Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the next generation *** to its particular characteristic of shared media structure,EPON suffers many s...
详细信息
Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the next generation *** to its particular characteristic of shared media structure,EPON suffers many security vulnerabilities. Communication security must be guaranteed when EPON is applied in *** paper gives a general introduction to the EPON system,analyzes the potential threats and attacks pertaining to the EPON system,and presents effective countermea-sures against these threats and attacks with emphasis on the authentication protocols and key distribution.
HER-2/neu (HER2) has been shown to be a valuable biomarker for breast cancer. However, inter-observer variability has been reported in the evaluation of HER2 with immunohistochemistry. It has been suggested that autom...
详细信息
HER-2/neu (HER2) has been shown to be a valuable biomarker for breast cancer. However, inter-observer variability has been reported in the evaluation of HER2 with immunohistochemistry. It has been suggested that automated computer-based evaluation can provide a consistent and objective measure of HER2 expression. In this manuscript, we present an automated method for the quantitative assessment of HER2 using digital microscopy. The method employs imaging algorithms on whole slide images of tissue specimens for the extraction of two features describing HER2 membrane staining, namely membrane staining completeness and membrane staining intensity. A classifier was trained to merge the extracted features into an overall slide assessment score. Preliminary results showed good agreement with the provided truth. The developed automated method has the potential to be used as a computer aid for the immunohistochemical evaluation of HER2 expression with the objective of increasing observer reproducibility.
In Optical Burst Switched (OBS) networks, packets are assembled into bursts at ingress edge routers and disassembled at egress edge routers. This letter presents an analytical model to quantify the burstification late...
详细信息
Optical Burst Switching (OBS) allows variable size data bursts to be transported directly over DWDM links without encountering O/E/O conversion. This paper identifies potential threats to security in OBS networks. To ...
详细信息
ISBN:
(纸本)9780889866591
Optical Burst Switching (OBS) allows variable size data bursts to be transported directly over DWDM links without encountering O/E/O conversion. This paper identifies potential threats to security in OBS networks. To alleviate the security threats, we propose a Secured Optical Burst Switching (S-OBS) framework that, for the first time, brings security measures to the OBS networks. The contributions of the paper are summarized as follows: 1) This is the first paper that identifies the potential security problems in OBS networks;2) We have proposed a security framework for OBS networks;3) We have proposed two levels of security measures to be incorporated into OBS networks, namely, authentication of burst headers and confidentiality of data bursts;4) We have examined the candidate solutions in each category, and suggested the solutions that are well suited to OBS networks.
Including concepts of entrepreneurship in an engineering education is nothing new. It would be difficult to find a university that does not offer several courses or specific programs in entrepreneurship. However, find...
详细信息
Since October 2005, the business and engineering faculties of the Milwaukee School of engineering (MSOE) have been working on a novel effort to integrate entrepreneurship into the engineering curricula. Our methods br...
详细信息
In this paper, we first provide a new theoretical understanding of the Evidence Pre-propagated Importance Sampling algorithm (EPIS-BN) (Yuan & Druzdzel 2003;2006b) and show that its importance function minimizes t...
详细信息
Some real problems are more naturally modeled by hybrid Bayesian networks that consist of mixtures of continuous and discrete variables with their interactions described by equations and continuous probability distrib...
详细信息
Some real problems are more naturally modeled by hybrid Bayesian networks that consist of mixtures of continuous and discrete variables with their interactions described by equations and continuous probability distributions. However, inference in such general hybrid models is hard. Therefore, existing approaches either only deal with special instances, such as Conditional Linear Gaussians (CLGs), or approximate a general model with a restricted version and then perform inference on the simpler model. However, results thus obtained highly depend on the quality of the approximations. This paper describes an importance sampling-based algorithm that directly deals with hybrid Bayesian networks constructed in the most general settings and guarantees to converge to the correct answers given enough time.
Knowledge elicitation is difficult for expert systems that are based on probability theory. The elicitation of probabilities for a probabilistic model requires a lot of time and interaction between the knowledge engin...
详细信息
The establishment of the Women in Science and engineering (WiSE) program represents the serious commitment of the University of Southern California to address the under-representation of women in science and engineeri...
详细信息
暂无评论