Learn More
BACKGROUND To investigate different responses to a high-fat/cholesterol diet and uncover their underlying genetic factors between C57BL/6J (B6) and DBA/2J (D2) inbred mice. METHODS B6 and D2 mice were fed a high-fat/cholesterol diet for a series of time-points. Serum and bile lipid profiles, bile acid yields, hepatic apoptosis, gallstones and(More)
This work is inspired by a kind of S-transforms which employ a window width optimization strategy. Since the main objective of their methods is to adjust the window width passively by controlling the standard deviation function of the Gaussian window, we realize it in a way more straightly. Namely, we propose a new window which can optimize the shape and(More)
NURR1 (also named as NR4A2) is a member of the steroid/thyroid hormone receptor family, which can bind to DNA and modulate expression of target genes. Previous studies have shown that NURR1 is essential for the nigral dopaminergic neuron phenotype and function maintenance, and the defects of the gene are possibly associated with Parkinson's disease (PD). In(More)
This paper presents a quadtree-based domain decomposition method for matching Global Positioning System (GPS) data onto the digital map in parallel. The method uses two basic tools, quadtree and interval distance measurement. Quadtree is a structure which can facilitate to decompose massive GPS data in a domain into multiple data pieces in the sub-domains.(More)
This paper presents a novel speech enhancement scheme on the basis of bone-conductive microphones. High performance in non-stationary noisy environments is achieved by combining the following two techniques: the speech detection based on the bone-conductive microphone signal, and non-stationary noise suppression by adaptive spectral subtraction. Unlike(More)
This paper introduces R2P, a Peer-to-Peer (P2P) transfer system with role based and reputation based access control policies. With the combination of user authentication, organization authorization and scoring system, we solve the problem of resource piracy, user privacy and network jam, which exist in traditional P2P systems. The R2P system takes advantage(More)
In this paper, we propose a novel hierarchy-aware ECC model termed HHECC for access control in Cloud. This model is implemented by a hierarchical and hybrid Elliptic Curve Cryptography (ECC) encryption on Cloud data. Cloud is a popular storage platform to build data center for data backup, file synchronization and resource sharing. Since accessed by various(More)