Learn More
Elliptic curve cryptography (ECC) has been the focus of much recent attention since it ooers the highest security per bit of any known public key cryptosystem. This beneet of smaller key sizes makes ECC particularly attractive for embedded applications since its implementation requires less memory and processing power. In this paper a microcoded Xilinx(More)
This article is an extension of the work of Huang and Wong (1), who found dual-objective designs for models with a continuous outcome. We consider quantal dose-response experiments with a binary outcome and develop multiple-objective designs for two or more Bayesian optimality criteria. Using the logit model as an illustrative example, we construct(More)
BACKGROUND Adipocyte fatty acid-binding protein (A-FABP) is traditionally thought to be a cytosolic fatty acid chaperone expressed in adipocytes. Mice with targeted disruption of the A-FABP gene exhibit a striking phenotype with strong protection from insulin resistance, hyperglycemia, and atherosclerosis. The clinical relevance of these findings remains to(More)
Two-dimensional (2-D) image-matrix-based projection methods for feature extraction are widely used in many fields of computer vision and pattern recognition. In this paper, we propose a novel framework called sparse 2-D projections (S2DP) for image feature extraction. Different from the existing 2-D feature extraction methods, S2DP iteratively learns the(More)
In this paper, we study the distributed synchronization and pinning distributed synchronization of stochastic coupled neural networks via randomly occurring control. Two Bernoulli stochastic variables are used to describe the occurrences of distributed adaptive control and updating law according to certain probabilities. Both distributed adaptive control(More)