-
281
Industry 6.0: methodology, tools, practice
Published 2025-02-01“…The concept of Industry 6.0 is considered as a qualitatively new phase of industrial and socio-economic development, characterized by comprehensive intellectual and technological immersive hyperconnectivity and physical-cognitive-emotional fusion of virtual twins of man and machine within the framework of symbiotic interaction. …”
Get full text
Article -
282
-
283
Successful nonoperative management of a simultaneous high-grade splenic injury and devascularized kidney in Australia: a case report
Published 2023-12-01“…Severe blunt injuries to isolated solid abdominal viscera have been previously managed nonoperatively; however, management algorithms for simultaneous visceral injuries are less well defined. …”
Get full text
Article -
284
Is It Possible to Maintain Consciousness and Spontaneous Ventilation with Chest Compression in the Early Phase of Cardiac Arrest?
Published 2016-01-01“…Here we describe the case of a 69-year-old man who underwent femoral bypass surgery and was extubated at the end of the procedure. …”
Get full text
Article -
285
Limits on reliable information flows through stochastic populations.
Published 2018-06-01Get full text
Article -
286
Sources of right to freedom of peaceful assembly
Published 2019-12-01“…However, without historical origins it is impossible to form an objective and necessary for the modern man to understand the content of the right to freedom of peaceful assembly. …”
Get full text
Article -
287
Secure and efficient batch authentication scheme based on dynamic revocation mechanism in space information network
Published 2022-04-01“…A secure and efficient batch authentication scheme based on dynamic revocation mechanism was proposed for the problem of cross-domain authentication of a large number of mobile users in space information networks.Early key negotiation was achieved by predicting the satellite trajectory and updating the session key in real time.Algorithms were designed for a single as well as a large number of mobile terminals to perform signing and verification, which effectively reduce the computational burden of satellites.Cuckoo filters were adopted by the new scheme to achieve dynamic revocation and malicious access control of mobile terminals.Finally, under the Diffie-Hellman assumption, the proposed scheme was proved to be resistant to replay and man-in-the-middle attacks based on a random oracle model and automated validation of internet security protocols and applications.Security goals such as traceability and revocability were achieved by the scheme, thus improving the efficiency of transmission and computation by more than 80% and 20%, respectively, compared with the existing optimal scheme.…”
Get full text
Article -
288
Interactive Embodied Intelligence of Machines
Published 2024-12-01“…The increased capacity for brute force computation has facilitated increased collaborative innovation between man and machines. For example, the intelligent farming machines have overcome the confines of computational power, algorithms, and data, and the next generation of intelligent farming machines is expected to interact, learn, and grow autonomously. …”
Get full text
Article -
289
Research on the dynamic performance and motion control methods of deep-sea human occupied vehicles
Published 2025-02-01Get full text
Article -
290
Artificial Intellect and Methodology of Economic Science
Published 2025-03-01“…Apart from that, the issue of public trust to applying algorithms and elaboration of evidence-based policy become hardly attainable without relevant interpretation of model functioning, in spite of hypothetic accuracy of forecasts made with their help. …”
Get full text
Article -
291
Autoinflammatory diseases: An immunologist’s view
Published 2015-03-01“…Moreover, it is important that the detection of a causative genetic defect frequently determines man-agement tactics for patients.For AIS treatment, there is a spectrum of agents modulating these or those inflammatory components. …”
Get full text
Article -
292
Ethno-Specific Codes: Metaphor and Everyday Symbolization of Objectified Space in Anna Nerkagy’s Story “The White Moss”
Published 2022-10-01“…This article is intended to reveal certain “algorithms of speech behavior” embedded in the language, the principles of mythologization and metaphorical objectification of the real world, to reveal more deeply the structure of understanding a literary text. …”
Get full text
Article -
293
QBPP: Quality of services–based location privacy protection method for location-based services in cloud-enabled Internet of vehicles
Published 2019-07-01“…Moreover, asymmetric key algorithms are used in the Internet of vehicles environment to reduce the cost. …”
Get full text
Article -
294
THE EMERGENCE OF ARTIFICIAL CONSCIOUSNESS AND ITS IMPORTANCE TO REACH THE TECHNOLOGICAL SINGULARITY
Published 2019-01-01“…Human evolution is about to meet its peak through the Technological Singularity, which can be understood as the future milestone reached at the moment that a computer program can think like a human, yet with quick access to all information already registered by society. It will not be like a man, but more intelligent than all mankind in history. …”
Get full text
Article -
295
Advanced Imaging and Preoperative MR-Based Cinematic Rendering Reconstructions for Neoplasms in the Oral and Maxillofacial Region
Published 2024-12-01“…This case study highlights the use of cinematic rendering (CR) in preoperative planning for the excision of a cyst in the oral and maxillofacial region of a 60-year-old man. The patient presented with a firm, non-tender mass in the right cheek, clinically suspected to be an epidermoid cyst. …”
Get full text
Article -
296
Acute Appendicitis Remains a Great Mimicker – The Pitfalls in the Differential Diagnosis and Tactics - A Case Report
Published 2020-09-01“…We present the case of a 41-year-old man who had been admitted to another hospital with an initial diagnosis of acute appendicitis and changed to Crohn’s disease (CD). …”
Get full text
Article -
297
Subliminal Channels in CRYSTALS-Kyber Key-Encapsulation Mechanism and Their Use in Quantum-Resistant TLS Protocols
Published 2025-01-01“…In the found subliminal channels, the covert message is embedded in the random data needed by the encapsulation or the key generation algorithms. Two settings are differentiated depending on if the covert receiver is an overt entity executing the key exchange protocol or a man-in-the-middle. …”
Get full text
Article -
298
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Published 2025-03-01“…The results show that XGBoost outperformed the other ensemble algorithms on two publicly available datasets for intrusion detection. …”
Get full text
Article -
299
THE SIMULATION OF ELECTRICAL SIGNALS PROPAGATION IN THE HEART MUSCLE OF THE HUMAN USING SOFTWARE PACKAGE COMSOL
Published 2014-08-01“…This paper is devoted to the modeling of the electrical system of the man’s cardiac tissue. The paper aims creating of the model, that geometrical structure is close to the actual geometry of the human heart. …”
Get full text
Article -
300
DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization
Published 2025-05-01“…DNS over HTTPS (DoH) is an advanced version of the traditional DNS protocol that prevents eavesdropping and man-in-the-middle attacks by encrypting queries and responses. …”
Get full text
Article