Learn More
We study the problem of tracking moving objects using distributed Wireless Sensor Networks (WSNs) in which sensors are deployed randomly. Due to the uncertainty and unpredictability of real-world objects' motion, the tracking algorithm is needed to adapt to real-time changes of velocities and directions of a moving target. Moreover, the energy consumption(More)
Decision problems with the features of prisoner's dilemma are quite common. A general solution to this kind of social dilemma is that the agents cooperate to play a joint action. The Nash bargaining solution is an attractive approach to such cooperative games. In this paper, a multi-agent learning algorithm based on the Nash bargaining solution is(More)
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network intrusion detection is proposed, consisting of two parts, anomaly detection and alert verification. The anomaly detection module processes unlabeled data using a clustering algorithm(More)
Intrusions impose tremendous threats to today's computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have catastrophic consequences. To protect computer hosts from the increasing threat of intrusion, various kinds of Intrusion Detection Systems (IDSs) have been developed. The main(More)
Molecular recognition force spectroscopy (MR-FS) was applied to investigate the dynamic interaction between aptamer GBI-10 and tenascin-C (TN-C) on human glioblastoma cell surface at single-molecule level. The unbinding force between aptamer GBI-10 and TN-C was 39 pN at the loading rate of 0.3 nN sec⁻¹. A series of kinetic parameters concerning interaction(More)
Data clustering is an important procedure to detect hidden patterns of a data set in a variety of fields, yet clustering analysis is a challenging problem, because many factors play together in devising and selecting a well tuned clustering technique and there are no predefined classes or examples to show whether the clusters are valid or not. In this(More)
The luteinizing hormone-releasing hormone- Pseudomonas aeruginosa exotoxin 40 (LHRH-PE40), is a candidate target drug associated with elevated LHRH receptor (LHRH-R) expression in malignant tumor tissue. The capability of LHRH-PE40 to recognize LHRH-Rs on a living cell membrane was studied with single molecular recognition force spectroscopy (SMFS) based on(More)
The capability of Bacillus subtilis spores to withstand extreme environmental conditions is thought to be conferred especially by their outermost proteinaceous protective layer, called the spore coat. Of the over 70 proteins that form the spore coat, only a small subset of them affect its morphogenesis, they are referred to as morphogenetic proteins. In(More)
In today's computing environment, unauthorized accesses and misuse of critical data can be catastrophic to personal users, businesses, emergency services, and even national defense and security. To protect computers from the ever-increasing threat of intrusion, we propose an event-driven architecture that provides fine grained intrusion detection and(More)