Showing 241 - 260 results of 1,160 for search 'attack three', query time: 0.08s Refine Results
  1. 241

    Serum miR-130a-3p and miR-326: Correlation with Airway Inflammation and Prognostic Implications in Pediatric Bronchial Asthma by Liu D, Liao F, Wang H

    Published 2025-04-01
    “…The elevation of serum levels of IL-4, TGF-β 1 and CKLF-1 increased the risk of asthma and poor prognosis, but IL-10, miR-130a-3p and miR-326 were protective factors (P < 0.05).Conclusion: The decreased levels of serum miR-130a-3p and miR-326 were related to airway inflammation in children with bronchial asthma. …”
    Get full text
    Article
  2. 242
  3. 243

    Applying bioinformatic analysis for prognostic assessment of the <i>HS3ST6</i> missense mutations clinical significance in the development of hereditary angioedema by N. A. Pechnikova, Yu. V. Ostankova, M. A. Saitgalina, A. M. Bebyakov, A. R. Denisova, N. S. Podchernyaeva, A. A. Totolian

    Published 2023-02-01
    “…Hereditary angioedema (HAE) is a genetically determined disease characterized by recurrent attacks of edema affecting the subcutaneous and/or submucosal layers of tissue, face, lips, neck, extremities of the body,  oral cavity,  intestine and/or larynx. …”
    Get full text
    Article
  4. 244

    Design, synthesis and evaluation of benzodioxole and bromofuran tethered 1,2,4-triazole hybrids as potential anti breast cancer agents with computational insights by Manjunath R, Sushruta S. Hakkimane, Shashikala B S, Santhosh L. Gaonkar

    Published 2025-07-01
    “…Among all the synthesized compounds, compound 12b demonstrated an excellent IC50 value of 3.54 ± 0.265 µg/mL. Additionally, in silico studies, such as molecular docking to predict the orientation of the compounds, molecular dynamics simulations to evaluate binding stability with the target protein, drug-likeness studies to evaluate Lipinski’s rule of five and Jorgensen’s rule of three, DFT analysis to determine the energy gap of the frontier molecular orbitals (FMOs) and the molecular electrostatic potential (MEP) for identifying sites of nucleophilic and electrophilic attacks, were also conducted.…”
    Get full text
    Article
  5. 245

    InvSim algorithm for pre-computing airplane flight controls in limited-range autonomous missions, and demonstration via double-roll maneuver of Mirage III fighters by Osama A. Marzouk

    Published 2025-07-01
    “…This mathematical framework incorporates (1) body axes (fixed in the airplane at its center of gravity), (2) inertial axes (fixed in the earth/ground at the take-off point), wind axes (aligned with the flight path/course), (3) spherical flight path angles (azimuth angle measured clockwise from the geographic north, and elevation angle measured above the horizon plane), and (4) spherical flight angles (angle of attack and sideslip angle). …”
    Get full text
    Article
  6. 246

    Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit by Hamdan Dian Jaya Rozi Hyang Utami, Riza Arifudin, Alamsyah Alamsyah

    Published 2019-05-01
    “…The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system. …”
    Get full text
    Article
  7. 247

    In-context learning for propaganda detection on Twitter Mexico using large language model meta AI by C.A. Piña-García

    Published 2025-09-01
    “…This study explores the application of Large Language Models (LLMs) for detecting political propaganda on Twitter, focusing on manipulative political narratives during the 2018 Mexican presidential election. Using LLaMA 3.2, we implement a few-shot prompting within an In-Context Learning framework to classify tweets as propagandist or non-propagandist. …”
    Get full text
    Article
  8. 248

    Islamist Terrorist Activity in 2000-2020: A Scoring Methodology by Olga S. Chikrizova

    Published 2024-12-01
    “…Based on the Global Terrorism Database and the author’s sample of 155 groups broadcasting Islamist ideology, three stages of the development of Islamist terrorism were identified, a direct proportional relationship between the number of terrorist attacks and the number of victims was proven, and the geography of Islamist terrorist activity was analyzed. …”
    Get full text
    Article
  9. 249

    Theoretical and Experimental Study of Corrosion Behavior of Carbon Steel Surface in 3.5% NaCl and 0.5 M HCl with Different Concentrations of Quinolin-2-One Derivative by Rehab Majid Kubba, Mustafa Alaa Mohammed

    Published 2022-02-01
    “…Theoretically, Density Functional Theory (DFT) of B3LYP/ 6-311++G/ 2d, 2p level was carried out to calculate the geometrical structure, physical properties and chemical inhibition chemical parameters, with the local reactivity in order to predict both the reactive centers and to know the possible sites of nucleophilic and electrophilic attacks, in vacuum and two solvents (DMSO and H2O), all at the equilibrium geometry. …”
    Get full text
    Article
  10. 250

    Impact of large-scale social restrictions on air quality (NO₂, CO, O₃) during COVID-19: Surabaya case study, Indonesia by Asmaul Nur Fitria, Supriyadi Supriyadi, Muhammad Al-Irsyad, Anindya Hapsari

    Published 2025-04-01
    “…It was identified as an attack on humans and spread very quickly almost all over the world. …”
    Get full text
    Article
  11. 251
  12. 252
  13. 253
  14. 254

    Fabrication of Highly Dispersed Cu/α-FeOOH via Green Rust and Its Application in Hydrogenation of Methyl Palmitate by Panjie YU, Hongwei ZHANG, Yongde MA, Zhenping CAI, Yanning CAO, Kuan HUANG, Lilong JIANG

    Published 2025-06-01
    “…Combining the characterization results, activity test results, and the temperature and pressure changes in the reactor during the reaction, the following reaction mechanism was proposed: the highly dispersed Cu0 species on the catalyst surface and the abundant Lewis acid sites on the Fe3O4 surface synergistically participate in the activation and dissociation of H2 and the activation and conversion reaction of methyl palmitate; H2 dissociates into active H· on Cu0, and the C=O bond of methyl palmitate is adsorbed and activated on the Lewis acid sites on the Fe3O4 surface; the generated H· attack the activated C=O bonds and promote the dissociation of methyl palmitate to generate hexadecanol; the Lewis acid sites occupied by O atoms react with H2 to achieve the regeneration of Lewis acid sites. …”
    Get full text
    Article
  15. 255
  16. 256

    Highly-Efficient Hardware Architecture for ML-KEM PQC Standard by Haesung Jung, Quang Dang Truong, Hanho Lee

    Published 2025-01-01
    “…Furthermore, the implementation incorporates several methods to effectively mitigate side-channel attacks, a common concern in hardware-based cryptosystem deployments. …”
    Get full text
    Article
  17. 257
  18. 258
  19. 259

    LB-IDS: Securing Wireless Sensor Network Using Protocol Layer Trust-Based Intrusion Detection System by Umashankar Ghugar, Jayaram Pradhan, Sourav Kumar Bhoi, Rashmi Ranjan Sahoo

    Published 2019-01-01
    “…Wireless sensor network (WSN) faces severe security problems due to wireless communication between the nodes and open deployment of the nodes. The attacker disrupts the security parameters by launching attacks at different layers of the WSN. …”
    Get full text
    Article
  20. 260

    Efficacy of iguratimod in the treatment of patients with palindromic rheumatism ineffective to methotrexate or hydroxychloroquine by Mengjie Chen, Yongjun Cheng, Guiyao Jin, Yuren Tu, Qi Zhang, Chuanfu Zhang, Wenlong Wang

    Published 2025-06-01
    “…The results demonstrated a significant reduction in the number of attacks over a three-month period (1.3 ± 1.4 vs. 5.8 ± 2.0, P &lt; 0.0001). …”
    Get full text
    Article