Jain-Shing Wu

Learn More
MOTIVATION Before performing a polymerase chain reaction experiment, a pair of primers to clip the target DNA subsequence is required. However, this is a tedious task as too many constraints need to be satisfied. Various kinds of approaches for designing a primer have been proposed in the last few decades, but most of them do not have restriction sites on(More)
The problem of placing wireless transmitters to meet particular objectives, such as coverage and cost, has proven to be NP-hard. Furthermore, the heterogeneity of wireless networks makes the problem more intractable to deal with. This paper presents a novel multiobjective variable-length genetic algorithm to solve this problem. One does not need to(More)
It has been discovered in recent years that the Internet attacks started by improper authorization on Web servers and Web applications. The top 10 Web vulnerabilities issued by OWASP and the top 20 security risks issued by SANS demonstrated that Web attacks is one of the most important network security problems. Therefore, with the help from Web attack(More)
The multiplex PCR experiment is to amplify multiple regions of a DNA sequence at the same time by using different primer pairs. Designing feasible primer pairs for multiplex PCR is a tedious task since there are too many constraints to be satisfied. In this paper, a new method for multiplex PCR primer design strategy using genetic algorithm is proposed. The(More)
There are lots of literature published for bio-medical researches every day. These bio-medical documents provides lots of helpful information. However, some information is hidden in these already published literature. When collecting these papers together, the hidden connections are shown up. The goal of this paper is trying to find out the hidden(More)
Data leakage is a serious problem for many large organizations. In order to provide the user with information about confidential data, many prevalent data leakage prevention (DLP) solutions rely on scanning the content of the relevant files. This approach requires the capability to parse various file formats. However, risks of data breach persist for(More)