7,346 research outputs found
Shortest Unique Substring Query Revisited
We revisit the problem of finding shortest unique substring (SUS) proposed
recently by [6]. We propose an optimal time and space algorithm that can
find an SUS for every location of a string of size . Our algorithm
significantly improves the time complexity needed by [6]. We also
support finding all the SUSes covering every location, whereas the solution in
[6] can find only one SUS for every location. Further, our solution is simpler
and easier to implement and can also be more space efficient in practice, since
we only use the inverse suffix array and longest common prefix array of the
string, while the algorithm in [6] uses the suffix tree of the string and other
auxiliary data structures. Our theoretical results are validated by an
empirical study that shows our algorithm is much faster and more space-saving
than the one in [6]
Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem
A recent work of Harn and Fuyou presents the first multilevel (disjunctive)
threshold secret sharing scheme based on the Chinese Remainder Theorem. In this
work, we first show that the proposed method is not secure and also fails to
work with a certain natural setting of the threshold values on compartments. We
then propose a secure scheme that works for all threshold settings. In this
scheme, we employ a refined version of Asmuth-Bloom secret sharing with a
special and generic Asmuth-Bloom sequence called the {\it anchor sequence}.
Based on this idea, we also propose the first multilevel conjunctive threshold
secret sharing scheme based on the Chinese Remainder Theorem. Lastly, we
discuss how the proposed schemes can be used for multilevel threshold function
sharing by employing it in a threshold RSA cryptosystem as an example
Diagnostic accuracy of cone-beam computed tomography in detecting secondary caries under composite fillings: An in vitro study
Purpose: The aim of this in vitro study was to assess the diagnostic performance of cone-beam computed tomography (CBCT) in the detection of secondary carious lesions under composite resin fillings applied to different types of cavities.
Materials and Methods: Occlusal cavities (O) (n=18), occlusal cavities with mesial or distal component (MO/DO) (n=30), and mesial–occlusal–distal cavities (MOD) (n=30) were prepared in seventy eight extracted human posterior teeth. In half of the cavities in each group, artificial secondary caries lesions were simulated. All cavities were restored by using composite resin. All specimens were embedded in silicone and they were positioned to have approximal contacts. CBCT imaging was done and data were evaluated two times with two week interval by two observers, using a five-point confidence scale. Intra- and inter-observer agreements were calculated with Kappa statistics (κ). The area under (Az) the receiver operating characteristic (ROC) curve was used to evaluate the diagnostic accuracy.
Results: Intra- (κ =0.89) and inter-observer (κ = 0.79) agreements were found to be excellent. Az values were highest for the O restorations which is followed by the MOD and DO/MO restorations. Az values for MOD and DO/MO restorations were very low and no statistically significant difference was found. Sensitivity for DO/MO restorations and specificity for MOD restorations were found to be the lowest values.
Conclusion: Diagnostic performance of CBCT was higher in O composite restorations than MOD and DO/MO restorations for secondary caries detection. The use of alternative imaging methods rather than CBCT may be useful for evaluating secondary caries under composite MOD and DO/MO restorations
An infrastructure for Turkish prosody generation in text-to-speech synthesis
Text-to-speech engines benefit from natural language processing while generating the appropriate prosody. In this study, we investigate the natural language processing infrastructure for Turkish prosody generation in three steps as pronunciation disambiguation, phonological phrase detection and intonation level assignment. We focus on phrase boundary detection and intonation assignment. We propose a phonological phrase detection scheme based on syntactic analysis for Turkish and assign one of three intonation levels to words in detected phrases. Empirical observations on 100 sentences show that the proposed scheme works with approximately 85% accuracy
Down-converter for GPS applications
An RF down/up converter system is presented for indoor GPS applications. Transmission of GPS signals directly into indoor environments are limited and in some cases prohibited for regular operation of GPS system. However, ISM frequency bands, especially 433MHz can be used to retransmit
the GPS signals to indoors. In this paper, RF down-converter building blocks are designed and implemented for sending GPS signals in ISM band. The down-converter system has heterodyne architecture which has LNAs, mixer, oscillator and filters. Received signals from the satellites are amplified, downconverted, filtered and again amplified. The overall performance of the designed system is 54.3dB gain and 2 dB noise figure while it is drawing 78mA current with 3V supply
- …
