Suggested Topics within your search.
Suggested Topics within your search.
- Criminal law 8
- Anesthesia 3
- Deception 3
- History 3
- Actions and defenses 2
- Administrative law 2
- English language 2
- Law 2
- Philosophy 2
- Truthfulness and falsehood 2
- foundations 2
- medicine 2
- methods 2
- roof 2
- water supply 2
- Anesthesiology 1
- Automobiles 1
- Biochemical Phenomena 1
- Biochemistry 1
- Breach of contract 1
- Breast 1
- Cancer 1
- Cardiac Surgical Procedures 1
- Child 1
- Civil law 1
- Civil procedure 1
- Clinical biochemistry 1
- Commercial art 1
- Communication in rehabilitation 1
- Constitutional law 1
-
16021
Indonesian navy post and social solidarity influence of Puger fisherman community resilience in facing covid-19 pandemic
Published 2023-03-01“…The role of Indonesian Navy Post (Posal) Puger is very essential, not only as implementing policies to empower marine defense areas, during the Covid 19 pandemic, they were also actively involved in helping to overcome the impact of the Covid 19 pandemic. …”
Get full text
Article -
16022
Familia, escuela y comunidad en relación a la violencia escolar en secundaria: Revisión sistemática
Published 2021-01-01“…Por último, resalta la importancia de examinar al observador y aquellas variables que impulsan a defender a la víctima.…”
Get full text
Article -
16023
Toll-like receptor 2/6-stimulated HMC-1 mast cells promote keratinocyte migration in wound healing.
Published 2025-01-01“…Mast cells, immune sentinels that respond to various stimuli in barrier organs, provide defense by expressing pattern recognition receptors, such as Toll-like receptors (TLRs). …”
Get full text
Article -
16024
-
16025
A Review on the Parameters Affecting the Mechanical, Physical, and Thermal Properties of Natural/Synthetic Fibre Hybrid Reinforced Polymer Composites
Published 2022-01-01“…Hybridization of natural fibres with synthetic fibres enhances the mechanical performance of natural fibres for structural and nonstructural applications such as automobile, aerospace, marine, sporting, and defense. There have been increased research interests towards natural/synthetic fibre hybrid composites in the past two decades (2001–2021) to overcome the identified limitations of natural fibres. …”
Get full text
Article -
16026
Secure controlling method for scalable botnets
Published 2023-02-01“…., internet of things (IoT) devices.Future botnets will become more cross-platform and stealthy, which introduces severe security risks to cyberspace.Therefore, in-depth research on botnets can offer study targets to corresponding defensive studies, which is very meaningful for designing an architecture to secure the next-generation cyberspace.Hence, an HTTP-based scalable botnet framework was proposed to address the problems of compatibility, stealthiness and security.Specifically, the framework adopted a centralized controlling model.Moreover, it used the HTTP protocol as the designed botnet’s communication protocol and block encryption mechanisms based on symmetric cryptography to protect the botnet’s communication contents.Furthermore, a secure control mechanism for multi-platform botnets was designed.In particular, the proposed mechanism utilized source-level code integration and cross-compilation techniques to solve the compatibility challenge.It also introduced encrypted communication with dynamic secret keys to overcome the drawbacks of network traffic regularity and ease of analysis in traditional botnets.Moreover, it designed server migration and reconnection mechanisms to address the weakness of single-point-failure in centralized botnet models.Simulation results in three experimental scenarios with different levels of botnet controllability show that there is a linear relationship between the size of a botnet and the service overhead of the related C&C servers.In addition, under the condition of the same botnet scale, a higher level of controllability introduces a higher throughput and a greater system overhead.The above results demonstrate the effectiveness and the practical feasibility of the proposed method.…”
Get full text
Article -
16027
Could Selectively Skipping of the Repetitive Thinking Questionnaire among a Series of Self-Report Scales in a Study Be a Coping Strategy?
Published 2013-07-01“…According to discriminant analysis, the LRT and IRT groups had been distinguished the HRT group in the context of psychopathology symptoms and attachment anxiety; the LRT and HRT groups had been distinguished the IRT group in the context of cognitive flexibility-control dimension.Conclusion: According to the results, the ignorance of the repetitive thinking items may be a defensive mechanism or stress coping strategy.…”
Get full text
Article -
16028
-
16029
Primordial Cause of Armament, Disarmament, Weaponry and Weapons of Mass Destruction
Published 2022-11-01“…Armed proliferation, it sources, ranging from technological advancement, offensive and defensive systems, economic boom, expansionist policy, growing disparity between the rich and the poor should back up with effective law creation enforcement and protection. …”
Get full text
Article -
16030
Mechanism of Cytosolic Phospholipase A2 Activation in Ghrelin Protection of Salivary Gland Acinar Cells against Ethanol Cytotoxicity
Published 2010-01-01“…Ghrelin, a peptide hormone, newly identified in oral mucosal tissues, has emerged recently as an important mediator of the processes of mucosal defense. Here, we report on the mechanism of ghrelin protection against ethanol cytotoxicity in rat sublingual salivary gland cells. …”
Get full text
Article -
16031
The Institute of Commissioner for Human Rights in the Republic of Peru
Published 2015-02-01“…One of the guarantees of their implementation in practice is establishment of the institute of the Commissioner for Human Rights (in the Peruvian legislation referred to "The defender of the people" [Defensor del pueblo (spanish)], which is regulated by chapter 11 of the Political Constitution of 1993, and also by the Organic Act on the Human Rights Protection Agency № 26520 of August 4, 1995. …”
Get full text
Article -
16032
Breaking the spiral of silence: News and social media dynamics on sexual abuse scandal in the Japanese entertainment industry.
Published 2024-01-01“…Notably, fans more loyal to the company tended to be slower to mention the issue, with a higher likelihood of standing in defense of the perpetrators. Moreover, conflicting attitudes were observed within the fan communities, culminating in an observable "echo chamber" phenomenon. …”
Get full text
Article -
16033
Benelux countries’ security strategies: between europeanism and atlanticism
Published 2024-08-01“…Besides, the balance between the strategic trends remains; Belgium and Luxembourg positively view deeper EU defense cooperation, while the Netherlands mostly sees security guarantees in Euro-Atlantic cooperation. …”
Get full text
Article -
16034
A tarefa na organização histórico-crítica do ensino com a Educação de Jovens e Adultos
Published 2024-12-01“…A concatenação de tarefas de estudo deve ter no horizonte a necessidade histórica da escolarização dos jovens e adultos em vínculo ao planejamento que considere diferentes níveis de apreensão dos conhecimentos. Defende-se a restituição da organização histórico-crítica do ensino como aspecto ontológico do trabalho docente que se pretenda transformador e compromissado com a educação como direito dos jovens e adultos…”
Get full text
Article -
16035
Targeting and editing the second exon of bmp6 gene results in a silver carp with reduced intramuscular bones
Published 2025-03-01“…Intermuscular bones (IBs) are needle-like bones frequently observed within the muscle septa of cyprinid fish, which adversely affects fish palatability and economic value. The deletion of bmp6 has been shown to lead the absence of IBs in fish, without affecting normal growth. …”
Get full text
Article -
16036
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01“…To address the difficulty faced by network security operation and maintenance personnel in timely and accurate identification of required data during network security event analysis, a recommendation algorithm based on a knowledge graph for network security events was proposed.The algorithm utilized the network threat framework ATT&CK to construct an ontology model and establish a network threat knowledge graph based on this model.It extracted relevant security data such as attack techniques, vulnerabilities, and defense measures into interconnected security knowledge within the knowledge graph.Entity data was extracted based on the knowledge graph, and entity vectors were obtained using the TransH algorithm.These entity vectors were then used to calculate data similarity between entities in network threat data.Disposal behaviors were extracted from literature on network security event handling and treated as network security data entities.A disposal behavior matrix was constructed, and the behavior matrix enabled the vector representation of network threat data.The similarity of network threat data entities was calculated based on disposal behaviors.Finally, the similarity between network threat data and threat data under network security event handling behavior was fused to generate a data recommendation list for network security events, which established correlations between network threat domains based on user behavior.Experimental results demonstrate that the algorithm performs optimally when the fusion weight α=7 and the recommended data volume K=5, achieving a recall rate of 62.37% and an accuracy rate of 68.23%.By incorporating disposition behavior similarity in addition to data similarity, the algorithm better represents factual disposition behavior.Compared to other algorithms, this algorithm exhibits significant advantages in recall rate and accuracy, particularly when the recommended data volume is less than 10.…”
Get full text
Article -
16037
Ernst Haeckel e a controvérsia sobre as imagens de embriões na obra Natürliche Schopfungsgeshichte
Published 2024-12-01“…Parte de sua produção científica foi devotada a defender e divulgar as ideias darwinianas de modificação das espécies em seu país. …”
Get full text
Article -
16038
Considerações sobre o conceito de dignidade humana
Get full text
Article -
16039
Blockchain Applications in the Military Domain: A Systematic Review
Published 2025-01-01“…<i>Methods:</i> A systematic review of 43 peer-reviewed articles was performed to discover the applications of blockchain in defense. Key areas analyzed include the role of blockchain in securing communications, fostering transparency, promoting real-time data sharing, and using smart contracts for maintenance management. …”
Get full text
Article -
16040
Enhanced Lightweight Quantum Key Distribution Protocol for Improved Efficiency and Security
Published 2025-01-01“…The proposed optimizations enhance post-processing efficiency and scalability, enabling practical deployment in bandwidth-limited environments like IoT networks, secure financial systems, and defense communications, thereby supporting broader adoption of quantum communication systems.…”
Get full text
Article