Suggested Topics within your search.
Suggested Topics within your search.
-
4921
Estimated mink home ranges using various home‐range estimators
Published 2018-12-01“…ABSTRACT Although the American mink (Neovison vison) is a fairly common and valued semiaquatic furbearing species, studies evaluating space use by mink in North America are scarce. …”
Get full text
Article -
4922
Analysis of Sports Injury Prevalence and Patterns in Recreational Sports Activities in South Korea: Applying the Association Rule Method
Published 2025-04-01“…The current survey on recreational sports injuries is expected to be used as basic data to prevent injuries in advance for participants in recreational sports, and it is expected that this will allow them to participate in sports by recognizing common injury sites before participating in sports.…”
Get full text
Article -
4923
Applied research note: Determining the size and scope of USDA-exempted poultry processing in Pennsylvania
Published 2025-09-01“…Broilers were the most common species, and nearly half of the respondents raised multiple species. …”
Get full text
Article -
4924
Alternative Growing Media Under the Same Fertigation Scheme Affected Mineral Accumulation and Physiological Parameters in Grapevine Cultivars
Published 2025-04-01“…Under nursery conditions, various organic and inorganic growing media can be used for plant propagation. However, a common fertigation program may have varying effects on plant performance. …”
Get full text
Article -
4925
Contributory Factors to the Inability of the Poor to Access National Health Protection: A Case Study in Waingapu, Sumba Timur District, Indonesia
Published 2024-11-01“…The information was inductive, analyzed, and coded to produce common information among the participants. The data analysis revealed the factors that contributed to the failure of the resident to enroll in the NHP, such as lack of information about the registration, poor socialization of the program, the ignorance of village officers, unaffordability, and confusion about the parties responsible for the registration. …”
Get full text
Article -
4926
Spectrum Allocation and Power Control Based on Newton’s Method for Weighted Sum Power Minimization in Overlay Spectrum Sharing
Published 2025-04-01“…We prioritize WSP minimization over the more common WSEE maximization. This choice not only simplifies computation but also maintains users’ quality of service (QoS) requirements. …”
Get full text
Article -
4927
Clinical and economic assessment of nosocomial pneumonia antibacterial therapy in Moscow hospital
Published 2023-09-01“…It was established that nosocomial pneumonia is the most common complication among hospitalized patients in the intensive care unit (ICU). …”
Get full text
Article -
4928
-
4929
-
4930
Towards understanding suicide dynamics in Ghana; Modelling and optimal control application
Published 2025-06-01“…Understanding the dynamics of suicide and identifying effective prevention strategies is paramount. The most common factors responsible for suicidal thoughts are financial challenges, relationship issues, hopelessness, low self-esteem, depression, peer pressure, academic challenges, and parental problems. …”
Get full text
Article -
4931
A 35 nV/√Hz Analog Front-End Circuit with Adjustable Bandwidth and Gain in UMC 40 nm CMOS for Biopotential Signal Acquisition
Published 2024-12-01“…The proposed AFE consists of a capacitive-coupled instrumentation amplifier (CCIA) and a combination of a programmable gain amplifier (PGA) and a low-pass filter (LPF). …”
Get full text
Article -
4932
Epidemiology of endometriosis in a Norwegian county
Published 1997-06-01“…Nulliparity was more common in women with endometriosis as were infertility problems and pelvic pain. …”
Get full text
Article -
4933
-
4934
Fashion-Leasure Time for Elderly: New Opportunities for Active Longevity
Published 2025-04-01“…The acquired skills and the first results, in feeling different, not like in common life, set the vector of further development, new plans and life horizons appear, contributing to active longevity.…”
Get full text
Article -
4935
Sistemas de cálculo como formas de Logicismo
Published 2019-01-01“…From those systems -though a bit changed from my own point of view- we can define a modal calcule that may have application in computer science, what would not be a stale work. From a common language we take in account two systems in order to show that Cocchiarella's modified system is as powerful deductively as that of Church modified functional second order calcule. …”
Get full text
Article -
4936
-
4937
Sleep Quality and Emotion Regulation Interact to Predict Anxiety in Veterans with PTSD
Published 2018-01-01Get full text
Article -
4938
-
4939
High-intensity focused ultrasound ablation combined with immunotherapy for treating liver metastases: A prospective non-randomized trial.
Published 2024-01-01“…Patients were followed up for adverse events (AEs) during the trial, using the CommonTerminology Criteria for Adverse Events v5.0(CTCAE v5.0) as the standard. …”
Get full text
Article -
4940
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…In order to reduce the risk of rapid spread of homogeneous attacks in network systems, and enhance network and software security, software diversification technologies are applied widely nowadays.Software diversification aims to generate functionally equivalent but internally changed program variants, thereby alter a single operating environment and mitigating homogenization attacks.The existing diversified technical evaluation index ROP gadgets survival rate is difficult to directly reflect the safety impact and the evaluation method is single.In order to evaluate the effectiveness of the diversification method more comprehensively and effectively, a software diversification evaluation method based on the properties of ROP/JOP gadgets is proposed, by analyzing common code reuse attacks, and turns abstract quantification into concrete indicators evaluates the security gain and effect of diversified methods from three aspects of space, time and quality.The method first discusses how diversification techniques affect ROP/JOP attacks according to the three properties of gadgets similarity, damage degree and availability.Nine kinds of diversification methods, such as instruction replacement, NOP insertion, and control flow flattening, are used to diversify the GNU coreutils assembly to generate diversification assembly.Experiments based on the property of gadgets are carried out on the diverse assemblies, and the effectiveness of different diversification methods and the impact on attacks are evaluated according to the experimental results.The experimental results show that this method can accurately evaluate the security gain of software diversification methods, the diversification technology will lead to the increase of the attack chain space required by the ROP/JOP attack, the longer time to construct the attack chain and the lower the attack success rate.The effects of different diversification methods are different, it has a guiding role for the follow-up research on diversified technologies with higher safety gains.…”
Get full text
Article