Artykuły w czasopismach na temat „Hias IKS”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Hias IKS.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Hias IKS”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Destiningsih, Rian, Yustirania Septiani i Dian Marlina Verawati. "Kontribusi dan Persebaran Subsektor Perikanan di Daerah Istimewa Yogyakarta". WELFARE Jurnal Ilmu Ekonomi 1, nr 2 (28.11.2020): 82–89. http://dx.doi.org/10.37058/wlfr.v1i2.2035.

Pełny tekst źródła
Streszczenie:
Fishery as one of the supports for national food security has an important role. The growth rate of fisheries subsector in Special Region of Yogyakarta during the year of 2019 is the lowest rate of all existing subsector. Fishery consists of capture fisheries and aquaculture fisheries. Capture fisheries are divided into marine fisheries (skipjack, cob, tuna, shrimp, others) and public water fisheries (shrimp, fish, others). Meanwhile, cultivation permits such as rearing, hatchery, ornamental fish. Initial efforts to prevent a prolonged decline in the fisheries subsector were to identify the contribution and distribution of the fisheries subsector. The aim is to identify the contribution of the fisheries subsector to total GRDP by using the sectoral contribution index (IKS), identifying comparative advantages using the location quotient approach, and the distribution of the fisheries subsector in Special Region of Yogyakarta in the period of 2011-2019 using the localization coefficient approach. The results of research with the IKS approach are that the fisheries subsector has a small role in overall GRDP in Special Region of Yogyakarta in the year of 2011-2019, the location quotient approach of the fisheries subsector does not have a comparative advantage in Special Region of Yogyakarta in the year of 2011-2019. Meanwhile, the distribution of the fisheries subsector is relatively even and balanced in regencies / cities in Special Region of Yogyakarta in the year of 2011-2019. Perikanan sebagai salah satu penyokong ketahanan pangan nasional memiliki peranan penting. Laju pertumbuhan subsektor perikanan di Daerah Istimewa Yogyakarta tahun 2019 menjadi laju terendah dari seluruh subsektor yang ada. Perikanan terdiri atas perikanan tangkap dan perikanan budidaya. Perikanan tangkap terbagi menjadi perikanan laut (cakalang, tongkol, tuna, udang, lainnya) dan perikanan perairan umum (udang, ikan, lainnya). Sedangkan perikanan budidaya seperti pembesaran, pembenihan, ikan hias. Usaha awal mencegah penurunan subsektor perikanan semakin berkepanjangan yaitu dengan mengidentifikasi kontribusi dan penyebaran subsektor perikanan. Adapun tujuannya untuk yaitu mengidentifikasi kontribusi subsektor perikanan terhadap Produk Domestik Regional Bruto (PDRB) secara total dengan menggunakan Indeks Kontribusi Sektoral (IKS), mengidentifikasi keunggulan komparatif dengan menggunakan pendekatan location quotient, dan penyebaran sub-sektor perikanan di Daerah Istimewa Yogyakarta tahun 2011-2019 menggunakan pendekatan koefisien lokalisasi. Hasil penelitian dengan pendekatan IKS yaitu subsektor perikanan memberikan peranan yang sedikit terhadap PDRB secara keseluruhan di Daerah Istimewa Yogyakarta tahun 2011-2019, pada pendekatan location quotient subsektor perikanan tidak memiliki keunggulan komparatif di Daerah Istimewa Yogyakarta tahun 2011-2019. Sedangkan penyebaran subsektor perikanan tergolong relatif merata dan seimbang di wilayah kabupaten/kota di Daerah Istimewa Yogyakarta tahun 2011-2019.
Style APA, Harvard, Vancouver, ISO itp.
2

Piquer, S., S. Casas, I. Quesada, A. Nadal, M. Julià, A. Novials i R. Gomis. "Role of iduronate-2-sulfatase in glucose-stimulated insulin secretion by activation of exocytosis". American Journal of Physiology-Endocrinology and Metabolism 297, nr 3 (wrzesień 2009): E793—E801. http://dx.doi.org/10.1152/ajpendo.90878.2008.

Pełny tekst źródła
Streszczenie:
Iduronate-2-sulfatase (IDS) is a lysosomal enzyme expressed in pancreatic islets responsible for the degradation of proteoglycans such as perlecan and dermatan sulfate. Previous findings of our group demonstrated the involvement of IDS in the normal pathway of lysosomal degradation of secretory peptides, suggesting a role of this enzyme in β-cell secretory functionality. The present study was undertaken to characterize the effect of IDS overexpression on insulin release. INS1E cells were transiently transfected with a construct encoding human IDS (hIDS). hIDS overexpression was associated with a gain of function detected by a reduction in heparan sulfate content. hIDS potentiated the glucose-stimulated insulin secretory response compared with controls (61%) with no changes in insulin mRNA levels or insulin peptide content. Results on quantification of the exocytotic process showed a significant increase in hIDS-transfected cells compared with controls. Furthermore, ultramorphological analysis demonstrated an increase in the number of granules in the immediate vicinity of the plasma membrane in hIDS-transfected cells and a decrease in total vesicles per square micrometer. hIDS overexpression induced phosphorylation of protein kinase C (PKC) α and its newly myristoylated alanine-rich C kinase substrate, MARCKS. We conclude that IDS has a role in glucose-stimulated insulin secretion via a mechanism that involves the activation of exocytosis through phosphorylation of PKCα and MARCKS.
Style APA, Harvard, Vancouver, ISO itp.
3

Yazar, A., K. Büyükafpar, G. Polat, C. Pata, A. Kanýk, EN Tiftik i Ö. Baðdatoðlu. "The Urinary 5-Hydroxyindole Acetic Acid and Plasma Nitric Oxide Levels in Irritable Bowel Syndrome: A Preliminary Study". Scottish Medical Journal 50, nr 1 (luty 2005): 27–29. http://dx.doi.org/10.1177/003693300505000111.

Pełny tekst źródła
Streszczenie:
Background and Aims: Postprandial increase of 3-hydroxytryptamine (5-HT) has been implicated in irritable bowel syndrome (IBS). There is evidence that nitric oxide (NO) may act as a mediator of 5-HT-evoked secretions in the colon. Our aim is to investigate the role of urinary 5-hydroxyindole acetic acid (5-HIAA) and plasma NO levels (with diarrhoea) in IBS patients. Methods: Nineteen (with constipation) IBS patients (group 1), 22 IBS patients (group 2) and 18 healthy controls (group 3) were included in the study. The diagnosis of IBS was made according to the Rome I Criteria. The urine was collected for determination of 5-HIAA and venous blood was collected from each subject for the measurement of plasma NO levels. Results: The levels of urinary 5-HIAA mmol/day and plasma NO mmol/l of group 1 (22,4±2,2 and 29,4±2 respectively) were significantly higher than group 3(14,2 ± 2,3 and 21,3 ± 2,1 respectively) (p =0,036 and p =0,019 respectively). The NO level of group 1 was also significantly higher than group 2(21,8 ± 1,9) (p = 0,021). The 5-HIAA level of group 1 was higher than group 2 (15,2, ± 2,1) and the difference was marginally significant (p = 0,055). There was no difference between group 2 and group 3 with respect to 5-HIAA and NO levels. Conclusions: The results of this preliminary study lend support to the involvement of 5-HT in some symptomatology of diarrhoea predominant IBS. Furthermore, NO may be one of the effector mediators of the 5-HT-induced symptoms in these patients.
Style APA, Harvard, Vancouver, ISO itp.
4

Hatungimana, Gervais. "PAIRWISE CLUSTERS OPTIMIZATION AND CLUSTER MOST SIGNIFICANT FEATURE METHODS FOR ANOMALY-BASED NETWORK INTRUSION DETECTION SYSTEM (POC2MSF)". MALAYSIAN JOURNAL OF COMPUTING 3, nr 2 (31.12.2018): 93. http://dx.doi.org/10.24191/mjoc.v3i2.3598.

Pełny tekst źródła
Streszczenie:
Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behavior. If the baseline is faulty, the IDS performance degrades. Most of researches in IDS which use k-centroids-based clustering methods like K-means, K-medoids, Fuzzy, Hierarchical and agglomerative algorithms to baseline network traffic suffer from high false positive rate compared to signature-based IDS, simply because the nature of these algorithms risk to force some network traffic into wrong profiles depending on K number of clusters needed. In this paper we propose alternate method which instead of defining K number of clusters, defines t distance threshold. The unrecognizable IDS; IDS which is neither HIDS nor NIDS is the consequence of using statistical methods for features selection. The speed, memory and accuracy of IDS are affected by inappropriate features reduction method or ignorance of irrelevant features. In this paper we use two-step features selection and Quality Threshold with Optimization methods to design anomaly-based HIDS and NIDS separately. The performance of our system is 0% ,99.9974%, 1,1 false positive rates, accuracy , precision and recall respectively for NIDS and 0%,99.61%, 0.991,0.978 false positive rates, accuracy, precision and recall respectively for HIDS.
Style APA, Harvard, Vancouver, ISO itp.
5

Little, Charles, i Samantha Noll. "Improving Hospital Incident Command Organizational Structures". Prehospital and Disaster Medicine 38, S1 (maj 2023): s97. http://dx.doi.org/10.1017/s1049023x23002704.

Pełny tekst źródła
Streszczenie:
Introduction:The current Incident Command System (ICS) was developed to manage wildland fires, then was adopted by general firefighting. It has since been adapted to multiple other sectors and widely used. The Hospital Emergency Incident Command (HICS) was introduced in 1991. An ICS currently is required to be used for hospital incident management in the US.The overarching structure of traditional HICS consists of Command Staff (Incident Commander, Public Information Officer, Safety Officer, Liaison Officer and Medical/Technical Specialist) and General Staff. The General Staff has Sections consisting of Operations, Planning, Logistics and Finance/Administration. Multiple and flexible subgroups carry out the processes in these areas.This HICS structure does not adapt easily to hospital daily functions and alternatives have been proposed. This includes structuring around essential functions and mixed models. Over time hospital systems have become larger, and incidents more complex and sustained. New more expansive and flexible ICS structures are needed for complex responses.Method:We reviewed both the published and grey literature for examples of different incident management structures and evidence of their effectiveness.Results:There is very little scientific literature on this topic. Several different descriptive reports exist. Multiple examples of hospital incident command organization structures from the hospital level progressing to hospital (and healthcare) system level and then multistate regional models will be reviewed. This includes the standard HICS model, emergency support function models and modifications following advanced ICS principles such as area command.Conclusion:Different ICS models exist that may offer individual healthcare systems improved ways to manage disasters.
Style APA, Harvard, Vancouver, ISO itp.
6

Maulidiyah, Wildatul, i Akhmad Fauzy. "Perbandingan Metode Peramalan Double Exponential Smoothing with Damped Parameter dan Autoregressive Integrated Moving Average (Studi Kasus: Data Volume Penjualan Bunga Krisan di Pasar Bunga Rawa Belong DKI Jakarta Tahun 2018-2022)". Emerging Statistics and Data Science Journal 1, nr 3 (8.12.2023): 361–77. http://dx.doi.org/10.20885/esds.vol1.iss.3.art43.

Pełny tekst źródła
Streszczenie:
Florikultura merupakan jenis tanaman hortikultura yang berasal dari tanaman hias dengan berbagai jenis tanaman hias yakni salah satunya bunga krisan. Tingginya permintaan tanaman hias pada bunga krisan tentunya akan memiliki pengaruh besar terhadap volume penjualan sehingga omzet penjualan akan meningkat. Penelitian ini bertujuan untuk memprediksi volume penjualan dari bunga krisan di Pasar Bunga Rawa Belong selama 12 periode ke depan dengan menggunakan metode terbaik. Manfaat penelitian ini ialah dapat dijadikan sebagai gambaran mengenai penjualan bunga krisan Cipanas di Pasar Rawa Belong pada 12 bulan kedepan sehingga dapat dijadikan referensi untuk mencari tindakan dalam menangani naik turunnya volume penjualan bunga krisan di Pasar Bunga Rawa Belong DKI Jakarta. Data yang digunakan berupa data sekunder yang berasal dari UPT Pasar Bunga Rawa Belong DKI Jakarta Dimana data ini memiliki satuan ikat dari bunga krisan Cipanas. Penelitian ini menggunakan analisis forecasting terbaik dengan melakukan perbandingan antara metode Double Exponential Smoothing with Damped Parameter dan Autoregressive Integrated Moving Average. Berdasarkan penelitian didapatkan metode peramalan untuk melakukan peramalan yakni dengan menggunakan metode Autoregressive Integrated Moving Average dengan model terbaik ARIMA(1,1,0) yang memiliki nilai ukuran kesalahan sebesar 22.21544. Dari hasil forecasting mengenai volume penjualan berkisar sebanyak 1749-1774 ikat bunga yang mengalami fluktuatif pada setiap bulannya
Style APA, Harvard, Vancouver, ISO itp.
7

Bearcroft, C. P., D. Perrett i M. J. G. Farthing. "Postprandial plasma 5-hydroxytryptamine in diarrhoea predominant irritable bowel syndrome: a pilot study". Gut 42, nr 1 (1.01.1998): 42–46. http://dx.doi.org/10.1136/gut.42.1.42.

Pełny tekst źródła
Streszczenie:
Background—Increased concentrations of 5-hydroxytryptamine (5-HT) can be detected in the systemic circulation after a meal and may be involved in the physiological control of gastrointestinal motility. Abnormalities of 5-HT release after a meal might explain some of the postprandial symptoms associated with the irritable bowel syndrome (IBS).Aim—To investigate the effect of a standard meal on plasma 5-HT and urinary 5-hydroxyindole acetic acid (5-HIAA) concentrations in patients with diarrhoea predominant IBS and in healthy volunteers.Methods—After an overnight fast, six volunteers and five patients with IBS were given a carbohydrate-rich meal. Blood and urine samples were taken before and for four hours after the meal. Platelet-poor plasma 5-HT and urinary 5-HIAA were analysed by reversed phase high performance liquid chromatography with fluorometric detection. 5-HIAA was expressed as a ratio with urinary creatinine concentration, which was measured by spectrophotometry.Results—During the four hour postprandial period, 5-HT concentrations were significantly higher in patients with IBS than in healthy volunteers at 0.5 hours (p<0.05), 2 hours (p<0.05) and 2.5 hours (p<0.05). 5-HT was not detected in the plasma in the fasting state in patients or volunteers. Median peak 5-HT in patients with IBS (359 (198–796) nmol/l) was significantly greater than volunteers (83 (7–190)) (p<0.05). “Area under the curve” for 5-HT detection was greater for patients with IBS (317 (138–771)) than for healthy volunteers (51 (4–129); p<0.05).The duration of the 5-HT peak was significantly longer in patients with IBS (3 (1–3) hours) than in the healthy volunteers (1 (1–1) hours; p<0.01). Postprandial urinary median 5-HIAA values in controls (5.6 (5.5–5.8) μmol/mmol creatinine) and patients with IBS (3.0 (2.5–6.8) μmol/mmol creatinine) were not significantly different from preprandial values (controls: 5.9 (5.5–6.6) μmol/mmol creatinine; patients with IBS: (6.2 (2.4–9.3) μmol/mmol creatinine).Conclusion—These findings indicate that there may be a difference in the way that 5-HT is released in patients with diarrhoea predominant IBS, and could suggest a possible role for 5-HT in the postprandial symptoms of these patients.
Style APA, Harvard, Vancouver, ISO itp.
8

Fan, Haojun, Shike Hou i Yanmei Zhao. "Consideration and Practice on Hospital Incident Command System During Mass Casualty Incidents in Chinese Hospitals". Prehospital and Disaster Medicine 34, s1 (maj 2019): s78. http://dx.doi.org/10.1017/s1049023x1900164x.

Pełny tekst źródła
Streszczenie:
Introduction:More and more hospitals are using the Hospital Incident Command System (HICS) for organizational management under emergency conditions. HICS is an incident management system based on principles of the Incident Command System (ICS), which assists hospitals and healthcare organizations in improving their emergency management planning, response, and recovery capabilities for unplanned and planned events. This study aims to explore how Chinese hospitals manage their organizations with HICS in Mass Casualty Incidents (MCI).Aim:To explore the feasibility of HICS in Chinese hospitals under MCI.Methods:A combination of literature analysis and empirical research was used in this study. Through case studies and experience summarization, the necessity and feasibility of the incident command system (ICS) and the emergency medical response system (EMRS) was demonstrated in the early stage of MCI. Based on this, a new "1 SECTION-5 GROUPS-10 TEAMS " model was proposed, and its value of practical application was discussed in MCI.Results:Multiple resources must be mobilized In MCI, and it is necessary to establish an ICS and an EMRS as soon as possible in the early stages of MCI. The earlier ICS is set up, the more initiative can be taken. The "1 SECTION-5 GROUPS-10 TEAMS" model proposed in this study has a good effect on the practice of drills and rescues, indicating that this model has a certain promotion effect in the hospital's response to MCI.Discussion:The "1 SECTION-5 GROUPS-10 TEAMS" model has high feasibility and can be further verified in the subsequent rescue practice.
Style APA, Harvard, Vancouver, ISO itp.
9

Chojnacki, Cezary, Marta Medrek-Socha, Aleksandra Blonska, Radoslaw Zajdel, Jan Chojnacki i Tomasz Poplawski. "A Reduced Tryptophan Diet in Patients with Diarrhoea-Predominant Irritable Bowel Syndrome Improves Their Abdominal Symptoms and Their Quality of Life through Reduction of Serotonin Levels and Its Urinary Metabolites". International Journal of Molecular Sciences 23, nr 23 (5.12.2022): 15314. http://dx.doi.org/10.3390/ijms232315314.

Pełny tekst źródła
Streszczenie:
(1). An essential component of any treatment for patients with irritable bowel syndrome (IBS) is an adequate diet. Currently, a low FODMAP diet is recommended as a first-line therapy, but it does not relieve abdominal discomfort in all patients, and alternative nutritional treatment is required. The purpose of this study was to evaluate the effect of a tryptophan-lowering diet (TRP) on abdominal and mental symptoms in patients with irritable bowel syndrome with predominant diarrhea (IBS-D). (2). The study included 40 patients with IBS-D, and 40 healthy subjects served as a baseline for IBS-D patients, after excluding comorbidities. The TRP intake was calculated using the nutritional calculator. The severity of abdominal symptoms was assessed using the gastrointestinal symptom rating scale (GSRS-IBS). Mental state was assessed using the Hamilton anxiety rating scale (HAM-A), the Hamilton depression rating scale (HAM-D), and the insomnia severity index (ISI). The serum levels of serotonin and melatonin and the urinary excretion of their metabolites 5-hydroxyindoleacetic acid (5-HIAA) and 6-sulfatoxymelatonin (aMT6) were determined by the ELISA method. The severity of symptoms and laboratory data were analyzed before and after a 12 week diet with tryptophan restricted to a daily dose 10 mg per kilogram body weight. (3). Compared to the control group, patients with IBS-D had a higher serum level of serotonin (198.2 ± 38.1 vs. 142.3 ± 36.4 ng/mL; p < 0.001) but a similar level of melatonin (8.6 ± 1.1 vs. 9.4 ± 3.0 pg/mL; p > 0.05). The urinary excretion of 5-HIAA was also higher in patients with IBS-D patients (7.7 ± 1.5 vs. 6.0 ± 1.7 mg/24 h; p < 0.001). After nutritional treatment, both the serum serotonin level and the urinary 5-HIAA excretion significantly decreased (p < 0.001). The severity of the abdominal symptoms and anxiety also decreased, while the HAM-D score and the ISI score remained unchanged (4). Lowering the dietary intake of tryptophan may reduce abdominal complaints and does not alter the mental state of IBS-D patients.
Style APA, Harvard, Vancouver, ISO itp.
10

Chojnacki, Jan, Paulina Konrad, Marta Mędrek-Socha, Aleksandra Kaczka, Aleksandra Błońska, Radosław Zajdel, Cezary Chojnacki i Anita Gąsiorowska. "The Variability of Tryptophan Metabolism in Patients with Mixed Type of Irritable Bowel Syndrome". International Journal of Molecular Sciences 25, nr 5 (22.02.2024): 2550. http://dx.doi.org/10.3390/ijms25052550.

Pełny tekst źródła
Streszczenie:
Patients with a mixed type of irritable bowel syndrome (IBS-M) experience constipation and diarrhea, which alternate between weeks or months. The pathogenesis of this syndrome is still little understood. The aim of the study was mainly to evaluate the urinary excretion of selected tryptophan (TRP) metabolites during the constipation and diarrhea periods of this syndrome. In 36 patients with IBS-M and 36 healthy people, serum serotonin level was measured by ELISA and urinary levels of 5-hydroxyindoleacetic acid (5-HIAA), kynurenine (KYN) and indican (3-IS) were determined using the LC-MS/MS method. The levels of all above metabolites were higher in the patient group, and increased significantly during the diarrheal period of IBS-M. In particular, the changes concerned 5-HIAA (3.67 ± 0.86 vs. 4.59 ± 0.95 mg/gCr, p < 0.001) and 3-IS (80.2 ± 17.4 vs. 93.7 ± 25.1 mg/g/Cr, p < 0.001). These changes coexisted with gut microbiome changes, assessed using hydrogen-methane and ammonia breath tests. In conclusion, the variability of TRP metabolism and the gut microbiome may cause the alternation of IBS-M symptoms.
Style APA, Harvard, Vancouver, ISO itp.
11

Bissell, Karen, Philippa Ellwood, Eamon Ellwood, Chen-Yuan Chiang, Guy Marks, Asma El Sony, Innes Asher, Nils Billo i Christophe Perrin. "Essential Medicines at the National Level: The Global Asthma Network’s Essential Asthma Medicines Survey 2014". International Journal of Environmental Research and Public Health 16, nr 4 (19.02.2019): 605. http://dx.doi.org/10.3390/ijerph16040605.

Pełny tekst źródła
Streszczenie:
Patients with asthma need uninterrupted supplies of affordable, quality-assured essential medicines. However, access in many low- and middle-income countries (LMICs) is limited. The World Health Organization (WHO) Non-Communicable Disease (NCD) Global Action Plan 2013–2020 sets an 80% target for essential NCD medicines’ availability. Poor access is partly due to medicines not being included on the national Essential Medicines Lists (EML) and/or National Reimbursement Lists (NRL) which guide the provision of free/subsidised medicines. We aimed to determine how many countries have essential asthma medicines on their EML and NRL, which essential asthma medicines, and whether surveys might monitor progress. A cross-sectional survey in 2013–2015 of Global Asthma Network principal investigators generated 111/120 (93%) responses—41 high-income countries and territories (HICs); 70 LMICs. Patients in HICs with NRL are best served (91% HICs included ICS (inhaled corticosteroids) and salbutamol). Patients in the 24 (34%) LMICs with no NRL and the 14 (30%) LMICs with an NRL, however no ICS are likely to have very poor access to affordable, quality-assured ICS. Many LMICs do not have essential asthma medicines on their EML or NRL. Technical guidance and advocacy for policy change is required. Improving access to these medicines will improve the health system’s capacity to address NCDs.
Style APA, Harvard, Vancouver, ISO itp.
12

Ronal Hadi, Yarmis Yuliana i Hanriyawan Adnan Mooduto. "Deteksi Ancaman Keamanan Pada Server dan Jaringan Menggunakan OSSEC". JITSI : Jurnal Ilmiah Teknologi Sistem Informasi 3, nr 1 (31.03.2022): 8–15. http://dx.doi.org/10.30630/jitsi.3.1.58.

Pełny tekst źródła
Streszczenie:
Kejahatan cyber dapat menyerang jaringan komputer, menyusup kedalam jaringan mengambil data-data rahasia dan melumpuhkan sistem jaringan komputer. Dalam mengatasi kejahatan yang akan terjadi, dibutuhkan sistem yang dilengkapi firewall dan Intrusion Detection System (IDS). Firewall dan IDS sebagai fitur keamanan jaringan yang dapat melindungi server, jaringan, dan memblok serangan. Fitur firewall dan IDS dapat diterapkan dalam Tools OSSEC. OSSEC merupakan IDS berbasis open-source (host-based intrusion detection system/HIDS) yang mampu melakukan analisis log, pengecekan integritas, pemantauan registri Windows, deteksi rootkit, peringatan berbasis waktu, dan respons aktif. OSSEC mampu memantau satu server atau ribuan server dalam mode server/agent
Style APA, Harvard, Vancouver, ISO itp.
13

Abdul Malik, Mohd Mirza, Mohd Nizam Osman i Mushahadah Maghribi. "Monitoring and Evaluating Open Wireless LAN using Hybrid IDS". Journal of Computing Research and Innovation 4, nr 2 (14.11.2019): 60–67. http://dx.doi.org/10.24191/jcrinn.v4i2.118.

Pełny tekst źródła
Streszczenie:
In this ever-growing wireless technology era, the number of Open Wireless Local Area Network (WLAN) are on the rise. From cafes to shopping areas, most of them offer users with a free-to-use WLAN which popularly known as Open Wi-Fi or Wi-Fi Hotspots. Although it is a convenient for them to access the Internet at these places, later they know it also makes them a vulnerable target for attackers that might be lurking in the same network they are connected. Therefore, a Hybrid IDS that combines both SNORT, a network-based IDS (NIDS) and OSSEC, a host-based IDS (HIDS) was developed to curb the problem. NIDS was used to monitor network traffics while HIDS monitor user’s system for any suspicious activities. Then, a system that can control and manage both IDS in the much easier and simpler way was developed using Python programming language. The system then can generate alerts with the help of both IDS to notify users for any suspicious activities that might occur in the network or user’s system. Several attacks were launched from the attacker’s laptop to test whether Hybrid IDS can generate alerts to notify the victim. As a result, the system breeze through the testing phase by showing necessary output. All the results were taken and then compared with other scenarios to determine whether they can give the same results as Hybrid IDS. From the comparison results, it can be said that Hybrid IDS can give the extra protection layer towards Open Wi-Fi users. Therefore, the Hybrid IDS was proven to provide vast tracking detection for suspicious activity in the network environments by monitor and alert the users about malicious activities.
Style APA, Harvard, Vancouver, ISO itp.
14

Chojnacki, Cezary, Aleksandra Błońska, Paulina Konrad, Marcin Chojnacki, Marcin Podogrocki i Tomasz Poplawski. "Changes in Tryptophan Metabolism on Serotonin and Kynurenine Pathways in Patients with Irritable Bowel Syndrome". Nutrients 15, nr 5 (3.03.2023): 1262. http://dx.doi.org/10.3390/nu15051262.

Pełny tekst źródła
Streszczenie:
(1) Background: L-tryptophan is a substrate for the synthesis of many biological compounds through the serotonin and kynurenine pathways. These compounds have a significant influence on gastrointestinal functions and mental processes. The aim of the study was to evaluate the urinary excretion of selected tryptophan metabolites in patients with constipation-predominant and diarrhoea-predominant irritable bowel syndrome (IBS-C and IBS-D, respectively), related to somatic and mental symptoms. (2) Methods: 120 people were included in the study and three groups were distinguished, with 40 individuals each, including healthy subjects (controls), patients with IBS-C and patients with IBS-D. The Gastrointestinal Symptoms Rating Scale (GSRS-IBS) was used to assess the severity of abdominal symptoms. The Hamilton Anxiety Rating Scale (HAM-A) and Hamilton Depression Rating Scale (HAM-D) were used to evaluate the mental state of patients. Using liquid chromatography tandem mass spectrometry (LC-MS/MS), L-tryptophan and the following metabolites in urine, related to the creatinine level, were measured: 5-hydroxyindoleacetic acid (5-HIAA), kynurenine (KYN), kynurenic acid (KYNA) and quinolinic acid (QA). (3) Results: In both groups of patients with IBS, changes in tryptophan metabolism were found as compared to the control group. We observed an increase in the activity of the serotonin pathway and a positive correlation between the 5-HIAA level and the GSRS score (p < 0.01) and HAM-A score (p < 0.001) in IBS-D patients. The IBS-C group was characterized by a higher concentration of kynurenines (KYN, QA) in urine. Moreover, the QA (p < 0.001) and KYNA (p < 0.05) levels were correlated with the HAM-D score among IBS-C patients. (4) Conclusions: Various changes in the tryptophan metabolism pathway can determine the differences in the clinical picture of irritable bowel syndrome. These results should be included in the nutritional and pharmacological treatment of this syndrome.
Style APA, Harvard, Vancouver, ISO itp.
15

Suharti, Sri, Anton Yudhana i Imam Riadi. "Forensik Jaringan DDoS menggunakan Metode ADDIE dan HIDS pada Sistem Operasi Proprietary". MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 21, nr 3 (31.07.2022): 567–82. http://dx.doi.org/10.30812/matrik.v21i3.1732.

Pełny tekst źródła
Streszczenie:
Forensik jaringan sangat dibutuhkan dalam mempertahankan kinerja jaringan komputer dari serangan Distributed Denial of Service (DDoS). Penelitian ini bertujuan untuk mendapatkan bukti digital keakurasian tool DDoS, keberhasilan metode HIDS dan implementasi firewall pada Network layer dalam menghentikan DDoS. Metode penelitian ini menerapkan ADDIE (Analyze, Design, Develop, Implement and Evaluate) dan Host-Based Intrusion Detection System (HIDS) Snort pada simulasi jaringan berbasis lokal dan luas. Hasil pengujian menyatakan Slowloris merupakan DDoS paling melumpuhkan web server IIS pada sistem operasi proprietary dengan penurunan performa server sebesar 78%, akurasi peningkatan trafik jaringan sebesar 92,84% alert 150 kali. Implementasi firewall pada network layer dalam menghentikan DDoS memiliki keberhasilan sebesar 98.91%. Hal ini menunjukkan metode ADDIE berhasil diterapkan dalam penelitian dan menyatakan DDoS pelumpuh server berhasil dideteksi pada metode HIDS dan berhasil dihentikan oleh firewall pada sistem operasi proprietary.
Style APA, Harvard, Vancouver, ISO itp.
16

Setiawan, Marwan, Wardah, Parwa Oryzanti i Emma Sri Kuncari. "ETNOBOTANI KEANEKARAGAMAN JENIS TUMBUHAN DI PULAU MOTI, PROVINSI MALUKU UTARA, INDONESIA". Buletin Kebun Raya 26, nr 1 (30.04.2023): 11–17. http://dx.doi.org/10.55981/bkr.2023.738.

Pełny tekst źródła
Streszczenie:
Pulau Moti merupakan salah satu dari gugusan pulau-pulau kecil kepulauan Halmahera dan terletak di sebelah barat pulau Halmahera. Penduduknya tersebar di seluruh kawasan pulau, terutama di sekitar kawasan pantai dengan mata pencaharian sebagian besar sebagai nelayan, petani kebun pala dan cengkih. Namun demikian, informasi mengenai sumber daya keanekaragaman jenis-jenis tumbuhannya belum banyak terungkap. Oleh karena itu perlu dilakukan penelitian guna mengungkap potensi dan keanekaragaman jenis tumbuhan yang ada di kawasan pulau Moti. Pengumpulan data kajian etnobotani menggunakan metode kualitatif dan kuantitatif. Analisis data menggunakan nilai guna (Use Value/UV) dan Index of Cultural Significance (ICS). Hasil penelitian menunjukkan 96 jenis tumbuhan dimanfaatkan oleh masyarakat pulau Moti, yaitu sebagai bahan obat (35 jenis), pangan (18 jenis), kayu bakar (14 jenis), kerajinan (12 jenis), bangunan (10 jenis), minuman (2 jenis), racun (2 jenis), pakan ternak, ritual dan tanaman hias (masing-masing 1 jenis). Tiga puluh sembilan jenis di antara 96 jenis tumbuhan berguna memiliki nilai UV (0,2-0,8) dan ICS (2-80), sedangkan jenis tumbuhan yang memiliki nilai guna (UV) tertinggi Arenga pinnata Merr. (0,8) dan tumbuhan memiliki nilai ICS tinggi Arenga pinnata Merr. (80), Barringtonia asiatica (L.) Kurz (48), dan Myristica fragrans Houtt. ( 48).
Style APA, Harvard, Vancouver, ISO itp.
17

Kurniawan, Rifky, i Fajar Prakoso. "Implementasi Metode IPS (Intrusion Prevention System) dan IDS (Intrusion Detection System) untuk Meningkatkan Keamanan Jaringan". SENTINEL 3, nr 1 (17.01.2020): 231–42. http://dx.doi.org/10.56622/sentineljournal.v3i1.20.

Pełny tekst źródła
Streszczenie:
Intrusion Detection System (IDS) dapat didefinisikan sebagai kegiatan yang bersifat anomaly,incorrect, inappropriate yang terjadi di jaringan atau host. Dan IDS sendiri adalah sistemkeamanan yang bekerja bersama Firewall untuk mengatasi Intrusion. IDS mampu mendeteksipenyusup dan memberikan respon secara real time. Terdapat dua teknik yang digunakandalam IDS yaitu, NIDS (Network Based Intrusion Detection System) dan HIDS (Host BasedIntrusion Detection System). Pada percobaan kali ini IDS dibagun menggunakan perangkatlunak Snort. Snort merupakan Open Source Intrusion Detection System (IDS) yang digunakanuntuk pemantauan dan pencegahan terhadap gangguan pada jaringan komputer. Agarmempermudah administrator dalam melihat dan membaca hasil log dari setiap paket datayang masuk atau keluar maka menggunakan Basic Analysis and Security Engine (BASE). Padapercobaan ini PC Server menggunakan sistem operasi Linux Ubuntu 16.04 LTS. Pengujiandilakukan pada Local Area Network dengan topologi Star. Dimana hasil gangguan yangdisebabkan DoS dan Port Scanner dapat dikenali oleh Snort IDS dan menampilkan log secaralengkap, baik dari waktu, tanggal kejadian dan sumber IP Address dari pengganggu.
Style APA, Harvard, Vancouver, ISO itp.
18

Khraisat, Ansam, Iqbal Gondal, Peter Vamplew, Joarder Kamruzzaman i Ammar Alazab. "Hybrid Intrusion Detection System Based on the Stacking Ensemble of C5 Decision Tree Classifier and One Class Support Vector Machine". Electronics 9, nr 1 (17.01.2020): 173. http://dx.doi.org/10.3390/electronics9010173.

Pełny tekst źródła
Streszczenie:
Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion detection mechanisms to monitor computer resources and generate reports on anomalous or suspicious activities. Many Intrusion Detection Systems (IDSs) use a single classifier for identifying intrusions. Single classifier IDSs are unable to achieve high accuracy and low false alarm rates due to polymorphic, metamorphic, and zero-day behaviors of malware. In this paper, a Hybrid IDS (HIDS) is proposed by combining the C5 decision tree classifier and One Class Support Vector Machine (OC-SVM). HIDS combines the strengths of SIDS) and Anomaly-based Intrusion Detection System (AIDS). The SIDS was developed based on the C5.0 Decision tree classifier and AIDS was developed based on the one-class Support Vector Machine (SVM). This framework aims to identify both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the benchmark datasets, namely, Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) and Australian Defence Force Academy (ADFA) datasets. Studies show that the performance of HIDS is enhanced, compared to SIDS and AIDS in terms of detection rate and low false-alarm rates.
Style APA, Harvard, Vancouver, ISO itp.
19

Darange, Yashavant. "Behavioral Host-Based Intrusion Detection and Prevention System for Android". International Journal for Research in Applied Science and Engineering Technology 9, nr VI (30.06.2021): 5268–74. http://dx.doi.org/10.22214/ijraset.2021.36191.

Pełny tekst źródła
Streszczenie:
Intrusion Detection System (IDS) is vital to protect smartphones from about to happen security breach and make sure user privacy. Android is the most popular mobile Operating System (OS), holding many markets share. Android malware detection has received important concentration, existing solutions typically rely on performing resource intensive analysis on a server, assuming an uninterrupted link between the device and the server. In this paper, we propose a behavior Host-based IDS (HIDS) by using permissions incorporating arithmetical and ML algorithms. The benefit of our proposed IDS is two folds. First, it is completely independent and runs on the smartphone device, without need any link to a server. Second, it requires only training dataset consisting of some of examples from both benign and malicious datasets for tuning. though, in put into practice, collecting malicious examples is exciting since its important infecting the device and collecting many of samples in order to characterize the malware’s behavior and the labelling has to be done. The evaluation outcome show that the proposed IDS gives a very hopeful accuracy.
Style APA, Harvard, Vancouver, ISO itp.
20

Khraisat, Gondal, Vamplew, Kamruzzaman i Alazab. "A novel Ensemble of Hybrid Intrusion Detection System for Detecting Internet of Things Attacks". Electronics 8, nr 11 (23.10.2019): 1210. http://dx.doi.org/10.3390/electronics8111210.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack to the end nodes. Due to the large number and diverse types of IoT devices, it is a challenging task to protect the IoT infrastructure using a traditional intrusion detection system. To protect IoT devices, a novel ensemble Hybrid Intrusion Detection System (HIDS) is proposed by combining a C5 classifier and One Class Support Vector Machine classifier. HIDS combines the advantages of Signature Intrusion Detection System (SIDS) and Anomaly-based Intrusion Detection System (AIDS). The aim of this framework is to detect both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the Bot-IoT dataset, which includes legitimate IoT network traffic and several types of attacks. Experiments show that the proposed hybrid IDS provide higher detection rate and lower false positive rate compared to the SIDS and AIDS techniques.
Style APA, Harvard, Vancouver, ISO itp.
21

Zhu, Xianwei, Zhibin Liu, Yifei Qin, Wenmin Niu, Qiang Wang, Lu Li i Jing Zhou. "Analgesic Effects of Electroacupuncture at St25 and Cv12 in a Rat Model of Postinflammatory Irritable Bowel Syndrome Visceral Pain". Acupuncture in Medicine 36, nr 4 (sierpień 2018): 240–46. http://dx.doi.org/10.1136/acupmed-2016-011320.

Pełny tekst źródła
Streszczenie:
Background Treatment with electroacupuncture (EA) at ST25 and CV12 has a significant analgesic effect on postinflammatory irritable bowel syndrome (PI-IBS) visceral pain. Enterochromaffin (EC) cells and serotonin (5-hydroxytryptamine (5-HT)) are important in the development of visceral hyperalgesia. Objective To investigate the analgesic effect and underlying mechanisms of EA at ST25 and CV12 on the treatment of trinitrobenzene sulfonic acid (TNBS)-induced PI-IBS visceral hyperalgesia in rats. Methods After EA at ST25 and CV12, changes in abdominal withdrawal reflex (AWR), electromyography (EMG) recordings, colonic EC cell numbers, and expression of tryptophan hydroxylase (TPH), 5-HT and 5-hydroxyindoleacetic acid (5-HIAA) of TNBS-induced PI-IBS visceral hyperalgesia in rats were examined. Results The results of AWR tests and EMG recordings indicated a significant analgesic effect of EA stimulation at ST25 and CV12on PI-IBS visceral hyperalgesia (p<0.05). In addition, the increased EC cell numbers and colonic expression of TPH and 5-HT in rats with TNBS-induced PI-IBS visceral hyperalgesia were significantly reduced by EA (p<0.05). Conclusions EA stimulation at ST25 and CV12 can attenuate visceral hyperalgesia. This analgesic effect may be mediated via reduction of both colonic EC cell number and 5-HT concentration.
Style APA, Harvard, Vancouver, ISO itp.
22

Bashir, Azeem, Saloni Verma, Simrat Kaur i S. P. Subashini. "Breast Cancer and Its Conventional Treatment: A Preliminary Review". Indian Journal of Genetics and Molecular Research 11, nr 1 (15.06.2022): 21–25. http://dx.doi.org/10.21088/ijgmr.2319.4782.11122.2.

Pełny tekst źródła
Streszczenie:
Worldwide, breast cancer is the maximum common cancer in ladies and might be the leading cause of most cancers in women. Better-paid nations (HICs) have made terrific strides in enhancing the consequences of breast cancer. Between 1990 and 2014, the mortality price of breast cancers dropped by means of 34 percent due to the combination of superior pre-diagnosis and powerful adjuvant remedies. In evaluation, breast cancer is developing trouble in low- and center-earnings nations (LMICs), where the low prevalence price has risen to 5% according to year. The measures identified within the HICs had been no longer established in LMICs wherein complete control techniques from wealthy countries couldn't be fully utilized because of critical resource constraints associated with constrained personal sources, underdeveloped fitness care infrastructure, drug shortages and cultural obstacles.
Style APA, Harvard, Vancouver, ISO itp.
23

Hanafi, Hanafi, Alva Hendi Muhammad, Ike Verawati i Richki Hardi. "An Intrusion Detection System Using SDAE to Enhance Dimensional Reduction in Machine Learning". JOIV : International Journal on Informatics Visualization 6, nr 2 (30.06.2022): 306. http://dx.doi.org/10.30630/joiv.6.2.990.

Pełny tekst źródła
Streszczenie:
In the last decade, the number of attacks on the internet has grown significantly, and the types of attacks vary widely. This causes huge financial losses in various institutions such as the private and government sectors. One of the efforts to deal with this problem is by early detection of attacks, often called IDS (instruction detection system). The intrusion detection system was deactivated. An Intrusion Detection System (IDS) is a hardware or software mechanism that monitors the Internet for malicious attacks. It can scan the internetwork for potentially dangerous behavior or security threats. IDS is responsible for maintaining network activity under the Network-Based Intrusion Detection System (NIDS) or Host-Based Intrusion Detection System (HIDS). IDS works by comparing known normal network activity signatures with attack activity signatures. In this research, a dimensional reduction and feature selection mechanism called Stack Denoising Auto Encoder (SDAE) succeeded in increasing the effectiveness of Naive Bayes, KNN, Decision Tree, and SVM. The researchers evaluated the performance using evaluation metrics with a confusion matrix, accuracy, recall, and F1-score. Compared with the results of previous works in the IDS field, our model increased the effectiveness to more than 2% in NSL-KDD Dataset, including in binary class and multi-class evaluation methods. Moreover, using SDAE also improved traditional machine learning with modern deep learning such as Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). In the future, it is possible to integrate SDAE with a deep learning model to enhance the effectiveness of IDS detection
Style APA, Harvard, Vancouver, ISO itp.
24

Vaz Leal, F. J., L. Rodríguez Santos, M. I. Ramos Fuentes, M. J. Cardoso Moreno i N. Fernández Sánchez. "Neurobiological and Clinical Predictors of Impulsivity in Bulimia Nervosa". European Psychiatry 24, S1 (styczeń 2009): 1. http://dx.doi.org/10.1016/s0924-9338(09)70614-5.

Pełny tekst źródła
Streszczenie:
Objective:The main aim of this study was to analyze the association between a set of neurobiological/clinical factors and impulsivity in patients suffering from bulimia nervosa, as well as the capability of this factors to predict the severity of impulsivity.Methods:The Impulsive Behaviors Scale (IBS), the Diagnostic Interview for Bordeline Patients - Revised (DIB-R), the Beck Depression Inventory (BDI), the Millon Multiaxial Clinical Inventory (MMCI-II) and the Family Environment Scale (FES) were applied to 70 female patients with DSM-IV BN (purging subtype). Twenty-four hour urinary excretion of norepinephrine (NE), 3-methoxy-4-hydroxyphenylglycol (MHPG), serotonin (5-HT), 5-hydroxi-indol-acetic acid (5-HIAA), dopamine (DA), homovallinic acid (HVA), and morning serum cortisol levels before and after the administration of 1 mg of dexamethasone were determined.Results:Impulsivity was associated to lower levels of urinary 5-HT and 5-HIAA, borderline features, and lower family expressed emotion.Conclusions:The consideration of impulsivity as a core clinical feature in patients with bulimia nervosa could lead us to identify clinical subtypes of patients, with specific clinical profiles and specific treatment needs.
Style APA, Harvard, Vancouver, ISO itp.
25

Vaz Leal, F. J., L. Rodríguez Santos, M. I. Ramos Fuentes, M. J. Cardoso Moreno i N. Fernández Sánchez. "Neurobiological and Clinical Predictors of Impulsivity in Bulimia Nervosa". European Psychiatry 24, S1 (styczeń 2009): 1. http://dx.doi.org/10.1016/s0924-9338(09)70992-7.

Pełny tekst źródła
Streszczenie:
Objective:The main aim of this study was to analyze the association between a set of neurobiological/clinical factors and impulsivity in patients suffering from bulimia nervosa, as well as the capability of this factors to predict the severity of impulsivity.Methods:The Impulsive Behaviors Scale (IBS), the Diagnostic Interview for Bordeline Patients - Revised (DIB-R), the Beck Depression Inventory (BDI), the Millon Multiaxial Clinical Inventory (MMCI-II) and the Family Environment Scale (FES) were applied to 70 female patients with DSM-IV BN (purging subtype). Twenty-four hour urinary excretion of norepinephrine (NE), 3-methoxy-4-hydroxyphenylglycol (MHPG), serotonin (5-HT), 5-hydroxi-indol-acetic acid (5-HIAA), dopamine (DA), homovallinic acid (HVA), and morning serum cortisol levels before and after the administration of 1 mg of dexamethasone were determined.Results:Impulsivity was associated to lower levels of urinary 5-HT and 5-HIAA, borderline features, and lower family expressed emotion.Conclusions:The consideration of impulsivity as a core clinical feature in patients with bulimia nervosa could lead us to identify clinical subtypes of patients, with specific clinical profiles and specific treatment needs.
Style APA, Harvard, Vancouver, ISO itp.
26

Salsabila, Hilda Tasya, Lily Wulandari i Dini Triasanti. "SISTEM PENGIDENTIFIKASI HAMA PENYAKIT TANAMAN AGLAONEMA MENGGUNAKAN METODE FORWARD CHAINING BERBASIS WEB". Jurnal Ilmiah Informatika Komputer 27, nr 2 (2022): 122–38. http://dx.doi.org/10.35760/ik.2022.v27i2.4905.

Pełny tekst źródła
Streszczenie:
Tanaman Aglaonema merupakan salah satu tanaman hias yang memiliki popularitas sangat tinggi. Daya tariknya terletak pada corak dan kilau warna daun yang dimiliki, keindahan tersebut dapat hilang jika tanaman ini mulai diserang hama penyakit. Sistem pakar dapat digunakan sebagai sistem untuk mengidentikasi hama penyakit pada tanaman. Penelitian ini membangun sebuah aplikasi berbasis web untuk mengidentifikasi hama penyakit pada tanaman Aglaonema dengan memberikan informasi hama penyakit yang menyerang dan solusi berdasarkan pakar atau ahli menggunakan metode Forward Chaining. Pengembangan aplikasi dilakukan menggunakan pendekatan SDLC dengan tahapan yaitu perencanaan, analisis kebutuhan, perancangan, implementasi dan uji coba. Pembangunan program dilakukan menggunakan framework codeigniter 3 dengan bahasa HTML, PHP, CSS dan MySQL. Pengujian aplikasi dilakukan metode pengujian Black Box yang berfungsi untuk memperhatikan kualitas dari aplikasi. Hasil pengujian Black Box menunjukkan bahwa semua menu pada aplikasi dapat berfungsi dengan baik. Aplikasi ini telah dipublikasi dan dapat diakses melalui alamat https://aglaonemaku.xyz.
Style APA, Harvard, Vancouver, ISO itp.
27

Ghawade, Miss Manoshri A. "Study of Intrusion Detection System". International Journal for Research in Applied Science and Engineering Technology 9, nr VI (14.06.2021): 788–92. http://dx.doi.org/10.22214/ijraset.2021.34935.

Pełny tekst źródła
Streszczenie:
An intrusion detection system (IDS) could be a device or software application that observes a network for malicious activity or policy violations. Any malicious activity or violation is often reported or collected centrally employing a security information and event management system. Some IDS’s are proficient of responding to detected intrusion upon discovery. These are classified as intrusion prevention systems (IPS). A system that analyzes incoming network traffic is thought as Network intrusion detection system (NIDS). A system that monitors important software files is understood as Host intrusion detection system (HIDS). Wireless sensor networks (WSNs) are vulnerable to different kinds of security threats which will degenrate the performance of the entire network; that may lead to fatal problems like denial of service (DoS) attacks, direction attacks, Sybil attack etc. Key management protocols, authentication protocols and secure routing cannot provide security to WSNs for these varieties of attacks. Intrusion detection system (IDS) could be a solution to the present problem. It analyzes the network by collecting sufficient amount of knowledge and detects abnormal behavior of sensor node(s).
Style APA, Harvard, Vancouver, ISO itp.
28

Burga, Angélica. "Amicus Curiae Presentado ante la Corte Interamericana de Derechos Humanos en el Caso Atala Riffo e hijas contra el Estado de Chile". IUS: Revista de investigación de la Facultad de Derecho 1, nr 2 (4.12.2020): 217–41. http://dx.doi.org/10.35383/ius-usat.v1i2.502.

Pełny tekst źródła
Streszczenie:
En noviembre de 2004, la abogada y juez chilena Karen Atala, presentó una petición ante la Comisión Interamericana de Derechos humanos por considerar al Estado de Chile responsable por la violación de su derecho a la igualdad y no discriminación; a la vida privada y familiar; entre otros. El informe de la Comisión fue favorable a la Sra. Atala, y ante el incumplimiento, por parte del Estado chileno, de las recomendaciones emitidas por la Comisión, ésta decidió llevar el caso ante la Corte Interamericana de Derechos Humanos. A lo largo de los procesos seguidos ante la Comisión y ante la Corte se presentaron numerosos amicus curiae a fin de apoyar tanto la posición de la Sra. Atala como la del Estado chileno. En la actualidad el proceso ha concluido y nos encontramos a la espera de la sentencia que deberá emitir la Corte. En este sentido, este artículo tiene por finalidad exponer los hechos del caso y las cuestiones pertinentes que consideramos que la Corte debe valorar, las cuales han sido debidamente fundamentadas en el escrito de Amicus Curiae presentado por nuestra Facultad ante la Corte Interamericana de Derechos Humanos.
Style APA, Harvard, Vancouver, ISO itp.
29

Alazab, Ammar, Ansam Khraisat, Sarabjot Singh, Savitri Bevinakoppa i Osama A. Mahdi. "Routing Attacks Detection in 6LoWPAN-Based Internet of Things". Electronics 12, nr 6 (10.03.2023): 1320. http://dx.doi.org/10.3390/electronics12061320.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) has become increasingly popular, and opened new possibilities for applications in various domains. However, the IoT also poses security challenges due to the limited resources of the devices and its dynamic network topology. Routing attacks on 6LoWPAN-based IoT devices can be particularly challenging to detect because of its unique characteristics of the network. In recent years, several techniques have been proposed for detecting routing attacks, including anomaly detection. These techniques leverage different features of network traffic to identify and classify routing attacks. This paper focuses on routing attacks that target the Routing Protocol for Low-Power and Lossy Networks (RPL), which are widely used in 6LoWPAN-based IoT systems. The attacks discussed in this paper can be categorized as either inherited from Wireless Sensor Networks or exploiting vulnerabilities unique to RPL (known as RPL-specific attacks). The paper describes various RPL attacks, including Flood Attacks, Data-DoS/DDoS Attacks, Wormhole Attacks, RPL Rank Attacks, Blackhole Attacks, Version Attacks, and Sinkhole Attacks. In this paper, a novel Hybrid Intrusion Detection System (HIDS) that combines a decision tree classifier and a one-class Support Vector Machine classifier is proposed to detect routing attacks. The HIDS draws on the strengths of both a Signature Intrusion Detection System (SIDS) and an Anomaly-based Intrusion Detection System (AIDS) to identify routing attacks with a high degree of accuracy and a low false alarm rate. The routing dataset, which features genuine IoT network traffic and various kinds of routing attacks, was used to test the proposed HIDS. According to the findings, the hybrid IDS proposed in this study outperforms SIDS and AIDS approaches, with higher detection rates and lower false positive rates.
Style APA, Harvard, Vancouver, ISO itp.
30

Chojnacki, Cezary, Tomasz Poplawski, Aleksandra Blonska, Paulina Konrad, Jan Chojnacki i Janusz Blasiak. "The Usefulness of the Low-FODMAP Diet with Limited Tryptophan Intake in the Treatment of Diarrhea-Predominant Irritable Bowel Syndrome". Nutrients 15, nr 8 (11.04.2023): 1837. http://dx.doi.org/10.3390/nu15081837.

Pełny tekst źródła
Streszczenie:
(1) Background: A low-FODMAP diet is often recommended in the treatment of irritable bowel syndrome, but it does not improve abdominal symptoms in all patients, and an alternative diet is desirable. The purpose of this study was to evaluate the efficacy of a low-FODMAP diet with a concomitant reduction in tryptophan (TRP) intake in irritable bowel syndrome with diarrhea predominance (IBS-D) in relation to its metabolism via the serotonin and kynurenine pathways. (2) Methods: 40 healthy people (Group I, Controls) and 80 patients with IBS-D were included in the study. IBS-D patients were randomly divided into two groups of 40 each (Groups IIA and IIB). In Group IIA, the low-FODMAP diet was recommended, while in Group IIB, the same diet was recommended but with limited TRP intake for 8 weeks. The TRP intake was analyzed with the use of the nutritional calculator. Abdominal complaints were assessed using the Gastrointestinal Symptom Rating Scale (GSRS-IBS), and psychological status was simultaneously determined using two scales: the Hamilton Anxiety Scale (HAM-A) and the Hamilton Depression Scale (HAM-D). TRP and its metabolites: 5-hydoxyindoleacetic acid (5-HIAA), kynurenine (KYN), kynurenic acid (KYNA), and quinolinic acid (QA) were measured in urine using liquid chromatography tandem mass spectrometry (LC-MS/MS). (3) Results: The consumption of TRP per mg/kg/b.w./24 h has decreased in Group IIA from 20.9 ± 2.39 to 17.45 ± 2.41 (16.5%) and in Group IIB from 21.3 ± 2.33 to 14.32 (34.4%). Significantly greater improvement was found after nutritional treatment in patients in Group IIB as compared to Group IIA (GSRS score: 38.1% vs. 49.8%; HAM-A: 38.7% vs. 49.9%; HAM-D: 13.8% vs. 35.0%; p < 0.01). Reducing TRP intake showed a negative correlation with the degree of improvement in the GSRS score. (4) Conclusions: Lowering the TRP content in a low-FODMAP diet may be useful in treating IBS-D.
Style APA, Harvard, Vancouver, ISO itp.
31

Hyvönen, Helena, Laura Svärd i Reijo Aksela. "Complexation of iminodisuccinic acid (IDS) and 3-hydroxy-2,2′-iminodisuccinic acid (HIDS) with Cd2+, Hg2+, and Pb2+ in aqueous solution". Journal of Coordination Chemistry 64, nr 6 (10.03.2011): 1091–103. http://dx.doi.org/10.1080/00958972.2011.562895.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Khater, Belal Sudqi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Mohammed Abdulla Hussain, Ashraf Ahmed Ibrahim, Mohammad Arif Amin i Hisham A. Shehadeh. "Classifier Performance Evaluation for Lightweight IDS Using Fog Computing in IoT Security". Electronics 10, nr 14 (8.07.2021): 1633. http://dx.doi.org/10.3390/electronics10141633.

Pełny tekst źródła
Streszczenie:
In this article, a Host-Based Intrusion Detection System (HIDS) using a Modified Vector Space Representation (MVSR) N-gram and Multilayer Perceptron (MLP) model for securing the Internet of Things (IoT), based on lightweight techniques and using Fog Computing devices, is proposed. The Australian Defence Force Academy Linux Dataset (ADFA-LD), which contains exploits and attacks on various applications, is employed for the analysis. The proposed method is divided into the feature extraction stage, the feature selection stage, and classification modeling. To maintain the lightweight criteria, the feature extraction stage considers a combination of 1-gram and 2-gram for the system call encoding. In addition, a Sparse Matrix is used to reduce the space by keeping only the weight of the features that appear in the trace, thus ignoring the zero weights. Subsequently, Linear Correlation Coefficient (LCC) is utilized to compensate for any missing N-gram in the test data. In the feature selection stage, the Mutual Information (MI) method and Principle Component Analysis (PCA) are utilized and then compared to reduce the number of input features. Following the feature selection stage, the modeling and performance evaluation of various Machine Learning classifiers are conducted using a Raspberry Pi IoT device. Further analysis of the effect of MLP parameters, such as the number of nodes, number of features, activation, solver, and regularization parameters, is also conducted. From the simulation, it can be seen that different parameters affect the accuracy and lightweight evaluation. By using a single hidden layer and four nodes, the proposed method with MI can achieve 96% accuracy, 97% recall, 96% F1-Measure, 5% False Positive Rate (FPR), highest curve of Receiver Operating Characteristic (ROC), and 96% Area Under the Curve (AUC). It also achieved low CPU time usage of 4.404 (ms) milliseconds and low energy consumption of 8.809 (mj) millijoules.
Style APA, Harvard, Vancouver, ISO itp.
33

Kunštát, Miroslav. "„Gott ist weg, aber sein Geruch bleibt“". osteuropa 71, nr 4-6 (2021): 33. http://dx.doi.org/10.35998/oe-2021-0025.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
34

AlMajed, Hisham N., i Ahmad S. AlMogren. "Simple and Effective Secure Group Communications in Dynamic Wireless Sensor Networks". Sensors 19, nr 8 (22.04.2019): 1909. http://dx.doi.org/10.3390/s19081909.

Pełny tekst źródła
Streszczenie:
Wireless Sensor Network (WSN) is a growing area of research in terms of applications, life enhancement and security. Research interests vary from enhancing network performance and decreasing overhead computation to solving security flaws. Secure Group Communication (SGC) is gaining traction in the world of network security. Proposed solutions in this area focus on generating, sharing and distributing a group key among all group members in a timely manner to secure their communication and reduce the computation overhead. This method of security is called SGC-Shared Key. In this paper, we introduce a simple and effective way to secure the network through Hashed IDs (SGC-HIDs). In our proposed method, we distribute a shared key among the group of nodes in the network. Each node would have the ability to compute the group key each time it needs to. We provide a security analysis for our method as well as a performance evaluation. Moreover, to the best of our knowledge, we present for the first time a definition of joining or leaving attack. Furthermore, we describe several types of such an attack as well as the potential security impacts that occur when a network is being attacked.
Style APA, Harvard, Vancouver, ISO itp.
35

Jain, Jay Kumar, i Akhilesh A. Waoo. "An Artificial Neural Network Technique for Prediction of Cyber-Attack using Intrusion Detection System". Journal of Artificial Intelligence, Machine Learning and Neural Network, nr 32 (24.02.2023): 33–42. http://dx.doi.org/10.55529/jaimlnn.32.33.42.

Pełny tekst źródła
Streszczenie:
An intrusion detection system, often known as IDS, is a piece of equipment or a piece of software that monitors a network or collection of devices in order to search for indications of possible intrusion. The frequency of cyber assaults has grown in recent years, and with it, the damage they do to society. The study of cyber security and the avoidance of cyber assaults, such as the use of intrusion detection as a defensive mechanism, is therefore needed. The internet services are widely used. Services based on computers, the internet, and other forms of technology are all considered part of the cyber world. The cyber world has advanced greatly thanks to new protocols and technologies. Cyber security is a major issue for every service that operates online. Network and host-based intrusion detection systems (NIDS/HIDS) are the backbones of any cyber security infrastructure. The NSL-KDD dataset is often used in algorithm research and verification and is widely employed in both the study and development of intrusion detection systems. In this study, we provide a neural network approach to intrusion detection system threat prediction. In this paper, the Python Spyder software is used for the simulation.
Style APA, Harvard, Vancouver, ISO itp.
36

McCaskie, Tom C. "Local Knowledge: An Akuapem Twi History of Asante". History in Africa 38 (2011): 169–92. http://dx.doi.org/10.1353/hia.2011.0003.

Pełny tekst źródła
Streszczenie:
In 2003 Asantehene Agyeman Prempeh I's eighty-nine page manuscript ‘The History of Ashanti Kings and the whole country itself’ of 1907 was published in an annotated scholarly edition alongside a selection of allied texts. The same publisher is to produce a related volume containing the four hundred and fifty pages of Asantehene Osei Agyeman Prempeh II's ‘History of Ashanti’ written in the 1940s (and edited by myself). Both of these texts are written in English. However, the huge range of sources on the Asante past recorded in Akan Twi have yet to receive equal attention and treatment. This short paper introduces and contextualises one source of this kind that was researched in Asante between 1902-1910 and finished in written form in Akan Twi in 1915.The Akuapem (Akwapim) kingdom is located less than thirty miles northeast of Ghana's capital at Accra. It has always been and remains a small polity. It comprises only seventeen historic towns scattered among hills on two parallel ridges about fifteen hundred feet above sea level. There are more towns today, many created by the cocoa economy of the early twentieth century, but Akuapem remains a compact entity. It is a Twi-speaking Akan kingdom, but an unusual one in that it is ethnically diverse.Patrilineal Guan-speaking farmers settled on the Akuapem ridges in the early decades of the seventeenth century. They were oppressed by the matrilineal Twi-speaking Akan of the nearby Akwamu kingdom. To end this situation the Guan recruited other Akan Twi speakers as allies. These were military adventurers from the Akyem Abuakwa polity to the west. The Akyem incomers succeeded against the Akwamu but stayed on to establish their own conquest dynasty in 1733.
Style APA, Harvard, Vancouver, ISO itp.
37

Čeponis, Dainius, i Nikolaj Goranin. "Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the AWSCTD". Security and Communication Networks 2019 (11.11.2019): 1–12. http://dx.doi.org/10.1155/2019/2317976.

Pełny tekst źródła
Streszczenie:
The increasing amount of malware and cyberattacks on a host level increases the need for a reliable anomaly-based host IDS (HIDS) that would be able to deal with zero-day attacks and would ensure low false alarm rate (FAR), which is critical for the detection of such activity. Deep learning methods such as convolutional neural networks (CNNs) and recurrent neural networks (RNNs) are considered to be highly suitable for solving data-driven security solutions. Therefore, it is necessary to perform the comparative analysis of such methods in order to evaluate their efficiency in attack classification as well as their ability to distinguish malicious and benign activity. In this article, we present the results achieved with the AWSCTD (attack-caused Windows OS system calls traces dataset), which can be considered as the most exhaustive set of host-level anomalies at the moment, including 112.56 million system calls from 12110 executable malware samples and 3145 benign software samples with 16.3 million system calls. The best results were obtained with CNNs with up to 90.0% accuracy for family classification and 95.0% accuracy for malicious/benign determination. RNNs demonstrated slightly inferior results. Furthermore, CNN tuning via an increase in the number of layers should make them practically applicable for host-level anomaly detection.
Style APA, Harvard, Vancouver, ISO itp.
38

Nur, Bastiar, Sawung Cindelaras i Nina Meilisza. "INDUKSI PEMATANGAN GONAD IKAN GURAMI COKELAT (Sphaerichthys osphromenoides Canestrini, 1860) MENGGUNAKAN PREGNANT MARE SERUM GONADOTROPIN DAN ANTIDOPAMIN". Jurnal Riset Akuakultur 12, nr 1 (30.05.2017): 69. http://dx.doi.org/10.15578/jra.12.1.2017.69-76.

Pełny tekst źródła
Streszczenie:
Ikan gurami cokelat (Sphaerichthys osphromenoides Canestrini, 1860) merupakan salah satu spesies ikan hias endemik perairan gambut dan memiliki potensi untuk dibudidayakan. Pada kondisi budidaya, berbagai faktor lingkungan yang berperan penting dalam menstimulasi perkembangan dan pematangan gonad hingga ovulasi dan pemijahan tidak mendukung aktivitas reproduksi beberapa spesies ikan. Penelitian ini dilakukan untuk menentukan dosis hormon yang efektif dapat merangsang pematangan gonad ikan gurami cokelat. Hormon yang digunakan adalah “Oodev®” (tersusun atas Pregnant Mare Serum Gonadotropin/PMSG) dan antidopamin) yang diberikan menggunakan metode “topical gill”. Ada tiga dosis Oodev® yang digunakan, yaitu: 0,02 mL; 0,04 mL; dan 0,06 mL; serta kontrol menggunakan NaCl 0,9% sebanyak 0,05 mL/g bobot badan ikan uji. Setiap perlakuan menggunakan 30 ekor induk betina ikan gurami cokelat (panjang total: 4,1 ± 0,3 cm; bobot: 1,41 ± 0,17 g). Pemberian hormon dilakukan setiap minggu hingga minggu ke-7. Pada minggu ke-8 dilakukan pembedahan untuk pengambilan gonad. Parameter yang diamati adalah: jumlah induk matang gonad, indeks gonadosomatik (IGS), fekunditas, diameter oosit, kadar estradiol-17â dalam darah, dan tingkat kematangan gonad (TKG) ikan uji pada masing-masing perlakuan. Hasil penelitian menunjukkan bahwa perlakuan hormon dengan dosis 0,04 mL/g bobot badan menghasilkan perkembangan gonad ikan uji yang lebih baik dengan jumlah induk matang gonad mencapai 23 ekor (76,67%), nilai IGS sebesar 2,33 ± 1,24%; fekunditas sebesar 73,5 ± 26,2 butir; diameter oosit berkisar antara 1,0-1,8 mm; kadar estradiol-17b dalam darah sebesar 15,9 ± 4,5 rg/mL dengan tingkat kematangan gonad mencapai tahap IV.Chocolate gourami (Sphaerichthys osphromenoides Canestrini, 1860) is an endemic ornamental fish species in peatland waters and potentially to be cultivated. In captive condition, some environmental factors that play important role for gonadal development, maturation, ovulation, and spawning are not suitable for supporting reproductive activity in some fish species. This study was conducted to determine the optimum dosages of hormone which is able to stimulate gonadal maturation of chocolate gourami. Oodev® (consisted of Pregnant Mare Serum Gonadotropin (PMSG) and antidopamin) was given using “topical gill” method. There were three Oodev® dosages used in this research: 0.02 mL; 0.04 mL; and 0.06 mL respectively; and control using 0.05 mL of 0.9% NaCl per gram of body weight. Each treatment was tested on 30 females (the averages of total length and body weight of 4.1 ± 0.3 cm and 1.41 ± 0.17 g, respectively). Hormone was given every week until the seventh week. At the eight weeks, surgery was performed for gonadal measurement. Parameters measured were: number of gonadal mature broodstocks, gonadosomatic index, fecundity, oocyte diameters, plasma estradiol-17â levels, and gonadal mature levels. The results showed that 0.04 mL Oodev® per g body weight of fish was superior in reproductive performance. In that treatment, there were 76.67% (23/30) fish being matured, gonad somatic index 2.33 ± 1.24%, egg fecundity 73.5 ± 26.2 eggs, oocyte diameters ranged 1.0-1.8 mm, blood level of estradiol-17b 15.9 ± 4.5 rg.mL-1, and the level of gonad development reached to stage IV.
Style APA, Harvard, Vancouver, ISO itp.
39

Mannopov, Islombek Sultonalievich. "The Term “Hikmat” , (“Wisdom”) Is Interpreted By Khoja Ahmad Yassavi And His Followers". American Journal of Social Science and Education Innovations 03, nr 04 (30.04.2021): 258–63. http://dx.doi.org/10.37547/tajssei/volume03issue04-39.

Pełny tekst źródła
Streszczenie:
After Khoja Ahmad Yassavi, creation in his style continued until the early twentieth century. Ahmad Yassavi and his followers discussed the use of the term “Hikmat” , “wisdom” in reference to a particular form of poetry.
Style APA, Harvard, Vancouver, ISO itp.
40

Václav, Tlapák, i colleeagues and. "Prof. Ing. Jaroslav Herynek, CSc., is celebrating his 80th birthday". Journal of Forest Science 59, No. 8 (24.09.2013): 337. http://dx.doi.org/10.17221/6991-jfs.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

Jamlean, Yosef Gerard, Nego E. Bataragoa i Jhon L. Tombokan. "Catch And Length-Weight Relationship Of Freshwater Lobster, Cherax Quadricarinatus Von Martens, 1868 In Tondano Lake, Kakas District, Minahasa, North Sulawesi". JURNAL ILMIAH PLATAX 6, nr 1 (30.01.2018): 85. http://dx.doi.org/10.35800/jip.6.1.2018.18903.

Pełny tekst źródła
Streszczenie:
C. quadricarinatus (red claw) has important economic value either for consumption or as ornamental crustacean, has been cultivated, and introduced to many waterways outside its natural habitat. In Tondano lake, C. quadricarinatus has developed and become fishing target using traps and spearguns. The purpose of this survey is to describe the freshwater lobster catching using traps, and to know the length-weight relationships, growth pattern and condition factor. The study was expected to use as information on the presence of C. quadricarinatus Tondano Lake. Catches were red claw, C. quadricrinatus, marble sleeper Oxyeleotris marmorata, Mud gudgeon Ophieleotris aporos, Mozambique tilapia Oreochromis mossambicus and African sharptooth catfish Clarias Gariepinus. Length-weight relationship of C. quadricarinatus was W = -1.8005 + 4.2765 log L for males, W = -1.2978 + 3.6524 log L for females, respectively, and W = -1.5631 + 3.9848 log b for combined sexes. They had positive allometric (A +) growth. Condition factor ranged from 0.60-1.43 with an average of 1.071 ± 0.17 for males and 0.46-1.36 with an average of 1.027 ± 0.18 for females, 0.59-1.642 withan average of 1.22± 0.21.Keywords: fishing, length-weight, growth pattern, fishing gear, Kakas district, MinahasaAbstrakC. quadricarinatus (red claws) mempuyai nilai ekonomis penting baik komsumsi maupun sebagai krustasea hias dan telah banyak di budidaya serta di introduksi ke banyak perairan di luar habitat aslinya. Di Danau Tondano, C. quadricarinatus telah berkembang biak dan menjadi target penangkapan nelayan mengunakan alat tangkap bubu dan alat tangkap tura sejenis tombak sambil menyelam. Tujuan penelitinan ini ialah untuk mendeskripsikan penangkapan lobster air tawar C. quadricarinatus menggunakan alat tangkap bubu, hubungan panjang berat, pola pertumbuhan dan faktor kondisi. Hasil penilitian ini diharapkan dapat digunakan sebagai informasi keberadaan lobster air tawar C. quadricarinatus di Danau Tondano. Hasil tangkapan yang didapat adalah lobster air tawar, ikan Betutu, ikan Payangka, ika Mujair dan ikan Lele Dumbo. Hasil hubungan panjang berat lobster air tawar di dapat jantan : W=-1,8005+4,2765 log L, betina : W=-1,2978+3,6524 log L dan gabungan ( jantan & betina) : W=-1,5631+3,9848 log L. Pola pertumbuhan ketiganya ialah allometrik positif (A+) dan faktor kondisi jantan berkisar 0,60-1,43 dengan rata-rata1,071±0,17, betina berkisar 0,46-1,36 dengan rata-rata 1,027±0,18, dan gabungan (jantan dan betina) berkisar 0,59-1,642 dengan rata-rata1,22±0,21.Kata Kunci : Penangkapan, Hubungan panjang berat, Pola pertumbuhan, Kecamatan Kakas
Style APA, Harvard, Vancouver, ISO itp.
42

Ferry, Peter. ""MY BEARD IS MY OWN”: HERMAN MELVILLE’S BEARD POETICS IN HIS NARRATIVES OF MARITIME MASCULINITY." Revista de Estudios Norteamericanos, nr 27 (2023): 67–83. http://dx.doi.org/10.12795/ren.2023.i27.13.

Pełny tekst źródła
Streszczenie:
This article celebrates the vital role of the beard in Herman Melville’s narratives of maritime masculinity. While the limited commentary on the beard has thus far focused on the hair on Melville’s face, this article shifts the focus to the beard on the page of Melville’s early texts to explicate the nuances in Melville’s developing beard poetics. These appear first in Typee (1846), Omoo (1847), and Mardi (1849), three texts which begin with the traditional idea of the beard as a symbol of native Otherness before introducing the symbolic power of the braided beard and setting out the importance of the beard in male homosocial relations. This final strand is key in Melville’s most sociologically charged writings, no more so than in White-Jacket (1850). From the communal cultivation of the beards on board the Neversink, to the tragic events of “The Great Massacre of the Beards,” White-Jacket displays an acute awareness of the discourses of hegemony, hierarchy, power, and authority that underscores the power of the beard in the performativity of masculinity of Melville’s characters on the sea
Style APA, Harvard, Vancouver, ISO itp.
43

Lamacz, M., M. C. Tonon, F. Leboulenger, F. Héry, S. Idres, A. J. Verhofstad, G. Pelletier i H. Vaudry. "Effect of serotonin on α-melanocyte-stimulating hormone secretion from perifused frog neurointermediate lobe: evidence for the presence of serotonin-containing cells in the frog pars intermedia". Journal of Endocrinology 122, nr 1 (lipiec 1989): 135—NP. http://dx.doi.org/10.1677/joe.0.1220135.

Pełny tekst źródła
Streszczenie:
ABSTRACT We have examined the presence of 5-hydroxytryptamine (serotonin; 5-HT) in the intermediate lobe of the frog pituitary and investigated the effect of exogenous 5-HT on α-melanocyte-stimulating hormone (α-MSH) release from the perifused neurointermediate lobe (NIL). Using a specific antiserum against 5-HT, the indirect immunofluorescence technique revealed the presence of 5-HT-like immunoreactivity (5-HT-LI) in discrete cells, generally gathered in small clusters among parenchymal cells, and in numerous neurites surrounding melanotrophic cells. At the electron microscopic level, using a silver-gold intensification procedure, 5-HT-LI was localized in dense-core secretory vesicles within specific pituitary cells which appear to be different from pituitary melanotrophs. Dense accumulation of gold particles was also observed in nerve fibres running between parenchymal cells. A combination of high-performance liquid chromatography analysis and electrochemical detection showed the presence of both 5-HT and its metabolite 5-hydroxyindol acetic acid (5-HIAA) in frog NIL extracts (534 ± 40 and 1245 ± 65 (s.e.m.) pg/mg wet tissue respectively). Administration of graded doses of 5-HT (from 1 to 30 μmol/l) to perifused frog NIL induced a dose-dependent inhibition of α-MSH release. Repeated pulses of 5-HT (10 μmol/l each) induced a reproducible inhibition of α-MSH without any desensitization phenomena. The inhibitory effect of 5-HT was partially blocked by the serotonergic antagonists methysergide and ICS-205-930 (10 μmol/l each). Concomitant administration of methysergide and ICS-205-930 (10 μmol/l each) totally abolished 5-HT-evoked inhibition of α-MSH. Fenfluramine, a releaser of 5-HT, induced a slight but significant reduction of α-MSH secretion. While 5-HT caused a marked inhibition of α-MSH release from intact NIL, 5-HT was devoid of effect on acutely dispersed pars intermedia cells suggesting that 5-HT does not exert a direct action on pituitary melanotrophs. We have examined the effect of specific dopaminergic, GABAergic and α-adrenergic antagonists on 5-HT-induced α-MSH inhibition. We observed that sulpiride and SR 95531 (10 μmol/l each) did not affect the response of NIL to 5-HT while yohimbine (10 μmol/l) suppressed the inhibitory action of 5-HT. Taken together, our results indicate that discrete cells of the frog pars intermedia contain the neurotransmitter 5-HT which may act locally to inhibit α-MSH release. Our data also suggest that the inhibitory effect of 5-HT is mediated via presynaptic stimulation of catecholamine (possibly norepinephrine) release from adrenergic nerve endings terminating in the intermediate lobe of the frog pituitary. Journal of Endocrinology (1989) 122, 135–146
Style APA, Harvard, Vancouver, ISO itp.
44

Tarhan, Nevzat. "Dur, Düşün, Yeniden Başla yazısıyla Prof. Dr. Nevzat Tarhan Medikongre Dergisinde…". ÜsküdarÜniversitesi 1, nr 1 (kwiecień 2023): 1–2. http://dx.doi.org/10.32739/uskunews.2023.1.nt.1.

Pełny tekst źródła
Streszczenie:
Prof. Dr. Nevzat Tarhan yeni yılın “Dur, düşün ve yeniden başlamak için yeni yıl bir fırsat” olduğuna dikkat çekerken, konuyla ilgili yazısı Tıp Toplantıları ve Kongre Turizmi Dergisi MEDİKONGRE’nin Ocak sayısında yayınlandı.
Style APA, Harvard, Vancouver, ISO itp.
45

Tarhan, Nevzat. "Dur, Düşün, Yeniden Başla yazısıyla Prof. Dr. Nevzat Tarhan Medikongre Dergisinde". ÜsküdarÜniversitesi 1, nr 1 (kwiecień 2023): 1–2. http://dx.doi.org/10.32739/uskunews.nt.en.1.

Pełny tekst źródła
Streszczenie:
While, Prof. Nevzat Tarhan highlighting that the new year is an important opportunity to stop, think and start over, he published his article on the topic on the January issue of the MEDİKONGRE Journal which is a Medical Congress and Congress Tourism Journal
Style APA, Harvard, Vancouver, ISO itp.
46

Frik, Tatyana B. ""Жуковский есть истинный наш брат": Н. М. Карамзин и В. А. Жуковский (к проблеме "Карамзин и его окружение")". Vestnik Tomskogo gosudarstvennogo universiteta, nr 483 (2022): 72–80. http://dx.doi.org/10.17223/15617793/483/7.

Pełny tekst źródła
Streszczenie:
The work is aimed at solving a topical research problem of establishing and maximally describing Karamzin’s circle. The article examines the relationship of the historiographer with Vasily A. Zhukovsky. To prepare an entry about Vasily A. Zhukovsky for the Nikolay M. Karamzin and His Circle reference dictionary, the author identified and systematized the available documentary evidence concerning the contacts of the poet and the historiographer. Based on a large number of sources, the author traces the history of their communication from the moment of acquaintance in 1800 to their last meeting in May 1826. She also considers facts reflecting Zhukovsky’s actions aimed at preserving the memory of Karamzin. The author notes the friendly nature of their relationship, highlights its significance for both Zhukovsky and Karamzin, and concludes that they both had a great influence on each other’s life and work. The facts confirming the closeness of Karamzin’s and Zhukovsky’s worldviews and behavioral strategies are considered separately. The historiographer and the poet had similar attitudes to life. Karamzin was significant in Zhukovsky’s behavioral discourse throughout his life: the poet regularly refers to Karamzin’s philosophemes when formulating maxims of his own life philosophy. Examples of Zhukovsky’s and Karamzin’s similar behavioral strategies are their statements regarding participation in the polemic, testimonies by their contemporaries. The author also emphasizes the historical and ideological role of the historiographer and the poet as courtiers, and mentions the continuity between the behavioral text of the monarch and the citizen formed by Karamzin and the imperial text of Zhukovsky. Based on the surviving letters of Karamzin to Zhukovsky, as well as the epistolary works of their closest friends, the author reconstructs the images of the poet and the historiographer in their perception of each other. Karamzin saw Zhukovsky as a truly close person, and Zhukovsky perceived the historiographer as a father and a friend, an evangelist and a mentor. In conclusion, the author notes that the poet played a significant role in the formation of the Karamzin myth. The poet sacralized the historiographer, which was based on both Zhukovsky’s sincere love for Karamzin and the idea of the historical and cultural significance of a person like Karamzin. Idealizing the historiographer, Zhukovsky constructed his image under his own pedagogical and educational program, bringing to the fore ethical personal qualities that were particularly significant for him.
Style APA, Harvard, Vancouver, ISO itp.
47

吳俊志, 吳俊志. "死亡前二年內贈與哪些人的財產要併入遺產課稅?". 月旦會計實務研究 71, nr 71 (listopad 2023): 035–40. http://dx.doi.org/10.53106/252260962023110071004.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
48

蔡國勝, 蔡國勝. "死亡前二年內贈與財產計入遺產稅的探討". 月旦會計實務研究 71, nr 71 (listopad 2023): 027–34. http://dx.doi.org/10.53106/252260962023110071003.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
49

Mirzazadeh, Ali, Ingrid Eshun-Wilson, Ryan R. Thompson, Atousa Bonyani, James G. Kahn, Stefan D. Baral, Sheree Schwartz, George Rutherford i Elvin H. Geng. "Interventions to reengage people living with HIV who are lost to follow-up from HIV treatment programs: A systematic review and meta-analysis". PLOS Medicine 19, nr 3 (15.03.2022): e1003940. http://dx.doi.org/10.1371/journal.pmed.1003940.

Pełny tekst źródła
Streszczenie:
Background Optimizing services to facilitate engagement and retention in care of people living with HIV (PLWH) on antiretroviral therapies (ARTs) is critical to decrease HIV-related morbidity and mortality and HIV transmission. We systematically reviewed the literature for the effectiveness of implementation strategies to reestablish and subsequently retain clinical contact, improve viral load suppression, and reduce mortality among patients who had been lost to follow-up (LTFU) from HIV services. Methods and findings We searched 7 databases (PubMed, Cochrane, ERIC, PsycINFO, EMBASE, Web of Science, and the WHO regional databases) and 3 conference abstract archives (CROI, IAC, and IAS) to find randomized trials and observational studies published through 13 April 2020. Eligible studies included those involving children and adults who were diagnosed with HIV, had initiated ART, and were subsequently lost to care and that reported at least one review outcome (return to care, retention, viral suppression, or mortality). Data were extracted by 2 reviewers, with discrepancies resolved by a third. We characterized reengagement strategies according to how, where, and by whom tracing was conducted. We explored effects, first, among all categorized as LTFU from the HIV program (reengagement program effect) and second among those found to be alive and out of care (reengagement contact outcome). We used random-effect models for meta-analysis and conducted subgroup analyses to explore heterogeneity. Searches yielded 4,244 titles, resulting in 37 included studies (6 randomized trials and 31 observational studies). In low- and middle-income countries (LMICs) (N = 16), tracing most frequently involved identification of LTFU from the electronic medical record (EMR) and paper records followed by a combination of telephone calls and field tracing (including home visits), by a team of outreach workers within 3 months of becoming LTFU (N = 7), with few incorporating additional strategies to support reengagement beyond contact (N = 2). In high-income countries (HICs) (N = 21 studies), LTFU were similarly identified through EMR systems, at times matched with other public health records (N = 4), followed by telephone calls and letters sent by mail or email and conducted by outreach specialist teams. Home visits were less common (N = 7) than in LMICs, and additional reengagement support was similarly infrequent (N = 5). Overall, reengagement programs were able to return 39% (95% CI: 31% to 47%) of all patients who were characterized as LTFU (n = 29). Reengagement contact resulted in 58% (95% CI: 51% to 65%) return among those found to be alive and out of care (N = 17). In 9 studies that had a control condition, the return was higher among those in the reengagement intervention group than the standard of care group (RR: 1.20 (95% CI: 1.08 to 1.32, P < 0.001). There were insufficient data to generate pooled estimates of retention, viral suppression, or mortality after the return. Conclusions While the types of interventions are markedly heterogeneity, reengagement interventions increase return to care. HIV programs should consider investing in systems to better characterize LTFU to identify those who are alive and out of care, and further research on the optimum time to initiate reengagement efforts after missed visits and how to best support sustained reengagement could improve efficiency and effectiveness.
Style APA, Harvard, Vancouver, ISO itp.
50

Hanumantharaju R, Shreenath KN, Sowmya BJ i Srinivasa KG. "Fog-Driven Approach for Distributed Intrusion Detection System in Auditing the Data Dased on Blockchain-Cloud Systems". Cloud Computing and Data Science, 1.11.2023, 97–107. http://dx.doi.org/10.37256/ccds.5120243772.

Pełny tekst źródła
Streszczenie:
Intrusion detection is a familiar phrase in the information and network security domain. An Intrusion Detection System (IDS) is a device or software that will keep track of the networks, for unlawful movements, and policy breaches that arise within the network. There are different forms of IDS, Host Intrusion Detection System (HIDS) helps in identifying unauthorized activities on the host, Network Intrusion Detection System (NIDS) helps in identifying attacks in the network, whereas Distributed Intrusion Detection System (DIDS) consists of multiple IDS over a large area of network where individual IDS communicates with each other or with the central the authorized central server. The proposed work has a three-layered architecture for DIDS for securing data sharing among different IDS. The bottom layer uses multiple IDS, the fog layer is supported with Blockchain functionality, and the cloud service at the upper layer stores required data permanently for future analysis. The fog computing-based architecture for DIDS tries to implement the application in a scalable and trustless environment using distributed ledger technology. The evaluation of the proposed work is carried out for fog, cloud, and integrated fog-cloud with the Blockchain functionality and without Blockchain functionality in measuring performance metrics related to throughput, service latency, response time, block creation time, and block execution time.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii