There are two methods for detecting videos illegally recorded in theaters. One uses digital watermarks to identify on what dates and in what theaters such videos were recorded. The other method uses infrared light, wh...
详细信息
Spatially proximate amino acids in a protein tend to coevolve. A protein's three-dimensional (3D) structure hence leaves an echo of correlations in the evolutionary record. Reverse engineering 3D structures from s...
详细信息
Spatially proximate amino acids in a protein tend to coevolve. A protein's three-dimensional (3D) structure hence leaves an echo of correlations in the evolutionary record. Reverse engineering 3D structures from such correlations is an open problem in structural biology, pursued with increasing vigor as more and more protein sequences continue to fill the data banks. Within this task lies a statistical inference problem, rooted in the following: correlation between two sites in a protein sequence can arise from firsthand interaction but can also be network-propagated via intermediate sites; observed correlation is not enough to guarantee proximity. To separate direct from indirect interactions is an instance of the general problem of inverse statistical mechanics, where the task is to learn model parameters (fields, couplings) from observables (magnetizations, correlations, samples) in large systems. In the context of protein sequences, the approach has been referred to as direct-coupling analysis. Here we show that the pseudolikelihood method, applied to 21-state Potts models describing the statistical properties of families of evolutionarily related proteins, significantly outperforms existing approaches to the direct-coupling analysis, the latter being based on standard mean-field techniques. This improved performance also relies on a modified score for the coupling strength. The results are verified using known crystal structures of specific sequence instances of various protein families. Code implementing the new method can be found at http://***/.
Organic Transistor (OT) modeling, fabrication and applicability has undergone remarkable progress during last ten years. Organic Thin Film Transistors (OTFTs) have received significant attention recently because of th...
详细信息
We explore in vivo diagnostic utility of an in-house developed multimodal nonlinear optical microscopy for detection of squamous epithelia precancer. Our results reveal all epithelial sublayers and stroma provide sign...
详细信息
Multi-walled carbon nanotubes (MWNTs) were coated first with methylene blue (MB) by noncovalent adsorption and then by horseradish peroxidase (HRP) and glucose oxidase (GOD) by covalent-linking. The MB-MWNTs/GOD/HRP c...
详细信息
ISBN:
(纸本)9783037853511
Multi-walled carbon nanotubes (MWNTs) were coated first with methylene blue (MB) by noncovalent adsorption and then by horseradish peroxidase (HRP) and glucose oxidase (GOD) by covalent-linking. The MB-MWNTs/GOD/HRP composites formed stable films on screen-printed electrodes (SPE). The electrochemical and electrocatalytic behaviors of the bienzyme modified SPE were studied using cyclic voltammetry (CV) and amperometry. Using the MB-MWNT/GOD/HRP composites, glucose could be calibrated by amperometry at -0.35 V vs. SCE. The optimized response (at pH 7.0) had a sensitivity of 2.4 mA.M-1 and a limit of detection (3xS/N) of 35 mu M. Tests of the portable bienzyme sensor demonstrate its imperviousness to the effects of ascorbic acid, uric acid and p-acetaminophen, as well as its ability to measure glucose concentrations ranging from 0.25 to 2 mM.
Currently, an authentication system used in banks is to protect assets of users. However, these systems are weak against the peeping attack. That is high risk. Therefore, we proposed that a user safely enters credenti...
详细信息
Currently, an authentication system used in banks is to protect assets of users. However, these systems are weak against the peeping attack. That is high risk. Therefore, we proposed that a user safely enters credentials and information to transfer money after launching Live CD on stand-alone in place without risk of peeping attack such as a home. The entered information is encrypted by common key crypto system and stored in a QR code. If the peeping attack occurred, this information were protected by using the QR code, also can be high-speed processing. However, if QR codes ware obtained by unauthorized users, they can find out privacy information of owner by reading QR code to a ATM. Therefore, we propose that the system is appended function for privacy protection to the previous method.
Modern society has recently had problems with a variety of crimes. Surveillance cameras have been installed in various locations to protect assets from these crimes. When the incident occurred, it is needed to manuall...
详细信息
Modern society has recently had problems with a variety of crimes. Surveillance cameras have been installed in various locations to protect assets from these crimes. When the incident occurred, it is needed to manually find out suspicious people in a large number of footage. Manually extracting prowlers is inefficient in which a lot of surveillance cameras have been installed and have taken a large number of people. Many methods to extract prowler have been proposed. One of the methods, it must give people special devices in advance. The other methods, it does not work without around people in order to extract suspicious behavior compared to around people. To solve the problems, we proposed a method acquiring data of bony framework from the footage using distance sensor to extract suspicious behavior depending on state of each joint. Therefore, it can practically detect suspicious person than those and does not need to give special device. In experimental result, distance errors when mounting distance sensors and cost of mounting are described.
The aim of this study is to compare forces generated by three different orthodontic closed coil springs supplied by three companies, optical fiber Bragg gratins are used to evaluate the force of closing of springs. ...
详细信息
A MAC protocol that depends on overheard information for its collision avoidance, such as Carrier Sense Multiple Access (CSMA) [1], may not work well in underwater, due to the long propagation delay characteristic of ...
详细信息
A MAC protocol that depends on overheard information for its collision avoidance, such as Carrier Sense Multiple Access (CSMA) [1], may not work well in underwater, due to the long propagation delay characteristic of an underwater acoustic (UWA) channel. In such channel, the overheard information may already become obsolete by the time it reaches the node and, thus, should not be taken into account in the collision avoidance mechanism. Intuitively, the degree of usefulness of overheard information plays an important role in determining the network performance for channel listening-based MAC protocols. In this paper, we analytically study the usefulness of overheard information for collision avoidance in two different channel listening-based MAC protocols: (1) CSMA [1] and (2) Aloha-CA [2]. From our study, it is shown that the overheard information is beneficial for collision avoidance only if certain conditions can be satisfied. More specifically, in order for a node that overhears an ongoing transmission to be able to utilize the extracted information for collision avoidance, the node must be within a bounded region that is determined by the relative positions of the sender and the receiver, the packet's transmission time, as well as the length of the packet's header. Based on this analysis, we also present the “usefulness index (U)” which is defined as the degree of usefulness of information overheard.
As the rapid growth of smart phone technology, people have a lot of digital image information such as digital photos or videos. Both data hiding and data compression are very important technologies in image processing...
详细信息
As the rapid growth of smart phone technology, people have a lot of digital image information such as digital photos or videos. Both data hiding and data compression are very important technologies in image processing field. On the overview, it seems that there is no relationship between data hiding and data compression because data hiding mechanisms focus on information security and data compression mechanisms emphasize the compression ratio. However, the more secret data is embedded, the more capacity the stego image increases. Actually, they are closely related. Until now, there are many literatures to discuss the secret data how to be embedded into the media image and keeps the original capacity as soon as possible. In this paper, a reversible data hiding scheme based on EMD data hiding and JPEG (Joint Picture Experts Group) compression technology will be proposed. According to experimental results, the authors can prove that our proposed scheme maintains high embedding capacity, security and good compression ratio.
暂无评论