Learn More
Previously, we demonstrated that ethanol potentiates glycine current (I(Gly)) in 35% of neurons freshly isolated from the ventral tegmental area (VTA) of rats (J. Pharmacol. Exp. Ther. 296 (2001) 77). In the present study, we examined the role of protein kinase C (PKC) in this action of ethanol on VTA neurons from young rats. Extracellular ethanol and(More)
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before(More)
(2014). A new payment system for enhancing location privacy of electric vehicles. Abstract An electric vehicle (EV) is a promising and futuristic automobile propelled by electric motors, using electrical energy stored in batteries or another energy storage device. Due to the need for the battery to be recharged, the cars will be required to visit a(More)
A large cohort of 74,828 benzene-exposed and 35,805 nonexposed workers employed between 1972 and 1987 in 12 cities in China was followed to determine mortality from all causes. Benzene-exposed study subjects were employed in a variety of occupations including coating applications, and rubber, chemical, and shoe production. Mortality was slightly increased(More)
We present a validation study of a quantitative retrospective exposure assessment method used in a follow-up study of workers exposed to benzene. Assessment of exposure to benzene was carried out in 672 factories in 12 cities in China. Historical exposure data were collected for 3179 unique job titles. The basic unit for exposure assessment was a(More)
The integrity of data stored on a hard disk is typically verified by computing the chained hash value of disk sector data in a specific order. However, this technique fails when one or more sectors turn bad during storage, making it impossible to compute their hash values. This paper presents a k-dimension hashing scheme, which computes and stores multiple(More)
Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in China. These pirated phones, referred to as " Shanzhai phones, " are often used by criminals because they are inexpensive and easy to obtain.(More)
To enable free communication between legal advisor and his client for proper functioning of the legal system, certain documents, known as Legal professional privilege (LPP) documents, can be excluded as evidence for prosecution. In physical world, protection of LPP information is well addressed and proper procedure for handling LPP articles has been(More)