-
1941
Movahed's sign of left ventricle on myocardial perfusion scintigraphy in a case with chronic thromboembolic pulmonary hypertension
Published 2024-04-01“…In this case, a 75-year-old female patient who was followed up with a diagnosis of chronic pulmonary thromboembolism and had an acute embolism attack covering the entire right lung was retrospectively reviewed. …”
Get full text
Article -
1942
Approach for information systems security situation evaluation using improved FAHP and Bayesian network
Published 2009-01-01“…An approach for the information systems security situation assessment based on an improved FAHP and Bayesian network was proposed to solve the problem of obtaining the risk grade.The improved FAHP was used to quantify the factor of attack severity which was hard to scale.Simultaneously, the conditional probability matrices for all fac-tors were defined with the expert knowledge.Then a model for information security situation assessment was established by the Bayesian network inference, and the corresponding approach was presented.Finally, an illustrative instance was given to demonstrate its rationality and feasibility.Thus it may provide a new way for assessing information systems security situation.…”
Get full text
Article -
1943
Tarnished Plant Bug, Lygus lineolaris (Palisot de Beauvois) (Insecta: Hemiptera: Miridae)
Published 2009-12-01“…It describes this insect that attacks over half of the cultivated plant species grown in the United States, including increasing feeding damage on conifer seedlings — distribution, description, life history, hosts, damage, survey and detection, and management. …”
Get full text
Article -
1944
South American Fruit Fly, Anastrepha fraterculus (Wiedemann) (Insecta: Diptera: Tephritidae)
Published 2004-11-01“…This species is of great economic importance because of the wide variety of plants which it attacks and its extensive distribution. In most of South America it probably is the most important species of Anastrepha. …”
Get full text
Article -
1945
Sporadic Hemiplegic Migraine with Seizures and Transient MRI Abnormalities
Published 2011-01-01“…Hemiplegic migraines are characterised by attacks of migraine with aura accompanied by transient motor weakness. …”
Get full text
Article -
1946
Synchronization and blind detect algorithm for dual channel audio watermark
Published 2006-01-01“…A synchronization and a blind detect algorithm based on character of dual-channel audio was presented by calculating Mel frequency spectrum coefficient and using correlation between left and right channel,the synchronized segment was fix on and the performance was analyzed.After the watermarking was embedded into synchronized segment in both channels at the same time,it could be detected without original audio and watermarking information by calculat-ing the correlation of them between left and right channels.Experimental results show that the proposed approach can significantly improve the watermarking robustness under the attacks of adding noise,MP3 compression,resample and requantization.…”
Get full text
Article -
1947
Ciphertext-only fault analysis of the TWINE lightweight cryptogram algorithm
Published 2021-03-01“…The security analysis of TWINE against the ciphertext-only fault analysis was proposed.The secret key of TWINE could be recovered with a success probability at least 99% using a series of distinguishers of SEI、MLE、HW、GF、GF-SEI、GF-MLE、Parzen-HW、MLE-HE、HW-HE and HW-MLE-HE.Among them, the novel proposed distinguishers of MLE-HE、HW-HE and HW-MLE-HE can effectively reduce the faults and improve the attack efficiency in simulating experiments.It provides a significant reference for analyzing the security of lightweight ciphers in the Internet of Things.…”
Get full text
Article -
1948
Sporadic Pemphigus Foliaceus in a 3-Year-Old Vietnamese Girl: A Case Report and Literature Review
Published 2024-01-01“…Pemphigus foliaceus is an uncommon autoimmune intraepidermal blistering disease characterized by immunoglobulin (Ig) G autoantibodies that attack desmoglein-1 in the epidermis. There are two predominant forms of pemphigus foliaceus, sporadic and endemic. …”
Get full text
Article -
1949
La symbolique des lieux urbains en France lors des attentats de janvier 2015
Published 2016-01-01“…We can see the creation of a kind of memorial in this square where no attacks occurred but there were the largest gatherings for many years.…”
Get full text
Article -
1950
Tarnished Plant Bug, Lygus lineolaris (Palisot de Beauvois) (Insecta: Hemiptera: Miridae)
Published 2009-12-01“…It describes this insect that attacks over half of the cultivated plant species grown in the United States, including increasing feeding damage on conifer seedlings — distribution, description, life history, hosts, damage, survey and detection, and management. …”
Get full text
Article -
1951
Extraintracranial Bypass as a Rescue Therapy for Symptomatic Flow Diverter Thrombosis
Published 2015-01-01“…Three months after the procedure, in concomitance with the discontinuation of one of the antiplatelet medications, the patient suffered from a minor stroke and relapsing transient ischemic attacks. The angiography demonstrated the occlusion of the internal carotid artery, and a perfusion-weighted CT scan showed a condition of hypoperfusion. …”
Get full text
Article -
1952
Reducing Your Risk for Heart Disease: The Power of Food
Published 2021-01-01“…Heart disease is an umbrella term for the following heart conditions: • Angina • Irregular heartbeats • Heart attacks • Heart failure • Stroke This new 8-page publication of the UF/IFAS Food Science and Human Nutrition Department describes the modifiable risk factors for heart disease and tips to reduce one’s risk for heart disease. …”
Get full text
Article -
1953
Bronchial asthma in elderlies: an approach to this issue in Cuba
Published 2011-03-01“…In elderlies it is an underdiagnosed and undertreated disease often confused with chronic lung disease, so it is very important to able to evaluate the specific characteristics it presents in elderlies in order to attack the disease effectively, and promote the life quality of asthmatic elderlies.…”
Get full text
Article -
1954
Research on Satellite Internet Security Simulation Test Technology
Published 2023-06-01“…Aiming at the challenges of continuous evolution of large-scale systems, massive attack data management and control, and flexible implementation of diversified test tasks, a system architecture and technical structure based on software-defined network and cloud platform were proposed.Key technologies such as high-fidelity large-scale network element simulation, high concurrent traffic generation, and dynamic choreography of security service chain based on SDN were studied in depth, and solutions were proposed.The experimental results showed that these three technologies were innovative and could be applied to the construction of the integrated simulation test platform.…”
Get full text
Article -
1955
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
Published 2017-06-01“…A secure,efficient and verifiable outsourcing computation scheme was proposed based on the current problems of leaking users information and tampering with the calculating results,which were encountered while solving large-scale linear equations in outsourcing computation.A new linear equation with similarity solutions was constructed based on the constant transformation between random permutation and linear equations.It avoids the problem that the current data camouflage scheme is easily attacked by solving common factor method.It also improves the verification effciency and reduces the complexity of space.The performance analysis shows that the scheme is highly efficient.…”
Get full text
Article -
1956
Multi-feature based authentication watermarking scheme for MPEG videos
Published 2008-01-01“…Experimental results show that the scheme is more robust than the single-feature one to the common processing such as code-switching and recompression, while sensitive to the malicious attacks such as erasure and insertion and replacement. …”
Get full text
Article -
1957
Stable Fly (Dog Fly) Control
Published 2012-09-01“…Stable flies primarily attack animals for a blood meal, but in the absence of an animal host, they will bite people. …”
Get full text
Article -
1958
Tobacco Budworm, Heliothis virescens (Fabricius) (Insecta: Lepidoptera: Noctuidae)
Published 2012-10-01“…It is principally a field crop pest, attacking such crops as alfalfa, clover, cotton, flax, soybean, and tobacco. …”
Get full text
Article -
1959
Squash Bug, Anasa tristis (DeGeer) (Insecta: Hemiptera: Coreidae)
Published 2002-08-01“… The squash bug, Anasa tristis, attacks cucurbits (squash and relatives) throughout Central America, the United States, and southern Canada. …”
Get full text
Article -
1960
Cyberbullying
Published 2012-08-01“…This involves put-downs, publicly sharing personal information, stalking, and other overt attacks upon a person, all using electronic communication.” …”
Get full text
Article