-
2121
Contaminação fúngica do acervo da biblioteca de Manguinhos da Fundação Oswaldo Cruz: ações desenvolvidas para sua solução<p>The contamination by fungus of the Manguinhos library bi...
Published 2002-10-01“…At the end of December 1996 the bibliographic collection of FIOCRUZ Manguinhos Library, then compound by approximately 620,000 volumes, was strongly attacked by fungus and had to be closed during five months. …”
Get full text
Article -
2122
Water availability, water content and chemical treatment of seeds on the emergence of soybean seedlings
Published 2024-12-01“…ABSTRACT During the germination process, seeds are susceptible to abiotic and biotic stresses, such as attacks by pests and pathogens. In this context, chemical treatment of seeds can promote physiological and morphological changes in seeds and seedlings, in addition to protecting seeds. …”
Get full text
Article -
2123
An Enhanced and Adaptive Algorithm for Secure Encryption of Data using Advanced Encryption
Published 2025-08-01“…Data is protected using encryption during online and other transfers, yet the information may be obtained from an unauthorized attacker who is persistent enough. Two or more approaches to security should be combined, according to what is highlighted in the article. …”
Get full text
Article -
2124
Perspectives of Palestinian physicians on the impact of the Gaza War in the West Bank
Published 2024-12-01“…When the Israeli army attacked Gaza after October 7th, 2023, the situation in the occupied West Bank became much worse. …”
Get full text
Article -
2125
Cybersecurity awareness among accounting students at a South African public university
Published 2025-06-01“…Results: The findings indicate that accounting students exhibit different levels of cybersecurity awareness, with some demonstrating strong knowledge of cyber risks and protective measures, while others show significant gaps in understanding and practice. …”
Get full text
Article -
2126
The Effect of Metformin in Experimentally Induced Animal Models of Epileptic Seizure
Published 2019-01-01“…In these studies, metformin showed to control seizure attacks by attenuating seizure generation, delaying the onset of epilepsy, reducing hippocampal neuronal loss, and averting cognitive impairments in both acute and chronic models of an epileptic seizure. …”
Get full text
Article -
2127
Personal health data protection and intelligent healthcare applications under generative adversarial network
Published 2025-05-01“…DP-GAN-HD demonstrates enhanced resistance to privacy attacks through its multi-generator framework and Gaussian noise perturbation mechanisms. …”
Get full text
Article -
2128
Impact of Rapid Urbanization on Vulnerability of Land System from Complex Networks View: A Methodological Approach
Published 2018-01-01“…Land systems are typical complex systems comprised of different land use types which interact with each other and respond to external environment processes (such as urbanization), resulting in dynamics in land systems. …”
Get full text
Article -
2129
Sialendoscopy approach in treating juvenile recurrent parotitis: a systematic review
Published 2023-08-01“…There was a statistically significant relationship between the number of attacks/year and recurrences (p < 0.05). The percentage of recurrences according to the type of irrigation/flushing used ranged from 22.2% to 25.2%, with no significant differences between the use of corticosteroids alone (25.2% of recurrences), corticosteroids plus antibiotics (25% of recurrences) or saline alone (22.2% of recurrences). …”
Get full text
Article -
2130
Modernization of the mechanism of the financial services market cybersecurity legal support
Published 2021-09-01“…The methodological basis of the study is systemic, and the study used a comprehensive approach, which is manifested in the use of different methods of scientific knowledge depending on specific aspects of the study. …”
Get full text
Article -
2131
Multiple image encryption algorithm using channel randomization and multiple chaotic maps
Published 2024-12-01“…Moreover, experimental results and a thorough security analysis affirm that the proposed encryption technique has effectively attained confidentiality and robust resistance against various attacks.…”
Get full text
Article -
2132
Optimizing Energy/Current Fluctuation of RF-Powered Secure Adiabatic Logic for IoT Devices
Published 2025-07-01“…By ensuring uniform and complementary current flow in each transition within the logic circuit’s functional blocks, the design reduces energy variation and enhances resistance against power analysis attacks. Evaluation under different clock frequencies and load capacitances demonstrates that the proposed adiabatic logic circuit exhibits lower fluctuation and improved security, particularly at load capacitances of 50 fF and 100 fF. …”
Get full text
Article -
2133
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…The 5G internet of things brings the ultimate experience to users, but it also puts forward new challenges.Users’ requirements of ultra-low latency experience, access to business without sense during movement and security guarantee have attracted much attention.Mobile edge computing can meet the strict requirements of 5G with low latency, large connection and high bandwidth.As a computing paradigm with the coexistence of multi-trust domains, multi-entities and cross-trust domains are interconnected frequently.Identity authentication is particularly important for security protection.Through the research on the identity authentication mechanism under the existing edge computing paradigm, a lightweight fast handover authentication scheme based on pre-authentication was proposed.The proposed solution moved services and calculations from the cloud to the edge.Biometric fingerprint technology was used on the client side to defend against terminal theft attacks.Edge servers in different regions used pre-authentication scheme to meet fast switching requirements.The user and the edge server established a secure channel by negotiating a shared session key in real time, and the authentication scheme ensured lightweight operation with XOR and hash operation.The proposed scheme was evaluated from two aspects of security and performance.Theoretical design analysis and formal tool verification were carried out for security evaluation.The formal analysis tool, AVISPA, was used to verify the improved security of the proposed scheme in the presence of intruders.The performance was mainly evaluated from the computing cost and communication cost of the authentication scheme.The simulation results showed that the proposed scheme reduces communication cost, and the computational overhead can meet the needs of mobile terminals with limited resources.As the future work, the scheme will be improved from two aspects: one is to strengthen the scalability to ensure that users and edge servers can join and exit at any time, and the other one is to strengthen the universality of the scheme to meet the access deployment of third-party service providers.…”
Get full text
Article -
2134
One-way Video Transmission Technology for Urban Rail Transit Based on EndpointDevices
Published 2025-07-01“…The proprietary protocol design in the proposed scheme effectively avoids the vulnerabilities associated with general-purpose protocols and enhances resistance to network attacks, thereby ensuring synchronous video transmission across classified networks.…”
Get full text
Article -
2135
Genome Editing and Defense against Its Misuse
Published 2025-05-01“…Human genome editing methods (“genetic scissors“) may be possibly used for biological attacks of various biological targets, including humans.We should set up an international surveillance scheme to control the use of this method and to detect cases of hidden use of these destructive agents created on its basis.Relevance. …”
Get full text
Article -
2136
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol
Published 2024-11-01“…The customer initiates the transaction on a computer and independently validates it on their mobile device using an out-of-band channel to prevent attacks such as phishing and man-in-the-middle. The methodology involves implementing a prototype in Java ME for Android devices and a Java application server, creating a practical, low-computational-cost system, accessible for use across different operating systems and devices. …”
Get full text
Article -
2137
Optimizing Internet of Things Honeypots with Machine Learning: A Review
Published 2025-05-01“…Honeypots enhance IoT security by attracting and analyzing attackers. However, traditional honeypots struggle with adaptability and efficiency. …”
Get full text
Article -
2138
Ecology, Floristic–Vegetational Features, and Future Perspectives of Spruce Forests Affected by <i>Ips typographus</i>: Insight from the Southern Alps
Published 2025-05-01“…According to the model, more than 58% of the current spruce forests in the study area will exhibit high susceptibility (probability > 0.7) to severe bark beetle attacks by 2080. The floristic–vegetational and ecological analysis of plant communities of 11 bark beetle-affected areas indicated that more thermophilic and significantly different forest communities (in both floristic and physiognomic terms) are expected to develop compared to those of pre-disturbance. …”
Get full text
Article -
2139
Trusted Energy-Aware Hierarchical Routing (TEAHR) for Wireless Sensor Networks
Published 2025-04-01“…Our experimental setup presents the simulation approach to prove our proposed protocol of TEAHR in comparison with typical trust models under different scenarios of node mobility, variable node density, and sophisticated security attacks such as Sybil, wormhole, and replay attacks. …”
Get full text
Article -
2140
Nutritional support in early phases of acute pancreatitis: fashionable trend and essential reality
Published 2013-07-01“…To establish a true role of early enteric feeding in AP treatment, it is necessary to continue monitoring of primary attacks, preventing its relapses, and to study effect of different types of enteric feeds on the level of APUD system hormones, that regulate pancreatic secretion.Conclusion. …”
Get full text
Article