| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910588899603321 |
|
|
Titolo |
Aging gametes : their biology and pathology : proceedings of the International Symposium on Aging Gametes, Seattle, Wash., June 13-16, 1973 / / editor, R. J. Blandau |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Basel ; ; New York, : S. Karger, c1975 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
x, 415 p. : ill. ; ; 25 cm |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographies and indexes. |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910864185803321 |
|
|
Titolo |
Congenital Spine Malformations : Clinical and Surgical Aspects / / edited by Khaled Fares AlAli, Hashim Talib Hashim |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2024.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (229 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Nervous system - Surgery |
Children - Surgery |
Neurosurgery |
Pediatric Surgery |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Chapter 1 General introduction to the congenital spine malformations -- Chapter 2 The epidemiology of the congenital spine malformations -- Chapter 3 The diagnosis of congenital spine malformations -- Chapter 4 Kyphosis -- Chapter 5 Lordosis -- Chapter 6 Scoliosis -- Chapter 7 Spina bifida -- Chapter 8 Spinal canal stenosis -- Chapter 9 Dorsal enteric fistula -- Chapter 10 Neuroenteric cyst -- Chapter 11 Dermal Sinus -- Chapter 12 Split cord malformation (diastematomyelia) -- Chapter 13 Caudal regression syndrome -- Chapter 14 Segmental spinal dysgenesis -- Chapter 15 Intradural lipoma -- Chapter 16 Filar lipoma -- Chapter 17 Tight filum terminale -- Chapter 18 Abnormally elongated spinal cord -- Chapter19 Persistent terminal ventricle -- Chapter 20 Terminal myelocystocele -- Chapter 21 Cervical meylocystocele -- Chapter 22 Congenital spine malformations in the Arab world. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book offers a clinical and surgical overview on congenital spine malformations, which are abnormalities that occur during fetal development, leading to structural issues in the spine. The fetal spine begins to develop shortly after conception and continues to grow throughout pregnancy. This book covers the various congenital spine malformations, their aetiologies and development, diagnosis and |
|
|
|
|
|
|
|
|
|
|
|
|
|
management. Since many of these disorders are rare, they do not have a final cure and their management is important - their consequences on the physical, psychological and developmental condition of the patient are massive. This book is of interest to orthopedic surgeons, neurosurgeons, and pediatric specialists - the team who take care of the surgical management of congenital spine malformations. |
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910616393303321 |
|
|
Autore |
Chen Xiaofeng |
|
|
Titolo |
Security and Privacy in Social Networks and Big Data : 8th International Symposium, SocialSec 2022, Xi'an, China, October 16–18, 2022, Proceedings / / edited by Xiaofeng Chen, Xinyi Huang, Mirosław Kutyłowski |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2022.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (372 pages) |
|
|
|
|
|
|
Collana |
|
Communications in Computer and Information Science, , 1865-0937 ; ; 1663 |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Application software |
Software engineering |
Cryptography |
Data encryption (Computer science) |
Data protection |
Computer networks |
Mobile and Network Security |
Computer and Information Systems Applications |
Software Engineering |
Cryptology |
Data and Information Security |
Computer Communication Networks |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Cryptography and its applications -- Improved (t,n)-Threshold Proxy Signature Scheme -- Algorithm Substitution Attacks on Identity-Based Encryption -- Authenticated Continuous Top-k Spatial Keyword Search on Dynamic Objects -- Efficient Attribute-based Proxy Re-encryption for Secure Deduplication -- A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption -- D2D Authentication Scheme for IoT-enabled Smart Home -- Inner Product Encryption from Middle-Product Learning with Errors -- Network security and privacy protection -- Publicly Verifiable Private Set Intersection from Homomorphic Encryption -- Secure Asynchronous Federated Learning for Edge Computing Devices -- FedBC: An Efficient and Privacy-preserving Federated Consensus Scheme -- A Secure and Privacy-preserving Authentication Scheme in IoMT -- Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication -- A Network Security Situation Assessment Method Based on Multi-attention Mechanism and HHO-ResNeXt -- A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces -- Data detection -- Patch-based Backdoors Detection and Mitigation with Feature Masking -- Detection and Defense Against DDoS Attack on SDN Controller Based on Feature Selection -- Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS -- A Defect Heterogeneous Risk Assessment Method with Misclassification Cost -- Squeeze-Loss: A Utility-Free Defense Against Membership Inference Attacks -- Blockchain and its applications -- Improved WAVE Signature and Apply to Post-Quantum Blockchain -- Secure Government Data Sharing Based on Blockchain and Attribute-Based Encryption -- Secure Data Storage Scheme of Judicial System based on Blockchain -- Judicial Evidence Storage Scheme Based on Smart Contract. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the 8th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2022, which took place in Xi'an, China, in October 2022. The 23 papers presented in this volume were carefully reviewed and selected from 103 submissions. The papers were evaluated on the basis of their significance, novelty, technical quality, as well as on their practical impact or their level of advancement of the field’s foundations. They were organized in topical sections as follows: Cryptography and its applications; Network security and privacy protection; Data detection; Blockchain and its applications. |
|
|
|
|
|
|
|
| |