4,876 research outputs found

    Recital: Korea\u27s Kim Trio: Won-Mi Kim, Piano; Won-Joo Kim, Violin; Won-Hee Kim, Cello; September 3, 1974

    Get PDF
    Centennial East Recital HallTuesday EveningSeptember 3, 19748:15 p.m

    A study on mechanical properties of natural gas pipe material in high pressure hydrogen gas environment

    Get PDF
    Please click Additional Files below to see the full abstrac

    Combined Striatum, Brain Stem, and Optic Nerve Involvement due to Mycoplasma pneumoniae in an Ambulatory Child

    Get PDF
    In children, Mycoplasma pneumoniae encephalitis has been characterized by acute onset of an encephalopathy associated with extrapyramidal symptoms and symmetric basal ganglia with or without brain stem involvement on magnetic resonance imaging. Our case, showing unilateral optic neuritis, ophthalmoplegia, no extrapyramidal symptoms, and typical striatal involvement on magnetic resonance imaging, broadens the spectrum of varying clinical manifestations of childhood M. pneumoniae-associated encephalopathy

    Tetra-μ-benzoato-bis­{[trans-1-(2-pyrid­yl)-2-(4-pyrid­yl)ethyl­ene]zinc(II)}

    Get PDF
    The paddle-wheel-type centrosymmetric dinuclear title complex, [Zn2(C7H5O2)4(C12H10N2)2], contains four bridging benzoate groups and two terminal trans-1-(2-pyrid­yl)-2-(4-pyrid­yl)ethyl­ene (L) ligands. The inversion center is located between the two ZnII atoms. The octa­hedral coordination around the ZnII atom, with four O atoms in the equatorial plane, is completed by an N atom of the L mol­ecule [Zn—N = 2.0198 (15) Å] and by the second ZnII atom [Zn⋯Zn = 2.971 (8) Å]. The ZnII atom is 0.372 Å out of the plane of the four coordinating O atoms

    Honey Chatting: A novel instant messaging system robust to eavesdropping over communication

    Get PDF
    There have been many efforts to strengthen security of Instant Messaging (IM) system. One of the typical technologies is the conventional message encryption using a secret or private key. However, the key is fundamentally vulnerable to a bruteforce attack, causing to acquire the original message. In this respect, a countermeasure was suggested as the way to generating plausible-looking but fake plaintexts, which is called Honey Encryption (HE). In this paper, we present a HE-based statistical scheme and design a Honey Chatting application, which is robust to eavesdropping. Besides, we verify the effectiveness of the Honey Chatting by comparing the entropy of decrypted messages through experiments
    • …
    corecore