Suggested Topics within your search.
Suggested Topics within your search.
- History 7
- Atlases 6
- Human anatomy 6
- Social conditions 5
- methods 5
- Anesthesia 4
- Histology 4
- Women 4
- Atmospheric physics 3
- Attitude to Health 3
- Chemistry, Physical and theoretical 3
- Climatology 3
- Diseases 3
- Leadership 3
- Medicine 3
- Meteorology 3
- Politics and government 3
- atlases 3
- Behavioral Medicine 2
- Children 2
- Christianity 2
- Civilization 2
- Colonial influence 2
- Contracts 2
- Customer relations 2
- Customer services 2
- Cytodiagnosis 2
- Health 2
- Health and hygiene 2
- Manners and customs 2
-
69001
Pengelolaan Kawasan Wisata Suku Anak Dalam Berbasis Kearifan Lokal
Published 2020-07-01“…The theory uses the opinion of Cox (1985) in Pitana (2009) on tourism management must pay attention to principles such as Development, Preservation, Development, Service and Regulation / legal certainty. …”
Get full text
Article -
69002
THE MAIN TRENDS OF INVESTMENT ACTIVITY IN REGIONS OF THE RUSSIAN FEDERATION
Published 2019-05-01“…The analysis of macroeconomic indicators, which characterize the conditions and results of investment activity, has been carried out. Special attention has been paid to studying of investment activity in regions of the Russian Federation based on the system of the indicators, reflecting the volumes of investment, their directions and structure. …”
Get full text
Article -
69003
Multidisciplinary and Nonpharmacological Management of Pain in Temporomandibular Disorders (TMDs)
Published 2022-01-01“…In terms of VAS scores, pain attenuation was observed in all subgroups. The study confirmed the analgesic effect of the selected physical therapy methods. …”
Get full text
Article -
69004
Evaluating the influence of anti-PD-1 immunotherapy combined with IMRT on thyroid dysfunction in nasopharyngeal carcinoma
Published 2025-01-01“…However, its potent anti-tumor effects can also attack normal tissues and organs, leading to immune-related adverse effects (irAE), with the thyroid being one of the most commonly affected organs. …”
Get full text
Article -
69005
The Death of American Studies
Published 2019-09-01“…The critical school came to be dominant in the American Studies Association with a paradoxical attitude undermining the very subject, and organization, that it purports to promote. …”
Get full text
Article -
69006
The Relation between CSR and Innovation. Model Approach
Published 2016-01-01“…The relation was also moderated by a series of six exogenous factors: external factors, industry, company characteristics, attitude, performance, and R&D.…”
Get full text
Article -
69007
Repertorio temático-cronológico de pliegos poéticos en catalán (ss. XV-XVI)
Published 2025-01-01“…La ordenación de los registros atiende a criterios temáticos y cronológicos. Cada entrada incluye una descripción básica del pliego, localización de ejemplares y referencias bibliográficas esenciales. …”
Get full text
Article -
69008
A Study of Non-Finite Forms of Anaphoric do in the Spoken BNC
Published 2019-12-01“…British do has received very little attention in the literature, particularly in comparison with other anaphoric phenomena involving do, such as ellipsis. …”
Get full text
Article -
69009
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
69010
Malicious PDF document detection based on mixed feature
Published 2019-02-01“…Aiming at the problem of poor robustness and easy to evade detection in the detection of malicious PDF document,a malicious PDF document detection method based on mixed features was proposed.It adopted dynamic and static analysis technology to extract the regular information,structure information and API calling information from the document,and then a feature extraction method based on K-means clustering algorithm was designed to filter and select the key mixed features that characterize the document security.Ultimately,it improved the robustness of features.On this basis,it used random forest algorithm to construct classifier and perform experiment to discuss the detection performance of the scheme and its ability to resist mimicry attacks.…”
Get full text
Article -
69011
Cervical cancer screening utilization among HIV-positive women in Edo State, Nigeria
Published 2024-04-01“…Materials and Methods: This cross-sectional study was conducted at an institution and involved HIV-positive women attending an HIV clinic from August 2022 to July 2023. …”
Get full text
Article -
69012
IoT-based automated system for water-related disease prediction
Published 2024-11-01“…Additionally, it offers an IoT system that uses H-ANFIS to gather data in real-time and identify attacks.…”
Get full text
Article -
69013
Measuring social integration, treatment, and mortality after substance use treatment: methodological elaborations in a 20-year follow-up study
Published 2025-01-01“…Baseline characteristics and attrition bias were explicated, and register-based outcomes were examined. …”
Get full text
Article -
69014
Endometriosis in Postmenopausal Woman Without Previous Hormonal Therapy: A Case Report
Published 2015-12-01“…In this presentation, we would like to draw attention to such cases of postmenopausal endometriosis. …”
Get full text
Article -
69015
Fijación interna en la fractura expuesta del tobillo. Presentación de dos casos
Published 2014-10-01“…Se presentan dos casos atendidos en el Hospital General Universitario Dr. …”
Get full text
Article -
69016
-
69017
Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal
Published 2022-05-01“…The average NPCR, UACI, and correlation coefficient (CC) are 96.57%, 35.43%, and 0.005, respectively, between the plain PPG and the encrypted PPG data against hacker attacks. The larger‐the‐better of NPCR and UACI indexes and the smaller‐the‐better of CC index are obtained to evaluate the efficiency of the proposed cryptography method. …”
Get full text
Article -
69018
Captive breeding, developmental biology and commercial production of<i> Dravidia fasciata</i>- An indigenous ornamental fish of the Western Ghats of India
Published 2022-01-01“…Unfortunately, the breeding technology for the ornamental fishes of the Western Ghats of India has not been attempted seriously till date. The present paper is almost a pioneering attempt to develop captive breeding technology for 12 prioritized species of the indigenous ornamental fishes of the Western Ghats of India. …”
Get full text
Article -
69019
The Dynamic Game of Knowledge Hiding Behavior from Organizational Members: To Hide or Not to Hide?
Published 2021-01-01“…At present, research on knowledge hiding has received extensive attention from Western countries, but there are few relevant studies in China. …”
Get full text
Article -
69020
Evaluating Foot and Mouth Disease Vaccination Services through Assessment of Beef Cattle Farmers’ Satisfaction in Sleman Regency
Published 2025-01-01“…The IPA highlighted several attributes as top priorities for performance enhancement, including: The priority indicators for performance improvement include service procedures that are easy to understand, vaccination officers not discriminating based on farm location, the handling skills of the officers, and the application of biosecurity measures according to procedures. …”
Get full text
Article