1,830 research outputs found

    Fatalism in Post-Revolution Egypt

    Get PDF
    Undergraduate Research Office Summer Research Fellowship4th Place Denman Undergraduate Research ForumFeatured in annual "Highlights of Undergraduate Research"Fatalism is the belief that forces outside of our control largely decide our future. It has traditionally been thought of as a single overarching idea. One recent study using the World Values Survey for the 2005-2010 wave found that social and religious fatalism are strongly correlated in most countries but not in others, including Egypt. This paper examines these two fatalisms in Egypt during the political opening created by the Egyptian revolution of 2011. Interviews were conducted with 136 adults in the months immediately following the June 17, 2012 Presidential election. In line with the WVS results, we found two unrelated dimension of fatalism: social and theological. The social correlates of these different dimensions are quite distinct, and each fatalism has different implications for political action. Social fatalism is associated with being older and female and is critical for willingness to engage in protest. Religious fatalism is negatively related to education and has no impact on protest potential. We conclude that fatalism has multiple dimensions that need to be separated to understand their origins and their implications for political action.Undergraduate Research OfficeA one year embargo was granted for this item.Academic Major: Neuroscienc

    3D Camouflaging Object using RGB-D Sensors

    Full text link
    This paper proposes a new optical camouflage system that uses RGB-D cameras, for acquiring point cloud of background scene, and tracking observers eyes. This system enables a user to conceal an object located behind a display that surrounded by 3D objects. If we considered here the tracked point of observer s eyes is a light source, the system will work on estimating shadow shape of the display device that falls on the objects in background. The system uses the 3d observer s eyes and the locations of display corners to predict their shadow points which have nearest neighbors in the constructed point cloud of background scene.Comment: 6 pages, 12 figures, 2017 IEEE International Conference on SM

    On improving security of GPT cryptosystems

    Full text link
    The public key cryptosystem based on rank error correcting codes (the GPT cryptosystem) was proposed in 1991. Use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This enabled using public keys of a smaller size. Several attacks against this system were published, including Gibson's attacks and more recently Overbeck's attacks. A few modifications were proposed withstanding Gibson's attack but at least one of them was broken by the stronger attacks by Overbeck. A tool to prevent Overbeck's attack is presented in [12]. In this paper, we apply this approach to other variants of the GPT cryptosystem.Comment: 5 pages. submitted ISIT 2009.Processed on IEEE ISIT201

    A Smart Approach for GPT Cryptosystem Based on Rank Codes

    Full text link
    The concept of Public- key cryptosystem was innovated by McEliece's cryptosystem. The public key cryptosystem based on rank codes was presented in 1991 by Gabidulin -Paramonov-Trejtakov(GPT). The use of rank codes in cryptographic applications is advantageous since it is practically impossible to utilize combinatoric decoding. This has enabled using public keys of a smaller size. Respective structural attacks against this system were proposed by Gibson and recently by Overbeck. Overbeck's attacks break many versions of the GPT cryptosystem and are turned out to be either polynomial or exponential depending on parameters of the cryptosystem. In this paper, we introduce a new approach, called the Smart approach, which is based on a proper choice of the distortion matrix X. The Smart approach allows for withstanding all known attacks even if the column scrambler matrix P over the base field Fq.Comment: 5 pages. to appear in Proceedings of IEEE ISIT201

    On the Ishikawa iteration process in Hilbert spaces

    No full text
    In this paper, we shall prove that a certain sequence of points which is iteratively defined converges always to a fixed point of some contractive mappings. The results generalize corresponding theorems of Singh and Qihou

    Towards multi-scale feature detection repeatable over intensity and depth images.

    Get PDF
    Object recognition based on local features computed at multiple locations is robust to occlusions, strong viewpoint changes and object deformations. These features should be repeatable, precise and distinctive. We present an operator for repeatable feature detection on depth images (relative to 3D models) as well as 2D intensity images. The proposed detector is based on estimating the curviness saliency at multiple scales in each kind of image. We also propose quality measures that evaluate the repeatability of the features between depth and intensity images. The experiments show that the proposed detector outperforms both the most powerful, classical point detectors (e.g., SIFT) and edge detection techniques

    CuisineNet: Food Attributes Classification using Multi-scale Convolution Network

    Full text link
    Diversity of food and its attributes represents the culinary habits of peoples from different countries. Thus, this paper addresses the problem of identifying food culture of people around the world and its flavor by classifying two main food attributes, cuisine and flavor. A deep learning model based on multi-scale convotuional networks is proposed for extracting more accurate features from input images. The aggregation of multi-scale convolution layers with different kernel size is also used for weighting the features results from different scales. In addition, a joint loss function based on Negative Log Likelihood (NLL) is used to fit the model probability to multi labeled classes for multi-modal classification task. Furthermore, this work provides a new dataset for food attributes, so-called Yummly48K, extracted from the popular food website, Yummly. Our model is assessed on the constructed Yummly48K dataset. The experimental results show that our proposed method yields 65% and 62% average F1 score on validation and test set which outperforming the state-of-the-art models.Comment: 8 pages, Submitted in CCIA 201

    Comparison of four DNA extraction and three preservation protocols for the molecular detection and quantification of soil-transmitted helminths in stool

    Get PDF
    Background : A DNA extraction and preservation protocol that yields sufficient and qualitative DNA is pivotal for the success of any nucleic acid amplification test (NAAT), but it still poses a challenge for soil-transmitted helminths (STHs), including Ascaris lumbricoides, Trichuris trichiura and the two hookworms (Necator americanus and Ancylostoma duodenale). In the present study, we assessed the impact of different DNA extraction and preservativation protocols on STH-specific DNA amplification from stool. Methodology and principal findings : In a first experiment, DNA was extracted from 37 stool samples with variable egg counts for T. trichiura and N. americanus applying two commercial kits, both with and without a prior bead beating step. The DNA concentration of T. trichiura and N. americanus was estimated by means of qPCR. The results showed clear differences in DNA concentration across both DNA extraction kits, which varied across both STHs. They also indicated that adding a bead beating step substantially improved DNA recovery, particularly when the FECs were high. In a second experiment, 20 stool samples with variable egg counts for A. lumbricoides, T. trichiura and N. americanus were preserved in either 96% ethanol, 5% potassium dichromate or RNA later and were stored at 4 degrees C for 65, 245 and 425 days. DNA was extracted using the DNeasy Blood & Tissue kit with a bead beating step. Stool samples preserved in ethanol proved to yield higher DNA concentrations as FEC increased, although stool samples appeared to be stable over time in all preservatives. Conclusions : The choice of DNA extraction kit significantly affects the outcome of NAATs. Given the clear benefit of bead beating and our validation of ethanol for (long-term) preservation, we recommend that these aspects of the protocol should be adopted by any stool sampling and DNA extraction protocol for downstream NAAT-based detection and quantification of STHs

    FIXED POINT RESULTS IN COMPLEX VALUED METRIC SPACES WITH AN APPLICATION

    Get PDF
    In this paper, we introduce fixed point theorem for a general contractive condition in complex valued metric spaces. Also, some important corollaries under this contractive condition areobtained. As an application, we find a unique solution for Urysohn integral equations and some illustrative examples are given to support our obtaining results. Our results extend and generalize the results of Azam et al. [2] and some other known results in the literature
    corecore