Learn More
Male germ cells require multiple epigenetic reprogramming events during their lifespan to achieve reproductive capacity. An emerging body of compelling data demonstrates that environmental exposures can be embodied within the developing male germ cell as epigenetic marks. In turn, these epigenetic marks can impart information at fertilization to affect the(More)
Biometric security has been largely regarded and researched within the latest 20 years. However, researchers focus in face recognition have not paid enough attention to the security of face biometric data. We propose a cryptographic algorithm to protect face recognition process against attack, which applies the error-correcting codes. The original face(More)
Akt2 overexpression correlates with chemoresistance of colorectal cancer (CRC). However, the cellular functions and precise signals elicited by Akt2 in LSCC have not been elucidated. Here, we transfected a CRC cell line HCT116 with Akt-2 targeted shRNA in order to establish a cell line with Akt2 knockdown. In vitro experiments showed that knockdown Akt2 in(More)
During the last decade, the concept of cluster, has become a popular practice in the field of road safety, mainly for the identification of worst performing areas or time slots also known as hotspots. However, current clustering methods used to identify road accident hotspots suffer from various deficiencies at both theoretical and operational level, these(More)
The dynamic demilitarized zone (DMZ) model considers both network performance and security, and dynamically responds to traffic demands in real-time. We realize this dynamic DMZ model based on an OpenFlow-enabled switch and controller. In our approach, the controller detects flows with bit rate greater than a given threshold (elephant flows) and controls(More)
In recent years, there are many studies on controller of electronic parking brake (EPB). These studies develop EPB controller based on vehicle dynamic equation. However, few studies focus on the identification of driving intention and running condition. This paper extends the method to identify target value of parking brake during hill-start and designs a(More)
Identifying objects of interest from a video sequence is a fundamental and essential part in many vision systems. A common method is to perform background subtraction. For automated surveillance systems, real-time background subtraction is especially important to ensure the performance of the systems. In this paper, we review various background subtraction(More)
Reversible data hiding is a kind of information hiding technique that can exactly recover the original image through data hiding and extraction. It can be potentially used in the medical and military applications. In the literature, by using the maximum inter-class square error to separate the background and foreground, the principal gray-scale values in(More)
Middleboxes are adopted to enhance network functions, e.g., providing security and guaranteeing performance. Some applications require flows to sequence through several middleboxes, and such stateful policy routing is challenging for network administrators. The goal of the management is to distribute well middlebox resources and avoid overloads, thus(More)