Learn More
As the Internet services spread all over the world, many kinds and a large number of security threats are increasing. Therefore, intrusion detection systems, which can effectively detect intrusion accesses, have attracted attention. This paper describes a novel fuzzy class-association-rule mining method based on genetic network programming (GNP) for(More)
Dosage compensation in mammals occurs by X inactivation, a silencing mechanism regulated in cis by the X inactivation center (Xic). In response to developmental cues, the Xic orchestrates events of X inactivation, including chromosome counting and choice, initiation, spread, and establishment of silencing. It remains unclear what elements make up the Xic.(More)
In female mammals, up-regulation of Xist triggers X-chromosome inactivation in cis. Up-regulation is inhibited by sequences 3' to Xist contained within the antisense locus, Tsix. Inhibition could depend on transcription of Tsix and/or on DNA elements therein. Here we test the role of Tsix transcription by augmenting the duration and strength of Tsix(More)
AIM Dietary fatty acids affect atherogenesis, which was presumed to be partly related to HDL cholesterol (HDL-C) metabolism. The major aim of the work was to analyze various ratios of n-6/n-3 PUFA diets on HDL-C metabolism in apolipoprotein E-null (apoE(-/-)) mice, which have similar symptoms to human type III familial hyperlipoproteinemia. METHODS(More)
Weaving is a traditional technology for making everyday products by hand that involves interlacing planar pieces to endow tough and pliable properties, (e.g., bamboo and stiff paper) to create 3D shapes. The technique has been extensively applied throughout history by various means, and is favored due to its low cost, accessibility, and environmental(More)
Amyloid precursor protein (APP) is enriched at the synapse, but its synaptic function is still poorly understood. We previously showed that GABAergic short-term plasticity is impaired in App knock-out (App-/-) animals, but the precise mechanism by which APP regulates GABAergic synaptic transmission has remained elusive. Using electrophysiological,(More)
With the increased usage of Internet, network security attracts many researchers to propose various kinds of approaches. Data mining techniques are efficient to construct a reliable Intrusion Detection System. Classification is an essential task in data mining. In this paper, a new classification method is proposed to build an accurate and efficient(More)
AIMS Dysfunction of neurovascular pericytes underlies breakdown of the blood-brain barrier, but the molecular mechanisms are largely unknown. In this study, we evaluated the role of the transient receptor potential melastatin-related 2 (TRPM2) channel and autophagy during brain pericyte injury both in vitro and in vivo. RESULTS A rapid induction in(More)
For the lack of process data of the Gas-Steam combined cycle power plant in initial operating stage, this article presents a method for the output power prediction of CCPP using the Fuzzy Analytical Hierarchy Process (FAHP). Firstly, based on the analysis of the main factors that affect the CCPP output, a hierarchical structure for the prediction of CCPP(More)