-
2361
Zombies in Revolt: The Violent Revolution of American Cinematic Monsters
Published 2014-06-01“…The characteristics of the zombies and the meaning ascribed to them transform over time but they also maintain a continuity with a difference with the previous expressions of the monstrous. …”
Get full text
Article -
2362
Effect of Plyometric Exercises on Balance Ability for Ashihara Karate Practitioners
Published 2024-07-01“…Ashihara Karate is a contemporary, full-contact fighting style that emphasises Sabaki, utilising the opponent's footwork and attacking techniques to gain an advantage by positioning oneself in the opponent's "blind" spot. …”
Get full text
Article -
2363
Research on A Lattice-Based Fuzzy Signature and Bimodal Gaussian
Published 2025-01-01“…Fuzzy signatures differ from standard signature schemes in that they use noisy strings as keys, thereby eliminating the need for user-specific auxiliary data. …”
Get full text
Article -
2364
Perch Selection by Three Cooccurring Species of Celithemis (Odonata: Libellulidae): Testing for a Competitive Hierarchy among Similar Species
Published 2016-01-01“…We conclude that even small differences in body size may contribute to niche partitioning in perch selection.…”
Get full text
Article -
2365
Mating System of Free-Ranging Dogs (Canis familiaris)
Published 2011-01-01“…Both males and females differed in their degree of attractiveness to the opposite sex. …”
Get full text
Article -
2366
Social Welfare & Inequality: The U.S.
Published 2019-01-01“…In some cities, the difference in life expectancy varies as much as 30 years between residents of rich and poor neighborhoods. …”
Get full text
Article -
2367
Research on trust measure and management for open distributed systems based on dynamic grouping
Published 2015-01-01“…A stability enhanced group-based trust model(denoted by SEGTM) for open distributed systems was presented to solve the problems of not sufficiently maintaining trust relation between peers due to the dynamic changes in trust network topology.First,the formation and dynamic management of peers' group were depicted in detail,including nodes gathered into the same group with similar interests,competition for group head and nodes within the group leave in active or passive ways.Then,the trust relation in proposed model was categorized into three kinds and subsequently each solution for these kinds was also put forward.So,the problems of decline in accuracy of computational trust degree between peers due to the difference of peers' interests and low probability of repeated transactions between them were addressed.Simulation results show that the model not only enhances the fairness and stability in response to dynamic changes in network topology,but also can effectively resist the attacks of malicious nodes.…”
Get full text
Article -
2368
Co-similar malware infection patterns as a predictor of future risk.
Published 2021-01-01“…However, most systems have at least one of three major limitations: 1) they are not personalized and do not account for the differences between users, 2) their defense mechanism is reactive and unable to predict upcoming attacks, and 3) they extensively track and use the user's activity, thereby invading her privacy in the process. …”
Get full text
Article -
2369
Constructing an Ecological Spatial Network Optimization Framework from the Pattern–Process–Function Perspective: A Case Study in Wuhan
Published 2025-07-01“…The “pattern–function” scenario strengthens core area connectivity (24% and 4% slower degradation under targeted/random attacks, respectively), enhancing resistance to general disturbances, whereas the “pattern–process” scenario increases redundancy in edge transition zones (21% slower degradation under targeted attacks), improving resilience to targeted disruptions. …”
Get full text
Article -
2370
A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security
Published 2025-07-01“…Compared with the traditional theoretical framework of the federated learning, DFF-FL first dynamically fuses the deep feature representation of each node through the transformer attention module to realize the fine-grained cross-node feature interaction in a heterogeneous data environment, thereby eliminating the performance degradation caused by the difference in feature distribution. Secondly, based on the final loss <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mrow><mi>L</mi></mrow><mrow><mi>A</mi><mi>E</mi></mrow></msub><mfenced open="(" close=")" separators="|"><mrow><mi>X</mi><mo>,</mo><mover accent="true"><mrow><mi>X</mi></mrow><mo>^</mo></mover></mrow></mfenced></mrow></semantics></math></inline-formula> index of each node, an adaptive weight adjustment mechanism is used to make the nodes with excellent performance dominate the global model update, which significantly improves robustness against complex attacks. …”
Get full text
Article -
2371
Prothrombotic Biomarkers Are Not Altered by Wood Smoke: A Pilot Controlled Exposure Study
Published 2025-07-01“…ABSTRACT Inhalation of wood smoke (WS) has been associated with increased risk of cardiovascular events, including heart attacks and strokes, both of which are caused in part by the thrombotic occlusion of blood vessels. …”
Get full text
Article -
2372
Clinical efficacy of simethicone combined with bifidobacterium in the treatment of pediatric aerophagia
Published 2025-08-01“…Moreover, it is prone to recurrent attacks. Simethicone oil, as a safe and new type of drug, can be used for treatment.To evaluate the clinical efficacy of simethicone combined with bifidobacterium for the treatment of pediatric aerophagia.MethodsThis study evaluated two treatment approaches for aerophagia. …”
Get full text
Article -
2373
The Role of Stigma in LGBTQIA+ Youth in Rural and Urban Areas
Published 2024-09-01“…Rural youth reported experiencing more discrimination or attacks at school and fewer LGBTQIA+ school resources but slightly higher family support. …”
Get full text
Article -
2374
Integrating certifications into the cybersecurity college curriculum: The efficacy of education with certifications to increase the cybersecurity workforce
Published 2023-10-01“…An un-tapped resource to combat these attacks lies in the students of the secondary educational system. …”
Get full text
Article -
2375
Atypical hemolytic uremic syndrome due to factor H autoantibody
Published 2013-02-01“…A 7.5-year-old girl with recurrent attacks of HUS had low C3 level. We initiated plasmapheresis treatment. …”
Get full text
Article -
2376
Enhanced related-key differential neural distinguishers for SIMON and SIMECK block ciphers
Published 2024-11-01“…In order to select input differences efficiently, we introduce a method that leverages weighted bias scores to approximate the suitability of various input differences. …”
Get full text
Article -
2377
Peach Rust (Transchelia spp.)
Published 2018-07-01“… Peach rust is a fungal disease commonly caused by Tranzchelia discolor (Fuckel) Tranzschel & Litvinov that attacks plants in the genus Prunus, including peach, nectarine, almond, plum, apricot, and cherry. …”
Get full text
Article -
2378
Changes in Arterial Wall Stiffness in Patients with Obesity and Paroxysmal Form of Atrial Fibrillation
Published 2020-09-01“…A positive direct relationship was found between CAVI index and the frequency of AF attacks during the year: r=0.782 (p=0.001).Conclusion. …”
Get full text
Article -
2379
STEMI under fire: evaluating management and challenges in a warzone amidst the 2023 Israeli conflict
Published 2025-05-01“…Correlation analysis between rocket attacks and STEMI cases was not statistically significant. …”
Get full text
Article -
2380
Apis mellifera adansonii Is the Most Defensive Honeybee in Uganda
Published 2018-01-01“…The number of honeybees attacking the researchers’ protective gear within one minute of disturbance was recorded per colony and analyzed. …”
Get full text
Article