![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessFactors associated with engraftment success of patient-derived xenografts of breast cancer
Patient-derived xenograft (PDX) models serve as a valuable tool for the preclinical evaluation of novel therapies. They closely replicate the genetic, phenotypic, and histopathological characteristics of prima...
-
Article
Open AccessProteomic analysis of breast cancer based on immune subtypes
Immunotherapy is applied to breast cancer to resolve the limitations of survival gain in existing treatment modalities. With immunotherapy, a tumor can be classified into immune-inflamed, excluded and desert b...
-
Article
Scalable Production of High Performance Flexible Perovskite Solar Cells via Film-Growth-Megasonic-Spray-Coating System
Commercialization of flexible perovskite solar cells requires an effective scalable coating system that overcomes the inadequate wettability of conventional polymer-based flexible substrates. In this study, we...
-
Article
Open AccessSpider-inspired tunable mechanosensor for biomedical applications
The recent advances of wearable sensors are remarkable but there are still limitations that they need to be refabricated to tune the sensor for target signal. However, biological sensory systems have the inher...
-
Article
New susceptible locus, rs9428555, is associated with pediatric-onset immunoglobulin A nephropathy and immunoglobulin A vasculitis in Koreans
Immunoglobulin A nephropathy (IgAN) is one of the most common primary forms of glomerulonephritis, while IgA vasculitis (IgAV) is the most common systemic vasculitis in children.
-
Article
Multiscale modeling and integration of a combined cycle power plant and a two-tank thermal energy storage system with gPROMS and SimCentral
With different computational tools, simulations ranging from detailed and rigorous mathematical models to overall process plant of black box models can be carried out. Whereas most of these computational tools...
-
Article
Deep color transfer using histogram analogy
We propose a novel approach to transferring the color of a reference image to a given source image. Although there can be diverse pairs of source and reference images in terms of content and composition simila...
-
Article
Open AccessNature-inspired rollable electronics
Inspired by the rolling mechanism of the proboscis of a butterfly, rollable electronics that can be rolled and unrolled to a great extent on demand are developed. Generally, electronic devices that are attache...
-
Article
Open AccessUltra-sensitive Pressure sensor based on guided straight mechanical cracks
Recently, a mechanical crack-based strain sensor with high sensitivity was proposed by producing free cracks via bending metal coated film with a known curvature. To further enhance sensitivity and controllabi...
-
Chapter and Conference Paper
Lightweight IEC 61850 Secure Communication Module for Microgrids
Microgrid systems use distributed renewable energy resources to reduce dependency of traditional power systems. These energy devices are located at various places because of their characteristic and communicat...
-
Article
Open AccessHigh-performance Fuel Cell with Stretched Catalyst-Coated Membrane: One-step Formation of Cracked Electrode
We have achieved performance enhancement of polymer electrolyte membrane fuel cell (PEMFC) though crack generation on its electrodes. It is the first attempt to enhance the performance of PEMFC by using cracks...
-
Article
An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks
The routing misbehavior is one of the most serious threats to wireless ad hoc networks where nodes are not forwarding messages correctly. Once the attack has been launched, nodes in the network are not able to...
-
Article
IO–MAC: An Enhancement of IEEE 802.11 DCF Using Implicit Ordering
In this paper, we present a novel medium access control protocol which is based on the IEEE 802.11 distributed coordination function (DCF) and embeds new capability allowing stations to make use of implicit or...
-
Chapter and Conference Paper
Testing the Differential Impact of Structural Paths in PLS Analysis: A Bootstrap** Approach
Researchers are often interested in examining the relative impact of PLS structural paths. As such, this paper focuses on how one assesses the impact of various antecedent constructs to a particular endogenous...
-
Chapter and Conference Paper
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments
In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an ...
-
Chapter and Conference Paper
An Effective Method for Location Privacy in Ubiquitous Computing
In ubiquitous computing environment, every service should have the characteristic of context-awareness. Since physical location is important information to grasp a user’s context, the service provider should m...
-
Chapter and Conference Paper
RPS: An Extension of Reference Monitor to Prevent Race-Attacks
Most software involves some vulnerabilities because of various potential factors such as design flaw and program bug. Among them, a faulty assumption on file access results in a side-effect as known TOCTTOU vu...
-
Chapter and Conference Paper
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction
The intrusion detection system (IDS) is used as one of the solutions against the Internet attack. However the IDS reports extremely many alerts as compared with the number of the real attack. Thus the operator...
-
Chapter and Conference Paper
Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs
The attribute oriented induction (AOI) is a kind of aggregation method. By generalizing the attributes of the alert, it creates several clusters that includes a set of alerts having similar or the same cause. ...
-
Chapter and Conference Paper
Effective Web-Related Resource Security Using Distributed Role Hierarchy
The recent trend of access control on the Web-related resource is that the service provider differentiates services according to the user’s attributes such as membership class or job position. For proper and s...