-
121
Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain
Published 2021-12-01Subjects: Get full text
Article -
122
Electronic medical records sharing solution based on Hyperledger Fabric
Published 2024-10-01Subjects: Get full text
Article -
123
Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks
Published 2017-10-01Subjects: Get full text
Article -
124
An Evolutionary Federated Learning Approach to Diagnose Alzheimer’s Disease Under Uncertainty
Published 2025-01-01Subjects: Get full text
Article -
125
Commissioning of ThomX Compton source subsystems and demonstration of 10^{10} x-rays/s
Published 2025-02-01Get full text
Article -
126
Client-Driven Joint Cache Management and Rate Adaptation for Dynamic Adaptive Streaming over HTTP
Published 2013-01-01“…Due to the fact that proxy-driven proxy cache management and the client-driven streaming solution of Dynamic Adaptive Streaming over HTTP (DASH) are two independent processes, some difficulties and challenges arise in media data management at the proxy cache and rate adaptation at the DASH client. …”
Get full text
Article -
127
Repurposing Drugs for Synergistic Combination Therapies to Counteract Monkeypox Virus Tecovirimat Resistance
Published 2025-01-01“…The FDA-approved small molecule antiviral tecovirimat (TPOXX) is recommended to treat mpox cases with severe symptoms, but the limited efficacy of TPOXX and the emergence of TPOXX resistant MPXV variants has challenged this medical practice of care and highlighted the urgent need for alternative therapeutic strategies. …”
Get full text
Article -
128
Research on data encryption system and technology for cloud storage
Published 2020-08-01“…To order to address the problem of cloud storage data security,the generic proxy-based data protection system was proposed,which could automatically and transparently secure sensitive data in browser-based cloud storage applications.A novel dynamic program analysis technique was adopted based on JavaScript API function hooking for automatically extending to various cloud applications.And a novel proxy executed searchable encryption solution was presented so that it could achieve data encryption while maintaining the original functions of cloud applications.Experimental results show that the system can support a variety of typical cloud services,effectively protect sensitive data,and bring a relatively low overhead.…”
Get full text
Article -
129
Identify the underlying true model from other models for clinical practice using model performance measures
Published 2025-01-01“…New statistical approaches or measures should be established to identify the casual true model from proxy models, especially for those in proxy models with extra noises and/or missing causal predictors.…”
Get full text
Article -
130
Nomination Violence in Uganda's National Resistance Movement
Published 2021“…We call for the proxy war thesis to be tested in case studies of other dominant parties’ nomination processes.…”
Get full text
Article -
131
El Niño-like tropical Pacific ocean cooling pattern during the Last Glacial Maximum
Published 2024-10-01“…Here, we examine past changes in the tropical Pacific upper ocean spatial pattern using paleoclimate reconstructions from proxies and simulations from a multi-model ensemble. …”
Get full text
Article -
132
New probabilistic methods for quantitative climate reconstructions applied to palynological data from Lake Kinneret
Published 2025-02-01“…The complex age–sediment–depth and proxy–climate relationships must be described in an appropriate way. …”
Get full text
Article -
133
Geomagnetic Pulsations Driving Geomagnetically Induced Currents
Published 2021-02-01“…A further consideration is that the often used dB/dt GIC proxy is biased to the sampling rate of the geomagnetic field measurements used. …”
Get full text
Article -
134
Simulation and Optimization of Acoustic Package of Dash Panel Based on SEA
Published 2020-01-01“…Based on the above problems, the statistical energy model of the dashboard model was established by combining the statistical energy flow method and the proxy model method, and the influences of different acoustic cladding layers, different thickness, leakage, and new material microfibers on the sound insulation parameters of the front coaming were simulated. …”
Get full text
Article -
135
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01“…Due to the existing cloud data deduplication schemes mainly focus on file-level deduplication.A scheme was proposed, based on attribute encryption, to support data block-level weight removal.Double granularity weight removal was performed for both file-level and data block-level, and data sharing was achieved through attribute encryption.The algorithm was designed on the hybrid cloud architecture Repeatability detection and consistency detection were conducted by the private cloud based on file labels and data block labels.A Merkle tree was established based on block-level labels to support user ownership proof.When a user uploaded the cipher text, the private cloud utilized linear secret sharing technology to add access structures and auxiliary information to the cipher text.It also updated the overall cipher text information for new users with permissions.The private cloud served as a proxy for re-encryption and proxy decryption, undertaking most of the calculation when the plaintext cannot be obtained, thereby reducing the computing overhead for users.The processed cipher text and labels were stored in the public cloud and accessed by the private cloud.Security analysis shows that the proposed scheme can achieve PRV-CDA (Privacy Choose-distribution attacks) security in the private cloud.In the simulation experiment, four types of elliptic curve encryption were used to test the calculation time for key generation, encryption, and decryption respectively, for different attribute numbers with a fixed block size, and different block sizes with a fixed attribute number.The results align with the characteristics of linear secret sharing.Simulation experiments and cost analysis demonstrate that the proposed scheme can enhance the efficiency of weight removal and save time costs.…”
Get full text
Article -
136
Paleohydrology based on sedimentology on Dasht e Arzhan basin SW Iran
Published 2018-03-01“…Paleo-climate reconstructions based on multi-proxy such as sedimentology is current in climatology investigation. …”
Get full text
Article -
137
Protective role of Pannexin1 in lymphatic endothelial cells in the progression of atherosclerosis in female mice.
Published 2024-01-01“…In addition, atherosclerotic lesions in female, but not in male, Prox1-CreERT2+Panx1fl/flApoe-/- mice showed T cell enrichment. …”
Get full text
Article -
138
Effects of Alzheimer’s disease plasma marker levels on multilayer centrality in healthy individuals
Published 2025-01-01“…We aimed to address the relationship between centrality network changes and two plasma pathology markers: phosphorylated tau at threonine 231 (p-tau231), a proxy for early Aβ change, and neurofilament light chain (Nfl), a marker of axonal degeneration. …”
Get full text
Article -
139
From Local Patriotism to a Planetary Perspective : impact crater research in Germany, 1930s - 1970s /
Published 2015Table of Contents: “…Introducing the smoking gun -- Early impactists and their sources -- Dismissing the impact I -- A letter from Berlin -- Kaalijärv crater and Köfels landslide -- Impact physics--beyond human imagination -- German geology -- Setting the stage -- The tide is turning -- Dismissing the impact II -- Testing an old theory -- Ries crater--a terrestrial proxy for the moon -- From local patriotism to a planetary perspective.…”
View in OPAC
Book -
140
Sex Differences in Parent and Child Pain Ratings during an Experimental Child Pain Task
Published 2008-01-01“…Children provided self-reports and parents provided proxy reports of child pain intensity using the seven-point Faces Pain Scale. …”
Get full text
Article