-
2181
Unified Monitor and Controller Synthesis for Securing Complex Unmanned Aircraft Systems
Published 2025-05-01“…Unmanned Aircraft Systems (UASs) have undergone rapid development over recent years, but have also became vulnerable to security attacks and the volatile external environment. Ensuring that the performance of UASs is safe and secure no matter how the environment changes is challenging. …”
Get full text
Article -
2182
POSITIVISM AND ITS ADVERSARIES: BRADLEY, COLLINGWOOD, NIETZSCHE AND HEIDEGGER
Published 1998-01-01“…Relating positivism to thinkers attacking traditional metaphysics and belonging to the second group is quite a different task. …”
Get full text
Article -
2183
Symbiotic Learning Grey Wolf Optimizer for Engineering and Power Flow Optimization Problems
Published 2022-01-01“…SL-GWO’s symbiotic hunting strategies provide a major overhaul to the exiting hierarchical hunting through population sub-grouping into attacking hunters and experienced hunters with individually crafted dynamic adaptive tuning. …”
Get full text
Article -
2184
Victimization of minors in online sexual abuse: a review of international studies
Published 2025-06-01“…</strong> The problem of sexual exploitation of children and adolescents has become even more acute after the advent of the Internet and the increase in online activity of people. The attacks began to be carried out in virtual space, acquired a completely different form, which poses a challenge to specialists of various profiles. …”
Get full text
Article -
2185
POSITIVISM AND ITS ADVERSARIES: BRADLEY, COLLINGWOOD, NIETZSCHE AND HEIDEGGER
Published 1998-01-01“…Relating positivism to thinkers attacking traditional metaphysics and belonging to the second group is quite a different task. …”
Get full text
Article -
2186
CLINICAL AND HEMODYNAMIC INTERRELATIONS OF ARRHYTHMIA COURSE IN CHILDREN OF 0 TO 7 YEARS OLD
Published 2014-12-01“…Into the factors that influence these hemodynamic relations we include high mean heartrate, tendency of tachicardias to recurrent and permanent course, high frequency of attacks in paroxysmal tachicardias in infants before 1 year old.…”
Get full text
Article -
2187
Medical data security and effective organization using integrated Blockchain principles in AI-based healthcare 6.0 infrastructures
Published 2025-08-01“…Medical data interoperability among different computing platforms needs intelligent security options. …”
Get full text
Article -
2188
Synergizing TabNet and SHAP for PM10 Forecasting: Insights From Makkah, Saudi Arabia
Published 2024-01-01“…Particulate matter (PM10) poses a serious threat to public health by increasing the risk of respiratory issues like asthma and bronchitis, as well as cardiovascular problems such as heart attacks and strokes. In Makkah, Saudi Arabia, the combined impact of dense vehicular traffic, large-scale construction projects, and an arid climate contributes to elevated PM10 concentrations, posing substantial challenges to air quality management and urban sustainability. …”
Get full text
Article -
2189
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Published 2025-03-01“…Our scheme provides security against chosen ciphertext attacks (CCA) with more than 100 bits of Core-SVP post-quantum security and belongs to the NIST-level-I security category (provide security at least as much as AES-128). …”
Get full text
Article -
2190
EFFECT OF MORINGA (MORINGA OLEIFERA) LEAF POWDER, NEEM (AZADIRACHTA INDICA) LEAF POWDER, AND CAMPHOR ON WEEVIL (CALLOSOBRUCHUS MACULATUS F.) IN STORED COWPEA (VIGNA UNGUICULATA (L....
Published 2023-02-01“…However, its seed is attacked by several insect pests both in the field and in storage, especially the cowpea weevil. …”
Get full text
Article -
2191
A low cost compact network TAP device with Raspberry Pi 4
Published 2025-10-01“…The communication of multiple networks in different locations is an open problem since the networks include various devices and applications. …”
Get full text
Article -
2192
Cervicogenic headache: Josey's cases revisited Cefaléia cervicogênica: revisão dos casos de Josey
Published 1997-01-01“…Important topics such as the relatively high frequency, fixed unilaterality of the pain, relation to previous trauma, irradiation from the back to the forehead, normal or slightly abnormal roentgenograms, and the mechanical precipitation of attacks are some of the topics considered by Josey. …”
Get full text
Article -
2193
EG-DPoS: Optimized DPoS Consensus Algorithm Based on Evolutionary Game
Published 2025-05-01“…The proportional coefficient of credit value and voting weight in the process of agent node election is balanced to reduce the oligopoly phenomenon caused by nodes with high credit value, while the roulette selection algorithm is used to randomize the block generation order of agent nodes, to avoid nodes being attacked during block generation and improve the security of the system. …”
Get full text
Article -
2194
Integrated Potential of Microbial, Botanical, and Chemical Pesticides for the Control of Viral Disease Vector Whiteflies (Hemiptera: Aleyrodidae) on Tomato under Greenhouse and Fie...
Published 2022-01-01“…Whiteflies are one of the most devastating horticultural pests attacking tomatoes. Although there are several control methods for the control of whitefly pests, the integrated application of entomopathogenic fungi (IPM) with chemical and botanical insecticides has proven more effective than individual control agents. …”
Get full text
Article -
2195
Experience of Acceptance and Commitment Therapy for those with mild traumatic brain injury (ACTion mTBI): A qualitative descriptive study.
Published 2025-01-01“…There were two overarching themes 1) attacking the concussion from a different direction and 2) positive impact on recovery which depicted participants' overall experiences of the intervention. …”
Get full text
Article -
2196
An efficient privacy-preserving multilevel fusion-based feature engineering framework for UAV-enabled land cover classification using remote sensing images
Published 2025-07-01“…Nevertheless, networked UAVs are vulnerable to malicious attacks, and therefore intrusion detection systems (IDSs) are logically derived to address the vulnerabilities and/or attacks. …”
Get full text
Article -
2197
Intelligent Decision Making Technique for Handling Game Tactics in Soccer Sports
Published 2025-10-01“…By analyzing the passing sequences of the other team, significant insights can be obtained, in the form of their attacking or defensive approach, preferred areas of the pitch, and style of play. …”
Get full text
Article -
2198
Resilience in the Internet of Medical Things: A Review and Case Study
Published 2024-11-01“…Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. …”
Get full text
Article -
2199
The numbers behind success: key metrics for advancing in male EURO 2024
Published 2025-08-01“…These variables were grouped into five categories: distribution, attacking, defending, goalkeeping, and disciplinary. …”
Get full text
Article -
2200
PHILDER: Lightweight Framework for Intelligent Phishing Detection on Resource-Limited Devices
Published 2025-01-01“…The increasing sophistication of phishing attacks represents a significant challenge to cybersecurity, particularly in the context of fraudulent emails crafted to deceive users and steal confidential information. …”
Get full text
Article