Results 31 to 40 of about 571,931 (308)
Fault and magmatic interaction within Iceland's western rift over the last 9kyr [PDF]
We present high-resolution 'Chirp' sub-bottom profiler data from Thingvallavatn, a lake in Iceland's western rift zone. These data are combined with stratigraphic constraints from sediment cores to show that movement on normal faults since 9 ka are ...
A. I. Best +13 more
core +1 more source
This edited work contains the most recent advances related to the study of layered intrusions and cumulate rocks formation. The first part of this book presents reviews and new views of processes producing the textural, mineralogical and geochemical characteristics of layered igneous rocks.
Charlier, Bernard +3 more
openaire +3 more sources
(1) The aim was to evaluate the predictability of treatment outcomes using clear aligner therapy (CAT) and ClinCheck Web 1.4 (Align Technology, Inc., San Jose, CA, USA) software in mandibular incisor intrusion in both children and adults with deep bite ...
Christopher Burns +4 more
doaj +1 more source
Background: Pre-and post-traumatic hypothalamic–pituitary–adrenal (HPA) axis markers have been studied to predict posttraumatic stress disorder (PTSD) risk, but its acute reactivity cannot be measured in real-life settings.
Sinha Engel +5 more
doaj +1 more source
An overview to Software Architecture in Intrusion Detection System [PDF]
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core +1 more source
Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir +2 more
core +2 more sources
Detection of Hacker Intention Using Deep Packet Inspection
Ideally, in a real cyberattack, the early detection of probable hacker intent can lead to improved mitigation or prevention of exploitation. With the knowledge of basic principles of communication protocols, the reconnaissance/scanning phase intentions ...
Justin Foreman +5 more
doaj +1 more source
In the present paper we aimed to show that competition for resources between post-emotional processes and the execution of a cognitive task will result in two possible effects: (1) an impairment of the cognitive task in the short run and (2) an ...
Antonietta eCurci +4 more
doaj +1 more source
ABSTRACT Purpose Metabolic syndrome (MetS) is a common complication in survivors of childhood acute lymphoblastic and myeloid leukemia (AL), and a major risk factor for premature cardiovascular disease, type‐2‐diabetes, and metabolic dysfunction‐associated steatotic liver disease (MASLD).
Visentin Sandrine +10 more
wiley +1 more source
Intrusive luxation is a severe dental injury and may result in complicated healing sequelae. Management and prognosis of these injuries depend on the factors such as severity of intrusion, stage of root development, and time elapsed between injury and ...
Boris Saha +3 more
doaj +1 more source

