They are susceptible to a variety of attacks, including node capture, physical tampering, and denial of service, while prompting a range of fundamental research challenges.
What is network denial of service (DoS), and why is it such a problem? This research project has sought to investigate these questions and look at the deeper questions such as can denial of service be removed, can it be detected and can network systems adequately respond to denial of service incidents should they become subjected to them? This paper… (More)
BACKGROUND Protein disulfide isomerase (PDI), is sorted to be enzymatic chaperone for reconstructing misfolded protein in endoplasmic reticulum lumen. Recently, PDI has been identified as a link between misfolded protein and neuron apoptosis. However, the potential for PDI to be involved in the pathogenesis of prion disease remains unknown. In this study,… (More)
Coronary heart disease (CHD) is the leading causes of morbidity and mortality in China. The diagnosis of CHD in Traditional Chinese Medicine (TCM) was mainly based on experience in the past. In this paper, we proposed four MI-based association algorithms to analyze phenotype networks of CHD, and established scale of syndromes to automatically generate the… (More)
It has been described that A disintegrin and metalloproteinase (ADAM10) may involve in the physiopathology of prion diseases, but the direct molecular basis still remains unsolved. In this study, we confirmed that ADAM10 was able to cleave recombinant human prion protein in vitro. Using immunoprecipitation tests (IP) and immunofluorescent assays (IFA),… (More)
The vision of ubiquitous computing presents us with unique difficulties in terms of maintaining security. Many of these relate to privacy or quality of service issues, but underpinning these are the requirement for secure execution of code. We present a novel framework for utilising a hybrid method of code analysis combined with component composition… (More)
Establishing the security properties of executable code provides an important challenge for advocates of ubiquitous computing. We provide a framework that utilises component composition techniques in order to establish such properties for a composed application in a ubiquitous environment. The framework accounts for the need to establish the properties of… (More)