-
2141
3D Radio Map-Based GPS Spoofing Detection and Mitigation for Cellular-Connected UAVs
Published 2023-01-01“…However, civil GPS services are unencrypted and vulnerable to spoofing attacks that can manipulate UAVs’ location and abort the UAVs’ mission. …”
Get full text
Article -
2142
Pain Assessment of Horses With Trigeminal‐Mediated Headshaking (TMHS) at Rest Between Episodes
Published 2025-05-01“…ABSTRACT Background While there is agreement that horses experience pain during the actual headshaking attacks, there is still a lack of research about the time between the individual episodes in this species. …”
Get full text
Article -
2143
Cybersecurity in the Republic of Moldova in the Context of European Integration
Published 2024-12-01“…This explains why there are unlimited possibilities for attacks, countless reasons for the attacks to happen, and endless strategies, which make a defence-based strategy futile, if not included within a larger resilience-based perspective. …”
Get full text
Article -
2144
Correlation of brain segmental volume changes with clinical parameters: a longitudinal study in multiple sclerosis patients
Published 2023-02-01“…Objective To measure the cranial volume differences from 15 different parts in the follow-up of relapsing-remitting multiple sclerosis (RRMS) patients and correlate them with clinical parameters. …”
Get full text
Article -
2145
Exploring Ant‐Mollusk Interactions: Insights From Southern Spain
Published 2025-05-01“…Our results may support cases of (a) predation of snails of certain species by ants, as many shells were found with perforations compatible with ant attacks and we have recorded direct predation, (b) the collection of empty shells to gather the body remains of snails as a trophic resource or for other purposes, and (c) the potential existence of more myrmecophilous snail species than currently known, capable of living in ant nests without being attacked, like Cecilioides acicula, Ferrussacia folliculum, or G. granum. …”
Get full text
Article -
2146
Fed-DPSDG-WGAN: Differentially Private Synthetic Data Generation for Loan Default Prediction via Federated Wasserstein GAN
Published 2025-01-01“…However, limited data and membership inference attacks still significantly affect the privacy of the synthetic data generated. …”
Get full text
Article -
2147
Determining optimal strategies for primary prevention of cardiovascular disease: a synopsis of an evidence synthesis study
Published 2025-08-01“…Plain language summary Heart disease, including heart attacks and strokes, is a major health problem worldwide. …”
Get full text
Article -
2148
Analysis of security and privacy challenges of smart health and sensing systems
Published 2024-12-01“…However, one of the major challenges faced by this system is the security and privacy of patient health data, which is considered vulnerable to local intruders and cyber attackers. In this paper, a comprehensive analysis of the security threats and privacy issues associated with different smart health systems developed by researchers is presented. …”
Get full text
Article -
2149
CXCL12α/SDF‐1 from perisynaptic Schwann cells promotes regeneration of injured motor axon terminals
Published 2017-05-01“…The present results have important implications in the effort to find therapeutics and protocols to improve recovery of function after different forms of motor axon terminal damage.…”
Get full text
Article -
2150
ACCELERATED TEST TO DETERMINE THE CORROSION BEHAVIOR OF STEELS IN BOILERS BURNING SUGARCANE BIOMASS
Published 2025-02-01“…Conclusions: This study carried out allowed to determine, comparatively, the behavior in the first stages of corrosion at 540 °C of two steels used in the construction of high-parameter superheaters boilers attacked by ashes simulating those formed in the combustion of different concentrations of sugarcane agricultural residues mixed with bagasse.…”
Get full text
Article -
2151
Evaluation and identification of dynamic strain on a blast door subjected to blast loading using fibre Bragg grating sensors
Published 2018-03-01“…Tunnels and subway blast doors are effective barriers to terrorist attacks and emergencies, and research into the mechanical properties of blast doors under explosive dynamic loads can improve and enhance the performance thereof. …”
Get full text
Article -
2152
Determinants of solid fuel use in Sub-Saharan Africa: A multilevel analysis using DHS data.
Published 2025-01-01“…<h4>Background</h4>Dawn in human history life excessively depends on different energy sources for various purposes including cooking food and heating. …”
Get full text
Article -
2153
Investigating novel Streptomyces bacteriophage endolysins as potential antimicrobial agents
Published 2025-01-01“…Using several bioinformatics tools, we identified nine different functional domain combinations from 250 Streptomyces phages putative endolysins. …”
Get full text
Article -
2154
Effect of diamondback month (Plutella xylostella) feeding on glucosinolate profile and content change in two mustard (Brassica juncea) varieties
Published 2013-09-01“…They distribute widely in Sichuan and Zhejiang in China. Mustard is often attacked by herbivorous insects (e.g. diamondback month, Plutella xylostella) during different development stages. …”
Get full text
Article -
2155
Updating data on cognitive impairment in stroke patients
Published 2024-04-01“…Memory impairment is not necessarily characteristic of vascular cognitive decline, usually having an evolution with episodic exacerbations and multiple cerebrovascular attacks (cumulative effect), thus producing a gradual deterioration. …”
Get full text
Article -
2156
The Therapeutic Management of Chemical and Herbal Medications on Uric Acid Levels and Gout: Modern and Traditional Wisdom
Published 2024-11-01“…<b>Background:</b> Gout is a chronic inflammatory condition characterized by elevated uric acid levels in the blood, which can precipitate acute gout attacks in individuals with genetic susceptibility, existing medical conditions, and dietary influences. …”
Get full text
Article -
2157
Optimal intrusion detection for imbalanced data using Bagging method with deep neural network optimized by flower pollination algorithm
Published 2025-03-01“…The performance of our IDS is evaluated using four commonly utilized public datasets, NSL-KDD, UNSW NB-15, CIC-IDS-2017, and BoT-IoT, in terms of different metrics, i.e., accuracy, precision, recall, and F1-score. …”
Get full text
Article -
2158
Distinctive Structural and Effective Connectivity Changes of Semantic Cognition Network across Left and Right Mesial Temporal Lobe Epilepsy Patients
Published 2016-01-01“…It suggested that seizure attacks were rather targeted than random for patients with hippocampal sclerosis (HS) in the dominant hemisphere. …”
Get full text
Article -
2159
DistB-Condo: Distributed Blockchain-Based IoT-SDN Model for Smart Condominium
Published 2020-01-01“…Our proposed approach has also the ability to detect attacks in an IoT environment. Eventually, this article evaluates the performance of the proposed architecture using different parameters (e.g., throughput, packet arrival rate, and response time). …”
Get full text
Article -
2160
Electrochemistry‐Based Assay for Monitoring of Adherent Macrophages and Foam Cells on Ab‐CD36 Modified Electrospun Nanofibers
Published 2025-06-01“…Abstract Atherosclerosis, a major cause of heart attacks, is a chronic inflammatory disease marked by the accumulation of lipid‐laden foam cells and immune cells in the arterial wall. …”
Get full text
Article