-
1
The Effect of Grip Strength on the Attack Accuracy of the Three Weapons for Fencing Players in Jordan
Published 2024-04-01Article -
2
Evaluation of Recurrence of Ischemic Stroke and Transient Ischemic Attack Three Months After the First Transient Ischemic Attack Based On Diffusion-Weighted Imaging (DWI)
Published 2023-04-01“…Introduction: One type of stroke is the Transient Ischemic Attack (TIA) which lasts less than twenty-four hours; of all patients, about 10 percent develop a stroke within three months after the first symptoms, and 30 percent develop over five years. …”
Get full text
Article -
3
MaDIoT 3.0: Assessment of Attacks to Distributed Energy Resources and Demand in a Power System
Published 2025-01-01“…MaDIoT 3.0 attacks are a novel type of attack that manage to compromise both high-wattage IoT demand devices and DER devices at the same time. …”
Get full text
Article -
4
-
5
-
6
TRANSIENT ISCHEMIC ATTACK AS AN ARTERIAL HYPERTENSION COMPLICATION
Published 2015-12-01Get full text
Article -
7
-
8
Features of flow of victims after terrorist attacks in the subway
Published 2021-01-01“…The objective of the study was to compare the order of admission and distribution in hospitals of the incoming flow of victims with explosive peacetime injuries (based on the analysis of terrorist acts in Minsk on April 11, 2011 and in St. Petersburg on April 3, 2017).Methods and Materials. We analyzed the organization of inpatient medical care for 2 groups of victims who applied for medical care to hospital health organizations on the day of the terrorist attack. …”
Get full text
Article -
9
Preparing a Family Communication Plan for Terrorist Attacks
Published 2003-06-01Get full text
Article -
10
Profile of patients in hypertensive attack assisted in an emergency unit in Fortaleza
Published 2005-06-01“…The main objective of this paper was to analyze, from emergency registers, the profile of patients undergoing hypertensive attack between January and February of 2002 in a municipal hospital in Fortaleza, investigating the characteristics of gender, age group, the working shifts (morning, afternoon, and night) with most frequent patients’ attendance in the hospital, and the medicines prescribed during the attack. …”
Get full text
Article -
11
My Pine Is Under Attack—What Should I Do?
Published 2016-05-01“… This guide is intended to help tree owners and Extension personnel in Florida and the adjacent southeastern region make decisions about backyard pine trees that display signs of attack by wood borers. The 3-page pictorial guide will help determine whether beetles have attacked a pine tree, how far along the attack has progressed, and what to do about it. …”
Get full text
Article -
12
Attacks and countermeasures on federated learning via historical knowledge modeling
Published 2025-07-01“…DynHisFL improves accuracy by 71.3% even with a 20% attack ratio, while achieving an outstanding 98.7% poisoning detection accuracy. …”
Get full text
Article -
13
Use of the New Antioxidant Mexidole for Intensive Care for Ischemic Attacks
Published 2005-06-01Get full text
Article -
14
An attack detection method based on deep learning for internet of things
Published 2025-08-01Get full text
Article -
15
A survey on membership inference attacks and defenses in machine learning
Published 2024-09-01Get full text
Article -
16
Agent-based modeling of Ethereum consensus short-range reorganization attacks
Published 2025-04-01“…However, some malicious nodes may compromise this trust through short-range reorganization attacks for their interest. This paper develops an agent-based model to systematically analyze Proof-of-Stake short-range reorganization attacks, where three types of agents interact through distributed consensus mechanisms with ex-ante, fine-grained, and ex-post reorganization attack strategies. …”
Get full text
Article -
17
RF-RFE-SMOTE: A DoS And DDoS Attack Detection Framework
Published 2023-10-01“…Many efforts are being put into developing defenses against these types of attacks. The tools used by attackers to perform these types of attacks increase day-to-day. …”
Get full text
Article -
18
Multi-view adversarial attack defending method for host intrusion detection
Published 2025-01-01“…Host-based intrusion detection (HID) aims to identify attack behaviors through the analysis of host logs. …”
Get full text
Article -
19
Quality of the nursing attendance with heart attack patient – evaluation through the handbook
Published 2000-02-01“…Based on a standard routine there were analyzed 50 official records by virtue of which could be concluded that: Level I – minimum requirements were 94.3% of that contemplated; Level II standards of quality in attendance attained 60%; Level III – standards of excellence were not attained. …”
Get full text
Article -
20
Asymptotic consensus of hybrid multi-agent systems considering network attacks
Published 2025-08-01Get full text
Article