-
681
Identifikasi Koi Herpesvirus pada Dosis yang Berbeda dengan Metode Imunohistokimia Streptavidin Biotin pada Ikan Nila (Oreochromis niloticus) <br><i>[Identification of Koi Herpes...
Published 2014-11-01“…KHV infection triggered by a drop in ambient temperature so it is referred to as a virus that attacks when cold (a cold virus). The disease attacks the temperature range of 18-28 ° C and can cause death. …”
Get full text
Article -
682
Establishing the best step-up treatments for children with uncontrolled asthma despite inhaled corticosteroids: the EINSTEIN systematic review, network meta-analysis and cost-effec...
Published 2025-05-01“…The rate of hospitalisation due to an asthma attack ranged from 0.5% to 2.7% of patients across five trials. …”
Get full text
Article -
683
Prediction of Anoxic Tonic Seizures due to Asthma in Children Using Machine Learning Methods
Published 2024-11-01“…The objective of this study is to investigate the factors influencing asthma attacks in children under six years old using machine learning (ML) methods. …”
Get full text
Article -
684
Hypertension and Headache: the Effect of Antihypertensive Drugs
Published 2019-07-01Subjects: “…the frequency of headaches during the treatment with arb (candesartan) is comparable to that in the placebo group. some antihypertensive drugs are used to prevent migraine attacks.…”
Get full text
Article -
685
Respon Beberapa Varietas Padi Terhadap Serangan Fusarium fujikuroi Penyebab Penyakit Bakanae
Published 2018-03-01“…The response of rice varieties to F. fujikuroi attack was different with characterized by different levels of infection rates. …”
Get full text
Article -
686
THE INFLUENCE OF FEATURES OF VORTEX FLOW ON AERODYNAMIC CHARACTERISTICS OF THE SUPERSONIC MANEUVERABLE AIRCRAFT MODEL
Published 2019-02-01“…Moreover, its effect can be radically different at different angles of attack (a = 25-30° and 35°). …”
Get full text
Article -
687
FATIGUE LIFE ANALYSIS OF WING WITH HIGH ASPECT RATIO BASED ON BIDIRECTIONAL FLUID-STRUCTURE COUPLING
Published 2022-01-01“…Based on the Miner linear cumulative damage theory and the finite element analysis method, the fatigue life of the wing with high aspect ratio at different angles of attack was calculated.Firstly, based on the N-S equation, the displacement, stress and strain of the wing structure in cruise state are solved by using the bidirectional fluid-structure coupling method.Secondly, the fatigue life of the wing structure is analyzed, and the fatigue life of the wing structure at the weak position and different angles of attack is obtained.The results show that the fatigue weakness of the wing with high aspect ratio tends to occur at the leading edge and the wing root, and the life of the leading edge increases from the wing tip to the wing root along the wing span.The life of the wing is closely related to the change of Angle of attack and airfoil parameters, and there is generally a maximum life Angle of attack under a given flight condition.…”
Get full text
Article -
688
Airflow direction influence on aerodynamic forces acting on a vehicle
Published 2025-06-01“…The paper considers the airflow around a railway car at different directions of its speed. The main purpose of the study is to determine the values of the longitudinal and transverse forces acting on the car for the entire possible range of changes in the angle of attack of the airflow.Materials and methods. …”
Get full text
Article -
689
Multi-task adversarial attribution method based on hierarchical structure
Published 2025-02-01“…To improve the accuracy of adversarial attribution and meet the requirements for different attribution granularities, attack algorithms and victim models were layered, and the dependencies between different levels were utilized. …”
Get full text
Article -
690
Assessment of Mechanical Properties and Damage of High Performance Concrete Subjected to Magnesium Sulfate Environment
Published 2017-01-01“…Sulfate attack is one of the most important problems affecting concrete structures, especially magnesium sulfate attack. …”
Get full text
Article -
691
Adversarial example defense algorithm for MNIST based on image reconstruction
Published 2022-02-01“…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&amp;W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
Get full text
Article -
692
Cryptographic secrecy of steganographic matrix encoding
Published 2012-06-01“…Based on an information theory model,the cryptographic security of matrix encoding,which can be applied in steganographic codes or wet paper codes,under different attack conditions was studied.The cryptographic security about matrix encoding under the condition of known-cover attack with key equivocation,message equivocation and unicity distance of stego-key was presented.The result that n groups of differential equations could sufficiently recover the share key of matrix encoding under the condition of chosen-stego attack was pointed out.…”
Get full text
Article -
693
Security, usability, and biometric authentication scheme for electronic voting using multiple keys
Published 2020-07-01“…We examine the authentication of electronic voting authentication scheme on numerous attack models. The measurement demonstrates that electronic voting authentication scheme is very operative in protecting against numerous elegant attacks such as wormhole attack, Sybil attack, and HELLO Flood attack. …”
Get full text
Article -
694
Estimation of wind deflection of high-speed railway catenary based on nonlinear finite element method
Published 2023-07-01“…The wind deflection of the contact wire under the static wind load of different wind speeds and different initial wind attack angles was obtained by applying wind loads. …”
Get full text
Article -
695
July 22nd a window of opportunity for police reform?
Published 2022-12-01“…A reform that had been in the cupboard for more than a decade since the previous reform of 2000 and was simply dusted off and presented as a neat and fresh general solution to many different problems facing the police. The article argues that the terror attack on July 22nd and the subsequent July 22nd Report (The Gjørv Report, NOU 2012:14) presented “a window of opportunity”or police management to make changes not only in the organization of the police, but also in regard to basic ideals of policing. …”
Get full text
Article -
696
Analysis of Offensive Efficiency and Goal Scoring in the Stanley Cup Finals 2023 and 2024
Published 2025-07-01“…The data consisted of (n=) 1477 shots, (n=) 79 goals, and (n=) 3619 even-strength attacks. Results: Teams had (n=) 181 even-strength attacks per game. …”
Get full text
Article -
697
Lightweight authentication for IoT devices (LAID) in sustainable smart cities
Published 2025-07-01“…We perform a formal security analysis of the proposed algorithm using AVISPA tool and informal semantic analysis to demonstrate that our algorithm is secure against different types of attacks including MITM attack, insider attack, replay attack smart device capture attack and others. …”
Get full text
Article -
698
Dynamic Analysis of the Effectiveness of Emergency Collaboration Networks for Public Health Emergencies from a Systems Thinking Perspective
Published 2024-11-01“…A new method for identifying key organization nodes and different network attack strategies is proposed, assessing network effectiveness from two dimensions: efficiency and resilience. …”
Get full text
Article -
699
Detecting Cyber Threats in UWF-ZeekDataFall22 Using K-Means Clustering in the Big Data Environment
Published 2025-06-01“…The labeled data, however, was used in the evaluation phase, to determine the attack clusters post-clustering. In order to identify APTs as well as zero-day attack clusters, three different labeling heuristics were evaluated to determine the attack clusters. …”
Get full text
Article -
700
Central auditory and cognitive functions in patients suffering from migraine: case–control study
Published 2025-05-01“…Abstract Purpose Assess the effect of migraine on different central auditory and cognitive abilities, compare the findings in migraine with aura versus without aura, and during the headache phase of the attack versus interictally. …”
Get full text
Article