1,850 research outputs found

    Achievements in medicine 1985-1995

    Get PDF
    Staff list with Chinese names.published_or_final_versionForeword Wang Gungwu Wang, Gungwu vRheumatology C.S. Lau and Raymond W.S. Wong Lau, C. S. Wong, Raymond, W. S. 162Respiratory Medicine W.K. Lam, Mary S.M. Ip and Jane C.K. Chan Lam, W. K. Ip, Mary, S. M. Chan, Jane, C. K. 153Neurology Y.L. Yu, Jason K.Y. Fong and S.L. Ho Yu, Y. L. Fong, Jason, K. Y. Ho, S. L. 143Nephrology Ignatius K.P. Cheng and Daniel T.M. Chan Cheng, Ignatius, K. P. Chan, Daniel, T. M. 132Molecular Medicine Vivian N.Y. Chan Chan, Vivian, N. Y. 125Haematology and Oncology Raymond H.S. Liang Liang, Raymond, H. S. 103Geriatric Medicine L.W. Chu Chu, L. W. 101General Practice Unit Anthony S. Dixon and Cindy L.K. Lam Dixon, Anthony S. Lam, Cindy, L. K. 91Gastroenterology and Hepatology S.K. Lam, C.L. Lai, C.K. Ching and Benjamin C.Y. Wong Lam, S. K. Lai, C. L. Ching, C. K. Wong, Benjamin, C. Y. 74Endocrinology Karen S.L. Lam and Annie W.C. Kung Lam, Karen, S. L. Kung, Annie, W. C. 62Clinical Pharmacology Cyrus R. Kumana and Bernard M.Y. Cheung Kumana, Cyrus R. Cheung, Bernard, M. Y. 55Cardiology C.P. Lau, K.L. Cheung, W.H. Chow and David S.W. Ho Lau, C. P. Cheung, K. L. Chow, W. H. Ho, David, S. W. 37Curriculum Vitae of Professor Chan Tai-kwong 25Professor Chan Tai-kwong - a Personal Tribute David Todd Todd, David 21The Department of Medicine: Today and Tomorrow S.K. Lam Lam, S. K. 14Vision and Mission - a History of the Department of Medicine Rosie T.T. Young Young, Rosie, T. T. 1Appendix Staff List 171Subspecialty Divisions and the General Practice UnitPreface Y.L. Yu Yu, Y. L. xiMission and Objectives of the Department of Medicine ixUniversity's Mission Statement vii

    Pacific Rim Magazine 2011

    Get PDF
    The 2011 issue of Pacific Rim Magazine includes the cover stories "Dayton Boots' Canadian Sale," "Angus An Gets Grilled," "Mars to Venus: Thailand's Third Gender," and "David Y. H. Lui.

    College Street Journal (May 2022)

    Get PDF
    College Street Journal serves as a student platform for business-related news, opportunities and resources at Holy Cross. Readers will discover a broad range of important topics from relevant news and economic issues, career development opportunities and advice, as well as Ciocca center and campus-wide opportunities to grow outside of the classroom. Highlights of this edition include an interview with Prof. David Chu, Dining Dollars, academic inflation,an alumni interview with Matt Blake, and a faculty editorial.https://crossworks.holycross.edu/csj/1004/thumbnail.jp

    The Ability of Specific-wavelength LED Lights to Attract Night-flying Insects

    Get PDF
    This paper describes a portable collecting light, designed by the authors, that weighs 0.3 kg, is powered by 8 AA batteries, and uses 9 light-emitting diodes (LEDs) to attract night-flying insects. Five different wavelengths of these LED lights, all within the long-wave ultraviolet spectrum, were compared to each other and to a commercially-available 15w fluorescent ultraviolet tube light for their abilities to collect insects over a series of 5 nights in July 2016. There was no difference in order richness, total specimen abundance, or the specimen abundance of most common orders between any of the wavelengths tested. Most LED wavelengths, however, caught fewer Diptera specimens than the fluorescent tube light, largely due to a lower abundance of chironomid midges. Differences in specimen abundance were greater based on sampling date or specific sampling location than based on type of collecting light. Due to their greater portability and possibly lower bycatch of Diptera, these new LED lights are presented as a potential alternative to ultraviolet tube lights

    Is God Homophobic ?

    Get PDF

    From: David Malone (enclosure)

    Get PDF

    McNair News, Volume 5, Number 1, Fall 2010

    Get PDF
    Meet the 2010 McNair CohortScholars Present at National McNair ConferenceMaking the Transition from Student to ScholarMentor Spotlight - Dr. Carl NelsonKhoa Chu Earns NASA Research InternshipBrittany Sznajder-Murray Completes Summer Research at Ohio StateAlumni News: Advanced DegreesScholars Receive 2010-11 UCARE fundingKudos to Scholars and Alumni: Masoud Mahjouri-Samani & Tyler ScherrGetting the Most Out of a Research Conferenc

    Imperial Contagions: Medicine, Hygiene, and Cultures of Planning in Asia ed. by Robert Peckham and David M. Pomfret (Book review)

    Get PDF
    Book review on Robert Peckham and David M. Pomfret (Eds.) Imperial Contagions: Medicine, Hygiene, and Cultures of Planning in Asia. Hong Kong: Hong Kong University Press, 2013published_or_final_versio

    ZigBee/ZigBee PRO security assessment based on compromised cryptographic keys

    Get PDF
    Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limited resources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.Les xarxes de sensors tenen moltes aplicacions en el control i la monitorització de les propietats del medi ambient, com ara el so, l¿acceleració, la vibració i la temperatura. A causa dels limitats recursos en la capacitat de càlcul, la memòria i l'energia són vulnerables a molts tipus d'atacs. L'especificació ZigBee basada en l'estàndard 802.15.4, defineix un conjunt de capes, adaptada específicament per a xarxes de sensors. Aquestes capes suporten missatgeria segura mitjançant criptografia simètrica. Aquest article presenta dues formes diferents per agafar la clau de xifrat en ZigBee: atac a distància i atacs físics. També les enquesta i classifica alguns atacs addicionals que es poden realitzar en les xarxes ZigBee: espionatge, falsificació, reproducció i atacs DoS en les diferents capes. A partir d'aquesta anàlisi, es demostren algunes vulnerabilitats existents en l'esquema de seguretat en tecnologia ZigBee.Las redes de sensores tienen muchas aplicaciones en el control y la monitorización de las propiedades del medio ambiente, como el sonido, la aceleración, la vibración y la temperatura. Debido a los limitados recursos en la capacidad de cálculo, la memoria y la energía son vulnerables a muchos tipos de ataques. La especificación ZigBee basada en el estándar 802.15.4, define un conjunto de capas, adaptada específicamente para redes de sensores. Estas capas soportan mensajería segura mediante criptografía simétrica. Este artículo presenta dos formas diferentes para coger la clave de cifrado en ZigBee: ataque a distancia y ataques físicos. También las encuesta y clasifica algunos ataques adicionales que se pueden realizar en las redes ZigBee: espionaje, falsificación, reproducción y ataques DoS en las diferentes capas. A partir de este análisis, se demuestran algunas vulnerabilidades existentes en el esquema de seguridad en tecnología ZigBee
    corecore