Showing 1 - 20 results of 45 for search '"stealing"', query time: 0.07s Refine Results
  1. 1

    Coronary-Subclavian Steal Syndrome: Percutaneous Approach by Carina Machado, Luís Raposo, Sílvio Leal, Pedro Araújo Gonçalves, Henrique Mesquita Gabriel, Rui Campante Teles, Manuel Sousa Almeida, Miguel Mendes

    Published 2013-01-01
    “…Coronary subclavian steal syndrome is a rare ischemic cause in patients after myocardial revascularization surgery. …”
    Get full text
    Article
  2. 2

    Coronary Subclavian Steal Syndrome Unamenable to Angioplasty Successfully Managed with Subclavian-Subclavian Bypass by Saad Tariq, Swosty Tuladhar, Edward Wingfield, Honesto Poblete

    Published 2012-01-01
    “…Purpose. Coronary-subclavian steal syndrome (CSSS) is defined as a reversal of flow in a previously constructed internal mammary artery (IMA) coronary conduit, producing myocardial ischemia. …”
    Get full text
    Article
  3. 3
  4. 4

    Coronary Subclavian Steal Syndrome Causing Acute Myocardial Infarction in a Patient Undergoing Coronary-Artery Bypass Grafting by Jiri Mandak, Miroslav Lojik, Martin Tuna, James Lago Chek

    Published 2012-01-01
    “…Coronary subclavian steal syndrome with retrograde blood flow in the left internal mammary-coronary bypass graft is a rare but severe complication of cardiac surgery. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    The prevalence of women sexual locking in a gender violence context - a pastoral perspective by M. E. Baloyi

    Published 2016-12-01
    “…Although it had been observed that cases of ‘stealing each other’s wives’ existed, these were not expected traditions among Africans. …”
    Get full text
    Article
  11. 11

    Étude des différents publics du théâtre et du cinéma lors de la généralisation du parlant à Lyon (1929-1932) by Marylin Marignan

    Published 2012-04-01
    “…In Lyon, between the seasons 1928-1929 and 1931-1932, the directors of both municipal theatres of the city of Lyon: the Théâtre des Célestins and the Grand-Théâtre denounce a redoubtable competition of the talking movies stealing some of their customers. Nevertheless, the attendance of both theatres remains stable. …”
    Get full text
    Article
  12. 12

    Spatial Analysis - Time of Stolen Crimes in District 12 of Tehran by nabi moradpoor, keramatolah zayyari

    Published 2022-06-01
    “…The spatial analysis of stealing crimes also suggests that the direction and extent of theft is different at different times of the day, weekdays, and on a monthly basis.…”
    Get full text
    Article
  13. 13

    Data Expression and Protection of Intellectual Property Education Resources Based on Machine Learning by Meng Mei, Hui Tan

    Published 2021-01-01
    “…It can prevent web crawlers from harming e-commerce websites, prevent them from stealing the intellectual property of e-commerce websites, and analyse web crawlers that visit websites to prevent important website data from being stolen by them. …”
    Get full text
    Article
  14. 14

    METAPHORICAL CONCEPTS AND THEIR IDEOLOGICAL FUNCTIONS IN ALURING VOTES FOR INDONESIAN PRESIDENCY by Arif Budiman, Khristianto Khristianto

    Published 2023-12-01
    “…Meanwhile, the supporters in Prabowo Camp focuses on criticizing the behavior of the existing government and leaders, by creating concepts of MISUSING IS STEALING, PRESIDENT IS A SCHOOL BOY, SWEARING IS A SENSATION, TO LEAD IS TO SUFFER. …”
    Get full text
    Article
  15. 15

    A Novel Rules Based Approach for Estimating Software Birthmark by Shah Nazir, Sara Shahzad, Sher Afzal Khan, Norma Binti Alias, Sajid Anwar

    Published 2015-01-01
    “…Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. …”
    Get full text
    Article
  16. 16

    Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy by Renwu Yan, Yang Zheng, Ning Yu, Cen Liang

    Published 2024-03-01
    “…Second, we propose a double-blind noise addition protocol to generate distributed noise through interaction between users and a cloud platform to prevent semi-honest participants from stealing data by colluding with one another. Finally, the simulation results show that the proposed scheme can encrypt the transmission of multi-intelligent meter data under the premise of satisfying the differential privacy mechanism. …”
    Get full text
    Article
  17. 17

    Anti-Social Behavior and Teenager’s Wellbeing: A Case Study of Northern Division Kabale Municipality. by Kyarikunda, Esau

    Published 2024
    “…Compared to teenagers with no antisocial behavior, participants with persistent antisocial behaviors had poorer personal well-being outcomes coupled with alcohol misuse, poverty, drug abuse, stealing, and unwanted pregnancy.…”
    Get full text
    Thesis
  18. 18

    Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis by Ridho Surya Kusuma, Muhammad Dirga Purnomo Putra

    Published 2025-01-01
    “…These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and contact information. …”
    Get full text
    Article
  19. 19

    Hybrid Botnet Detection Based on Host and Network Analysis by Suzan Almutairi, Saoucene Mahfoudh, Sultan Almutairi, Jalal S. Alowibdi

    Published 2020-01-01
    “…The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. The size of the botnet is usually very large, and millions of infected hosts may belong to it. …”
    Get full text
    Article
  20. 20

    Controlled Bidirectional Quantum Secure Direct Communication by Yao-Hsin Chou, Yu-Ting Lin, Guo-Jyun Zeng, Fang-Jhu Lin, Chi-Yuan Chen

    Published 2014-01-01
    “…Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.…”
    Get full text
    Article