Learn More
This paper introduces the IPSec security architecture and its mechanism, and gives an in-depth analysis of the IPSec security. Due to the flaws of the pre-shared key authentication method and the fact that it is vulnerable to DoS attacks, this paper proposes a dynamic pre-shared key generation method to avoid the harm to the system caused by crack of the(More)
To date, advances in face recognition have been dominated by the design of algorithms that do recognition from a single test image. Recently, an obvious but important question has been put forward. Will the recognition results of such approaches be generally improved when using multiple images or video sequences? To test this, we extend the formulation of a(More)
Various iron-oxide nanoparticles have been in use for a long time as therapeutic and imaging agents and for supplemental delivery in cases of iron-deficiency. While all of these products have a specified size range of ∼40 nm and above, efforts are underway to produce smaller particles, down to ∼1 nm. Here, we show that after a 24-h exposure of SHSY-5Y human(More)
Researchers in computer vision, machine learning and cognitive science have long sought a way to describe faces of different people as disjoint subsets in a feature space of some sort. In recent years, the modelling of such subsets has played an increasingly important role within our community. In this chapter, we address the three important challenges(More)
Recent studies have suggested that the metastasis-associated colon cancer1 (MACC1) gene can promote tumor proliferation, invasion and metastasis through an upregulation of c-Met expression. However, its role in gastric cancer is controversial. Our study investigated expression of MACC1 and c-Met in gastric cancer, as well as correlated this with(More)
In the past decade or so, subspace methods have been largely used in face recognition – generally with quite success. Subspace approaches, however, generally assume the training data represents the full spectrum of image variations. Unfortunately, in face recognition applications one usually has an under-represented training set. A known example is that(More)
While it is generally possible to do recognition from video sequences, the training process is usually done over static images. This is due to the fact that, in many applications (e.g., homeland security), one does not have large video sequences which can be used for training. For example, law enforcement agencies generally have a frontal and a profile view(More)
PURPOSE Four-dimensional computed tomography (4D CT) images have been recently adopted in radiation treatment planning for thoracic and abdominal cancers to explicitly define respiratory motion and anatomy deformation. However, significant image distortions (artifacts) exist in 4D CT images that may affect accurate tumor delineation and the shape(More)
In order to realize online, real-time, fast and automatic multiparameter measurement of complex part, the principle on encoded sequence is introduced. The sequence has an important property, named window property. The length of the window is quite small relative to the sequence. When the window slides over the whole sequence, the subsequences in the window(More)