Learn More
Providing security and privacy in mobile ad hoc networks has been a major issue over the last few years. Most research work has so far focused on providing security for routing and data content, but nothing has been done in regard to providing privacy and anonymity over these networks. We propose a novel distributed routing protocol which guarantees(More)
Wireless sensors networks are susceptible to a large number of security threats, and because of the communication, computation and delay constraints of most applications that run on top of these networks, traditional security mechanisms cannot be used. Trust and reputation have been recently suggested as an effective security mechanism for open environments(More)
Although aberrant microRNA (miRNA) expressions have been observed in different types of cancer, their pathophysiologic role and their relevance to tumorigenesis are still largely unknown. In this study, we first evaluated the expression of 308 miRNAs in human hepatocellular carcinoma (HCC) and normal hepatic tissues and identified 29 differentially(More)
Linear motors offer several advantages over their rotary counterparts in many applications requiring linear motion by eliminating mechanical transmission mechanisms. However, these advantages are obtained at the expense of added difficulties in controlling such a system. This paper studies the high performance robust motion control of an epoxy core linear(More)
This paper presents experiments on subjectivity and polarity classifications of topicand genre-independent blog posts, making novel use of a linguistic feature, verb class information, and of an online resource, the Wikipedia dictionary, for determining the polarity of adjectives. Each post from a blog is classified as objective, positive, or negative. Our(More)
We developed a theoretical framework to prove the existence and quantify the Waddington landscape as well as chreode-biological paths for development and differentiation. The cells can have states with the higher probability ones giving the different cell types. Different cell types correspond to different basins of attractions of the probability landscape.(More)
The root stem cell niche, which in the Arabidopsis thaliana root meristem is an area of four mitotically inactive quiescent cells (QCs) and the surrounding mitotically active stem cells, is critical for root development and growth. We report here that during jasmonate-induced inhibition of primary root growth, jasmonate reduces root meristem activity and(More)
Shadow detection and removal in real scene images is always a challenging but yet intriguing problem. In contrast with the rapidly expanding and continuous interests on this area, it is always hard to provide a robust system to eliminate shadows in static images. This paper aimed to give a comprehensive method to remove both vague and hard shadows from a(More)
Mutations in cyclin-dependent kinase-like 5 (CDKL5), also known as serine/threonine kinase 9 (STK9), have been identified in patients with Rett syndrome (RTT) and X-linked infantile spasm. However, the function of CDKL5 in the brain remains unknown. Here, we report that CDKL5 is a critical regulator of neuronal morphogenesis. We identified a neuron-specific(More)
Accurate and timely traffic classification is critical in network security monitoring and traffic engineering. Traditional methods based on port numbers and protocols have proven to be ineffective in terms of dynamic port allocation and packet encapsulation. The signature matching methods, on the other hand, require a known signature set and processing of(More)