629 research outputs found

    A Web Application for Automatic Detection and Counting of Garbage Using Object Recognition Model

    Get PDF
    departmental bulletin pape

    Analysis of the Socioeconomic Difficulties Affecting the Suicide Rate in Japan

    Get PDF
    This paper focuses on the drastic increase observed in the Japanese male suicide rate in the late 1990s and early 2000s and confirms unemployment and personal bankruptcy to be the associated socioeconomic factors behind the male suicide variation. Personal bankruptcy is also confirmed to be significant in the female suicide variation. The relationship is confirmed through a pooled data analysis by a middle-aged group and by prefecture. Further, the paper focused on the association between the unemployment rate and suicide mortality by incorporating the reasons for unemployment in the monthly regression. Next, we identified a significant association between male suicide variations and changes in some of the reasons for being unemployed. The interpretation of the results implies that the risk of unemployment among men has been mitigated by the unemployment insurance rather than the bias in the reasons reported and/or mental disorder in Japan.

    Primary Neuroendocrine Tumor in Brain

    Get PDF
    The incidence of brain metastases for neuroendocrine tumor (NET) is reportedly 1.5~5%, and the origin is usually pulmonary. A 77-year-old man presented to our hospital with headache and disturbance of specific skilled motor activities. Computed tomography (CT) showed a massive neoplastic lesion originating in the left temporal and parietal lobes that caused a mass edematous effect. Grossly, total resection of the tumor was achieved. Histological examination revealed much nuclear atypia and mitotic figures. Staining for CD56, chromogranin A, and synaptophysin was positive, indicating NET. The MIB-1 index was 37%. Histopathologically, the tumor was diagnosed as NET. After surgery, gastroscopy and colonoscopy were performed, but the origin was not seen. After discharge, CT and FDG-PET (fluoro-2-deoxy-d-glucose positron emission tomography) were performed every 3 months. Two years later we have not determined the origin of the tumor. It is possible that the brain is the primary site of this NET. To our knowledge, this is the first reported case of this phenomenon

    An Automatic Detection of River Garbage Using 360-degree Camera

    Get PDF

    Boosting Healthier Choices

    Get PDF
    Thomas Rouyard and colleagues discuss use of the boosting approach as an alternative to nudging in developing non-coercive interventions to promote health

    Preparation of Corrosion-Resistant Films on Magnesium Alloys by Steam Coating

    Get PDF
    This chapter introduces a novel, chemical-free “steam coating” method for preparing films on magnesium (Mg) alloys and assesses their effectiveness in improving the corrosion resistance of two different Mg alloys. A film composed of crystalline Mg(OH)2 and Mg-Al layered double hydroxide (LDH) was successfully formed on AZ31 Mg alloy, and its corrosion resistance was evaluated through electrochemical measurements and immersion tests in an aqueous solution containing 5 wt.% NaCl. An anticorrosive film was also formed on Ca-added flame-resistant AM60 (AMCa602) Mg alloy via the same steam coating method and found to be composed of crystalline Mg(OH)2 and Mg-Al layered double hydroxide (LDH). Its corrosion resistance was also investigated, and the effectiveness of the steam coating method for improving the corrosion resistance of Mg was fully explored

    Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes

    Get PDF
    Cyberattacks, especially attacks that exploit operating system vulnerabilities, have been increasing in recent years. In particular, if administrator privileges are acquired by an attacker through a privilege escalation attack, the attacker can operate the entire system and cause serious damage. In this paper, we propose an additional kernel observer (AKO) that prevents privilege escalation attacks that exploit operating system vulnerabilities. We focus on the fact that a process privilege can be changed only by specific system calls. AKO monitors privilege information changes during system call processing. If AKO detects a privilege change after system call processing, whereby the invoked system call does not originally change the process privilege, AKO regards the change as a privilege escalation attack and applies countermeasures against it. AKO can therefore prevent privilege escalation attacks. Introducing the proposed method in advance can prevent this type of attack by changing any process privilege that was not originally changed in a system call, regardless of the vulnerability type. In this paper, we describe the design and implementation of AKO for Linux x86 64-bit. Moreover, we show that AKO can be expanded to prevent the falsification of various data in the kernel space. Then, we present an expansion example that prevents the invalidation of Security-Enhanced Linux. Finally, our evaluation results show that AKO is effective against privilege escalation attacks, while maintaining low overhead

    Development of a low-alpha-emitting {\mu}-PIC for NEWAGE direction-sensitive dark-matter search

    Full text link
    NEWAGE is a direction-sensitive dark-matter-search experiment that uses a micro-patterned gaseous detector, or {\mu}-PIC, as the readout. The main background sources are {\alpha}-rays from radioactive contaminants in the {\mu}-PIC. We have therefore developed a low-alpha-emitting {\mu}-PICs and measured its performances. We measured the surface {\alpha}-ray emission rate of the {\mu}-PIC in the Kamioka mine using a surface {\alpha}-ray counter based on a micro TPC.Comment: 6 pages, 4 figure

    Partial Gathering of Mobile Agents in Dynamic Tori

    Get PDF
    corecore