Showing 561 - 580 results of 2,541 for search 'different attack', query time: 0.11s Refine Results
  1. 561

    Assoclation polymorphism apoe gene and blood lipid profile with diffe different types of stroke in Siberia by M. I. Voevoda, Yu. V. Skurikhina, S. V. Shishkin

    Published 2011-04-01
    “…The average age of stroke attack is 61,3 ± 1,0 for men and 61,3 ± 1,0 for women.Independent influence of APOE gene's genotypes polymorphism on development at different stroke patients has not been revealed.…”
    Get full text
    Article
  2. 562

    Long-term survival of patients with cerebrovascular accident in different age groups in the REGION-M registry by S. N. Tolpygina, A. V. Zagrebelny, M. I. Chernysheva, V. P. Voronina, N. P. Kutishenko, N. A. Dmitrieva, O. V. Lerman, Yu. V. Lukina, S. V. Blagodatskikh, M. M. Lukyanov, E. Yu. Okshina, N. E. Parsadanyan, S. Yu. Martsevich, O. M. Drapkina

    Published 2023-03-01
    “…With increasing age, ischemic stroke was significantly more common and transient ischemic attack was less common (p<0,001).Conclusion. Mortality of patients who underwent stroke was significantly higher in older age groups and did not differ among men and women.…”
    Get full text
    Article
  3. 563
  4. 564
  5. 565

    Analysis of different IDS-based machine learning models for secure data transmission in IoT networks by Gladić Dejana, Petrovački Jelena, Sladojević Srdan, Arsenović Marko, Ristić Sonja

    Published 2025-07-01
    “…The aim of this study is to develop a machine learning (ML) model for network traffic classification and attack detection in IoT environments. Through a comparative analysis of different algorithms, the study seeks to identify the model with the best performance, which could serve as a foundation for efficient IDS solutions tailored to the specific characteristics of IoT networks. …”
    Get full text
    Article
  6. 566

    Mitigating Voltage Violations in Smart City Microgrids Under Coordinated False Data Injection Cyberattacks: Simulation and Experimental Insights by Ehsan Naderi, Arash Asrari

    Published 2025-01-01
    “…In the examined framework, a team of attackers independently identify the optimal times of two different cyberattacks leading to undervoltage and overvoltage in a smart microgrid. …”
    Get full text
    Article
  7. 567
  8. 568
  9. 569

    Numerical investigation with experimental validation of aerodynamics performance of NACA 2414 airfoil with passive momentum injection through channeling by Md. Mushfiqur Rahman, Ahmed Abrar Shayor, Abdullah Al-Faruk, Md. Touhidur Rahman Evan

    Published 2025-03-01
    “…The flow was subsonic and incompressible. Different attack angles were investigated - cruise (≈5°) and near-stall (≈16°) conditions. …”
    Get full text
    Article
  10. 570

    Study of Aerodynamic Characteristics of Asymmetrical Blades and a Wind-Driven Power Plant with a Vertical Axis of Rotation by Muhtar Isataev, Rustem Manatbayev, Zhanibek Seydulla, Birzhan Bektibai, Nurdaulet Kalassov

    Published 2024-12-01
    “…This paper presents the results of wind tunnel experiments, where lift and drag coefficients were studied at various angles of attack and flow speeds, alongside numerical simulations conducted in ANSYS. …”
    Get full text
    Article
  11. 571

    Qualifying Event and Recurrence of Ischemic Stroke in Symptomatic Artery Occlusion: A Post Hoc Analysis of CMOSS by Guangdong Lu, Tao Wang, Xinyi Sun, Renjie Yang, Jichang Luo, Xiaoguang Tong, Yuxiang Gu, Jiyue Wang, Zhiyong Tong, Dong Kuai, Yiling Cai, Jun Ren, Donghai Wang, Lian Duan, Aisha Maimaitili, Chunhua Hang, Jiasheng Yu, Yan Ma, Sheng Liu, Liqun Jiao

    Published 2024-07-01
    “…The incidence of ipsilateral ischemic stroke did not significantly differ between patients with a TIA and those with a stroke as their qualifying event (13.3% versus 6.7%, P=0.17). …”
    Get full text
    Article
  12. 572
  13. 573

    Separable reversible data hiding by vacating room after encryption using encrypted pixel difference by Veeramuthu Venkatesh, R. Anushiadevi, Padmapriya Velupillai Meikandan, Hemalatha Mahalingam, Rengarajan Amirtharajan

    Published 2025-04-01
    “…The encrypted image ensures high security against various attacks, including statistical, differential, and chosen plaintext attacks, and it allows for the extraction of secret data and recovery of the original image independently, making it a separable process.…”
    Get full text
    Article
  14. 574

    Phenotypic and transcriptomic analyses reveal major differences between apple and pear scab nonhost resistance by Vergne, Emilie, Chevreau, Elisabeth, Ravon, Elisa, Gaillard, Sylvain, Pelletier, Sandra, Bahut, Muriel, Perchepied, Laure

    Published 2023-01-01
    “…Apple (Malus x domestica Borkh.) have a nonhost resistance to Venturia pyrina, the scab species attacking European pear (Pyrus communis L.). Reciprocally, P. communis have a nonhost resistance to Venturia inaequalis, the scab species attacking apple. …”
    Get full text
    Article
  15. 575
  16. 576
  17. 577

    EFFICACY ANALYSIS OF DIFFERENT ANTIANGINAL REGIMENS IN ISCHEMIC HEART DISEASE WITH CHRONIC OBSTRUCTIVE PULMONARY DISEASE by K. O. Galeeva, A. I. Chesnikova

    Published 2015-12-01
    “…Assessment of effectiveness of different treatment regimens application for angina in coronary heart disease patients (CHD) with frequent exacerbations of chronic obstructive pulmonary disease (COPD).Material and methods. …”
    Get full text
    Article
  18. 578

    A Novel Method for Screening the PMU Phase Angle Difference Data Based on Hyperplane Clustering by Ancheng Xue, Shuang Leng, Yecheng Li, Feiyang Xu, Kenneth E. Martin, Jingsong Xu

    Published 2019-01-01
    “…Some of the applications, such as line parameter identification and state estimation, depend not only on phase angle data but also on phase angle difference between different locations. Field data can suffer from errors, such as time synchronization error, transducer error, PMU algorithm error, hardware error or malicious attacks, etc. …”
    Get full text
    Article
  19. 579

    Asymptomatic hyperuricemia and gout: Are there any differences (data from a pilot case-control study) by M. S. Eliseev, E. V. Panina, O. V. Zheliabina

    Published 2025-07-01
    “…It is not known whether there are differences between these conditions, beyond the acute attacks of arthritis unique to gout.The aim – to identify differences in the frequency of concomitant diseases, metabolic disorders and dietary habits in patients with gout and asymptomatic hyperuricemia.Material and methods. …”
    Get full text
    Article
  20. 580

    Reducing Defense Vulnerabilities in Federated Learning: A Neuron-Centric Approach by Eda Sena Erdol, Hakan Erdol, Beste Ustubioglu, Guzin Ulutas, Iraklis Symeonidis

    Published 2025-05-01
    “…Current defense mechanisms often fail when facing different attack types or high percentages of malicious participants. …”
    Get full text
    Article