![](images/graphics/blank.gif)
Threat model
-
Hepatocellular carcinoma (HCC) presents a significant threat to individuals and healthcare systems due to its high recurrence rate. Accurate prognostic models are essential for improving patient outcomes. This study aimed to investigate the predictive value of the GGT to PA ratio (GPR) and to construct prognostic nomograms for HCC patients without microvascular invasion.
12p
vikoch
27-06-2024
1
1
Download
-
Ebook "Climate change and food security: Adapting agriculture to a warmer world" aims to resolve some of the controversy by exploring and comparing the different methodologies and data that scientists use to understand climate’s effects on food security. In explains the nature of the climate threat, the ways in which crops and farmers might respond, and the potential role for public and private investment to help agriculture adapt to a warmer world.
201p
giangdongdinh
28-05-2024
2
1
Download
-
The Mekong deltaic coasts have suffered from erosion and mangrove losses due to many relative threats in human activities, bringing to coastal instabilities. The massive and large number of constructions, such as sea dikes, revetments, and sea walls, tend to break the equilibrium in multiple locations along the coasts. As a result, a significant reduction of mangroves comes along in qualitative and quantitative variations, for example, the number of trees in one location and the healthy width of mangroves.
13p
dianmotminh02
03-05-2024
1
1
Download
-
Forest fires present a significant threat to the tropical forest ecosystem in the northwestern region of Vietnam. Our study aimed to assess the impacts of environmental factors on forest fire occurrence and to map forest fire probability for the whole region. The forest fire occurrence data over the period 2003–2016, environmental factors (climate, fuel condition, topography, and human activity), and the MaxEnt approach were used for this study.
21p
dianmotminh02
03-05-2024
4
2
Download
-
Wildlife conservation is a pressing global concern, with the need to create and manage protected areas where multiple species can coexist without facing the threat of extinction. In this paper, we proposed an Agent-Based Model that simulates the interactions and life activities of tigers, leopards, and wild boars within a 400 km2 area, approximately the area of standard conservation.
8p
vibego
02-02-2024
1
0
Download
-
Ebook "Systems biology of marine ecosystems" describes the latest advances in systems biology in four plant-based marine ecosystems: seaweeds, seagrasses, microalgae, and corals. Marine organisms that inhabit the oceanic environment experience a diverse range of environmental fluctuations, anthropogenic stress, and threats from invasive species and pathogens.
355p
lucchinguyen
28-12-2023
4
2
Download
-
Part 1 of ebook "The car hacker's handbook: A guide for the penetration tester" provides readers with contents including: Chapter 1 - Understanding threat models; Chapter 2 - Bus protocols; Chapter 3 - Vehicle communication with SocketCAN; Chapter 4 - Diagnostics and logging; Chapter 5 - Reverse engineering the CAN bus; Chapter 6 - ECU hacking;...
164p
dangsovu
20-10-2023
5
3
Download
-
Lung cancer is a major global threat to public health for which a novel predictive nomogram is urgently needed. Non-small cell lung cancer (NSCLC) which accounts for the main port of lung cancer cases is attracting more and more people’s attention.
15p
vioracle
29-09-2023
6
2
Download
-
Ebook Router security strategies: Securing IP network traffic planes – Part 1 includes contents: Chapter 1 Internet protocol operations fundamentals, Chapter 2 Threat models for IP networks, Chapter 3 IP network traffic plane security concepts, Chapter 4 IP data plane security, Chapter 5 IP control plane security, Chapter 6 IP management plane security, Chapter 7 IP services plane security.
425p
haojiubujain06
05-09-2023
6
3
Download
-
Ebook "Security concepts" includes contents: Metadata, security properties, security models, security concepts, economics of security, adversary modeling, threat modeling, physical security, hardware security, distributed systems, identification and authentication, authorization - access control, secure system administration, logging, reporting, abuse detection, abuse response, forensics, privacy, intrusion response, network security, email security, web security, software security, human factors and usability, attack patterns, trust and personnel security, cryptography, randomness and unpr...
246p
haojiubujain06
05-09-2023
3
2
Download
-
Ebook Cyber adversary characterization - Auditing the hacker mind part 2 includes contents: Chapter 6 bringing it all together: completing the cyber adversary model, chapter 7 warmtouch: assessing the insider threat and relationship management, chapter 8 managing the insider threat, chapter 9 the cyber adversary in groups: targeting nations' critical infrastructures, chapter 10 characterizing the extremes-terrorists and nation states, chapter 11 conclusions, chapter 12 return on investment.
190p
haojiubujain06
05-09-2023
5
2
Download
-
Wildfires are considered one of the most common hazards in mountainous areas, posing a serious threat to flora, fauna, and humans. This article focuses on building a forest fire risk map based on GIS techniques in the southwest area of Ky Son district, Nghe An province.
12p
viengels
25-08-2023
4
3
Download
-
Ebook Strategic management: An integrated approach (10th edition) - Part 2 includes contents: Chapter 1 strategic leadership: managing the strategy-making process for competitive advantage; chapter 2 external analysis: the identification of opportunities and threats; chapter 3 internal analysis: distinctive competencies, competitive advantage, and profitability; chapter 4 building competitive advantage through functional-level strategy; chapter 5 building competitive advantage through business-level strategy; chapter 6 business-level strategy and the industry environment;…
434p
haojiubujain02
03-07-2023
6
2
Download
-
For early detection and response to network threats, a network intrusion detection system should be executed on a data plane. However, due to high model complexity, an intrusion detection model based on advanced machine learning techniques becomes unsuitable for limited-resource switches.
15p
viargus
20-02-2023
5
2
Download
-
Continued part 1, part 2 of ebook "Advances in time series data methods in applied economic research: International Conference on Applied Economics (ICOAE) 2018" provide readers with content about: revealed comparative advantage BRICS-EU 28 - some new evidence; the effect of a sovereign credit rating change on share prices of the South African retail banks; impact of macro-economic variables on exchange rate - an evidence from Pakistan; the potential threat of corporate financial distress in Switzerland;...
289p
damtuyetha
16-02-2023
4
2
Download
-
This thesis provides a first step towards understanding how fear of crime, perceived risk, perceptions of unsafety, and avoidance behavior reciprocally and positively influence each other; and how personal characteristics and community-related factors influence threat of victimization within a nonrecursive frame of reference, laying the groundwork and advancing conceptual foundations upon which threat of victimization can be assessed.
270p
runthenight04
02-02-2023
3
2
Download
-
The traditional method to evaluate the feasibility of IVR-ERVC strategy is based on the steady state of the molten pool. But in the early stage, the transient behavior of the molten corium may impose a greater threat to the integrity of the reactor pressure vessel.
7p
vironald
15-12-2022
11
5
Download
-
The World Health Organization (WHO) requires reduction in the prevalence of hepatitis B virus (HBV) surface antigen (HBsAg) in children to 0.1% by 2030, a key indicator for eliminating viral hepatitis as a major public health threat.
10p
viferrari
28-11-2022
7
2
Download
-
To compare an autoregressive integrated moving average (ARIMA) model with a model that combines ARIMA with the Elman recurrent neural network (ARIMA-ERNN) in predicting the incidence of pertussis in mainland China. Background: The incidence of pertussis has increased rapidly in mainland China since 2016, making the disease an increasing public health threat.
11p
viferrari
28-11-2022
8
2
Download
-
A coursebook: Exploring Pragmatics - Part 2 has present the content incitement in legal discourse; verbal irony; a pragmatic model of verbal parody; threats and impoliteness; speech act stage metaphor; pragmatics and behavioral game theory; clinical pragmatics revisited; pragmatic disorders in schizophrenia;...
268p
chenlinong_0310
23-02-2022
15
5
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)