-
1621
Fog-aided identity privacy protection scheme for sensing users in mobile crowd sensing
Published 2019-12-01“…In mobile crowd sensing(MCS),attackers can reconstruct the social circle among sensing users,who use the social association information among sensing users and the correlation between the sensing user’s identity and sensing data to further attack a social alliance.In order to tackle this issue,a fog-aided identity privacy protection scheme is proposed.Firstly,two fog nodes are introduced which located at the edge of the sensing terminal.The one is task allocation center (TC) for handling the reasonable allocation of sensing tasks,and the other is data center (DC) for calculating sensing data.Furthermore,differential privacy is employed for preventing attackers from acquiring the specific social association weight of sensing users.Finally,in order to prevent attackers from obtaining the sensing users' identity information and sensing data at the same time,sensing users use different blind identities to communicate with TC and DC.Security analysis indicates that the proposed scheme can ensure the security of identity privacy information of sensing users in the process of completing sensing tasks.Experimental results show that the proposed scheme can protect the social association information between sensing users,and has a low delay.…”
Get full text
Article -
1622
42° Congresso Nazionale SIAN - 6,7,8 Maggio 2024, Riccione
Published 2025-01-01“…Nuovi strumenti per l’assistenza a lungo termine - Le aree di intervento e il percorso di acquisizione delle competenze dell’infermiere di nefrologia e dialisi in Italia - Revisioni della letteratura ed esercitazione pratica all’interno delle banche dati di letteratura primaria - L’ Infermiere di Famiglia in Dialisi Peritoneale: esperienza ASST NORD MILANO - Gestione territoriale della dialisi peritoneale: le possibili aree di intervento dell’Infermiere di Famiglia e Comunità - Digitalizzazione e Informatica. …”
Get full text
Article -
1623
Dynamic spectrum resource allocations in wireless senor networks for improving packet transmission
Published 2024-12-01“…The spectrum is allotted such that, in the event of phishing or malicious nodal assaults on the cluster groups of the wireless sensor nodal points in the WSN, efficient packet transmission will occur, beginning at the source and terminating at the sink. The simulation results demonstrate the efficacy of the approach described in the research paper and its application to data transmission.…”
Get full text
Article -
1624
Activation Mechanism of LRRK2 and Its Cellular Functions in Parkinson’s Disease
Published 2016-01-01“…LRRK2 belongs to the group of Roco proteins which are characterized by the presence of a Ras-like G-domain (Roc), a C-terminal of Roc domain (COR), a kinase, and several protein-protein interaction domains. …”
Get full text
Article -
1625
Genetic polymorphism of hepatitis C virus and risk of hepatocellular carcinoma
Published 2014-09-01“…Frequency of mutant forms of 1b genotype is related to discovery of previously unknown protein of HCV — minicor-protein with absence of N-terminal of classical Cor-protein p21.Conclusion. Early detection mutant Glu 70, Met 91 forms of HCV genotype 1b will provide prediction of HCC risk in CHC patients and to begin adequate etiological treatment for preventive maintenance of this dangerous complication intime.…”
Get full text
Article -
1626
Towards Quality Assessment for Arbitrary Translational 6DoF Video: Subjective Quality Database and Objective Assessment Metric
Published 2025-01-01“…Arbitrary translational Six Degrees of Freedom (6DoF) video represents a transitional stage towards immersive terminal videos, allowing users to freely switch viewpoints for a 3D scene experience. …”
Get full text
Article -
1627
A Mac Protocol Implementation for Wireless Sensor Network
Published 2015-01-01“…The analysis gives a full understanding of the behavior of the MAC protocol with regard to backoff delay, data loss probability, congestion probability, slot effectiveness, and traffic distribution for terminals. Two ideas are proposed and tested to improve efficiency of CSMA/CA mechanism for IEEE 802.15.4 MAC Layer. …”
Get full text
Article -
1628
Graph-to-sequence deep reinforcement learning based complex task deployment strategy in MEC
Published 2024-03-01“…With the help of mobile edge computing (MEC) and network virtualization technology, the mobile terminals can offload the computing, storage, transmission and other resource required for executing various complex applications to the edge service nodes nearby, so as to obtain more efficient service experience.For edge service providers, the optimal energy consumption decision-making problem when deploying complex tasks was comprehensively investigated.Firstly, the problem of deploying complex tasks to multiple edge service nodes was modeled as a mixed integer programming (MIP) model, and then a deep reinforcement learning (DRL) solution strategy that integrated graph to sequence was proposed.Potential dependencies between multiple subtasks through a graph-based encoder design were extracted and learned, thereby automatically discovering common patterns of task deployment based on the available resource status and utilization rate of edge service nodes, and ultimately quickly obtaining the deployment strategy with the optimal energy consumption.Compared with representative benchmark strategies in different network scales, the experimental results show that the proposed strategy is significantly superior to the benchmark strategies in terms of task deployment error ratio, total power consumption of MEC system, and algorithm solving efficiency.…”
Get full text
Article -
1629
Therapy of Inflammatory Bowel Disease using New 5-ASA Compounds: An Introduction
Published 1989-01-01“…Since the active metabolite avoids the toxic potential of sulphapyridine, this perception has initiated new therapeutic approaches, for example, two 5-ASA molecules have been coupled to form another prodrug (olsalazine) which again depends on a proper cleavage of the azobond by bacteria in the colon A more direct way has been applied successfully by administering 5-ASA itself in special galenic formulation (suppositories, enemas, controlled release preparations) to provide enough active material at the proposed sites of action in the terminal ileum and/or colon. One major advantage of all 5-ASA compounds, compared to sulphasalazine, is their 10-fold lower potential (incidence) for inducing allergic reactions or causing intolerance. …”
Get full text
Article -
1630
Anatomical, Physiological, and Technical Considerations of the Trapezius–rhomboid Plane Block
Published 2024-12-01“…No complications occurred, and we were able to illustrate the interfacial distribution in this plane, in addition to being able to theorize its mechanism of action in the blockade of the ventral cutaneous sensory branches, the terminal branches of the accessory nerve, and the dorsal nerve of the scapula. …”
Get full text
Article -
1631
Responsibility features at different job satisfaction level of multiprofile assistance organization specialists
Published 2025-01-01“…Senin’s questionnaire of terminal values, and E.V. Kharitonova’s questionnaire of socio-professional demand for personality, as well as S.R. …”
Get full text
Article -
1632
INVESTIGATING THE COST EFFECTIVENESS OF BIODIESEL DISTRIBUTION IN INDONESIA
Published 2023-05-01“…The complexity of delivering biodiesel from the supply point to the blending terminal of gasoil might result in cost inefficiency, which in turn will escalate the government funding of biodiesel incentives. …”
Get full text
Article -
1633
Joint Resource Allocation Optimization of Wireless Sensor Network Based on Edge Computing
Published 2021-01-01“…Edge computing changes the traditional centralized cloud computing processing method into a method that reduces computing storage capacity to the edge of the network and faces users and terminals. Realize the advantages of lower latency, higher bandwidth, and fast response. …”
Get full text
Article -
1634
Evolution of sequence, structural and functional diversity of the ubiquitous DNA/RNA-binding Alba domain
Published 2024-12-01“…Sequence and structural conservation analysis of the subgroups indicated high preservation of the dimer interface, with Alba domains from unicellular eukaryotes notably exhibiting structural deviations towards their C-terminal end. Finally, phylogenetic analysis, while supporting SSN clustering, revealed the evolutionary branchpoint at which the eukaryotic Rpp20- and Rpp25-like clades emerged from archaeal Albas, and the subsequent taxonomic lineage-based divergence within each clade. …”
Get full text
Article -
1635
Optimized Wideband Impedance Matching Balun for Conducting Two-Arm Antennas
Published 2014-01-01“…The effects of the three dimensional parameters on the input impedance seen at the (unbalanced) coaxial line side of the balun are investigated when it is terminated with specific lumped impedance at its (balanced) split side. …”
Get full text
Article -
1636
Security communication and energy efficiency optimization strategy in UAV-aided edge computing
Published 2023-03-01“…The flexible mobility of the unmanned aerial vehicle (UAV) has attracted widespread attention in the mobile edge computing (MEC) system.However, the existence of eavesdroppers in the air makes it a huge challenge for its secure transmission.In order to solve the contradiction between high safe communication rate and low energy consumption, the concept of security communication energy efficiency was introduced, that was, the ratio between UAV safe communication transmission rate and UAV energy consumption.Firstly, to subject the task delay constraint, limited UAV CPU frequency and task offloading rate constraint, an offloading strategy was proposed to maximize the energy efficiency of secure communication by jointly optimizing the legal UAV hover location, CPU frequency allocation and distinguishing the complexity of computing tasks, while improving the security communication in the UAV-MEC scenario from the perspective of physical layer security.Secondly, to address the non-convex optimization problem, it was decomposed into three sub-problems that were solved with block coordinate descent and the successive convex approximation (SCA) methods respectively.The simulation results show that, with different task complexity, the proposed strategy can balance the relationship between the overall secure communication performance and energy consumption, while meeting the offloading requirements of ground terminals.And then it improves secrecy energy efficiency.…”
Get full text
Article -
1637
Matrix Gla Protein Binds to Fibronectin and Enhances Cell Attachment and Spreading on Fibronectin
Published 2014-01-01“…The binding site for fibronectin is in a MGP C-terminal peptide comprising amino acids 61–77. Second, MGP enhances cell attachment and cell spreading on fibronectin. …”
Get full text
Article -
1638
Sociology of Students: A Theoretical Perspective and Research Practice
Published 2019-07-01“…Students are now an influential group of young people, and taking into consideration students’ “advanced” status, its social activity (including network) and socio-political and socio-economic potential, we can assume that it is the student youth, which de- termines the youth “agenda”. This makes constant research of students relevant and important, both at the theoretical and academic level of sociological science and at the level of applied knowledge focused on the constant monitoring of social well-being, lifestyle, values, opinions and activity of students in specific universities and in a whole country. …”
Get full text
Article -
1639
The behavioural trend of ghosting in the professional context – a scoping review on the empirical mapping of ghosting in vocational surroundings
Published 2025-12-01“…Ghosting describes the behaviour of one party abruptly terminating contact with another party, without providing explanatory information or indications. …”
Get full text
Article -
1640
Cyber–Physical–Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges
Published 2025-01-01“…On this basis, the threats faced by the SGs due to the widespread deployment of terminal devices, open network environments, and the increasing importance of social behaviors are analyzed. …”
Get full text
Article