-
341
Spectrum of Ixodidae Ticks Attacking Humans in Novosibirsk Province, Russian Siberia, and Their Association with Tick-Borne Bacterial Agents
Published 2025-03-01“…In this study, we determined tick species attacking people in the vicinity of Novosibirsk and the range of bacterial agents they were infected with. …”
Get full text
Article -
342
Tackling the Optimal Phasor Measurement Unit Placement and Attack Detection Problems in Smart Grids by Incorporating Machine Learning
Published 2025-01-01“…Existing research primarily addresses cybersecurity by focusing on the optimal placement of phasor measurement units (PMUs) to ensure topological observability and minimize system costs, followed by developing AI-based attack detection algorithms. However, these studies fail to simultaneously consider system cost, loss in system observability, and false data injection attack (FDIA) detection performance. …”
Get full text
Article -
343
Combining Sentinel-2 Data and Risk Maps to Detect Trees Predisposed to and Attacked by European Spruce Bark Beetle
Published 2024-11-01“…The results show that detection accuracy was high already before the trees were attacked in May 2018, indicating that the Sentinel-2 data detect predisposed trees and that the early signs of attack are low for trees at high risk of being attacked. …”
Get full text
Article -
344
Combined Use of Spectral and Structural Features for Improved Early Detection of Pine Shoot Beetle Attacks in Yunnan Pines
Published 2025-03-01“…The results are as follows: (1) Point cloud segmentation using the Canopy Height Model (CHM) yielded the highest crown segmentation accuracy (F-score: 87.80%). (2) Near-infrared reflectance exhibited the greatest decrease for early-attacked crowns, while the structural variable intensity percentile (int_P50-int_P95) showed significant differences (<i>p</i> < 0.05). (3) In the RF model, spectral variables were predominant, with LiDAR structural variables serving as a supplement. …”
Get full text
Article -
345
Serum Vitamin D and B12 Levels in School-aged Children and Adolescents with Frequent Primary Headache Attacks
Published 2022-12-01“…Additionally, the vitamin D levels in migraine patients with ≥4 attacks per week were significantly lower than those of migraine patients with 2-3 attacks per week (p=0.010). …”
Get full text
Article -
346
Heterogeneity and efficacy of immunotherapy in multiple cancer: insights from a meta-analysis
Published 2025-05-01“…Findings showed the different efficacy and safety of immunotherapy in treating multiple cancers, with various objective response rates. …”
Get full text
Article -
347
SROR: A Secure and Reliable Opportunistic Routing for VANETs
Published 2024-09-01“…In addition, the influence of different learning rate and exploratory factor policy on rewards of agents are analyzed. …”
Get full text
Article -
348
La coprésence des touristes et des habitants au cœur de la résilience du tourisme urbain. Une analyse du marché de Noël des Champs Elysées à partir de données d’enquêtes et des tél...
Published 2018-11-01“…We intend to analyse if the co-presence of different types of tourists and inhabitants during such event is a factor of resilience. …”
Get full text
Article -
349
Changes in volatile organic compounds (VOCs) content in resistant and non-resistant forest trees in response to bark beetle attack
Published 2025-05-01“…The response of forest trees to bark beetle attack involves substantial changes in terpene content, which varies between resistant and non-resistant species. …”
Get full text
Article -
350
The establishment of a clinical protocol for hostages returning from captivity
Published 2025-07-01Get full text
Article -
351
The Role Of Akre In The Barzan Armed Movement (1943-1945)
Published 2023-09-01Get full text
Article -
352
Evaluation of Double Acid Attack (Dae) on Deformed and Aged Ti-xNb-ySn Alloys for Application in Implants
Published 2025-08-01Get full text
Article -
353
Aerodynamic analysis of wind turbine blades: A numerical study
Published 2025-06-01“…In this study, the aerodynamic performance of different wind turbine blades including FX 63-137, NACA 6415, NACA 63-415 has been investigated. …”
Get full text
Article -
354
Diphyllin elicits a doubled-pronged attack on the entry of SARS-CoV-2 by inhibiting cathepsin L and furin
Published 2024-12-01“…Collectively, our findings establish diphyllin as novel inhibitor of CTSL and furin proteases, resulting in a double-pronged attack on SARS-CoV-2 entry along endosomal as well as cell surface routes. …”
Get full text
Article -
355
Advancing Hydrogen Gas Utilization in Industrial Boilers: Impacts on Critical Boiler Components, Mitigation Measures, and Future Perspectives
Published 2024-09-01“…Specifically, the study focused on hydrogen embrittlement (HE) and high-temperature hydrogen attack (HTHA) and their effects on boiler components. …”
Get full text
Article -
356
Optimizing feature selection and deep learning techniques for precise detection of low-rate distributed denial of service (LDDoS) attack
Published 2025-07-01“…Abstract The solution for cybersecurity faces significant challenges due to the growing complexity of denial of service (DoS) attacks, especially Low-rate Distributed Denial of Service (LDDoS) attacks. …”
Get full text
Article -
357
Efficient Distributed Denial of Service Attack Detection in Internet of Vehicles Using Gini Index Feature Selection and Federated Learning
Published 2025-01-01“…As noted in this paper, the average accuracy of the models is 91%. Moreover, different types of DDoS attacks were identified by employing our proposed technique. …”
Get full text
Article -
358
Dangerous attack paths analysis for power networks based on adaptive limited depth search and improved Z-score pruning
Published 2024-12-01“…Aiming at the problems of low efficiency of attack path search in a large-scale power system, a dangerous attack path search analysis method is proposed, which searches the dangerous attack path in the attack graph of the node threat value quantification to realize the security analysis in the power system. …”
Get full text
Article -
359
Physical Assessment of an SDN-Based Security Framework for DDoS Attack Mitigation: Introducing the SDN-SlowRate-DDoS Dataset
Published 2023-01-01“…The results demonstrate that the framework effectively mitigates malicious connections, with a mitigation efficiency between 91.66%– 100% for different conditions of the number of attackers and victims. …”
Get full text
Article -
360
Antiplatelet regimens in the long-term secondary prevention of transient ischaemic attack and ischaemic stroke: an updated network meta-analysis
Published 2016-03-01“…Objective To examine the comparative efficacy and safety of different antiplatelet regimens in patients with prior non-cardioembolic ischaemic stroke or transient ischaemic attack.Design Systematic review and network meta-analysis.Data sources As on 31 March 2015, all randomised controlled trials that investigated the effects of antiplatelet agents in the long-term (≥3 months) secondary prevention of non-cardioembolic transient ischaemic attack or ischaemic stroke were searched and identified.Outcome measures The primary outcome measure of efficacy was serious vascular events (non-fatal stroke, non-fatal myocardial infarction and vascular death). …”
Get full text
Article