7,346 research outputs found

    Shortest Unique Substring Query Revisited

    Get PDF
    We revisit the problem of finding shortest unique substring (SUS) proposed recently by [6]. We propose an optimal O(n)O(n) time and space algorithm that can find an SUS for every location of a string of size nn. Our algorithm significantly improves the O(n2)O(n^2) time complexity needed by [6]. We also support finding all the SUSes covering every location, whereas the solution in [6] can find only one SUS for every location. Further, our solution is simpler and easier to implement and can also be more space efficient in practice, since we only use the inverse suffix array and longest common prefix array of the string, while the algorithm in [6] uses the suffix tree of the string and other auxiliary data structures. Our theoretical results are validated by an empirical study that shows our algorithm is much faster and more space-saving than the one in [6]

    Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem

    Get PDF
    A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain natural setting of the threshold values on compartments. We then propose a secure scheme that works for all threshold settings. In this scheme, we employ a refined version of Asmuth-Bloom secret sharing with a special and generic Asmuth-Bloom sequence called the {\it anchor sequence}. Based on this idea, we also propose the first multilevel conjunctive threshold secret sharing scheme based on the Chinese Remainder Theorem. Lastly, we discuss how the proposed schemes can be used for multilevel threshold function sharing by employing it in a threshold RSA cryptosystem as an example

    Diagnostic accuracy of cone-beam computed tomography in detecting secondary caries under composite fillings: An in vitro study

    Get PDF
    Purpose: The aim of this in vitro study was to assess the diagnostic performance of cone-beam computed tomography (CBCT) in the detection of secondary carious lesions under composite resin fillings applied to different types of cavities. Materials and Methods: Occlusal cavities (O) (n=18), occlusal cavities with mesial or distal component (MO/DO) (n=30), and mesial–occlusal–distal cavities (MOD) (n=30) were prepared in seventy eight extracted human posterior teeth. In half of the cavities in each group, artificial secondary caries lesions were simulated. All cavities were restored by using composite resin. All specimens were embedded in silicone and they were positioned to have approximal contacts. CBCT imaging was done and data were evaluated two times with two week interval by two observers, using a five-point confidence scale. Intra- and inter-observer agreements were calculated with Kappa statistics (κ). The area under (Az) the receiver operating characteristic (ROC) curve was used to evaluate the diagnostic accuracy. Results: Intra- (κ =0.89) and inter-observer (κ = 0.79) agreements were found to be excellent. Az values were highest for the O restorations which is followed by the MOD and DO/MO restorations. Az values for MOD and DO/MO restorations were very low and no statistically significant difference was found. Sensitivity for DO/MO restorations and specificity for MOD restorations were found to be the lowest values. Conclusion: Diagnostic performance of CBCT was higher in O composite restorations than MOD and DO/MO restorations for secondary caries detection. The use of alternative imaging methods rather than CBCT may be useful for evaluating secondary caries under composite MOD and DO/MO restorations

    An infrastructure for Turkish prosody generation in text-to-speech synthesis

    Get PDF
    Text-to-speech engines benefit from natural language processing while generating the appropriate prosody. In this study, we investigate the natural language processing infrastructure for Turkish prosody generation in three steps as pronunciation disambiguation, phonological phrase detection and intonation level assignment. We focus on phrase boundary detection and intonation assignment. We propose a phonological phrase detection scheme based on syntactic analysis for Turkish and assign one of three intonation levels to words in detected phrases. Empirical observations on 100 sentences show that the proposed scheme works with approximately 85% accuracy

    Down-converter for GPS applications

    Get PDF
    An RF down/up converter system is presented for indoor GPS applications. Transmission of GPS signals directly into indoor environments are limited and in some cases prohibited for regular operation of GPS system. However, ISM frequency bands, especially 433MHz can be used to retransmit the GPS signals to indoors. In this paper, RF down-converter building blocks are designed and implemented for sending GPS signals in ISM band. The down-converter system has heterodyne architecture which has LNAs, mixer, oscillator and filters. Received signals from the satellites are amplified, downconverted, filtered and again amplified. The overall performance of the designed system is 54.3dB gain and 2 dB noise figure while it is drawing 78mA current with 3V supply
    corecore