A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Codes With Hierarchical Locality
[article]
2015
arXiv
pre-print
In this paper, we study the notion of codes with hierarchical locality that is identified as another approach to local recovery from multiple erasures. The well-known class of codes with locality is said to possess hierarchical locality with a single level. In a code with two-level hierarchical locality, every symbol is protected by an inner-most local code, and another middle-level code of larger dimension containing the local code. We first consider codes with two levels of hierarchical
arXiv:1501.06683v1
fatcat:k43iyd3vwfcibcmcpj3je74nqe
more »
... ty, derive an upper bound on the minimum distance, and provide optimal code constructions of low field-size under certain parameter sets. Subsequently, we generalize both the bound and the constructions to hierarchical locality of arbitrary levels.
Accessing the Data Security Model in Distributed System
2012
International Journal of Applied Information Systems
This research deals with the comparative study of distributed system and client/server computer system, placing a special emphasis is on security system. The researches describe the data security in these systems by describing them; examine their issues, challenges and presenting the adequate solutions. We have selected four type of distributed system and included a report on the basis of authorization, authentication, encryption, access control.
doi:10.5120/ijais12-450157
fatcat:d4svkkjh5zgj7ifhja7cltpg7q
Interactive Image Generation Using Scene Graphs
[article]
2019
arXiv
pre-print
Recent years have witnessed some exciting developments in the domain of generating images from scene-based text descriptions. These approaches have primarily focused on generating images from a static text description and are limited to generating images in a single pass. They are unable to generate an image interactively based on an incrementally additive text description (something that is more intuitive and similar to the way we describe an image). We propose a method to generate an image
arXiv:1905.03743v1
fatcat:cznovw7p5zbehj7nos5hqxorju
more »
... rementally based on a sequence of graphs of scene descriptions (scene-graphs). We propose a recurrent network architecture that preserves the image content generated in previous steps and modifies the cumulative image as per the newly provided scene information. Our model utilizes Graph Convolutional Networks (GCN) to cater to variable-sized scene graphs along with Generative Adversarial image translation networks to generate realistic multi-object images without needing any intermediate supervision during training. We experiment with Coco-Stuff dataset which has multi-object images along with annotations describing the visual scene and show that our model significantly outperforms other approaches on the same dataset in generating visually consistent images for incrementally growing scene graphs.
Ford Multi-AV Seasonal Dataset
[article]
2020
arXiv
pre-print
The ground truth pose is generated using full bundle adjustment; this method has been popularly used in the community (Castorena and Agarwal 2017; Wolcott et al. 2017 ). ...
arXiv:2003.07969v1
fatcat:fn45licsn5gw3auad5mbq6bf6i
On Secure Network Coding for Multiple Unicast Traffic
[article]
2019
arXiv
pre-print
This paper investigates the problem of secure communication in a wireline noiseless scenario where a source wishes to communicate to a number of destinations in the presence of a passive external adversary. Different from the multicast scenario, where all destinations are interested in receiving the same message, in this setting different destinations are interested in different messages. The main focus of this paper is on characterizing the secure capacity region, when the adversary has
arXiv:1901.02787v1
fatcat:dqaefuw7lzf7pk7o5bzu7kzqly
more »
... ed computational capabilities, but limited network presence. First, an outer bound on the secure capacity region is derived for arbitrary network topologies and general number of destinations. Then, secure transmission schemes are designed and analyzed in terms of achieved rate performance. In particular, for the case of two destinations, it is shown that the designed scheme matches the outer bound, hence characterizing the secure capacity region. It is also numerically verified that the designed scheme matches the outer bound for a special class of networks with general number of destinations, referred to as combination network. Finally, for an arbitrary network topology with general number of destinations, a two-phase polynomial time in the network size scheme is designed and its rate performance is compared with the capacity-achieving scheme for networks with two destinations.
BIOMEDICAL WASTE: CURRENT MANAGEMENT OPTIONS AND RECOMMENDATION FOR PROSTHODONTIST, ENDODONTIST AND RADIOLOGIST
2019
Zenodo
Aim: Our aim was to come forward and provide recommendations to Prosthodontist, Endodontist and Radiologist on the issue of biomedical waste management i.e. management of waste generated by them. Material & Method: A thorough computer search using PubMed, Google Scholar, Wikipedia and Yahoo search engine, search through cross-references and hand search in the libraries was performed.With this agroup of practitioner, academic scholars and other prominent persons of the field were consulted and a
doi:10.5281/zenodo.3365173
fatcat:v2zsebcm3zdglerjc76jtx7toa
more »
... questioneare was designed. Their after the recommendations were drafted. Results: Biomedical waste likeImpression materials waste, Titanium based waste, Metal based waste, Zinc based waste, Gypsum based waste, Resin based waste and Ceramic waste, need a very precise and specific management. Conclusion: Mishandling of biomedical waste (both infected and non-infected) is a growing problem for our self and society. Lack of awareness is adding a big amount of fuel to this fire. If proper segregation, collection, transportation and final disposal protocols are followed from the point of generation (keeping in mind the harmful effects on our self and our environment), we can reduce a lot of non-infected waste turning to infected ones and contribute in the safety of generations to come.
Locally Advanced Carcinoma of Maxillary Sinus with Orbital Involvement
2020
Asian Journal of Oncology
AbstractMaxillary sinus carcinoma is a rare neoplasm, with incidence of 0.2 to 0.8% of all systemic malignancies. Patients are diagnosed in the advanced stage when there is orbital invasion with abnormal ocular signs and symptoms. The standard treatment of maxillary sinus carcinoma is en bloc radical maxillectomy along with orbital exenteration, followed by postoperative adjuvant therapy. Orbital exenteration is used when the malignancy extends to the orbit in case of squamous/basal cell
doi:10.1055/s-0040-1714308
fatcat:guo34fjybzfmnihg6uwf7ykg4m
more »
... ma. The aim of the current review is to provide an insight into the management of advanced maxillary carcinoma with orbital involvement in a 42-year-old male.
Detailed Study of AI/ML in Smart Agriculture
2021
International Journal of Scientific Research in Computer Science Engineering and Information Technology
This work explores the tools and technologies used in smart agriculture. Artificial Intelligence and Machine Learning techniques, including basic block models that are used to do smart agriculture. How can we use fuzzy logic and Artificial Neural Network, is also covered in this paper. We have explored some of the IOT based irrigation systems including crop prediction systems. The necessary hardware, software and sensors that can be used to make precision agriculture are also included. The main
doi:10.32628/cseit21734
fatcat:rnlk66qtdjciliucrxb6dx2gte
more »
... motto of this paper is to get a detailed literature review that is required for smart agriculture.
Aerial Imagery based LIDAR Localization for Autonomous Vehicles
[article]
2020
arXiv
pre-print
In
Fig. 7 : 7 Localization
Ankit Vora and Siddharth Agarwal are with Ford AV LLC, Dearborn, MI, USA {avora3,sagarw20}@ford.com Gaurav Pandey and James McBride are with Ford Motor Company, Dearborn, ...
Ankit Vora and Siddharth Agarwal are co-first authors 1 In this paper, we propose a system which exploits publicly available aerial imagery to create a prior map. ...
arXiv:2003.11192v1
fatcat:thsizvjxyrh7bbikdb2cg3jckm
Hate speech detection using static BERT embeddings
[article]
2021
arXiv
pre-print
With increasing popularity of social media platforms hate speech is emerging as a major concern, where it expresses abusive speech that targets specific group characteristics, such as gender, religion or ethnicity to spread violence. Earlier people use to verbally deliver hate speeches but now with the expansion of technology, some people are deliberately using social media platforms to spread hate by posting, sharing, commenting, etc. Whether it is Christchurch mosque shootings or hate crimes
arXiv:2106.15537v1
fatcat:bw3znnhsufhgbcqfg7gamne6gy
more »
... gainst Asians in west, it has been observed that the convicts are very much influenced from hate text present online. Even though AI systems are in place to flag such text but one of the key challenges is to reduce the false positive rate (marking non hate as hate), so that these systems can detect hate speech without undermining the freedom of expression. In this paper, we use ETHOS hate speech detection dataset and analyze the performance of hate speech detection classifier by replacing or integrating the word embeddings (fastText (FT), GloVe (GV) or FT + GV) with static BERT embeddings (BE). With the extensive experimental trails it is observed that the neural network performed better with static BE compared to using FT, GV or FT + GV as word embeddings. In comparison to fine-tuned BERT, one metric that significantly improved is specificity.
Pediatric and adolescent pheochromocytoma: Clinical presentation and outcome of surgery
2014
Indian Pediatrics
Objectives: To describe the clinical presentation and outcome of surgery in children with pheochromocytoma in a tertiary care hospital in India. Methods: Clinical records of 24 children who were operated between January 1990 and January 2011 were reviewed. The diagnosis of familial disease was established based on clinical examination and follow-up events. Results: Familial, bilateral, extra-adrenal and malignant pheochromocytoma were observed in 20.8%, 20.8%, 12.5% and 4.2% children,
doi:10.1007/s13312-014-0397-9
pmid:24825268
fatcat:jahw6tisljhc3gvfmashgarec4
more »
... ly. Median follow-up duration was 36 months. Persistent hypertension was noted in 12.5% patients and similar proportion died in follow-up. Conclusions: In the absence of routine genetic screening, good history and long-term follow up are essential to rule out familial pheochromocytoma.
Solving Physics Puzzles by Reasoning about Paths
[article]
2020
arXiv
pre-print
We propose a new deep learning model for goal-driven tasks that require intuitive physical reasoning and intervention in the scene to achieve a desired end goal. Its modular structure is motivated by hypothesizing a sequence of intuitive steps that humans apply when trying to solve such a task. The model first predicts the path the target object would follow without intervention and the path the target object should follow in order to solve the task. Next, it predicts the desired path of the
arXiv:2011.07357v1
fatcat:4xs7uvzvrbejvakfs2wu7xgnry
more »
... ion object and generates the placement of the action object. All components of the model are trained jointly in a supervised way; each component receives its own learning signal but learning signals are also backpropagated through the entire architecture. To evaluate the model we use PHYRE - a benchmark test for goal-driven physical reasoning in 2D mechanics puzzles.
Distorting an Adversary's View in Cyber-Physical Systems
[article]
2018
arXiv
pre-print
In Cyber-Physical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for CPSs security, is not only more appropriate for these applications but also quite frugal in
arXiv:1809.04580v1
fatcat:3a7lay2w2zeydfhgfdr7dbu6we
more »
... rms of prior requirements on shared keys. In this paper, we propose distortion-based metrics to protect CPSs communication and show that it is possible to confuse adversaries with just a few bits of pre-shared keys.
Circumcaval ureter/retrocaval ureter
2018
BMJ Case Reports
DesCripTion A 33-year-old non-diabetic married woman from rural background presented with complaints of dull intermittent right flank pain since 1 year. She had no history of fever, dysuria, haematuria or weight loss. Clinical examination of the abdomen was within normal limits. Complete laboratory evaluation including urinalysis, complete blood picture, urea, creatinine and electrolytes were within normal limits. Ultrasonography (USG) of kidney, ureters and bladder showed moderate
doi:10.1136/bcr-2018-225449
pmid:29898913
pmcid:PMC6011506
fatcat:zeepgoynzzgdffd5xtmkl4xmba
more »
... ephrosis (HDUN) until right midureter. Intravenous pyelography (IVP) revealed dilated right renal pelvicalyceal system and upper ureter with abrupt S-shaped turn of ureter at the level of L4 vertebrae. The appearance on IVP was strongly suspicious of retrocaval ureter and hence a contrast-enhanced CT urography was performed to confirm the diagnosis, which showed dilated right proximal ureter (figure 1) coursing medially and lying posterior to inferior vena cava (IVC). Three-dimensional reconstruction from CT urography showed proximal HDUN and classical S-shaped loop of the ureter behind the IVC (figure 2). Diuretic renal scan (Tc-99m diethylene-triamine-penta-acetic acid) showed reduced right renal function with obstructed, hydroureteronephrotic drainage. After informed consent of the patient was taken, a right ureteroureterostomy was performed after mobilising ureter anterior to IVC. Retrocaval ureter is also known as circumcaval ureter. It is a term used to describe an abnormal course of a ureter that encircles the IVC. Both of these terms are somewhat misleading, as this configuration is considered a developmental anomaly of the IVC. It results from abnormal persistence of right subcardinal vein ventral to ureter during embryogenesis of IVC. The developing right ureter courses behind and medial to IVC over pedicle of L3-L4 vertebrae then exits between IVC and aorta returning to its normal position. This produces varying degree of HDUN. 1 2 The overall incidence of retrocaval ureter is 0.07% with male to female ratio of 3:1. Most patients are asymptomatic with most common presenting feature being flank pain and/ or recurrent urinary tract infections due to urinary stasis. Figure 1 CT urography of 33-year-old woman showing right retrocaval ureter. Figure 2 Reconstruction image of the same patient showing proximal h ydroureteronephrosis and classical S-shaped loop of the ureter behind the inferior vena cava. Figure 3 Postoperative intravenous pyelography film done after 6 months showing point of anastomosis and complete resolution of hydroureteronephrosis.
Determination of genial tubercle position and dimensions using cone-beam computerised tomography
2012
Indian Journal of Medical Specialities
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (creativecommons.org/licenses/by/3.0) Conflict of interest: None declared | Source of funding: Nil | DOI: http://dx.Abstract Objective: To evaluate the position and dimensions of the genial tubercle. Study Design: Cone-beam computed tomography (CT) records of 36 adult patients with Class I or Class II skeletal type were used to evaluate the position and dimensions of the genial tubercle and
doi:10.7713/ijms.2012.0064
fatcat:f7djzw6v7zcfrb3o4tfqurtg2y
more »
... ensions of the anterior mandible. Subjects were grouped by sex and skeletal type. Results: In all groups, the genial tubercle width was close to the genial tubercle height. The distance from the inferior border of the genial tubercle to the inferior border of the mandible was greater in Class II male patients than in Class I female patients (p < 0.05). The anterior mandible in Class I male patients was thicker than in Class II female patients (p < 0.05). Conclusions: The variable position and dimensions of this structure among patients suggest the need for cone-beam CT before attempting genioglossus advancement to treat obstructive sleep apnoea.
« Previous
Showing results 1 — 15 out of 750 results