Learn More
A method is proposed for preventing privacy invasion through unintentional capture of facial images. Prevention methods such as covering the face and painting particular patterns on the face are effective but hinder face-to-face communication. The proposed method overcomes this problem through the use of a device worn on the face that transmits(More)
Keywords: Topology optimization Finite element method Level set method Phase field method Tikhonov regularization method a b s t r a c t This paper proposes a new topology optimization method, which can adjust the geometrical complexity of optimal configurations, using the level set method and incorporating a fictitious interface energy derived from the(More)
CIN85, an adaptor protein which binds the C-terminal domain of tyrosine phosphorylated Cbl and Cbl-b, has been thought to be involved in the internalization and subsequent degradation of receptors. However, its physiological function remains unclear. To determine its role in B cells, we used Mb1-cre to generate mice with a B cell-specific deletion of CIN85.(More)