-
10301
Acute exacerbations in patients with progressive pulmonary fibrosis
Published 2024-12-01Get full text
Article -
10302
The DarkSide Multiton Detector for the Direct Dark Matter Search
Published 2015-01-01Get full text
Article -
10303
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01“…Many individuals or businesses outsource their data to remote cloud.Cloud storage provides users the advantages of economic convenience,but data owners no longer physically control over the stored data,which introduces new security challenges,such as no security guarantees of integrity and privacy.The security of two identity-based cloud data integrity verification schemes by Zhang et al and Xu et al respectively are analysed.It shows that Zhang et al.’s scheme is subjected to secret key recovery attack for the cloud servers can recover user’s private key only utilizing stored data.And Xu et al.’s scheme cannot satisfy security requirements of soundness.Based on Xu et al.'…”
Get full text
Article -
10304
Visual insights into personalizing women's running shoes: A consumer psychology perspective
Published 2025-03-01Get full text
Article -
10305
-
10306
Effect of Xiaoxuming Decoction on Aβ and GFAP Protein Expressions in Hippocampus of APP/PS1 Mouse Model of Alzheimer's Disease and Its Behavior Analysis
Published 2016-08-01“…Xiao Xu Ming group received XXMD at a dose of 13 g/kg for 90 days. …”
Get full text
Article -
10307
New method for file deduplication in cloud storage
Published 2017-03-01“…Deduplication is widely used in cloud storage service to save bandwidth and storage resources,however,the security of client deduplication still flaws in an external attack to access a user’s private data.Xu-CDE,a deduplication solution of encrypting data for multi-client was first proposed,which could protect the privacy of data from the external attackers and honest but curious server,with favorable theoretical meaning and representativeness.However,in Xu-CDE,the user ownership authentication credentials were lack of instantaneity protection,which could not resist replay attack.As an improvement to the flaw,the protocol MRN-CDE (MLE based and random number modified client-side deduplication of encrypted data in cloud storage) was proposed,adding random number in order to ensure the instantaneity of the authentication credentials,and using the algorithm of MLE-K<sub>P</sub>to extract key from original file to replace the file itself as an encryption key.As a consequence,the new protocol improved security while significantly reduced the amount of computation.After the safety analysis and the actual tests,results show that based on Xu-CDE,the proposed protocol MRN-CDE has stronger security of ownership,and improves time efficiency.Specially,the new protocol works better on large files in cloud with a certain value.…”
Get full text
Article -
10308
Iterative Algorithms for Variational Inequalities Governed by Boundedly Lipschitzian and Strongly Monotone Operators
Published 2015-01-01“…., Lipschitzian on bounded subsets of H) and strongly monotone operator. He and Xu proved that this variational inequality has a unique solution and devised iterative algorithms to approximate this solution (see He and Xu, 2009). …”
Get full text
Article -
10309
Laminar Wall Jet Flow and Heat Transfer over a Shallow Cavity
Published 2015-01-01“…The flow characteristics of wall jet with respect to aspect ratio (AR), step length (Xu), and Reynolds number (Re) of the shallow cavity are expressed. …”
Get full text
Article -
10310
Fixed Points of Asymptotic Pointwise Nonexpansive Mappings in Modular Spaces
Published 2012-01-01“…Kirk and Xu studied the existence of fixed points of asymptotic pointwise nonexpansive mappings in the Banach space. …”
Get full text
Article -
10311
Existence Theory for Pseudo-Symmetric Solution to 𝑝-Laplacian Differential Equations Involving Derivative
Published 2011-01-01Get full text
Article -
10312
The Second and Fourth Moments of Discrete Gaussian Distributions over Lattices
Published 2024-01-01“…Using the relationship, we also derive an uncertainty principle for Gaussian functions, which extend the result of Zheng, Zhao, and Xu. Our proof is based on combination of the idea of Micciancio and Regev and the idea of Zheng, Zhao, and Xu, where the main tool is high-dimensional Fourier transform.…”
Get full text
Article -
10313
-
10314
Approximate Iteration Algorithm with Error Estimate for Fixed Point of Nonexpansive Mappings
Published 2012-01-01“…The results presented in this paper extend, generalize, and improve the results of Xu, G. Marino and Xu and some others.…”
Get full text
Article -
10315
Characterization of Polylysine Enriched Self-Adhesive Resin Cements
Published 2023-01-01“…The aim of this study is to add polylysine (PLS) particles to two different types of self-adhesive resin cement (RelyXU200 and Breeze) and to characterize them before and after PLS incorporation. …”
Get full text
Article -
10316
-
10317
TOÀN CẦU HÓA TÔN GIÁO VÀ SỰ PHÁT TRIỂN CỦA ĐẠO TIN LÀNH Ở TÂY NGUYÊN
Published 2015-03-01“…Bài viết này trình bày khái quát về khái niệm, biểu thiện và xu thế vận động của toàn cầu hóa tôn giáo. Trên cơ sở đó, chúng tôi tập trung lý giải hiện tượng búng phát đọa Tin Lành ở Tây Nguyên trong những thập niên cuối thế kỷ XX, đầu thế kỷ XXI dưới tác động của xu thế toàn cầu hóa nói chung, toàn cầu hóa tôn giáo nói chung.…”
Get full text
Article -
10318
Local Analyticity in the Time and Space Variables and the Smoothing Effect for the Fifth-Order KdV-Type Equation
Published 2011-01-01“…We consider the initial value problem for the reduced fifth-order KdV-type equation: 𝜕𝑡𝑢−𝜕5𝑥𝑢−10𝜕𝑥(𝑢3)+10𝜕𝑥(𝜕𝑥𝑢)2=0, 𝑡,𝑥∈ℝ, 𝑢(0,𝑥)=𝜙(𝑥), 𝑥∈ℝ. This equation is obtained by removing the nonlinear term 10𝑢𝜕3𝑥𝑢 from the fifth-order KdV equation. …”
Get full text
Article -
10319
Ketamine Infusion Associated with Improved Neurology in a Patient with NMDA Receptor Encephalitis
Published 2013-01-01Get full text
Article -
10320
GIẢI QUYẾT TRANH CHẤP HỢP ĐỒNG TÍN DỤNG NGÂN HÀNG TẠI TÒA ÁN TRÊN ĐỊA BÀN TỈNH LÂM ĐỒNG
Published 2013-12-01“…Chúng tôi đề xuất các giải pháp hoàn thiện pháp luật cũng như công tác xét xử tại tòa án.…”
Get full text
Article