![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Security Policy Deployment in IPsec
Security policy system defines the basic rules and strategies for information security systems, e.g., IPsec, IKE, and Firewalls. But due to the heterogeneous network security systems and the corresponding appl...
-
Chapter and Conference Paper
Security Technologies Based on Home Gateway for Making Smart Home Secure
As home network is expanding into ubiquitous computing environment and lots of private information is accessible, it is required to protect home network system from illegal accesses and security threats in ope...
-
Chapter and Conference Paper
Security Framework for Home Network: Authentication, Authorization, and Security Policy
As a number of home network services are available and home network is expanding into ubiquitous computing environment, we need to protect home network system from illegal accesses and a variety of threats. Ho...
-
Article
Open AccessApplication of the Western-based adjuvant online model to Korean colon cancer patients; a single institution experience
Adjuvant Online (AOL) is web-accessible risk-assessment model that predicts the mortality and the benefits of adjuvant therapy (http://www.newadjuvantonline.com
-
Chapter and Conference Paper
ID Globalization Across Multiple Convergence Spaces Using Smart Cameras
This paper suggests a scheme for ID globalization, wherein the single successful authentication at initial stage requires no further authentication check while traversing multiple convergence spaces. This is d...
-
Chapter and Conference Paper
Prototype System Design for Large-Scale Person Re-identification
Identifying a person across cameras in disjoint views at different time and location has important applications in visual surveillance. However, it is difficult to apply existing methods to the development of...
-
Chapter and Conference Paper
Face Recognition for Mobile Self-authentication with Online Model Update
Face recognition system encounters complex change that varies over time, due to a limited control over the environment. So, the facial model of an individual tends to diverse from underlying distribution that ...
-
Article
Open AccessVibrio vulnificus quorum-sensing molecule cyclo(Phe-Pro) inhibits RIG-I-mediated antiviral innate immunity
The recognition of pathogen-derived ligands by pattern recognition receptors activates the innate immune response, but the potential interaction of quorum-sensing (QS) signaling molecules with host anti-viral ...
-
Article
Open AccessHA1077 displays synergistic activity with daclatasvir against hepatitis C virus and suppresses the emergence of NS5A resistance-associated substitutions in mice
The kinase C-related kinase 2 (PRK2), which phosphorylates hepatitis C virus (HCV) RNA polymerase, is a proviral factor enhancing HCV replication. Here, we report on the in vivo anti-HCV efficacy of HA1077, which...
-
Article
Surface-Plasmon Assisted Transmission Through an Ultrasmall Nanohole of ~ 10 nm with a Bull’s Eye Groove
We simulate the light transmission through an extremely small nanoscale aperture having a 10 nm diameter punctured in a metal film positioned at the center of a plasmonic bull’s eye grating. A considerable dir...
-
Article
Deep feature learning for person re-identification in a large-scale crowdsourced environment
Finding the same individual across cameras in disjoint views at different locations and times, which is known as person re-identification (re-id), is an important but difficult task in intelligent visual surve...
-
Article
Compact deep learned feature-based face recognition for Visual Internet of Things
The Visual Internet of Things has received much attention in recent years due to its ability to get the object location via image information of the scene, attach the visual label to the object, and then retur...
-
Chapter
Development of a Physical Security Gateway for Connectivity to Smart Media in a Hyper-Connected Environment
Due to the rapid technological growth of smart media and the rapid spread of convenience through increased convenience, most individuals have smart media, and many person information is stored on a server conn...
-
Chapter and Conference Paper
Design Considerations for an Intelligent Video Surveillance System Using Cloud Computing
Recently, deep neural network and cloud computing based intelligent video surveillance technology are growing interests in the industrial and academia. The synergy with both technologies emerges as a key role ...
-
Article
Genome divergence in Brassica rapa subspecies revealed by whole genome analysis on a doubled-haploid line of turnip
Subspecies of Brassica rapa are morphologically and genetically diverse, and include a variety of fresh vegetables grown worldwide. Among them, turnip (B. rapa subsp. rapa) produces a large bulbous taproot, and t...
-
Chapter and Conference Paper
Early Wildfire Detection Using Convolutional Neural Network
Wildfires are one of the disasters that are difficult to detect early and cause significant damage to human life, ecological systems, and infrastructure. There have been several research attempts to detect wi...
-
Article
A tiny retraction of the pars flaccida may conceal an attic cholesteatoma
The purpose of this study was to evaluate the possibility of attic cholesteatomas concealed within a tiny retraction of the pars flaccida (classification of Tos and Poulsen type I or II attic retraction) in pa...
-
Article
Open AccessThe role of N6-methyladenosine modification in the life cycle and disease pathogenesis of hepatitis B and C viruses
N6-methyladenosine (m6A) is the most prevalent modification of mammalian cellular RNAs. m6A methylation is linked to epigenetic regulation of several aspects of gene expression, including RNA stability, splicing,...
-
Article
Open AccessGenome-wide association study of resistance to anthracnose in pepper (Capsicum chinense) germplasm
Anthracnose is a fungal disease caused by Colletotrichum spp. that has a significant impact on worldwide pepper production. Colletotrichum scovillei is the most common pathogenic anthracnose-causing species in th...
-
Article
Exploring horticultural traits and disease resistance in Capsicum baccatum through segmental introgression lines
Segmental introgression and advanced backcross lines were developed and validated as important tools for improving agronomically important traits in pepper, offering improved sensitivity in detecting quantitat...