …”
Get full text
Article -
1899
Secure and energy-efficient inter- and intra-cluster optimization scheme for smart cities using UAV-assisted wireless sensor networks
Published 2025-02-01“…Security issues, such as insufficient data encryption, further exacerbate these challenges, leaving WSNs vulnerable to attacks. To address these gaps, we propose the secure and energy-efficient inter- and intra-cluster optimization scheme (SEI2), a novel WMET-based framework that ensures balanced energy utilization among cluster heads (CHs) and member nodes (MNs) while securing data transmission. …”
Get full text
Article -
1900
Efficient and secure attribute-based heterogeneous online/offline signcryption for body sensor networks based on blockchain
Published 2019-09-01“…The formal security analysis of the proposed scheme is proved in the standard model, and informal security assures that our scheme provides resistance against possible attacks. As compared to other existing schemes, our proposed scheme consumes fewer resources and efficient in terms of processing cost, transmission overhead, and energy consumption.…”
Get full text
Article