252 research outputs found

    Probabilistic segmentation of volume data for visualization using SOM-PNN classifier

    Get PDF
    We present a new probabilistic classifier, called SOM-PNN classifier, for volume data classification and visualization. The new classifier produces probabilistic classification with Bayesian confidence measure which is highly desirable in volume rendering. Based on the SOM map trained with a large training data set, our SOM-PNN classifier performs the probabilistic classification using the PNN algorithm. This combined use of SOM and PNN overcomes the shortcomings of the parametric methods, the nonparametric methods, and the SOM method. The proposed SOM-PNN classifier has been used to segment the CT sloth data and the 20 human MRI brain volumes resulting in much more informative 3D rendering with more details and less artifacts than other methods. Numerical comparisons demonstrate that the SOM-PNN classifier is a fast, accurate and probabilistic classifier for volume rendering.published_or_final_versio

    Review of The Electronic Transaction Ordinance: Can The Personal Identification Number Replace The Digital Signature?

    Get PDF
    In a recent consultation document, the Information Technology and Broadcasting Bureau proposed that personal identification numbers (PINs) be accepted as a form of signature for the purposes of the Electronic Transactions Ordinance (ETO) (Cap 553). This article explains why this proposal is fundamentally flawed. The article identifies three basic requirements for a signature and examines whether they are satisfied by digital signatures and PINs. It concludes that while a digital signature has built into it all the elements necessary for compliance with the requirements, a PIN can only be used for the purpose of authorisation and cannot be elevated to the status of a signature as required by the ETO.published_or_final_versio

    Digital evidence search kit

    Get PDF
    With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that can assist law enforcement agencies in cyber crime evidence collection. This paper describes a cyber crime evidence collection tool called DESK (Digital Evidence Search Kit), which is the product of several years of cumulative efforts of our Center together with the Hong Kong Police Force and several other law enforcement agencies of the Hong Kong Special Administrative Region. We will use DESK to illustrate some of the desirable features of an effective cyber crime evidence collection tool. © 2005 IEEE.published_or_final_versio

    Separable and anonymous identity-based key issuing

    Get PDF
    In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a secure channel is required. For privacy-oriented applications, it is important to keep in secret whether the private key corresponding to a certain identity has been requested. All of the existing ID-based key issuing schemes have not addressed this anonymity issue. Besides, the separation of duties of LRA and KGC has not been discussed as well. We propose a novel separable and anonymous ID-based key issuing scheme without secure channel. Our protocol supports the separation of duties between LRA and KGC. The private key computed by the KGC can be sent to the user in an encrypted form such that only the legitimate key requester authenticated by LRA can decrypt it, and any eavesdropper cannot know the identity corresponding to the secret key. © 2005 IEEE.published_or_final_versio

    DLX1 acts as a crucial target of FOXM1 to promote ovarian cancer aggressiveness by enhancing TGF-β/SMAD4 signaling

    Get PDF
    Recent evidence from a comprehensive genome analysis and functional studies have revealed that FOXM1 is a crucial metastatic regulator that drives cancer progression. However, the regulatory mechanism by which FOXM1 exerts its metastatic functions in cancer cells remains obscure. Here, we report that DLX1 acts as a FOXM1 downstream target, exerting pro-metastatic function in ovarian cancers. Both FOXM1 isoforms (FOXM1B or FOXM1C) could transcriptionally upregulate DLX1 through two conserved binding sites, located at +61 to +69bp downstream (TFBS1) and -675 to -667bp upstream (TFBS2) of the DLX1 promoter, respectively. This regulation was further accentuated by the significant correlation between the nuclear expression of FOXM1 and DLX1 in high-grade serous ovarian cancers. Functionally, the ectopic expression of DLX1 promoted ovarian cancer cell growth, cell migration/invasion and intraperitoneal dissemination of ovarian cancer in mice, whereas small interfering RNA-mediated DLX1 knockdown in FOXM1-overexpressing ovarian cancer cells abrogated these oncogenic capacities. In contrast, depletion of FOXM1 by shRNAi only partially attenuated tumor growth and exerted almost no effect on cell migration/invasion and the intraperitoneal dissemination of DLX1-overexpressing ovarian cancer cells. Furthermore, the mechanistic studies showed that DLX1 positively modulates TGF- signaling by upregulating PAI-1 and JUNB through direct interaction with SMAD4 in the nucleus upon TGF-1 induction. Taken together, these data strongly suggest that DLX1 plays a pivotal role in FOXM1 signaling to promote cancer aggressiveness through intensifying TGF-/SMAD4 signaling in high-grade serous ovarian cancer cells.published_or_final_versio

    Intrusion detection routers: Design, implementation and evaluation using an experimental testbed

    Get PDF
    In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed. The system, known as intrusion detection router (IDR), is deployed on network routers to perform online detection on any DDoS attack event, and then react with defense mechanisms to mitigate the attack. The testbed is built up by a cluster of sufficient number of Linux machines to mimic a portion of the Internet. Using the testbed, we conduct real experiments to evaluate the IDR system and demonstrate that IDR is effective in protecting the network from various DDoS attacks. © 2006 IEEE.published_or_final_versio

    Individualizing therapy – in search of approaches to maximize the benefit of drug treatment (II)

    Get PDF
    Adjusting drug therapy to the individual, a common approach in clinical practice, has evolved from 1) dose adjustments based on clinical effects to 2) dose adjustments made in response to drug levels and, more recently, to 3) dose adjustments based on deoxyribonucleic acid (DNA) sequencing of drug-metabolizing enzyme genes, suggesting a slow drug metabolism phenotype. This development dates back to the middle of the 20(th )century, when several different drugs were administered on the basis of individual plasma concentration measurements. Genetic control of drug metabolism was well established by the 1960s, and pharmakokinetic-based individualized therapy was in use by 1973

    Seasonal effects of influenza on mortality in a subtropical city

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Influenza has been associated with a heavy burden of mortality. In tropical or subtropical regions where influenza viruses circulate in the community most of the year, it is possible that there are seasonal variations in the effects of influenza on mortality, because of periodic changes in environment and host factors as well as the frequent emergence of new antigenically drifted virus strains. In this paper we explored this seasonal effect of influenza.</p> <p>Methods</p> <p>A time-varying coefficient Poisson regression model was fitted to the weekly numbers of mortality of Hong Kong from 1996 to 2002. Excess risks associated with influenza were calculated to assess the seasonal effects of influenza.</p> <p>Results</p> <p>We demonstrated that the effects of influenza were higher in winter and late spring/early summer than other seasons. The two-peak pattern of seasonal effects of influenza was found for cardio-respiratory disease and sub-categories pneumonia and influenza, chronic obstructive pulmonary disease, cerebrovascular diseases and ischemic heart disease as well as for all-cause deaths.</p> <p>Conclusion</p> <p>The results provide insight into the possibility that seasonal factors may have impact on virulence of influenza besides their effects on virus transmission. The results warrant further studies into the mechanisms behind the seasonal effect of influenza.</p

    Hand-assisted laparoscopic subtotal colectomy with cecorectal anastomosis for chronic idiopathic colonic pseudo-obstruction: report of a case

    Get PDF
    Chronic idiopathic colonic pseudo-obstruction (CICP) is characterized by the chronic disturbance of colonic motility without mechanical obstruction, any underlying disease or medication. Currently, there are no established medical treatments for CICP. A 62-year-old female who had undergone right hemicolectomy for splenic flexure syndrome caused by idiopathic megacolon was referred to our hospital with relapse, experiencing palpitation and abdominal fullness. She was diagnosed with CICP according to findings of marked dilation of the colon without mechanical obstruction, dilation of other parts of the gastrointestinal tract, or underlying disease. The dilated colon was surgically removed by hand-assisted laparoscopic subtotal colectomy, followed by cecorectal anastomosis. Histopathologically, there was no degeneration or lack of ganglion cells in Auerbach\u27s plexus. The patient has experienced no severe symptoms after undergoing the present operation
    • …
    corecore