Learn More
In this paper, we propose E-Shadow, a distributed mobile phone-based local social networking system. E-Shadow has two main components: (1) Local profiles. They enable EShadow users to record and share their names, interests, and other information with fine-grained privacy controls. (2) Mobile phone based local social interaction tools. E-Shadow provides(More)
BACKGROUND There is considerable controversy as to which posterior technique is best for the treatment of multi-level cervical spondylotic myelopathy. The aim of this study was to compare the clinical and radiographic results and complications of laminoplasty (LAMP) and laminectomy (LAMT) in the treatment of multi-level cervical spondylotic myelopathy. (More)
Nowadays, an increasing number of objects can be represented by their wireless electronic identifiers. For example, people can be recognized by their phone numbers or their phones' WiFi' MAC addresses and products can be identified by their RFID numbers. Localizing objects with electronic identifiers is increasingly important as our lives become(More)
Location privacy in wireless sensor networks has gained a wide concern. Particularly, the location privacy of base station requires ultimate protection due to its crucial position in wireless sensor networks. In this paper, we propose an efficient scheme, consisting of anonymous topology discovery and intelligent fake packet injection (IFPI), to protect the(More)
[1] Radial velocity (Vr) and reflectivity (Z) data from eight coastal operational radars of mainland China and Taiwan are assimilated for the first time using the ARPS 3DVAR and cloud analysis package for Pacific Typhoon Meranti of 2010. It is shown that the vortex-scale circulations of Meranti can be adequately established after only 2 hourly assimilation(More)
—With smartphones' meteoric growth in recent years, leaking sensitive information from them has become an increasingly critical issue. Such sensitive information can originate from smartphones themselves (e.g., location information) or from many Internet sources (e.g., bank accounts, emails). While prior work has demonstrated information flow tracking's(More)
Most human pancreatic cancer cells are resistant to tumor necrosis factor (TNF)-related apoptosis-inducing ligand (TRAIL)-mediated apoptosis. However, the mechanisms by which pancreatic cancer cells utilize their extracellular molecules to counteract the proapoptotic signaling mediated by the TNF family are largely unknown. In this study, we demonstrate for(More)
Cyclic di‑AMP (c-di-AMP) is a second signaling molecule involved in the regulation of bacterial physiological processes and interaction between pathogen and host. However, the regulatory network mediated by c-di-AMP in Mycobacterium remains obscure. In M. smegmatis, a diadenylate cyclase (DAC) was reported recently, but there is still no investigation on(More)
In this paper, a genetic algorithm with sexual reproduction and niche selection technology is proposed. Simple genetic algorithm has been successfully applied to many evolutionary optimization problems. But there is a problem of premature convergence for complex multimodal functions. To solve it, the frame and realization of niche genetic algorithm based on(More)