Learn More
1. Serotonin (5-HT) facilitates the connections between sensory and motor neurons in Aplysia during behavioural sensitization. The effect of 5-HT on sensorimotor synapses is believed to be primarily presynaptic. Here we tested whether 5-HT can have an exclusively postsynaptic facilitatory effect. 2. Siphon motor neurons were individually dissociated from(More)
Plants must effectively defend against biotic and abiotic stresses to survive in nature. However, this defense is costly and is often accompanied by significant growth inhibition. How plants coordinate the fluctuating growth-defense dynamics is not well understood and remains a fundamental question. Jasmonate (JA) and gibberellic acid (GA) are important(More)
We develop distributed algorithms for self-organizing sensor networks that respond to directing a target through a region. The sensor network models the danger levels sensed across its area and has the ability to adapt to changes. It represents the dangerous areas as obstacles. A protocol that combines the artificial potential field of the sensors with the(More)
—In a dynamic spectrum access (DSA) network, communication rendezvous is the first step for two secondary users to be able to communicate with each other. In this step, the pair of secondary users meet on the same channel, over which they negotiate on the communication parameters, to establish the communication link. This paper presents ETCH, Efficient(More)
Access control in sensor networks is used to authorise and grant users the right to access the network and data collected by sensors. Different users have different access right due to the access restriction implicated by the data security and confidentiality. Even though symmetric-key scheme, which has been investigated extensively for sensor networks, can(More)
As RFID tags are increasingly attached to everyday items, it quickly becomes impractical to collect data from every tag in order to extract useful information. In this paper, we consider the problem of identifying popular categories of RFID tags out of a large collection of tags, without reading all the tag data. We propose two algorithms based on the idea(More)
—We consider a sensor network that is not fully trusted and ask the question how we preserve privacy for the collected data and how we verify the data reply from the network. We explore the problem in the context of a network augmented with storage nodes and target at range query. We use bucketing scheme to mix the data for a range, use message encryption(More)