Learn More
In this paper, we propose a transport control performance improvement algorithm in heterogeneous networks. This paper discusses some novel algorithms to estimate the available bandwidth and to distinguish congestion error losses from wireless transmission error losses. The main characteristics of the algorithms is that it is nonintrusive, i.e., it does not(More)
Methane-rich water triggered adventitious rooting by regulating heme oxygenase1/carbon monoxide and calcium pathways in cucumber explants. Heme oxygenase1/carbon monoxide (HO1/CO) and calcium (Ca2+) were reported as the downstream signals in auxin-induced cucumber adventitious root (AR) formation. Here, we observed that application of methane-rich water(More)
The primary goal of the secure socket layer protocol (SSL) is to provide confidentiality and data integrity between two communicating entities. Since the most computationally expensive step in the SSL handshake protocol is the server’s RSA decryption, it is introduced that the proposed secret exchange algorithm can be used to speed up the SSL session(More)
The anti-spoofing community has been intensively proposing new methods for defending against new spoofing techniques. It is still challenging for protecting na¨ıve users from advanced spoofing attacks. In this paper, we analyze the problems within those anti-spoofing mechanisms and propose a new Automatic Detecting Security Indicator (ADSI) scheme. This(More)
It is difficult to control the degree of ischemic postconditioning in the brain and other ischemia-sensitive organs. Remote ischemic postconditioning could protect some ischemia-sensitive organs through measures on terminal organs. In this study, a focal cerebral ischemia-reperfusion injury model was established using three cycles of remote ischemic(More)
In next generation network (NGN), end-to-end QoS is one of the critical issues for real-time multimedia communications and applications. Such applications are sensitive to the availability of bandwidth for a given path. Measuring bandwidth has attracted considerable research efforts in the networking community. This paper intends to the contribution to the(More)
Current reputation systems for peer-to-peer (P2P) file sharing systems either fail to utilize existing trust within social networks or suffer from certain attacks (e.g., free-riding and collusion). To handle these problems, we introduce a trust management system, called SocialLink, that utilizes social network and historical transaction links. SocialLink(More)