Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
source » sources (Expand Search)
resourcesss » resourcessss (Expand Search), resources (Expand Search)
resourcess » resourcesss (Expand Search), resource (Expand Search)
source » sources (Expand Search)
resourcesss » resourcessss (Expand Search), resources (Expand Search)
resourcess » resourcesss (Expand Search), resource (Expand Search)
-
601
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
602
A directed greybox fuzzer for windows applications
Published 2025-07-01“…Abstract Directed greybox fuzzing (DGF) has proven effective in vulnerability discovery, but most efforts focus on the Linux platform, with substantially less attention devoted to Windows platform due to its closed-source and GUI software nature. This paper proposes WinDGF, a novel directed greybox fuzzer for Windows applications that addresses challenges including target function localization in persistent testing, GUI bypassing, and fitness metric calculation. …”
Get full text
Article -
603
CHARTER OF THE STAVROPOL KRAI: PROBLEM ISSUES AND SEARCH FOR SOLUTION
Published 2021-09-01“…The interpretation of the source of the government of the Stavropol Krai, which is the people of the Stavropol Kraias part of the multinational people of the Russian Federation, has been proposed. …”
Get full text
Article -
604
Prevalence and determinants of restrictive lung disorder among quarry workers at the Umuoghara quarry site, Ebonyi State, Nigeria: a cross-sectional study
Published 2025-01-01“…Data was collected using a pre-tested semi-structured questionnaire among 300 quarry workers selected by simple random sampling method. Lung function test was performed using a spirometer- spirovit SPI schiller and data was analyzed with the use of IBM SPSS version 23.0. …”
Get full text
Article -
605
The Techniques of Influencing the Addressee in the Business Letters of Khan Ayuka on “Todo Bichig” (“Clear Letter”) and their Reflection in the Synchronized Russian Translations of...
Published 2024-12-01“…For this work, only those letters from the specified period have been selected that have preserved a synchronized translation into Russian. …”
Get full text
Article -
606
Systemic model of segregation and transformation of urban solid waste
Published 2025-07-01“…These values were adjusted to a probability distribution function and expressed in state, flow and auxiliary equations, to explain and predict their behavior. …”
Get full text
Article -
607
COMPLEX FOR MONITORING OF SEWAGE OPTICAL DENSITY CHANGES
Published 2018-03-01“…For carrying out an experiment water pollution is selected by vegetable oil. The analysis of absorption spectra of water and vegetable oil showed that as a source of radiation it is expedient to use lasers with lengths of waves in the range of 0,4–0,5 μm which have the minimum absorption of radiation in the water environment and the considerable absorption in the environment of impurity, for example, the violet STLL-MM-405-200-52-A laser with wavelength of 0,405 μm and 200 mW. …”
Get full text
Article -
608
Exploratory Analysis of Unstable Surface Training: A Systematic Review and Meta-Analysis for Chronic Ankle Instability
Published 2024-12-01“…Objective: To conduct an exploratory systematic review and meta-analysis to evaluate the effect of unstable surface training on balance and hop function in individuals with chronic ankle instability (CAI). …”
Get full text
Article -
609
A framework for personal protective equipment use in laboratories: regulatory compliance and employee protection
Published 2025-07-01“…The Occupational Safety and Health Administration (OSHA) Personal Protective Equipment (PPE) Standard, outlined in 29 CFR 1910 Subpart I states that Protective gear - including personal protective clothing, respiratory equipment, and barriers or shields- must be supplied, properly used, and kept clean and functional whenever there are hazards present. These hazards may arise from processes, environmental conditions, chemicals, radiation, or mechanical sources that could potentially cause injury or harm bodily functions through skin contact, inhalation, or absorption. …”
Get full text
Article -
610
Regenerative Cartilage Treatment for Focal Chondral Defects in the Knee: Focus on Marrow-Stimulating and Cell-Based Scaffold Approaches
Published 2025-08-01“…Given the limited regenerative capacity of hyaline cartilage, biologically based surgical strategies have emerged to promote tissue repair and restore joint function. This narrative review critically examines current treatment approaches that rely on autologous cell sources and scaffold-supported regeneration. …”
Get full text
Article -
611
Thermal analysis and multi-objective optimization of equal-area microfluidic cooling systems
Published 2025-09-01“…Four distinct microchannel designs were selected to explore how variations in structure impact thermal management efficiency. …”
Get full text
Article -
612
Effect of Dry, Vacuum, and Modified Atmosphere Ageing on Physicochemical Properties of Roe Deer Meat
Published 2023-05-01“…Roe deer meat, due to the natural origin, is a source of organic and healthy meat. The selection of suitable storage conditions and times plays an important role in a deterioration of the meat's functional and nutritional values. …”
Get full text
Article -
613
The therapeutic validity and effectiveness of physiotherapeutic exercise following total hip arthroplasty for osteoarthritis: A systematic review.
Published 2018-01-01“…Characteristics of the physiotherapeutic exercise interventions and results about joint and muscle function, functional performance and self-reported outcomes were extracted.…”
Get full text
Article -
614
The impact of dyadic interventions on psycho-social outcomes for stroke patients and their caregivers: a systematic review and meta-analysis
Published 2025-05-01“…AimsTo describe the details of dyadic interventions and summarize the current evidence on supporting dyadic interventions for psycho-social outcomes of stroke patients and their caregivers.DesignA systematic review and meta-analysis based on PRISMA guidelines.Data sourcesFive English databases (PubMed, Web of Science, CINAHL, Embase and Cochrane Library) were searched to identify eligible studies published from the inception to October 15, 2024.MethodsTwo reviewers independently screened the literature in accordance with the selection criteria. …”
Get full text
Article -
615
3D-MRI brain glioma intelligent segmentation based on improved 3D U-net network.
Published 2025-01-01“…This method offers significant guidance for medical diagnosis, grading, and treatment strategy selection.<h4>Methods</h4>Glioma case data were sourced from the BraTS2023 public dataset. …”
Get full text
Article -
616
A novel efferocytosis-related gene signature for predicting prognosis and therapeutic response in bladder cancer
Published 2025-06-01“…Abstract Efferocytosis, the process by which phagocytes like macrophages and dendritic cells clear apoptotic cells, is crucial for maintaining tissue homeostasis. However, its function in bladder cancer (BLCA) remains unclear and warrants further exploration. …”
Get full text
Article -
617
Activity tracking devices in pregnancy: Understanding the participant experience in a longitudinal birth cohort
Published 2025-06-01“…REACH-Fitbit participants had to be <20 weeks gestation with access to a Bluetooth-enabled device. Recruitment (self-selection) for focus groups occurred from completed REACH-Fitbit participants (e.g., delivered their baby). …”
Get full text
Article -
618
When, where, and how prey pair antipredator behaviors to natural and anthropogenic mortality risks
Published 2025-07-01“…We used hidden Markov models to determine whether each covariate impacted the probability of transitioning between behavioral states and selection functions to determine whether deer spatially avoided each covariate. …”
Get full text
Article -
619
Quantifying degradation in animal acoustic signals with the R package baRulho
Published 2025-03-01“…Abstract Animal acoustic signals are shaped by selection to convey information based on their tempo, intensity, and frequency. …”
Get full text
Article -
620
Study on the mechanism of Buzhong Yiqi Decoction in the treatment of rectal prolapse: related analysis of single-cell transcriptome sequencing based on surgical excision specimens
Published 2023-02-01“…One patient in each group was selected as the sample source for analysis, and the related analysis of single-cell transcriptome sequencing was performed. …”
Get full text
Article