Results 31 to 40 of about 571,931 (308)

Fault and magmatic interaction within Iceland's western rift over the last 9kyr [PDF]

open access: yes, 2003
We present high-resolution 'Chirp' sub-bottom profiler data from Thingvallavatn, a lake in Iceland's western rift zone. These data are combined with stratigraphic constraints from sediment cores to show that movement on normal faults since 9 ka are ...
A. I. Best   +13 more
core   +1 more source

Layered Intrusions

open access: yes, 2015
This edited work contains the most recent advances related to the study of layered intrusions and cumulate rocks formation. The first part of this book presents reviews and new views of processes producing the textural, mineralogical and geochemical characteristics of layered igneous rocks.
Charlier, Bernard   +3 more
openaire   +3 more sources

Analysis of Clear Aligner Therapy Predictability for Mandibular Incisor Intrusion in Children and Adults

open access: yesApplied Sciences
(1) The aim was to evaluate the predictability of treatment outcomes using clear aligner therapy (CAT) and ClinCheck Web 1.4 (Align Technology, Inc., San Jose, CA, USA) software in mandibular incisor intrusion in both children and adults with deep bite ...
Christopher Burns   +4 more
doaj   +1 more source

Cortisol response to traumatic stress to predict PTSD symptom development – a systematic review and meta-analysis of experimental studies

open access: yesEuropean Journal of Psychotraumatology, 2023
Background: Pre-and post-traumatic hypothalamic–pituitary–adrenal (HPA) axis markers have been studied to predict posttraumatic stress disorder (PTSD) risk, but its acute reactivity cannot be measured in real-life settings.
Sinha Engel   +5 more
doaj   +1 more source

An overview to Software Architecture in Intrusion Detection System [PDF]

open access: yes, 2014
Today by growing network systems, security is a key feature of each network infrastructure. Network Intrusion Detection Systems (IDS) provide defense model for all security threats which are harmful to any network.
Bahrami, Mehdi, Bahrami, Mohammad
core   +1 more source

Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

open access: yes, 2010
In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment.
A. F. M. Sultanul Kabir   +2 more
core   +2 more sources

Detection of Hacker Intention Using Deep Packet Inspection

open access: yesJournal of Cybersecurity and Privacy
Ideally, in a real cyberattack, the early detection of probable hacker intent can lead to improved mitigation or prevention of exploitation. With the knowledge of basic principles of communication protocols, the reconnaissance/scanning phase intentions ...
Justin Foreman   +5 more
doaj   +1 more source

Balancing emotional processing with ongoing cognitive activity: The effects of task modality on intrusions and rumination

open access: yesFrontiers in Psychology, 2015
In the present paper we aimed to show that competition for resources between post-emotional processes and the execution of a cognitive task will result in two possible effects: (1) an impairment of the cognitive task in the short run and (2) an ...
Antonietta eCurci   +4 more
doaj   +1 more source

Nutritional and Behavioral Intervention for Long‐Term Childhood Acute Leukemia Survivors With Metabolic Syndrome

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Purpose Metabolic syndrome (MetS) is a common complication in survivors of childhood acute lymphoblastic and myeloid leukemia (AL), and a major risk factor for premature cardiovascular disease, type‐2‐diabetes, and metabolic dysfunction‐associated steatotic liver disease (MASLD).
Visentin Sandrine   +10 more
wiley   +1 more source

Delayed surgical repositioning of severely intruded permanent maxillary central incisor with completely formed root: A case report with narrative review and a decision/intervention flowchart based on the International Association of Dental Traumatology guidelines

open access: yesEndodontology, 2020
Intrusive luxation is a severe dental injury and may result in complicated healing sequelae. Management and prognosis of these injuries depend on the factors such as severity of intrusion, stage of root development, and time elapsed between injury and ...
Boris Saha   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy