4,876 research outputs found
Recital: Korea\u27s Kim Trio: Won-Mi Kim, Piano; Won-Joo Kim, Violin; Won-Hee Kim, Cello; September 3, 1974
Centennial East Recital HallTuesday EveningSeptember 3, 19748:15 p.m
A study on mechanical properties of natural gas pipe material in high pressure hydrogen gas environment
Please click Additional Files below to see the full abstrac
Combined Striatum, Brain Stem, and Optic Nerve Involvement due to Mycoplasma pneumoniae in an Ambulatory Child
In children, Mycoplasma pneumoniae encephalitis has been characterized by acute onset of an encephalopathy associated with extrapyramidal symptoms and symmetric basal ganglia with or without brain stem involvement on magnetic resonance imaging. Our case, showing unilateral optic neuritis, ophthalmoplegia, no extrapyramidal symptoms, and typical striatal involvement on magnetic resonance imaging, broadens the spectrum of varying clinical manifestations of childhood M. pneumoniae-associated encephalopathy
Tetra-μ-benzoato-bisÂ{[trans-1-(2-pyridÂyl)-2-(4-pyridÂyl)ethylÂene]zinc(II)}
The paddle-wheel-type centrosymmetric dinuclear title complex, [Zn2(C7H5O2)4(C12H10N2)2], contains four bridging benzoate groups and two terminal trans-1-(2-pyridÂyl)-2-(4-pyridÂyl)ethylÂene (L) ligands. The inversion center is located between the two ZnII atoms. The octaÂhedral coordination around the ZnII atom, with four O atoms in the equatorial plane, is completed by an N atom of the L molÂecule [Zn—N = 2.0198 (15) Å] and by the second ZnII atom [Zn⋯Zn = 2.971 (8) Å]. The ZnII atom is 0.372 Å out of the plane of the four coordinating O atoms
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication
There have been many efforts to strengthen security of Instant
Messaging (IM) system. One of the typical technologies is
the conventional message encryption using a secret or private
key. However, the key is fundamentally vulnerable to a bruteforce
attack, causing to acquire the original message. In this
respect, a countermeasure was suggested as the way to generating
plausible-looking but fake plaintexts, which is called
Honey Encryption (HE). In this paper, we present a HE-based
statistical scheme and design a Honey Chatting application,
which is robust to eavesdropping. Besides, we verify the effectiveness
of the Honey Chatting by comparing the entropy
of decrypted messages through experiments
- …