Showing 221 - 240 results of 14,174 for search 'CNOH~', query time: 2.33s Refine Results
  1. 221
  2. 222

    Bus cache-based location privacy protection scheme in the Internet of vehicles by Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG

    Published 2021-07-01
    “…To solve the problem of real location leakage when vehicles use location-based service (LBS) on the Internet of vehicles, a location privacy protection scheme based on bus cache was proposed.Firstly, a point of interest (POI) pool was obtained from the LBS provider based on its route information.Then the data in the POI pool was selected form a POI list while driving.Finally, the POI list was broadcast to surrounding private vehicles.After the private vehicle received the broadcast data, it verified the identity of the bus and then stored the POI list in the vehicle’s local cache.When a private vehicle needed to query POI information, it would first retrieve it in the local cache, and if the cache was missed, it would send a query request to the LBS provider using the k-anonymity method.The simulation experiment results show that the proposed scheme can reduce the possibility of leakage of the real location of the private vehicle by reducing the number of communications between the private vehicle and the LBSP, thereby effectively improving the privacy protection level of the private vehicle.…”
    Get full text
    Article
  3. 223

    Exploring post-rehabilitation plasticity with intra-cerebral recordings on anomic profiles by Agnès Trébuchon, Agnès Trébuchon, Alexia Fasola, Véronique Sabadell, Véronique Sabadell, Anne-Sophie Dubarry, Romain Carron, Romain Carron, Fabrice Bartolomei, Fabrice Bartolomei, F.-Xavier Alario

    Published 2025-01-01
    “…BackgroundPatients with drug-resistant epilepsy involving the language network often exhibit anomic profiles in daily life due to difficulties with lexical selection processes. …”
    Get full text
    Article
  4. 224
  5. 225
  6. 226
  7. 227

    There Is Another, So I am A Critique on the Book Deadly Identities by Shahab Dalili

    Published 2021-08-01
    “…A review of the book “Deadly Identities” shows that Ma’louf takes a critical approach to the situation of identity confrontations and traces the current situation in the Middle East to the historical period of the Crusades and the main reason for today's situation is introducing the identity “insiders”. Another elimination causes dissatisfaction on the part of individuals, peoples and tribes in different nations and creates violence, terror, war, and suicide attempts.…”
    Get full text
    Article
  8. 228

    THE LOWER PALEOLITHIC INDUSTRY OF ANKHE IN VIETNAM WITH THE SO-CALLED MOVIUS LINE by Nguyễn Khắc Sử

    Published 2019-09-01
    “…From 2014 to 2019, four of 23 Lower Paleolithic sites were excavated by a joint Vietnamese - Russian team of archaeologists in Ankhe town, Gialai province. The An Khe industry is characterized by a collection of stone tools made of local river and stream quartz, quartzite pebbles which are large, hard, and fine grained. …”
    Get full text
    Article
  9. 229

    Effect of cash flow and liquidity on financial stability of listed firms in Nigeria by Olusegun Agbesuyi, Abass Shiro

    Published 2025-01-01
    “…The aim of this paper is to examine the impact of cash flow and liquidity on firms’ financial status in Nigeria, especially the Depbt to Equity (DE or DER). …”
    Get full text
    Article
  10. 230
  11. 231

    Theoretical analysis for the data immigration between memory and processor percolation cache by Jiuchuan HU, Dongrui FAN, Jiancong CHENG, Long YAN, Xiaochun YE, Lingzhi LI, Liangyi WAN, Haibin ZHONG

    Published 2021-08-01
    “…To improve the computer processor’s memory access efficiency, increase hit rates, reduce data fetching latency, the data and instructors that had close relation with each other could build the just-in-time locality environment on processor’s cache.To build such an environment, the relations between the data and instructors should be studied while them being immigrated into on-chip cache.The research results show that these relations could be well kept when the data and instructors are moved.The simulation also shows that the percolation cache can help the processor core to increase its hit rates.These research results give a new way to build the just-in-time locality environment on the percolation cache.…”
    Get full text
    Article
  12. 232

    The Smoothing Artifact of Spatially Constrained Canonical Correlation Analysis in Functional MRI by Dietmar Cordes, Mingwu Jin, Tim Curran, Rajesh Nandy

    Published 2012-01-01
    “…An advanced method uses local canonical correlation analysis (CCA) to encompass a group of neighboring voxels instead of looking at the single voxel time course. …”
    Get full text
    Article
  13. 233
  14. 234
  15. 235
  16. 236
  17. 237

    Smart Caching Based on Mobile Agent of Power WebGIS Platform by Xiaohui Wang, Kehe Wu, Fei Chen

    Published 2013-01-01
    “…In this paper, we first discuss the architecture and functionality of power WebGIS, and then we study caching technology in detail, which contains dynamic display cache model, caching structure based on mobile agent, and cache data model. …”
    Get full text
    Article
  18. 238
  19. 239
  20. 240