Learn More
1. Abstract This study presents the specification, estimation and historical simulation of a multisectoral bilateral trade model for 120 commodity categories and fourteen countries and two regions covering the rest of the world. The model shows, for each trade flow, the country of origin, the country of destination, and the commodity traded. The primary(More)
It is still not clear which group of ammonia-oxidizing microorganisms plays the most important roles in nitrification in soils. Change in abundances and community compositions of ammonia-oxidizing bacteria (AOB) and ammonia-oxidizing archaea (AOA) under long-term different nitrogen (N) fertilization rates were investigated in an acidic luvisols soil using(More)
Over the past decade, advertising has emerged as the primary source of revenue for many web sites and apps. In this paper we report a first-of-its-kind study that seeks to broadly understand the features, mechanisms and dynamics of display advertising on the web - <i>i.e., the Adscape</i>. Our study takes the perspective of users who are the targets of(More)
Context awareness is emphasized in order to provide automatic services in smart home. This paper uses case based reasoning as the reasoning method which solves the problem "in the first phase, we don't know exactly about the key processes and their interdependencies in smart home's context". The context's contents in smart home are described in this paper.(More)
Because of the widespread use of antibiotics in animal breeding, the agricultural application of animal manure can lead to the introduction of antibiotics, antibiotic-resistant bacteria and antibiotic resistance genes to the soil and surrounding environment, which may pose a threat to public health. In this study, we investigated the status of(More)
—Existing approaches to diagnosing sensor networks are generally sink-based, which rely on actively pulling state information from all sensor nodes so as to conduct centralized analysis. However, the sink-based diagnosis tools incur huge communication overhead to the traffic sensitive sensor networks. Also, due to the unreliable wireless communications,(More)
The emanations of electronic and mechanical devices have raised serious privacy concerns. It proves possible for an attacker to recover the keystrokes by acoustic signal emanations. Most existing malicious applications adopt context-based approaches, which assume that the typed texts are potentially correlated. Those approaches often incur a high cost(More)
A major vector of computer infection is through exploiting vulnerable software or design flaws in networked applications such as the browser. Malicious code can be fetched and executed on a victim's machine without the user's permission, as in drive-by download (DBD) attacks. In this paper, we describe a new tool called DeWare (standing for Detection of(More)
How to shorten the time for channel waiting is critical to avoid network contention. Traditional MAC protocols with CSMA often assume that a transmission must be deferred if the channel is busy, so they focus more on the optimization of serial transmission performance. Recent advances in physical layer, however, allows a receiver to reengage onto a stronger(More)
BACKGROUND Glypican-3 (GPC3) is an oncofetal antigen that shows great promise as a biomarker for diagnosis of hepatocellular carcinoma (HCC), but there is no reliable kit that can be used to detect it in clinics. The aim of this study is to develop a stable performance kit for GPC3 detection in clinics. DESIGN AND METHODS The paired antibodies were(More)