Suggested Topics within your search.
Suggested Topics within your search.
- methods 56
- Moral and ethical aspects 26
- Research 22
- Methodology 17
- Statistical methods 10
- Study and teaching 10
- Mass media 9
- Professional ethics 7
- therapy 7
- Communication 6
- History 6
- Legal ethics 6
- Management 6
- Physical Examination 6
- Social sciences 6
- diagnosis 6
- Anatomy 5
- Child 5
- Ethics 5
- Extremities (Anatomy) 5
- Human anatomy 5
- Information technology 5
- Law 5
- Public administration 5
- nursing 5
- Abdomen 4
- Biochemistry 4
- Business ethics 4
- Chest 4
- Classification 4
-
52241
Factors Associated with Road Accidents among Brazilian Motorcycle Couriers
Published 2012-01-01Get full text
Article -
52242
Effect of Articular Needling Therapy Combined with Proprioceptive Training on Patients with Knee Osteoarthritis
Published 2024-04-01“…ObjectiveTo observe the clinical effect of articular needling therapy combined with proprioceptive training on patients with knee osteoarthritis (KOA).MethodsA total of 90 KOA patients in the Foshan Traditional Chinese Medicine Hospital Affiliated to Guangzhou University of Medicine from February 2021 to October 2022 were randomly divided into control group and observation group, with 45 cases in each group. …”
Get full text
Article -
52243
-
52244
Observation of Conventional Therapy Combined with PNF Technology to Treat Elbow Joint Dysfunction after Trauma Surgery
Published 2017-02-01“…Objective:To study the effect of regular strength training, joint mobilization combined with proprioceptive neuromuscular facilitation (PNF) technology on postoperative dysfunction of elbow joint due to common trauma.Methods:According to random draw method, one hundred patients with postoperative dysfunction of traumatic elbow joint were randomly divided into the routine group and the experimental group with 50 cases in each group. …”
Get full text
Article -
52245
-
52246
-
52247
-
52248
-
52249
-
52250
-
52251
-
52252
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
52253
-
52254
-
52255
-
52256
-
52257
-
52258
-
52259
Effects of Pressure Gloves Combined with Hand Training for Post-stroke Hand Edema
Published 2021-06-01“…Objective:To explore the effects of pressure gloves combined with hand training on post-stroke hemiplegic hand edema in rehabilitation treatment. Methods:A total of sixty post-stroke patients were randomly divided into control group and observation group, with thirty cases in each group. …”
Get full text
Article -
52260