-
541
Cluster headache attacks in a woman previously struck by lightning: pathophysiology of the latent period Cefaléia em salvas em uma mulher que foi previamente atingida por raio: fis...
Published 2007-06-01“…BACKGROUND: Cases of patients who developed cluster headache-like symptoms after different putative causes have been reported, indicating a direct relationship between brain lesion and this particular type of headache. …”
Get full text
Article -
542
-
543
Predictive value of patent foramen ovale diameter for cryptogenic stroke and age-related differences
Published 2025-08-01“…Elevated white blood cell count (WBC), age ≥ 60 years, large right-to-left shunt (RLS), previous stroke/transient ischemic attack (TIA) and cortical infarction were associated with CS. …”
Get full text
Article -
544
Design of key technologies for intranet dynamic gateway based on DPDK
Published 2020-06-01“…Aiming at the problems of high packet processing delay and high overhead caused by IP hopping,active defense gateway system with multi-layer network deployment structure was designed and implemented based on the data plane development kit (DPDK).Firstly,based on the DPDK fast forwarding framework,forwarding and processing performance of the system were optimized.Secondly,for the dynamic random mapping gateway with three different types of IP addresses,an efficient IP address allocation algorithm and an unpredictable IP address conversion algorithm were designed.The experimental results show that the designed system can effectively reduce the rate of information acquisition of sniffing attack,while greatly improving the processing delay caused by dynamic hopping.…”
Get full text
Article -
545
Clinical cases of cerebral venous thrombosis at the onset of paroxysmal conditions
Published 2020-11-01Get full text
Article -
546
The impact of the application of antivirus programs on the security of computer systems
Published 2024-08-01“…The paper presents a study that analyzes the application of different antivirus programs to reduce negative consequences on computer systems caused by malicious attacks. …”
Get full text
Article -
547
Reputation mechanism based on multi-path routing protocol in ad hoc networks
Published 2008-01-01“…The simulation results show that it can react to the attacks more quickly and accurately.…”
Get full text
Article -
548
AIDFL: An Information-Driven Anomaly Detector for Data Poisoning in Decentralized Federated Learning
Published 2025-01-01“…To address these challenges, AIDFL is proposed to utilize conditional entropy and mutual information, which are independent of data distribution to detect and mitigate data poisoning attacks in DFL environments. Experimental results demonstrate that AIDFL achieves superior defense under non-IID settings under different poisoning configurations. …”
Get full text
Article -
549
Evaluation method for flange-climb derailment focusing on contact position and transverse creepage between wheel and rail in railway vehicle
Published 2025-01-01“…Results show that the transit domains for loci of these variables differ significantly between derailment and non-derailment cases. …”
Get full text
Article -
550
A New Hybrid Wavelet Transform-Deep Learning for Smart Resilient Inverters in Microgrids Against Cyberattacks
Published 2025-01-01“…While the model shows high performance, further research is needed to validate its generalizability across different inverter hardware and against novel, zero-day attack variants.…”
Get full text
Article -
551
Headaches and its dependence from different factors in patients with temporal epilepsy at interictal period
Published 2010-08-01“…Headaches (HA) among 80.4% patients with TE is revealed and its dependence from different factors is studied. The absence of gender differences, the dependence from the type TE, frequency of attacks and the duration of the disease among patients TE with HA are noticed, however the burdened neurological and obstetrical anamnesis, the presence HA among relatives, changes on data MRI of the brain, pathology of vertebral-basilar basin, the reduction and asymmetry of the index of the vessel resistance are observed. …”
Get full text
Article -
552
Towards Analysable Chaos-based Cryptosystems: Constructing Difference Distribution Tables for Chaotic Maps
Published 2024-10-01“…Unlike conventional cryptography, evaluating the security margins of chaos-based encryption against attacks such as differential cryptanalysis is complex. …”
Get full text
Article -
553
ASSOCIATION BETWEEN ANTHROPOMETRIC AND PHYSICAL DATA OF UNIVERSITY SOCCER PLAYERS FROM DIFFERENT POSITIONS
Published 2021-05-01“…The agility test was moderately correlated with YoYo intermittent recovery test across the different playing positions. In conclusion, there the acceleration and the agility had a positive association with the different positions of the soccer players.…”
Get full text
Article -
554
-
555
Laboratory Evaluation of Different Insecticides against Hibiscus Mealybug, Maconellicoccus hirsutus (Hemiptera: Pseudococcidae)
Published 2016-01-01“…The study emphasizes the use of such insecticide mixtures to develop better management strategy for mealybug populations attacking ornamental plants. However effects of such insecticide mixtures on other organisms and biological control agents should be checked under field conditions.…”
Get full text
Article -
556
Clinincal variants of trancient neurological deficit in patients with the neck osteochondrosis
Published 2018-06-01“…With the purpose of studing frequency and variability of clinical symptoms there were observed 130 patients after transient ischemic attack (TIA) in a vertebrobasillar pool (VBP) on a background of neck osteochondrosis, verified from MRI, CT data or sciagraphies of the neck portion of the spine with functional tests. …”
Get full text
Article -
557
Clinincal variants of trancient neurological deficit in patients with the neck osteochondrosis.
Published 2018-06-01“…With the purpose of studing frequency and variability of clinical symptoms there were observed 130 patients after transient ischemic attack (TIA) in a vertebrobasillar pool (VBP) on a background of neck osteochondrosis, verified from MRI, CT data or sciagraphies of the neck portion of the spine with functional tests. …”
Get full text
Article -
558
-
559
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
Published 2023-05-01“…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
Get full text
Article -
560
Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption
Published 2023-05-01“…Aiming at the problem that traditional cloud-based data sharing schemes rely on trusted third parties and only focus on data privacy protection or access control, a blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption was proposed.The blockchain and cloud server were combined to store data chain by chain and provide efficient, reliable and tamper-proof data sharing.Firstly, the localization difference privacy was introduced to preprocess the shared data to protect the privacy of the data owner and resist the attack of the untrusted third party.Secondly, the searchable encryption technology and attribute-based encryption were combined to realize data privacy protection, support ciphertext retrieval, and provide fine-grained access control for shared data.Finally, the safety, the correctness proof, and the experimental analysis proves that the proposed scheme meets the safety objectives.…”
Get full text
Article