Learn More
In data stream clustering, it is desirable to have algorithms that are able to detect clusters of arbitrary shape, clusters that evolve over time, and clusters with noise. Existing stream data clustering algorithms are generally based on an online-offline approach: The online component captures synopsis information from the data stream (thus, overcoming(More)
OBJECTIVES To validate a new device, Intelligent Device for Energy Expenditure and Activity (IDEEA), for the measurement of duration, frequency, and intensity of various types of human physical activity (PA). RESEARCH METHODS AND PROCEDURES The ability of IDEEA to identify and quantify 32 types of PA, including the most common daily exercise and(More)
PURPOSE The purpose of this study was to validate the Intelligent Device for Energy Expenditure and Activity (IDEEA) for estimation of energy expenditure during a variety of activities. An additional aim was to improve the accuracy of the estimation of energy expenditure of physical activity based on second-by-second information of type, onset, and duration(More)
Mitochondrial inner membrane fusion depends on the dynamin-related GTPase OPA1 and the function of OPA1 is regulated by proteolytic cleavage. The mitochondrial proteases Yme1L and OMA1 cleave OPA1 at S2 and S1 sites, respectively. Here, we show that OMA1 is cleaved to a short form (S-OMA1) by itself upon mitochondrial membrane depolarization; S-OMA1 is(More)
Network lifetime is a crucial performance metric to evaluate data-gathering wireless sensor networks (WSNs) where battery-powered sensor nodes periodically sense the environment and forward collected samples to a sink node. In this paper, we propose an analytic model to estimate the entire network lifetime from network initialization until it is completely(More)
Infectious bursal disease (IBD) is an acute and contagious viral infection of young chickens caused by IBD virus (IBDV). The VP2 protein of IBDV is the only antigen for inducing neutralizing antibodies and protective immunity in the natural host. In the current study, we have succeeded in construction of one recombinant baculovirus BacSC-VP2 expressing(More)
With the proliferation of connected devices and emerging data-hungry applications, volume of mobile data traffic is predicted to have a 1000-fold growth by year 2020. To address the data explosion challenge, industry and academia have initiated research and development of 5G wireless network, which is envisaged to cater for the massive data traffic volume,(More)
The roaming service enables mobile subscribers to access the internet service anytime and anywhere, which can fulfill the requirement of ubiquitous access for the emerging paradigm of networking, e.g., the Internet of Things (IoT). In this paper, we propose a conditional privacy-preserving authentication with access linkability (CPAL) for roaming service,(More)
Smart grid, envisioned as an indispensable power infrastructure, is featured by real-time and two-way communications. How to securely retrieve and audit the communicated metering data for validation testing is, however, still challenging for smart grid. In this paper, we propose a novel privacy-preserving range query (PaRQ) scheme over encrypted metering(More)
The emerging Internet-of-Things (IoT) are vulnerable to Sybil attacks where attackers can manipulate fake identities or abuse pseudoidentities to compromise the effectiveness of the IoT and even disseminate spam. In this paper, we survey Sybil attacks and defense schemes in IoT. Specifically, we first define three types Sybil attacks: SA-1, SA-2, and SA-3(More)