911 research outputs found

    M^2UNet: MetaFormer Multi-scale Upsampling Network for Polyp Segmentation

    Full text link
    Polyp segmentation has recently garnered significant attention, and multiple methods have been formulated to achieve commendable outcomes. However, these techniques often confront difficulty when working with the complex polyp foreground and their surrounding regions because of the nature of convolution operation. Besides, most existing methods forget to exploit the potential information from multiple decoder stages. To address this challenge, we suggest combining MetaFormer, introduced as a baseline for integrating CNN and Transformer, with UNet framework and incorporating our Multi-scale Upsampling block (MU). This simple module makes it possible to combine multi-level information by exploring multiple receptive field paths of the shallow decoder stage and then adding with the higher stage to aggregate better feature representation, which is essential in medical image segmentation. Taken all together, we propose MetaFormer Multi-scale Upsampling Network (M2^2UNet) for the polyp segmentation task. Extensive experiments on five benchmark datasets demonstrate that our method achieved competitive performance compared with several previous methods

    Blind multi-signature scheme based on factoring and discrete logarithm problem

    Get PDF
    One of the important objectives of information security systems is providing authentication of the electronic documents and messages. In that, blind signature schemes are an important solution to protect the privacy of users in security electronic transactions by highlighting the anonymity of participating parties. Many studies have focused on blind signature schemes, however, most of the studied schemes are based on single computationally difficult problem. Also digital signature schemes from two difficult problems were proposed but the fact is that only finding solution to single hard problem then these digital signature schemes are breakable. In this paper, we propose a new signature schemes base on the combination of the RSA and Schnorr signature schemes which are based on two hard problems: IFP and DLP. Then expanding to propose a single blind signature scheme, a blind multi-signature scheme, which are based on new baseline schemes

    Failure of Embankment on Soil-Cement Columns for Thi Vai Port, Vietnam

    Get PDF
    The Thi Vai Container Port is constructed on reclaimed ground along the Thi Vai River in the Mekong delta approximately 90 km southeast of Ho Chi Minh City, Vietnam. The soil profile consists of an about 15 to 23 m thick deposit of soft, normally consolidated, highly compressible clay deposited on dense to compact sand. A soil improvement scheme was instigated aiming to reduce long-term settlement after construction of the facilities and improve the stability of the river bank. The scheme combined wick drains and, along the river bank, soil cement columns and toe revetments. The wick drains were installed at a spacing of about 1.5 m and a staged surcharge was placed to a maximum height of 6 through 6.6 m to bring about the consolidation of the clay. After a surcharge height of 4.7 m had been in place for about three months and the measured settlement was about 1.2 m, a slope failure occurred along about 200 m length of the riverbank. An investigation indicated that the three-month consolidation period had not increased clay undrained shear strength as anticipated and that the slope failure had broken the soil cement columns at about 11 m depth below the original ground surface. Costs to remedy the collapsed and damaged area amounted to about US$10 million. The paper presents the background information, soil failure details, results of bank stability analyses, and the solution chosen for the remedial construction

    The role of environmental, social, and governance responsibilities and economic development on achieving the SDGs: evidence from BRICS countries

    Get PDF
    Sustainable development goal (SDG) achievement has gained increasing trend due to the current economic uncertainty that demands the attention of scholars, practitioners, and regulators. Hence, the study examines the environmental, social, and governance (ESG) responsibilities and economic development such as economic growth, net national income and FDI on the SDG achievements in BRICS countries. The secondary data is considered for the study which was collected from various resources like SDG reports published by the united nation and World Bank Indicators (WDI) from 1991 to 2020. The current research has checked them without structural breaks stationarity using Dickey-Fuller (ADF) test, Phillips–Perron (PP) test, and Kwiatkowski–Phillips–Schmidt–Shin (KPSS), while stationarity with structural breaks has been examined using the ‘zivot-andrews’ test. The study also employed the ARDL technique to verify the association among the constructs. The findings revealed that ESG responsibilities, economic growth, net national income, FDI, and inflation positively correlate with SDG achievements in BRICS countries. This article provides help to the regulators while making policies related the SDG achievemen

    New Blind Muti-signature Schemes based on ECDLP

    Get PDF
    In various types of electronic transactions, including election systems and digital cash schemes, user anonymity and authentication are always required. Blind signatures are considered the most important solutions to meeting these requirements. Many studies have focused on blind signature schemes; however, most of the studied schemes are single blind signature schemes. Although blind multi-signature schemes are available, few studies have focused on these schemes. In this article, blind multi-signature schemes are proposed based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). The proposed schemes are based on the GOST R34.10-2012 digital signature standard and the EC-Schnorr digital signature scheme, and they satisfy blind multi-signature security requirements and have better computational performance than previously proposed schemes. The proposed schemes can be applied in election systems and digital cash schemes

    Linear topological invariants of spaces of holomorphic functions in infinite dimension

    Get PDF
    It is shown that if EE is a Frechet space with the strong dual E∗E^* then Hb(E∗)H_b(E^*), the space of holomorphic functions on E∗E^* which are bounded on every bounded set in E∗E^*, has the property (DN)(DN) when E∈(DN)E\in (DN) and that Hb(E∗)∈(Ω)H_b(E^*)\in(\Omega) when E∈(Ω)E\in (\Omega) and either E∗E^* has an absolute basis or EE is a Hilbert-Frechet-Montel space. Moreover the complementness of ideals J(V)J(V) consisting of holomorphic functions on E∗E^* which are equal to 00 on VV in H(E∗)H(E^*) for every nuclear Frechet space EE with E∈(DN)∩(Ω)E\in (DN)\cap (\Omega) is stablished when J(V)J(V) is finitely generated by continuous polynomials on E∗E^*

    Analysis of Piled-Raft Foundation for CAI MEP Container Port, Vietnam

    Get PDF
    During the last decade, a series of ports are being built along the Thi Vai River in the Mekong delta approximately 80 km southeast of Ho Chi Minh City, Vietnam. The ports are built on reclaimed ground over an about 30 to 40 m thick deposit of soft, normally consolidated, compressible clay deposited on dense to compact sand The deep foundation system typically used for buildings in this region consists of pretensioned spun high strength concrete piles driven to significant toe bearing in dense soils. Because of the anticipated significant costs of this solution, a more economical alternative foundation system was essential, and the alternative of a shaft bearing pile, a precast concrete pile, was proposed for Cai Mep Container Port. To reduce settlements, a soil improvement scheme was imposed, consisting of wick drains installed through the clay to the sand and placing an up to 8 m thick surcharge over the area. After removal of the surcharge, piled-raft foundations were constructed for the Port building, incorporating 400 mm square, precast concrete piles, which were driven to depths of 18 m. Settlement monitoring showed that the area and the piles continued to settle after the removal of the surcharge, indicating that consolidation settlement had not been completed despite the about 18 months long surcharge period. It became clear that the long-term settlements, primarily due to downdrag, would exceed the limit of maximum 400 mm over a 20-year period. In order to remedy the situation, the piles were lengthened to a total length of 44 m to ensure that the neutral plane was located in the sand, where no long-term settlement would occur. The problem and its solution were analyzed by means of the Unified Design Method. The remedial solution added about US$2 million to the project and caused a 12-month delay

    A STATISTICAL APPROACH FOR PACKER IDENTIFICATION

    Get PDF
    Most of modern malware are packed by packers which automatically generate a lot of obfuscation techniques to defeat the anti-virus software. To identify packer, most of industry approaches still adopt the well-known technique of signature matching which can be easily evaded. This paper studies the new approach of applying a statistical approach to tackle this problem. We propose a new weight for extracting what obfuscation techniques might be more favourable in packers. We call it obfuscation technique frequency-inverse packer frequency ( ). As the term implies, calculates values for each obfuscation techniques in a packer through an inverse proportion of the frequency of the obfuscation technique in a particular packer to the percentage of packers the obfuscation technique appears in. Obfuscation techniques with high value show a strong relationship with the packer they appear in. Based on this weight, packer is represented by a vector of . Then the used packer is identified by measuring the similarity between vectors of packer and targeted file. For checking the accuracy of our approach, we have performed the experiments of identifying packer on 200 real-world malware for comparing between our approach with the binary signature technique adopted in CFF Explorer. The result shows that our technique produces the better detection
    • 

    corecore