-
1
Coronary-Subclavian Steal Syndrome: Percutaneous Approach
Published 2013-01-01“…Coronary subclavian steal syndrome is a rare ischemic cause in patients after myocardial revascularization surgery. …”
Get full text
Article -
2
Coronary Subclavian Steal Syndrome Unamenable to Angioplasty Successfully Managed with Subclavian-Subclavian Bypass
Published 2012-01-01“…Purpose. Coronary-subclavian steal syndrome (CSSS) is defined as a reversal of flow in a previously constructed internal mammary artery (IMA) coronary conduit, producing myocardial ischemia. …”
Get full text
Article -
3
Celiac trunk angiography with balloon occlusion of splenic artery for diagnosis and treatment of splenic steal syndrome
Published 2025-03-01Subjects: “…Splenic steal syndrome…”
Get full text
Article -
4
Coronary Subclavian Steal Syndrome Causing Acute Myocardial Infarction in a Patient Undergoing Coronary-Artery Bypass Grafting
Published 2012-01-01“…Coronary subclavian steal syndrome with retrograde blood flow in the left internal mammary-coronary bypass graft is a rare but severe complication of cardiac surgery. …”
Get full text
Article -
5
-
6
A logistics book hidden in a linguistics library shelf: a qualitative examination of how resource constraints manifest in library operations
Published 2025-01-01Subjects: Get full text
Article -
7
Ischemic monomelic neuropathy following arteriovenous fistula surgery: a case report
Published 2025-01-01Subjects: Get full text
Article -
8
Occlusion of the left subclavian artery as a reason of angina pectoris recurrence after coronary artery bypass grafting
Published 2017-09-01Subjects: “…coronary mammary subclavian steal…”
Get full text
Article -
9
ASKERÎ CEZA KANUNU’NDA ASKERÎ ŞAHISLAR AÇISINDAN HIRSIZLIK SUÇU
Published 2024-07-01Subjects: Get full text
Article -
10
The prevalence of women sexual locking in a gender violence context - a pastoral perspective
Published 2016-12-01“…Although it had been observed that cases of ‘stealing each other’s wives’ existed, these were not expected traditions among Africans. …”
Get full text
Article -
11
Étude des différents publics du théâtre et du cinéma lors de la généralisation du parlant à Lyon (1929-1932)
Published 2012-04-01“…In Lyon, between the seasons 1928-1929 and 1931-1932, the directors of both municipal theatres of the city of Lyon: the Théâtre des Célestins and the Grand-Théâtre denounce a redoubtable competition of the talking movies stealing some of their customers. Nevertheless, the attendance of both theatres remains stable. …”
Get full text
Article -
12
Spatial Analysis - Time of Stolen Crimes in District 12 of Tehran
Published 2022-06-01“…The spatial analysis of stealing crimes also suggests that the direction and extent of theft is different at different times of the day, weekdays, and on a monthly basis.…”
Get full text
Article -
13
Data Expression and Protection of Intellectual Property Education Resources Based on Machine Learning
Published 2021-01-01“…It can prevent web crawlers from harming e-commerce websites, prevent them from stealing the intellectual property of e-commerce websites, and analyse web crawlers that visit websites to prevent important website data from being stolen by them. …”
Get full text
Article -
14
METAPHORICAL CONCEPTS AND THEIR IDEOLOGICAL FUNCTIONS IN ALURING VOTES FOR INDONESIAN PRESIDENCY
Published 2023-12-01“…Meanwhile, the supporters in Prabowo Camp focuses on criticizing the behavior of the existing government and leaders, by creating concepts of MISUSING IS STEALING, PRESIDENT IS A SCHOOL BOY, SWEARING IS A SENSATION, TO LEAD IS TO SUFFER. …”
Get full text
Article -
15
A Novel Rules Based Approach for Estimating Software Birthmark
Published 2015-01-01“…Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. …”
Get full text
Article -
16
Multi-Smart Meter Data Encryption Scheme Basedon Distributed Differential Privacy
Published 2024-03-01“…Second, we propose a double-blind noise addition protocol to generate distributed noise through interaction between users and a cloud platform to prevent semi-honest participants from stealing data by colluding with one another. Finally, the simulation results show that the proposed scheme can encrypt the transmission of multi-intelligent meter data under the premise of satisfying the differential privacy mechanism. …”
Get full text
Article -
17
Anti-Social Behavior and Teenager’s Wellbeing: A Case Study of Northern Division Kabale Municipality.
Published 2024“…Compared to teenagers with no antisocial behavior, participants with persistent antisocial behaviors had poorer personal well-being outcomes coupled with alcohol misuse, poverty, drug abuse, stealing, and unwanted pregnancy.…”
Get full text
Thesis -
18
Android Malware Threats: A Strengthened Reverse Engineering Approach to Forensic Analysis
Published 2025-01-01“…These malicious programs pose a significant threat, causing financial loss through unauthorized premium-rate SMS messages and jeopardizing user privacy by stealing sensitive data like login credentials and contact information. …”
Get full text
Article -
19
Hybrid Botnet Detection Based on Host and Network Analysis
Published 2020-01-01“…The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. The size of the botnet is usually very large, and millions of infected hosts may belong to it. …”
Get full text
Article -
20
Controlled Bidirectional Quantum Secure Direct Communication
Published 2014-01-01“…Based on the nonlocal swap gate scheme, the legitimate users exchange their quantum information or secret messages without transmission in a public channel, thus protecting against eavesdroppers stealing the secret messages.…”
Get full text
Article