2,056 research outputs found
EFFICACY OF SUTURE VERSUS SUTURELESS TECHNIQUE AFTER PERIODONTAL FLAP SURGERY – A SPLIT MOUTH STUDY
Suturing is an integral part of periodontal flap surgery, but it has disadvantages such as difficulty in maintaining oral hygiene, increased post-operative discomfort, and higher infection rate. To overcome these problems, a search for an alternative like tissue adhesives, possibly a sutureless technique has been experimented. The aim of the study was to compare the stability & healing properties after periodontal flap surgery using tissue adhesive and surgical sutures
Spoof detection using time-delay shallow neural network and feature switching
Detecting spoofed utterances is a fundamental problem in voice-based
biometrics. Spoofing can be performed either by logical accesses like speech
synthesis, voice conversion or by physical accesses such as replaying the
pre-recorded utterance. Inspired by the state-of-the-art \emph{x}-vector based
speaker verification approach, this paper proposes a time-delay shallow neural
network (TD-SNN) for spoof detection for both logical and physical access. The
novelty of the proposed TD-SNN system vis-a-vis conventional DNN systems is
that it can handle variable length utterances during testing. Performance of
the proposed TD-SNN systems and the baseline Gaussian mixture models (GMMs) is
analyzed on the ASV-spoof-2019 dataset. The performance of the systems is
measured in terms of the minimum normalized tandem detection cost function
(min-t-DCF). When studied with individual features, the TD-SNN system
consistently outperforms the GMM system for physical access. For logical
access, GMM surpasses TD-SNN systems for certain individual features. When
combined with the decision-level feature switching (DLFS) paradigm, the best
TD-SNN system outperforms the best baseline GMM system on evaluation data with
a relative improvement of 48.03\% and 49.47\% for both logical and physical
access, respectively
A Study On External Environment Of Business And Its Influence On Msmes In The Context Of Covid-19
Businesses across the globe has decided ‘just to survive apart from making huge profit’, from a global pandemic which has created huge disaster to economy of almost all countries in the world. In India pharmaceutical industry is improving its status day by day, on the other hand travel and tourism industry, entertainment sector, market for luxury products and services is deteriorating among which the drastic-hit is the MSMEs.This study aims at analysing various external factors influencing the performance of business especially during times of COVID-19 pandemic, those factors include political, social, cultural,economic, legal, technological, etc., The study aims at finding out those external factor and potential ways to recover from the losses incurred
Liver Tumour Detection for Ct Images
A cancer is an abnormal growth of cells typically derived from a single abnormal cell. Detection of liver tumour in early stage is important for the prevention of liver tumour. Many techniques have been developed for the detection of liver tumour from CT images. Treatment of any cancer mainly depends on tumour size and grading. Hepatocellular carcinoma is the most common type of liver cancer. Diagnosis involves CT scan of abdomen provides accurate results. Tumour segmentation in liver CT images is a challenging task. This paper deals with the detection of liver tumour from CT images. Implementation of FCM technique and some default tools help to detect the shape of tumour. Finally the tumour part is extracted from CT images and its exact position and shape is determined to calculate the abnormality are
Recommended from our members
Innovative Approaches to Emergency Medical Services Fellowship Challenges
Introduction: Since the development of an Accreditation Council of Graduate Medical Education (ACGME)-accredited emergency medical services (EMS) fellowship, there has been little published literature on effective methods of content delivery or training modalities. Here we explore a variety of innovative approaches to the development and revision of the EMS fellowship curriculum.Methods: Three academic, university-based ACGME-accredited EMS fellowship programs each implemented an innovative change to their existing training curricula. These changes included the following: a novel didactic curriculum delivery modality and evaluation; implementation of a distance education program to improve EMS fellows’ rural EMS experiences; and modification of an existing EMS fellowship curriculum to train a non-emergency medicine physician.Results: Changes made to each of the above EMS fellowship programs addressed unique challenges, demonstrating areas of success and promise for more generalized implementation of these curricula. Obstacles remain in tailoring the described curricula to the needs of each unique institution and system.Conclusion: Three separate curricula and program changes were implemented to overcome specific challenges and achieve educational goals. It is our hope that our shared experiences will enable others in addressing common barriers to teaching the EMS fellowship core content and share similar innovative approaches to educational challenges
Analysis of Security methods in Internet of Things
Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. In addition, the Internet of Things can be providing variety applications via convergence with other technology such as machine-to-machine, Wireless Sensor Network, and Web technology. In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated communication that can be applied in IoT environment.
DOI: 10.17762/ijritcc2321-8169.16044
C# Application to Deal with Neutrosophic g(alpha)-Closed Sets In Neutrosophic Topology
In this paper, we have developed a C# Application for finding the values of the complement, union, intersection and the inclusion of any two neutrosophic sets in the neutrosophic field by using .NET Framework, Microsoft Visual Studio and C# Programming Language. In addition to this, the system can find neutrosophic topology, neutrosophic alpha-closed sets and neutrosophic g(alpha)-closed sets in each resultant screens. Also, this computer-based application produces the complement values of each neutrosophic closed sets
- …