Showing 1,961 - 1,980 results of 2,093 for search '"Attacker"', query time: 0.09s Refine Results
  1. 1961

    Difference in Rill Costs With INA-CBGs Rates and Treatment Rationality of Inpatient Asthma Children by Amelia Lorensia, Marthy Meliana Ariyanti Jalmav, Adilah Fatin Amir, Fida Shafi Anizzalati

    Published 2024-12-01
    “… Asthma in children may affect children's efficiency at school because frequent attacks occur which disrupt children's activities, so that asthma in children is a serious problem that requires appropriate treatment. …”
    Get full text
    Article
  2. 1962

    Investigation of the Normal Blowing Approach to Controlling Wingtip Vortex Using LES by Yubiao Jiang, Wanbo Wang, Chen Qin, Patrick N. Okolo, Kun Tang

    Published 2021-01-01
    “…The Reynolds number based on the chord length is 1.6×106 and the angle of attack is 12°. The computational approach utilized the dynamic Smagorinsky-Lilly subgrid model for 3D simulations. …”
    Get full text
    Article
  3. 1963

    Symptom descriptors and patterns in lumbar radicular pain caused by disc herniation: a 1-year longitudinal cohort study by Lars Grøvle, Anne Julsrud Haugen, Eivind Hasvik

    Published 2022-12-01
    “…In a subsample classified with neuropathic pain, in-depth interviews were performed, and symptomatic areas were drawn on standardised body charts.Results At baseline, the most frequently used painDETECT symptom descriptor was numbness sensation, reported by 94%, followed by sudden pain attacks and tingling or prickling. The mean (SD) SF-MPQ-2 score (0–10) for aching pain was 5.9 (2.8); numbness 4.3 (3.3); tingling 4.0 (3.4); burning 2.6 (3.1); pain caused by light touch 1.5 (2.6). …”
    Get full text
    Article
  4. 1964

    Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection by Hanxian Duan, Qian Jiang, Xin Jin, Michal Wozniak, Yi Zhao, Liwen Wu, Shaowen Yao, Wei Zhou

    Published 2024-11-01
    “…These face forgery techniques can cause problems such as fraud and social engineering attacks in facial recognition and identity verification areas. …”
    Get full text
    Article
  5. 1965

    Perioperative Treatment with Rivaroxaban and Dabigatran on Changes of Coagulation and Platelet Activation Biomarkers following Left Atrial Appendage Closure by Yao Yao, Yanli Li, Qinchun Jin, Xiaoye Li, Xiaochun Zhang, Qianzhou Lv

    Published 2024-01-01
    “…The primary endpoints of this study were the efficacy and safety characteristics of different antithrombotic strategies, including DRT incidence, stroke or transient ischemic attack, systemic embolism, and clinical major and nonmajor bleeding complications during the follow-up of 180 days. …”
    Get full text
    Article
  6. 1966

    qTrustNet Virtual Private Network (VPN): Enhancing Security in the Quantum Era by Hyoungsub Shim, Bongho Kang, Haejung Im, Duhyun Jeon, Seok-Min Kim

    Published 2025-01-01
    “…PUFs offer a hardware-based security mechanism that is resistant to cloning and tampering, ensuring that the encryption keys remain secure against both classical and quantum attacks. This innovative combination of WireGuard protocol, PQC algorithms, and PUF technology creates a VPN system with significantly improved security features. …”
    Get full text
    Article
  7. 1967

    The Effect of Calcitonin Gene-Related Peptide Monoclonal Antibodies on Quality of Life among Migraine Patients: Pilot Study at the Hospital of Lithuanian University of Health Scien... by Monika Remenčiūtė, Greta Varžaitytė, Gintarė Žemgulytė

    Published 2024-05-01
    “… Background: Migraine has a negative impact on patients’ quality of life, with the frequency of attacks being associated with greater disability and poorer health status. …”
    Get full text
    Article
  8. 1968

    Research on Damage Assessment of Buried Standard and Carbon-Fibre-Reinforced Polymer Petroleum Pipeline Subjected to Shallow Buried Blast Loading in Soil by Ying Cui, Jun Fang, Zhan Qu, Meimei Song, Junhai Zhao

    Published 2021-01-01
    “…Buried petroleum pipelines may encounter threats from blast loading due to terrorist attacks, accidental explosions, and artificial blasting during in-progress construction. …”
    Get full text
    Article
  9. 1969

    The utility of Glaucoma Information Cards for grasping glaucoma subtypes: a single-center pilot study by Yukinori Yamada, Tetsuya Murase, Emiko Mashida, Yuki Kakeda, Yuuka Shibata, Hiroaki Matsuo

    Published 2025-02-01
    “…The contraindication in patients with open-angle glaucoma (OAG) led to excessive medication restrictions because anticholinergic drugs are associated with a low risk of acute glaucoma attacks in OAG. To eliminate this problem, the contraindications of anticholinergic drugs were reduced for types from all glaucoma to angle closure glaucoma (ACG) in 2019. …”
    Get full text
    Article
  10. 1970

    Combination of Gilbert's syndrome and gastrointestinal diseases by G. M. Dubrovina, O. K. Botvinyev, A. I. Kolotilina

    Published 2014-09-01
    “…Provoking factors of jaundice attacks include fasting, infectious diseases, overstrain, effect of drugs and xenobiotics. …”
    Get full text
    Article
  11. 1971

    Formulation and In Vitro Evaluation of Oral Capsules from Liquid Herbal Antimalarials Marketed in Ghana by Christina Osei-Asare, Fredrick William Akuffo Owusu, Philomena Entsie, Ama Kwansima Annan, Rita Akosua Gyamaa, Edem Makafui Amenuke

    Published 2021-01-01
    “…In adults, mortality rates are lower, but frequent debilitating attacks reduce the quality of life for chronic sufferers. …”
    Get full text
    Article
  12. 1972
  13. 1973

    Synthesis, characterization and toxicity assessment of chlorantraniliprole nanoemulsion against Helicoverpa armigera by Geeta Devi, Lomash Kumar, Rahul Kumar Dhaka, Karuna Jain, Rahul Saini, Shubham Saini, Anil Jakhar, Sushil Ahlawat, Mehdi Rahimi

    Published 2025-02-01
    “…Abstract Helicoverpa armigera is a highly devastating and polyphagous pest attacking on different field crops. Effective management of this pest is essential for sustainable agriculture. …”
    Get full text
    Article
  14. 1974

    Lebanon: An Ordinary “Consociational Democracy” in the Regional Context by A. V. Sarabiev

    Published 2019-09-01
    “…Heightened relations with Syria by 2005, the Israeli attack in 2006, the gravest threat from jihadi-caliphatists – all these factors have negatively affected intra-civil and inter-group relations. …”
    Get full text
    Article
  15. 1975

    PoWBWM: Proof of work consensus cryptographic blockchain-based adaptive watermarking system for tamper detection applications by P. Aberna, L. Agilandeeswari

    Published 2025-01-01
    “…In comparison with the existing system, the experimental findings of the suggested model show an effective tamper detection watermarking system as well as a robust against both intentional and unintentional attacks with an average NCC value of 0.98.…”
    Get full text
    Article
  16. 1976

    Scabies Outbreak Investigation and Risk Factors in East Badewacho District, Southern Ethiopia: Unmatched Case Control Study by Jarso Sara, Yusuf Haji, Achamyelesh Gebretsadik

    Published 2018-01-01
    “…A total of 4,532 scabies cases line listed with overall attack rate of 110/1,000 population. The mean age was 12 years, and most affected age group was 5–14 years. …”
    Get full text
    Article
  17. 1977

    Main threats to the state’s interests in the sphere of information security of Ukraine by O. Yu. Starostin

    Published 2024-03-01
    “…For the purpose of more comprehensive understanding of the main threats to the interests of the state in the field of information security of Ukraine, the following threats are identified: the use of information influence to distort political opinion and attitudes of the population to certain phenomena, processes, public authorities, political forces and individuals; imperfect regulatory and legal support for the information security of the state; deliberate distortion of information at the level of state leaders and diplomatic representatives and their negative impact on the opinion of the international community; insufficient participation of the Ukrainian population in countering information attacks; insufficient institutional and organisational support for information security education and the formation of an information security culture in society. …”
    Get full text
    Article
  18. 1978

    Explosive Performance Assessment of Buried Steel Pipeline by Seyed-Mohammad Seyed-Kolbadi, Mohammad Safi, Ayoub Keshmiri, S. Mahdi S. Kolbadi, Masoud Mirtaheri

    Published 2021-01-01
    “…It is so important to consider the passive defense problem in any places there have been attacks by varies kinds of military threats and terrorists. …”
    Get full text
    Article
  19. 1979

    Assessing the Adherence of ChatGPT Chatbots to Public Health Guidelines for Smoking Cessation: Content Analysis by Lorien C Abroms, Artin Yousefi, Christina N Wysota, Tien-Chin Wu, David A Broniatowski

    Published 2025-01-01
    “…All chatbots showed resilience to adversarial attacks that were intended to derail the conversation. …”
    Get full text
    Article
  20. 1980

    The Analysis of Dynamic Changes and Prognosis of Posner–Schlossman Syndrome with Cytomegalovirus Infection and Antiviral Therapy by Qilian Sheng, Ruyi Zhai, Xintong Fan, Xiangmei Kong

    Published 2021-01-01
    “…Clinical retrospective cohort study in the Eye & ENT Hospital of Fudan University, Shanghai, China. The attacked eyes of 98 eligible subjects diagnosed unilateral PSS were enrolled between 2016 and 2019. …”
    Get full text
    Article