3,507 research outputs found
Know2Look: Commonsense Knowledge for Visual Search
With the rise in popularity of social media, images accompanied by contextual text form a huge section of the web. However, search and retrieval of documents are still largely dependent on solely textual cues. Although visual cues have started to gain focus, the imperfection in object/scene detection do not lead to significantly improved results. We hypothesize that the use of background commonsense knowledge on query terms can significantly aid in retrieval of documents with associated images. To this end we deploy three different modalities - text, visual cues, and commonsense knowledge pertaining to the query - as a recipe for efficient search and retrieval
Secured Aggregation for Privacy and Efficiency in Energy in WSN
The proposed system in WSN’s have many applications in critical secured areas, mostly in military applications, since it hides data using many nodes from third parties. The existing techniques uses hop by hop based protocols which does not provide efficiency in energy, due to which it may reveals large amount of data to the adversaries. There by loses its confidentiality of data. The proposed technique is best suited to overcome the constraints of the existing system. This uses end to end encryption which aggregates the encrypted data and sends to the base station, which provide a complete security, data freshness, confidentiality. Because of the aggregation of the encrypted data it reduces the energy consumption
The mapping class group and the Meyer function for plane curves
For each d>=2, the mapping class group for plane curves of degree d will be
defined and it is proved that there exists uniquely the Meyer function on this
group. In the case of d=4, using our Meyer function, we can define the local
signature for 4-dimensional fiber spaces whose general fibers are
non-hyperelliptic compact Riemann surfaces of genus 3. Some computations of our
local signature will be given.Comment: 24 pages, typo adde
Fabrication and characterization of a polymeric microcantilever with an encapsulated hotwire CVD polysilicon piezoresistor
We demonstrate a novel photoplastic nanoelectromechanical device that includes an encapsulated polysilicon piezoresistor. The temperature limitation that typically prevents deposition of polysilicon films on polymers was overcome by employing a hotwire CVD process. In this paper, we report the use of this process to fabricate and characterize a novel polymeric cantilever with an embedded piezoresistor. This device exploits the low Young's modulus of organic polymers and the high gauge factor of polysilicon. The fabricated device fits into the cantilever holder of an atomic force microscope (AFM) and can be used in conjunction with the AFM's liquid cell for detecting the adsorption of biochemicals. It enables differential measurement while preventing biochemicals from interfering with measurements using the piezoresistor. The mechanical and electromechanical characterization of the device is also reported in this paper
A Large Blue Shift of the Biexciton State in Tellurium Doped CdSe Colloidal Quantum Dots
The exciton-exciton interaction energy of Tellurium doped CdSe colloidal
quantum dots is experimentally investigated. The dots exhibit a strong Coulomb
repulsion between the two excitons, which results in a huge measured biexciton
blue shift of up to 300 meV. Such a strong Coulomb repulsion implies a very
narrow hole wave function localized around the defect, which is manifested by a
large Stokes shift. Moreover, we show that the biexciton blue shift increases
linearly with the Stokes shift. This result is highly relevant for the use of
colloidal QDs as optical gain media, where a large biexciton blue shift is
required to obtain gain in the single exciton regime.Comment: 9 pages, 4 figure
Utilizing Computational Complexity to Protect Cryptocurrency against Quantum Threats: A Review
Digital currency is primarily designed on problems that are computationally hard to solve using traditional computing techniques. However, these problems are now vulnerable due to the computational power of quantum computing. For the postquantum computing era, there is an immense need to reinvent the existing digital security measures. Problems that are computationally hard for any quantum computation will be a possible solution to that. This research summarizes the current security measures and how the new way of solving hard problems will trigger the future protection of the existing digital currency from the future quantum threat
- …