Results 61 to 70 of about 716,322 (331)

Delayed surgical repositioning of severely intruded permanent maxillary central incisor with completely formed root: A case report with narrative review and a decision/intervention flowchart based on the International Association of Dental Traumatology guidelines

open access: yesEndodontology, 2020
Intrusive luxation is a severe dental injury and may result in complicated healing sequelae. Management and prognosis of these injuries depend on the factors such as severity of intrusion, stage of root development, and time elapsed between injury and ...
Boris Saha   +3 more
doaj   +1 more source

An Ensemble Learning Based Intrusion Detection Model for Industrial IoT Security

open access: yesBig Data Mining and Analytics, 2023
Industrial Internet of Things (IIoT) represents the expansion of the Internet of Things (IoT) in industrial sectors. It is designed to implicate embedded technologies in manufacturing fields to enhance their operations.
Mouaad Mohy-Eddine   +4 more
doaj   +1 more source

Protection of an intrusion detection engine with watermarking in ad hoc networks [PDF]

open access: yes, 2010
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware.
Douligeris, C.   +2 more
core  

Machine Learning and Deep Learning Methods for Intrusion Detection Systems: A Survey

open access: yesApplied Sciences, 2019
Networks play important roles in modern life, and cyber security has become a vital research area. An intrusion detection system (IDS) which is an important cyber security technique, monitors the state of software and hardware running in the network ...
Hongyu Liu, Bo Lang
semanticscholar   +1 more source

Dexamethasone for Chemotherapy‐Induced Nausea and Vomiting Prevention in Pediatric Patients: International Consensus

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Background An international Delphi panel of experts developed consensus statements to delineate the circumstances where the risks of dexamethasone as an antiemetic do and do not outweigh its benefits. Procedure Experts in supportive care of pediatric patients were invited to participate.
Negar Shavandi   +20 more
wiley   +1 more source

An Implementation of Intrusion Detection System Using Genetic Algorithm

open access: yes, 2012
Nowadays it is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. But secured data communication over internet and any other network is always under threat of intrusions
Bikas, Md. Abu Naser   +2 more
core   +2 more sources

An Enhanced Intrusion Detection Model Based on Improved kNN in WSNs

open access: yesItalian National Conference on Sensors, 2022
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering the combined characteristics of the wireless sensor network, we consider setting up a corresponding intrusion detection system on the edge side through edge ...
Gaoyuan Liu   +5 more
semanticscholar   +1 more source

Clinical Insights Into Hypercalcemia of Malignancy in Childhood

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Hypercalcemia of malignancy (HCM) is a rare but life‐threatening metabolic emergency in children that occurs in less than 1% of pediatric cancer cases, with a reported incidence ranging from 0.4% to 1.0% across different studies. While it is observed in 10%–20% of adult malignancies, pediatric HCM remains relatively uncommon.
Hüseyin Anıl Korkmaz
wiley   +1 more source

Sensor networks security based on sensitive robots agents. A conceptual model

open access: yes, 2012
Multi-agent systems are currently applied to solve complex problems. The security of networks is an eloquent example of a complex and difficult problem. A new model-concept Hybrid Sensitive Robot Metaheuristic for Intrusion Detection is introduced in the
B. Kim   +11 more
core   +1 more source

Network Intrusion Detection Model Based on CNN and GRU

open access: yesApplied Sciences, 2022
A network intrusion detection model that fuses a convolutional neural network and a gated recurrent unit is proposed to address the problems associated with the low accuracy of existing intrusion detection models for the multiple classification of ...
Bo Cao   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy