Suggested Topics within your search.
Suggested Topics within your search.
-
21
-
22
Cross-sector collaboration to develop a mobile health solution for promotion of physical activity after stroke or transient ischaemic attack in Sweden
Published 2025-06-01“…The development process consisted of three phases: 1) startup, prioritisation, and specifications for digitalisation; 2) development of the mHealth prototype; and 3) prototype adaptation based on feedback on end-user workshops. …”
Get full text
Article -
23
Mal-Detect: An intelligent visualization approach for malware detection
Published 2022-05-01Get full text
Article -
24
Clinical cases of cerebral venous thrombosis at the onset of paroxysmal conditions
Published 2020-11-01Get full text
Article -
25
Evaluation of Intrusion Detection Systems in Cyber Security using Fuzzy OffLogic and MCDM Approach
Published 2025-06-01Subjects: Get full text
Article -
26
Monetary policy of the National bank of Kazakhstan: chronological analysis and assessment
Published 2020-12-01“…The authors revealed the necessary conditions for the occurrence of speculative attacks on the currency market. Based on these patterns, three options for the Central Bank’s actions to prevent speculative attacks are proposed. …”
Get full text
Article -
27
Fully secure and hierarchical identity based signature for automatic dependent surveillance broadcast systems
Published 2025-07-01“…The proposed construction has three characteristics. Firstly, our scheme achieves full security under standard model, which means that its security is independent of the number of inquiries from the attacker. …”
Get full text
Article -
28
Integrated intrusion detection design with discretion of leading agent using machine learning for efficient MANET system
Published 2025-08-01“…At first, the IDS is performed in the network using Adaptive Ensemble Tree Learning (AETL) based classification of typical nodes and malicious intrusions. …”
Get full text
Article -
29
THE AUTHENTICATION PROCESS USING GRAPHICAL PASSWORDS
Published 2016-05-01“…On three examples of dynamic graphical authentication article demonstrates how with user-friendly, graphical password can be stable.…”
Get full text
Article -
30
-
31
Spectral–spatial mamba adversarial defense network for hyperspectral image classification
Published 2025-08-01“…The dense involution branch extracts embedding features via three dense involution layers. The spectral mamba branch can learn the spectral sequence information from HSI adversarial samples. …”
Get full text
Article -
32
Comparative study of the two-shift fast break velocity index for the first three teams to qualify for the Golden Pistol of the Basketball Premier League (2016-2017)
Published 2021-06-01“…As for the research sample, it included the first three clubs of the Premier League basketball (2016-2017). …”
Get full text
Article -
33
Classification and identification of pest, diseases and nutrient deficiency in paddy using layer based EMD phase features with decision tree
Published 2025-06-01“…The features are trained/classified using the decision tree classifiers that classify the pest attack, disease incidence, and nutrient deficiency categories. …”
Get full text
Article -
34
A DMPC-based three-dimensional cooperative guidance scheme with impact time and impact angle constraints
Published 2025-05-01“…In this paper, a distributed model predictive control (DMPC)-based three-dimensional (3D) cooperative guidance scheme is proposed for multiple interceptors with controllable thrust and constrained acceleration, to simultaneously attack a maneuvering target at desired terminal angles. …”
Get full text
Article -
35
Resilience evolution and optimization strategies of ecological networks in the Three Gorges Reservoir Area: A scenario-based simulation approach
Published 2025-12-01“…This study focuses on the Three Gorges Reservoir Area (TGRA), addressing human-land relationship conflicts by constructing an EN system and analyzing its spatiotemporal evolution from 2001 to 2023. …”
Get full text
Article -
36
Three-spined sticklebacks recognize familiar individuals by facial recognition
Published 2025-07-01“…These results suggest that the three-spined stickleback exclusively distinguishes familiar neighbours from unknown fish via facial recognition. …”
Get full text
Article -
37
Perch Selection by Three Cooccurring Species of Celithemis (Odonata: Libellulidae): Testing for a Competitive Hierarchy among Similar Species
Published 2016-01-01“…We tested for this pattern among three similar-sized species: Celithemis elisa, C. fasciata, and C. ornata. …”
Get full text
Article -
38
A network recovery strategy based on boundary nodes and tetrahedral approximation fermat points in three-dimensional wireless sensor networks
Published 2025-08-01“…Abstract Wireless Sensor Networks (WSNs) have emerged as a critical research frontier in the Internet of Things (IoT) domain, with widespread applications in three-dimensional environments. However, due to harsh environments (such as high temperature, high pressure, etc.), natural disasters (such as earthquakes, etc.), large-scale attacks (such as bombing), WSNs in a certain area is split into many isolated islands, and the regional network fails. …”
Get full text
Article -
39
-
40
Early Prediction of Stroke Risk Using Machine Learning Approaches and Imbalanced Data
Published 2025-03-01“…The findings showed that KNN outperformed the three other models with an achieved accuracy of 90%. …”
Get full text
Article