Learn More
1. Abstract This study presents the specification, estimation and historical simulation of a multisectoral bilateral trade model for 120 commodity categories and fourteen countries and two regions covering the rest of the world. The model shows, for each trade flow, the country of origin, the country of destination, and the commodity traded. The primary(More)
The emanations of electronic and mechanical devices have raised serious privacy concerns. It proves possible for an attacker to recover the keystrokes by acoustic signal emanations. Most existing malicious applications adopt context-based approaches, which assume that the typed texts are potentially correlated. Those approaches often incur a high cost(More)
It is still not clear which group of ammonia-oxidizing microorganisms plays the most important roles in nitrification in soils. Change in abundances and community compositions of ammonia-oxidizing bacteria (AOB) and ammonia-oxidizing archaea (AOA) under long-term different nitrogen (N) fertilization rates were investigated in an acidic luvisols soil using(More)
Context awareness is emphasized in order to provide automatic services in smart home. This paper uses case based reasoning as the reasoning method which solves the problem "in the first phase, we don't know exactly about the key processes and their interdependencies in smart home's context". The context's contents in smart home are described in this paper.(More)
This article reviewed the beneficial effects of moderate voluntary physical exercise on brain health according to the studies on humans and animals, which includes improving psychological status and cognitive function, enhancing psychological well-being, decreasing the risks of Alzheimer's disease (AD) and dementia, and promoting the effects of(More)
—Existing approaches to diagnosing sensor networks are generally sink-based, which rely on actively pulling state information from all sensor nodes so as to conduct centralized analysis. However, the sink-based diagnosis tools incur huge communication overhead to the traffic sensitive sensor networks. Also, due to the unreliable wireless communications,(More)
Over the past decade, advertising has emerged as the primary source of revenue for many web sites and apps. In this paper we report a first-of-its-kind study that seeks to broadly understand the features, mechanisms and dynamics of display advertising on the web - <i>i.e., the Adscape</i>. Our study takes the perspective of users who are the targets of(More)
CYP1A1 and 1A2 play critical roles in the metabolic activation of carcinogenic polycyclic aromatic hydrocarbons (PAHs) and heterocyclic aromatic amines/amides (HAAs), respectively, to electrophilic reactive intermediates, leading to toxicity and cancer. CYP1As are highly inducible by PAHs and halogenated aromatic hydrocarbons via aryl hydrocarbon(More)
A major vector of computer infection is through exploiting vulnerable software or design flaws in networked applications such as the browser. Malicious code can be fetched and executed on a victim's machine without the user's permission, as in drive-by download (DBD) attacks. In this paper, we describe a new tool called DeWare (standing for Detection of(More)
How to shorten the time for channel waiting is critical to avoid network contention. Traditional MAC protocols with CSMA often assume that a transmission must be deferred if the channel is busy, so they focus more on the optimization of serial transmission performance. Recent advances in physical layer, however, allows a receiver to reengage onto a stronger(More)