Showing 69,001 - 69,020 results of 81,006 for search 'AT*', query time: 0.27s Refine Results
  1. 69001

    Pengelolaan Kawasan Wisata Suku Anak Dalam Berbasis Kearifan Lokal by Syafik Wazan, Retno Sunu Astuti, Kismartini Kismartini, Teuku Afrizal

    Published 2020-07-01
    “…The theory uses the opinion of Cox (1985) in Pitana (2009) on tourism management must pay attention to principles such as Development, Preservation, Development, Service and Regulation / legal certainty. …”
    Get full text
    Article
  2. 69002

    THE MAIN TRENDS OF INVESTMENT ACTIVITY IN REGIONS OF THE RUSSIAN FEDERATION by A. V. Kozhukhova, M. D. Khabib

    Published 2019-05-01
    “…The analysis of macroeconomic indicators, which characterize the conditions and results of investment activity, has been carried out. Special attention has been paid to studying of investment activity in regions of the Russian Federation based on the system of the indicators, reflecting the volumes of investment, their directions and structure. …”
    Get full text
    Article
  3. 69003

    Multidisciplinary and Nonpharmacological Management of Pain in Temporomandibular Disorders (TMDs) by Elżbieta Kubala, Danuta Lietz–Kijak, Paulina Strzelecka, Aneta Wieczorek, Piotr Skomro, Helena Gronwald

    Published 2022-01-01
    “…In terms of VAS scores, pain attenuation was observed in all subgroups. The study confirmed the analgesic effect of the selected physical therapy methods. …”
    Get full text
    Article
  4. 69004

    Evaluating the influence of anti-PD-1 immunotherapy combined with IMRT on thyroid dysfunction in nasopharyngeal carcinoma by Liqianqi Chen, Zihuang Li, Xianming Li, Shihai Wu, Long Gong, Gang Xu, Shanyi Chen, Yucong Zhang

    Published 2025-01-01
    “…However, its potent anti-tumor effects can also attack normal tissues and organs, leading to immune-related adverse effects (irAE), with the thyroid being one of the most commonly affected organs. …”
    Get full text
    Article
  5. 69005

    The Death of American Studies by Simon J. Bronner

    Published 2019-09-01
    “…The critical school came to be dominant in the American Studies Association with a paradoxical attitude undermining the very subject, and organization, that it purports to promote. …”
    Get full text
    Article
  6. 69006

    The Relation between CSR and Innovation. Model Approach by Dawid Szutowski, Piotr Ratajczak

    Published 2016-01-01
    “…The relation was also moderated by a series of six exogenous factors: external factors, industry, company characteristics, attitude, performance, and R&D.…”
    Get full text
    Article
  7. 69007

    Repertorio temático-cronológico de pliegos poéticos en catalán (ss. XV-XVI) by Laura Puerto Moro

    Published 2025-01-01
    “…La ordenación de los registros atiende a criterios temáticos y cronológicos. Cada entrada incluye una descripción básica del pliego, localización de ejemplares y referencias bibliográficas esenciales. …”
    Get full text
    Article
  8. 69008

    A Study of Non-Finite Forms of Anaphoric do in the Spoken BNC by Kimberly Oger

    Published 2019-12-01
    “…British do has received very little attention in the literature, particularly in comparison with other anaphoric phenomena involving do, such as ellipsis. …”
    Get full text
    Article
  9. 69009

    Lightweight terminal cross-domain authentication protocol in edge computing environment by Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG

    Published 2023-08-01
    “…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
    Get full text
    Article
  10. 69010

    Malicious PDF document detection based on mixed feature by Xuehui DU, Yangdong LIN, Yi SUN

    Published 2019-02-01
    “…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
    Get full text
    Article
  11. 69011

    Cervical cancer screening utilization among HIV-positive women in Edo State, Nigeria by Ngozi R. Osunde, Mercy N. Anayo, Ona Patience, Favour E. Omoregie

    Published 2024-04-01
    “…Materials and Methods: This cross-sectional study was conducted at an institution and involved HIV-positive women attending an HIV clinic from August 2022 to July 2023. …”
    Get full text
    Article
  12. 69012

    IoT-based automated system for water-related disease prediction by Bhushankumar Nemade, Kiran Kishor Maharana, Vikram Kulkarni, Surajit mondal, G S Pradeep Ghantasala, Amal Al-Rasheed, Masresha Getahun, Ben Othman Soufiene

    Published 2024-11-01
    “…Additionally, it offers an IoT system that uses H-ANFIS to gather data in real-time and identify attacks.…”
    Get full text
    Article
  13. 69013

    Measuring social integration, treatment, and mortality after substance use treatment: methodological elaborations in a 20-year follow-up study by Tove Sohlberg, Jessica Storbjörk, Peter Wennberg

    Published 2025-01-01
    “…Baseline characteristics and attrition bias were explicated, and register-based outcomes were examined. …”
    Get full text
    Article
  14. 69014

    Endometriosis in Postmenopausal Woman Without Previous Hormonal Therapy: A Case Report by Mine İslimye Taşkın, Meltem Çağrı Menteşe, Engin Uzgören, Ümit İnceboz

    Published 2015-12-01
    “…In this presentation, we would like to draw attention to such cases of postmenopausal endometriosis. …”
    Get full text
    Article
  15. 69015
  16. 69016
  17. 69017

    Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal by Chia‐Hung Lin, Jian‐Xing Wu, Neng‐Sheng Pai, Pi‐Yun Chen, Chien‐Ming Li, Ching Chou Pai

    Published 2022-05-01
    “…The average NPCR, UACI, and correlation coefficient (CC) are 96.57%, 35.43%, and 0.005, respectively, between the plain PPG and the encrypted PPG data against hacker attacks. The larger‐the‐better of NPCR and UACI indexes and the smaller‐the‐better of CC index are obtained to evaluate the efficiency of the proposed cryptography method. …”
    Get full text
    Article
  18. 69018

    Captive breeding, developmental biology and commercial production of<i> Dravidia fasciata</i>- An indigenous ornamental fish of the Western Ghats of India by T.V. Anna Mercy, Eapen Jacob, K. Raju Thomas

    Published 2022-01-01
    “…Unfortunately, the breeding technology for the ornamental fishes of the Western Ghats of India has not been attempted seriously till date. The present paper is almost a pioneering attempt to develop captive breeding technology for 12 prioritized species of the indigenous ornamental fishes of the Western Ghats of India. …”
    Get full text
    Article
  19. 69019

    The Dynamic Game of Knowledge Hiding Behavior from Organizational Members: To Hide or Not to Hide? by Fan Yang, Long Yang, Ping Li

    Published 2021-01-01
    “…At present, research on knowledge hiding has received extensive attention from Western countries, but there are few relevant studies in China. …”
    Get full text
    Article
  20. 69020

    Evaluating Foot and Mouth Disease Vaccination Services through Assessment of Beef Cattle Farmers’ Satisfaction in Sleman Regency by M. Y. Syihabuddin, S. Andarwati, B. Guntoro, A. R. S. Putra

    Published 2025-01-01
    “…The IPA highlighted several attributes as top priorities for performance enhancement, including: The priority indicators for performance improvement include service procedures that are easy to understand, vaccination officers not discriminating based on farm location, the handling skills of the officers, and the application of biosecurity measures according to procedures. …”
    Get full text
    Article