- Service-Oriented Architecture and Web Services
- Semantic Web and Ontologies
- Business Process Modeling and Analysis
- Access Control and Trust
- Advanced Database Systems and Queries
- Biomedical Text Mining and Ontologies
- Multi-Agent Systems and Negotiation
- Cryptography and Data Security
- Mobile Agent-Based Network Management
- Privacy-Preserving Technologies in Data
- Bioinformatics and Genomic Networks
- Data Management and Algorithms
- Peer-to-Peer Network Technologies
- Data Mining Algorithms and Applications
- Cloud Data Security Solutions
- Big Data and Business Intelligence
- Software Engineering Research
- Blockchain Technology Applications and Security
- Web Data Mining and Analysis
- Distributed and Parallel Computing Systems
- Data Quality and Management
- Lymphoma Diagnosis and Treatment
- Advanced Software Engineering Methodologies
- Scientific Computing and Data Management
- Model-Driven Software Engineering Techniques
Beijing Jiaotong University
2025
University of Wisconsin Carbone Cancer Center
2011-2024
University of Wisconsin–Madison
2011-2024
Griffith University
2022-2024
Columbia University
2024
Virginia Commonwealth University
2024
Rutgers, The State University of New Jersey
2019-2023
The University of Melbourne
2023
Taipei Medical University
2017-2023
Tenaga Nasional Berhad (Malaysia)
2023
Many believe that Cloud will reshape the entire ICT industry as a revolution. In this paper, we aim to pinpoint challenges and issues of computing. We first discuss two related computing paradigms - Service-Oriented Computing Grid computing, their relationships with then identify several from adoption perspective. Last, highlight interoperability issue deserves substantial further research development.
Watermarking, which belong to the information hiding field, has seen a lot of research interest. There is work begin conducted in different branches this field. Steganography used for secret communication, whereas watermarking content protection, copyright management, authentication and tamper detection. In paper we present detailed survey existing newly proposed steganographic techniques. We classify techniques based on domains data embedded. limit images only.
Wireless sensor networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. However these sensors operate under extreme energy constraints and designed by keeping application in mind. Designing new wireless node is extremely challenging task involves assessing number different parameters required the target application, which includes range, antenna type, technology, components, memory, storage, power, life time,...
This paper proposes a novel neural network (NN) training method that employs the hybrid exponential smoothing and Levenberg-Marquardt (LM) algorithm, which aims to improve generalization capabilities of previously used methods for NNs short-term traffic flow forecasting. The approach uses preprocess data by removing lumpiness from collected data, before employing variant LM algorithm train NN weights an model. aids training, as preprocessed are more smooth continuous than original...
Smart grids are robust, self-healing networks that allow bidirectional propagation of energy and information within the utility grid. This introduces a new type user who consumes, produces, stores shares with other grid users. Such is called “prosumer.” Prosumers’ participation in smart critical for sustainability long-term efficiency sharing process. Thus, prosumer management has attracted increasing attention among researchers recent years. paper systematically examines literature on...
Cloud computing has been a hot topic in the research community since 2007. In cloud computing, online services are conducted to be pay-as-you-use. Service customers need not long term contract with service providers. level agreements (SLAs) signed between provider and another party such as consumer, broker agent, or monitoring agent. Because is recent technology providing many for critical business applications, reliable flexible mechanisms manage contracts very important. This paper...
Background As stem cells of the early embryo mature and differentiate into all tissues, mitochondrial complement undergoes dramatic functional improvement. Mitochondrial activity is low to minimize generation DNA-damaging reactive oxygen species during pre-implantation development increases following implantation differentiation meet higher metabolic demands. It has recently been reported that when cell type known as induced pluripotent (IPSCs) are re-differentiated for several weeks in...
Digital ecosystems transcend the traditional, rigorously defined, collaborative environments from centralised, distributed or hybrid models into an open, flexible, domain cluster, demand-driven, interactive environment. A digital ecosystem is a newly networked architecture and environment that addresses weakness of client-server, peer-to-peer, grid, Web services. In this paper we provide explanation ecosystems, their analogy to ecological systems, architecture, swarm intelligence, comparison...
Cloud computing is a new form of technology, which infrastructure, developing platform, software, and storage can be delivered as service in pay you use cost model. However, for critical business application more sensitive information, cloud providers must selected based on high level trustworthiness. In this paper, we present trust model to evaluate services order help users select the most reliable resources. We integrate our previous work "conceptual SLA framework computing" with proposed...
As therapeutic options and supportive care for the treatment of neoplastic disease have improved, there has been an associated increase in incidence leptomeningeal disease. In this review, clinical presentation, natural history, diagnostic evaluation, often devastating sequela solid tumors, lymphoma, leukemia will be summarized. The efficacy ionizing radiation, systemic agents, intrathecal drugs examined from existing literature. Additionally pathophysiology, which part defines limitations...
Background Human induced pluripotent stem cells (IPSCs) have enormous potential in the development of cellular models human disease and represent a source autologous tissues for therapeutic use. A question remains as to biological age IPSCs, particular when isolated from older subjects. Studies cloned animals indicate that somatic reprogrammed pluripotency variably display telomere elongation, common indicator cell "rejuvenation." Methodology/Principal Findings We examined lengths skin...
For more than thirty years, the dog has been used as a model for human diseases. Despite efforts made to develop canine embryonic stem cells, success elusive. Here, we report generation of induced pluripotent cells (ciPSCs) from adult fibroblasts, which accomplished by introducing OCT4, SOX2, c-MYC, and KLF4. The ciPSCs expressed critical pluripotency markers showed evidence silencing viral vectors normal karyotypes. Microsatellite analysis indicated that same profile donor fibroblasts but...