3,325 research outputs found

    Know2Look: Commonsense Knowledge for Visual Search

    No full text
    With the rise in popularity of social media, images accompanied by contextual text form a huge section of the web. However, search and retrieval of documents are still largely dependent on solely textual cues. Although visual cues have started to gain focus, the imperfection in object/scene detection do not lead to significantly improved results. We hypothesize that the use of background commonsense knowledge on query terms can significantly aid in retrieval of documents with associated images. To this end we deploy three different modalities - text, visual cues, and commonsense knowledge pertaining to the query - as a recipe for efficient search and retrieval

    Secured Aggregation for Privacy and Efficiency in Energy in WSN

    Get PDF
    The proposed system in WSN’s have many applications in critical secured areas, mostly in military applications, since it hides data using many nodes from third parties. The existing techniques uses hop by hop based protocols which does not provide efficiency in energy, due to which it may reveals large amount of data to the adversaries. There by loses its confidentiality of data. The proposed technique is best suited to overcome the constraints of the existing system. This uses end to end encryption which aggregates the encrypted data and sends to the base station, which provide a complete security, data freshness, confidentiality. Because of the aggregation of the encrypted data it reduces the energy consumption

    The mapping class group and the Meyer function for plane curves

    Full text link
    For each d>=2, the mapping class group for plane curves of degree d will be defined and it is proved that there exists uniquely the Meyer function on this group. In the case of d=4, using our Meyer function, we can define the local signature for 4-dimensional fiber spaces whose general fibers are non-hyperelliptic compact Riemann surfaces of genus 3. Some computations of our local signature will be given.Comment: 24 pages, typo adde

    Fabrication and characterization of a polymeric microcantilever with an encapsulated hotwire CVD polysilicon piezoresistor

    Get PDF
    We demonstrate a novel photoplastic nanoelectromechanical device that includes an encapsulated polysilicon piezoresistor. The temperature limitation that typically prevents deposition of polysilicon films on polymers was overcome by employing a hotwire CVD process. In this paper, we report the use of this process to fabricate and characterize a novel polymeric cantilever with an embedded piezoresistor. This device exploits the low Young's modulus of organic polymers and the high gauge factor of polysilicon. The fabricated device fits into the cantilever holder of an atomic force microscope (AFM) and can be used in conjunction with the AFM's liquid cell for detecting the adsorption of biochemicals. It enables differential measurement while preventing biochemicals from interfering with measurements using the piezoresistor. The mechanical and electromechanical characterization of the device is also reported in this paper

    A Large Blue Shift of the Biexciton State in Tellurium Doped CdSe Colloidal Quantum Dots

    Full text link
    The exciton-exciton interaction energy of Tellurium doped CdSe colloidal quantum dots is experimentally investigated. The dots exhibit a strong Coulomb repulsion between the two excitons, which results in a huge measured biexciton blue shift of up to 300 meV. Such a strong Coulomb repulsion implies a very narrow hole wave function localized around the defect, which is manifested by a large Stokes shift. Moreover, we show that the biexciton blue shift increases linearly with the Stokes shift. This result is highly relevant for the use of colloidal QDs as optical gain media, where a large biexciton blue shift is required to obtain gain in the single exciton regime.Comment: 9 pages, 4 figure

    Study of AC Transport Processes in Re (Y,Sm,Nd,Dy) BCO HTSC Samples in the Normal State

    Get PDF

    Utilizing Computational Complexity to Protect Cryptocurrency against Quantum Threats: A Review

    Full text link
    Digital currency is primarily designed on problems that are computationally hard to solve using traditional computing techniques. However, these problems are now vulnerable due to the computational power of quantum computing. For the postquantum computing era, there is an immense need to reinvent the existing digital security measures. Problems that are computationally hard for any quantum computation will be a possible solution to that. This research summarizes the current security measures and how the new way of solving hard problems will trigger the future protection of the existing digital currency from the future quantum threat
    corecore