Suggested Topics within your search.
Suggested Topics within your search.
-
201
On Adversarial Robust Generalization of DNNs for Remote Sensing Image Classification
Published 2025-01-01Get full text
Article -
202
-
203
Corrosion inhibition mechanisms of 2-mercaptobenzothiazole on AA2024 T3 aluminium alloy
Published 2025-08-01“…It is shown that 2-MBT effectively inhibits corrosion of the alloy, reducing its susceptibility to corrosion attack and its corrosion rate. Surface analysis, including the use of ToF-SIMS 3-D chemical mapping, confirms 2-MBT adsorption on partially dealloyed intermetallic particles (IMPs) along with the presence of a thin 2-MBT layer on the top-most alloy surface. …”
Get full text
Article -
204
Resilience evolution and optimization strategies of ecological networks in the Three Gorges Reservoir Area: A scenario-based simulation approach
Published 2025-12-01“…To evaluate network resilience, this study employs node attack simulation methods, we dynamically assessed EN resilience through four functional and structural indicators. …”
Get full text
Article -
205
Three-Dimensional and Multiple Image Encryption Algorithm Using a Fractional-Order Chaotic System
Published 2025-05-01Get full text
Article -
206
Acute and Chronic Cardiovascular Manifestations of COVID-19: Role for Endotheliopathy
Published 2021-12-01Get full text
Article -
207
-
208
THE DIAGNOSIS AND TREATMENT OF PANDAS SYNDROME: A CASE REPORT
Published 2015-04-01Get full text
Article -
209
Reversible steganographic method based on interpolation by bivariate linear box-spline on the three directional mesh
Published 2020-09-01“…This paper proposes a reversible steganographic method based on interpolation by linear box-splines on the three directional mesh. Secret data is hidden in the error between the cover and interpolated pixels. …”
Get full text
Article -
210
Congenital Plasmodium vivax in a 3-day-old neonate: a case report
Published 2024-11-01Get full text
Article -
211
Between geometric schemes and mnemonic images: The three paradigmatic figures of Giordano Bruno’s Articuli adversus mathematicos
Published 2024-10-01“… Giordano Bruno’s Articuli adversus mathematicos (Prague 1588) is an emblematic text for more than one reason: it contains a harsh critique of the astronomical measurement techniques in use at the time, but also a radical attack on the theoretical foundations of geometry itself, proposing a discrete notion of basic geometric objects such as the point, the line, the plane, and solid figures. …”
Get full text
Article -
212
A DMPC-based three-dimensional cooperative guidance scheme with impact time and impact angle constraints
Published 2025-05-01“…In this paper, a distributed model predictive control (DMPC)-based three-dimensional (3D) cooperative guidance scheme is proposed for multiple interceptors with controllable thrust and constrained acceleration, to simultaneously attack a maneuvering target at desired terminal angles. …”
Get full text
Article -
213
NLRP3 Inflammasome — a new universal target of asymptomatic hyperuricemia and gout management
Published 2024-07-01“…The key mediator of gout attacks is recognized as IL-1β, a product of NLRP3 (NLR family pyrin domain containing 3) inflammasome activation (complex multiprotein), responsible for local inflammatory response in synovial membrane and periarticular tissues with participation of macrophages and neutrophils. …”
Get full text
Article -
214
An enhanced DPoS consensus mechanism using quadratic voting in Web 3.0 ecosystem
Published 2025-01-01“…With the advent of Web 3.0, blockchain has revealed limitations of traditional Delegated Proof of Stake (DPoS) consensus mechanisms. …”
Get full text
Article -
215
Corrugation at the Trailing Edge Enhances the Aerodynamic Performance of a Three-Dimensional Wing During Gliding Flight
Published 2025-05-01“…This study investigates the aerodynamic effects of three corrugation parameters on gliding performance at a Reynolds number of 1350 and angles of attack ranging from 0° to 20°: (1) chordwise corrugation position, (2) linear variation in corrugation amplitude toward the trailing edge, and (3) the number of trailing-edge corrugations. …”
Get full text
Article -
216
-
217
A secure IoT-edge architecture with data-driven AI techniques for early detection of cyber threats in healthcare
Published 2025-05-01“…The aim of research is to propose and evaluate an attack detection algorithm for IoMT, focusing on improving detection performance against man-in-the-middle attacks. …”
Get full text
Article -
218
The Legal Issues of Firearms Trafficking in the United States of America
Published 2023-01-01“…The norms of the Federal Law of February 7, 2011 No. 3-FZ “About the Police” (hereinafter referred to as the Law “About the Police”) refer to the achievements of domestic administrative science as a result of the work of specialists. …”
Get full text
Article -
219
A network recovery strategy based on boundary nodes and tetrahedral approximation fermat points in three-dimensional wireless sensor networks
Published 2025-08-01“…Abstract Wireless Sensor Networks (WSNs) have emerged as a critical research frontier in the Internet of Things (IoT) domain, with widespread applications in three-dimensional environments. However, due to harsh environments (such as high temperature, high pressure, etc.), natural disasters (such as earthquakes, etc.), large-scale attacks (such as bombing), WSNs in a certain area is split into many isolated islands, and the regional network fails. …”
Get full text
Article -
220