496 research outputs found

    An Analysis of the Historical Application of Jihad and Implications on the Clash of Civilizations

    Get PDF
    This paper is a part-review analysis into the modern conception of both the word and Jihād and the violent nature of Islam. In order to develop an overarching modern theory of Jihād, current opinions and general argumtations in the literature are examined. Two theories have emerged in defining Islam and the role of Jihād in Islam. The first is that of the so-called Muslim apologists; scholars who define Jihād as mainly a personal struggle, and whose physical application (warfare) is only in self-defence of the Islamic community. The second sponsors the concept of ‘offensive’ Jihād: that Islam is imperialistic and has a vision of global domination. The stark contrast in the divisions that the scholarship have are indicative of two opposing parties, likely each basing their respective policy positions on beliefs on the nature of Islam as a violent of peaceful ‘religion’

    Transfer Learning with Deep Convolutional Neural Network (CNN) for Pneumonia Detection using Chest X-ray

    Get PDF
    Pneumonia is a life-threatening disease, which occurs in the lungs caused by either bacterial or viral infection. It can be life-endangering if not acted upon in the right time and thus an early diagnosis of pneumonia is vital. The aim of this paper is to automatically detect bacterial and viral pneumonia using digital x-ray images. It provides a detailed report on advances made in making accurate detection of pneumonia and then presents the methodology adopted by the authors. Four different pre-trained deep Convolutional Neural Network (CNN)- AlexNet, ResNet18, DenseNet201, and SqueezeNet were used for transfer learning. 5247 Bacterial, viral and normal chest x-rays images underwent preprocessing techniques and the modified images were trained for the transfer learning based classification task. In this work, the authors have reported three schemes of classifications: normal vs pneumonia, bacterial vs viral pneumonia and normal, bacterial and viral pneumonia. The classification accuracy of normal and pneumonia images, bacterial and viral pneumonia images, and normal, bacterial and viral pneumonia were 98%, 95%, and 93.3% respectively. This is the highest accuracy in any scheme than the accuracies reported in the literature. Therefore, the proposed study can be useful in faster-diagnosing pneumonia by the radiologist and can help in the fast airport screening of pneumonia patients.Comment: 13 Figures, 5 tables. arXiv admin note: text overlap with arXiv:2003.1314

    The Correlation between Corneal Topographic Indices and Corneal High Order Aberrations in Keratoconus

    Get PDF
    This study was performed to investigate aberrometric changes of Keratoconus (KC) and its correlation with corneal topographic indices. In a cross sectional study, the researchers included 170 eyes of 138 candidates that were seeking corneal refractive surgery in Sohag refractive center, Sohag, Egypt and had been diagnosed as clinical KC. Patients were divided to mild, moderate, and severe KC. All eyes included in this study were subjected to corneal tomographic evaluation. Corneal aberrometry data was collected from the Sirius topography (Sirius, Costruzione Strumenti Oftalmici, Italy) over a 5-mm diameter. The collected data included Zernike coefficients for corneal aberrations, including total Root Mean Square (RMS), RMS Spherical Aberration (SA), RMS Coma, and RMS astigmatism. The study population was divided to mild, moderate, and severe KC. Mild KC cases included 58 eyes of 46 patients, moderate KC were 64 eyes of 52 patients, and severe KC were 48 eyes of 40 patients. Root mean square total was statistically significant in all groups with a higher p value in moderate KC (P = 0.001) and also was statistically significant when compared in the three groups altogether (P = 0.0001). Coma aberration was statistically significant in mild and moderate KC and when compared between the three groups (P = 0.0001). Root mean square Trefoil aberration was statistically significant only in moderate KC yet was statistically significant when compared in all groups (P = 0.0001). Root mean square astigmatism was statistically significant in mild KC only and when compared in the three groups altogether (P = 0.0001). Spherical aberration was also statistically significant in moderate and severe KC with a P value of < 0.0001 and 0.001, respectively. There was a positive correlation between posterior elevation and RMS values in mild and moderate KC while there was negative or very weak positive correlation in severe KC. There were negative correlations between the thinnest location and RMS values in nearly all variables in the three groups except weak positive correlation with RMS astigmatism in mild KC and with RMS total and coma aberration in severe KC .In conclusion corneal high order aberrations measured by the Sirius topography system had low to moderate correlation with corneal topographic indices provided by the same device in different grades of KC

    The Correlation between Corneal Topographic Indices and Corneal High Order Aberrations in Keratoconus

    Get PDF
    This study was performed to investigate aberrometric changes of Keratoconus (KC) and its correlation with corneal topographic indices. In a cross sectional study, the researchers included 170 eyes of 138 candidates that were seeking corneal refractive surgery in Sohag refractive center, Sohag, Egypt and had been diagnosed as clinical KC. Patients were divided to mild, moderate, and severe KC. All eyes included in this study were subjected to corneal tomographic evaluation. Corneal aberrometry data was collected from the Sirius topography (Sirius, Costruzione Strumenti Oftalmici, Italy) over a 5-mm diameter. The collected data included Zernike coefficients for corneal aberrations, including total Root Mean Square (RMS), RMS Spherical Aberration (SA), RMS Coma, and RMS astigmatism. The study population was divided to mild, moderate, and severe KC. Mild KC cases included 58 eyes of 46 patients, moderate KC were 64 eyes of 52 patients, and severe KC were 48 eyes of 40 patients. Root mean square total was statistically significant in all groups with a higher p value in moderate KC (P = 0.001) and also was statistically significant when compared in the three groups altogether (P = 0.0001). Coma aberration was statistically significant in mild and moderate KC and when compared between the three groups (P = 0.0001). Root mean square Trefoil aberration was statistically significant only in moderate KC yet was statistically significant when compared in all groups (P = 0.0001). Root mean square astigmatism was statistically significant in mild KC only and when compared in the three groups altogether (P = 0.0001). Spherical aberration was also statistically significant in moderate and severe KC with a P value of < 0.0001 and 0.001, respectively. There was a positive correlation between posterior elevation and RMS values in mild and moderate KC while there was negative or very weak positive correlation in severe KC. There were negative correlations between the thinnest location and RMS values in nearly all variables in the three groups except weak positive correlation with RMS astigmatism in mild KC and with RMS total and coma aberration in severe KC .In conclusion corneal high order aberrations measured by the Sirius topography system had low to moderate correlation with corneal topographic indices provided by the same device in different grades of KC

    Primary adrenal non-Hodgkin lymphoma: a case report and review of the literature

    Get PDF
    Background: Lymphomas are cancers that arise from the white blood cells and have been traditionally divided into two large subtypes: Hodgkin and non-Hodgkin lymphoma. B-cell lymphoma is the most common subtype of non-Hodgkin lymphoma; almost 85% of patients with lymphoma have this variant. Lymphomas can potentially arise from any lymphoid tissue located in the body; however, primary adrenal non-Hodgkin lymphoma is extremely rare. We report the history, examination findings, and laboratory results of a 50-year-old man diagnosed with a primary left adrenal diffuse large B-cell lymphoma. CASE PRESENTATION: A 50-year-old Pakistani man presented to our hospital with progressively increasing pain and fullness in the left upper quadrant of his abdomen, generalized weakness, easy fatigability, and decreased appetite of 1.5 months\u27 duration. On examination, he had a blood pressure of 140/80 mmHg with no postural drop, a pulse rate of 106 beats/minute, and no fever. His past medical history was significant for pulmonary tuberculosis 2 years earlier, for which he received antituberculous therapy. Computed tomography revealed a heterogeneous enhancing soft tissue density mass in the left adrenal gland. It measured 7.1*5.6*9.5 cm. Further laboratory workup revealed the following levels: sodium 135 mEq/L, potassium 4.5 mEq/L, lactate dehydrogenase 905 IU/L, renin 364 IU/ml, aldosterone 5.79 ng/dl, dehydroepiandrosterone sulfate 79.20 mug/dl, urinary vanillylmandelic acid 6.4 mg/24 hours, and a low-dose overnight dexamethasone suppression test result of 3.20 mug/dl. The patient underwent left adrenalectomy. Histopathological test results showed a diffuse large B-cell lymphoma. Immunohistochemical stains were strongly positive for CD20 and negative for CD3, CD5, CD10, and cyclin D1. The patient\u27s Ki-67 (Mib-1) index was approximately 80%. He received a total of six cycles of cyclophosphamide, doxorubicin, vincristine, and prednisone chemotherapy (rituximab was not given, owing to financial constraints) and was routinely followed pre- and postchemotherapy at our hematology clinic with complete blood count and serum lactate dehydrogenase evaluations. The patient responded to chemotherapy and is currently doing well. CONCLUSIONS: Primary adrenal lymphoma is an extremely rare but rapidly progressive disease. It generally carries a poor prognosis, partly because an optimal treatment protocol has not yet been established. Further studies with larger sample sizes are needed to establish the best treatment option and increase overall survival

    Drilling of carbon fibre reinforced plastic composites

    Get PDF
    Following an extensive literature survey focusing on the machinability of carbon fibre reinforced plastics (CFRP), three main phases of experimental work were undertaken to evaluate the drilling of CFRP and associated stack materials. Phase 1 and 2 involved small diameter holes (1.5 mm) in thin CFRP laminates (3 mm thick) while Phase 3 addressed the feasibility of one-shot drilling (6.35 mm diameter holes) in multilayer workpiece stacks comprising titanium, CFRP and aluminium. Machinability was assessed in terms of tool life/wear, force/torque, hole size and geometrical accuracy, workpiece surface integrity and chip morphology

    Don't Knock! Rowhammer at the Backdoor of DNN Models

    Full text link
    State-of-the-art deep neural networks (DNNs) have been proven to be vulnerable to adversarial manipulation and backdoor attacks. Backdoored models deviate from expected behavior on inputs with predefined triggers while retaining performance on clean data. Recent works focus on software simulation of backdoor injection during the inference phase by modifying network weights, which we find often unrealistic in practice due to restrictions in hardware. In contrast, in this work for the first time, we present an end-to-end backdoor injection attack realized on actual hardware on a classifier model using Rowhammer as the fault injection method. To this end, we first investigate the viability of backdoor injection attacks in real-life deployments of DNNs on hardware and address such practical issues in hardware implementation from a novel optimization perspective. We are motivated by the fact that vulnerable memory locations are very rare, device-specific, and sparsely distributed. Consequently, we propose a novel network training algorithm based on constrained optimization to achieve a realistic backdoor injection attack in hardware. By modifying parameters uniformly across the convolutional and fully-connected layers as well as optimizing the trigger pattern together, we achieve state-of-the-art attack performance with fewer bit flips. For instance, our method on a hardware-deployed ResNet-20 model trained on CIFAR-10 achieves over 89% test accuracy and 92% attack success rate by flipping only 10 out of 2.2 million bits.Comment: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN

    A Study On The Utilization and Health Services Provision by Community Clinics of Jashore, Bangladesh

    Get PDF
    Background: As Bangladesh has gained the reputation of improving the health sectors, much health related sites still require improvements. Community clinic services (CCS) may contribute to this sector with its foremost importance. So this study was conducted to investigate the utilization and health services provision by community clinics (CCs) in rural area. Methods: A descriptive longitudinal study was conducted among three community clinics of Jashore and a structured questionnaire was developed on which most of the questions were developed to find out the contributions of these community clinics. Here for data analysis we used SPSS version 25.0 software. Results: Here we analyzed health service related data from three randomly selected community clinics (CCs). We found an average of 15 patients got antenatal care every month by the Komlapur CC throughout the year. About 140 patients received health services per month from Dogachiya CC. About 634 children were benefited by Saziyali CC throughout the year. By this study we came to know that average 67-75 patients were provided iron supplementations each month by Saziyali CC. All of the CCs had active referral system and online reporting system. Conclusion: From our study we came to know that majority % of rural people are now dependent on community health care services. But most of the community clinics have many limitations regarding infrastructure, training, medicines, financial etc. So the government should take necessary steps regarding this

    A Post-Processing Based Bengali Document Layout Analysis with YOLOV8

    Full text link
    This paper focuses on enhancing Bengali Document Layout Analysis (DLA) using the YOLOv8 model and innovative post-processing techniques. We tackle challenges unique to the complex Bengali script by employing data augmentation for model robustness. After meticulous validation set evaluation, we fine-tune our approach on the complete dataset, leading to a two-stage prediction strategy for accurate element segmentation. Our ensemble model, combined with post-processing, outperforms individual base architectures, addressing issues identified in the BaDLAD dataset. By leveraging this approach, we aim to advance Bengali document analysis, contributing to improved OCR and document comprehension and BaDLAD serves as a foundational resource for this endeavor, aiding future research in the field. Furthermore, our experiments provided key insights to incorporate new strategies into the established solution

    QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme

    Get PDF
    Post-quantum schemes are expected to replace existing public-key schemes within a decade in billions of devices. To facilitate the transition, the US National Institute for Standards and Technology (NIST) is running a standardization process. Multivariate signatures is one of the main categories in NIST\u27s post-quantum cryptography competition. Among the four candidates in this category, the LUOV and Rainbow schemes are based on the Oil and Vinegar scheme, first introduced in 1997 which has withstood over two decades of cryptanalysis. Beyond mathematical security and efficiency, security against side-channel attacks is a major concern in the competition. The current sentiment is that post-quantum schemes may be more resistant to fault-injection attacks due to their large key sizes and the lack of algebraic structure. We show that this is not true. We introduce a novel hybrid attack, QuantumHammer, and demonstrate it on the constant-time implementation of LUOV currently in Round 2 of the NIST post-quantum competition. The QuantumHammer attack is a combination of two attacks, a bit-tracing attack enabled via Rowhammer fault injection and a divide and conquer attack that uses bit-tracing as an oracle. Using bit-tracing, an attacker with access to faulty signatures collected using Rowhammer attack, can recover secret key bits albeit slowly. We employ a divide and conquer attack which exploits the structure in the key generation part of LUOV and solves the system of equations for the secret key more efficiently with few key bits recovered via bit-tracing. We have demonstrated the first successful in-the-wild attack on LUOV recovering all 11K key bits with less than 4 hours of an active Rowhammer attack. The post-processing part is highly parallel and thus can be trivially sped up using modest resources. QuantumHammer does not make any unrealistic assumptions, only requires software co-location (no physical access), and therefore can be used to target shared cloud servers or in other sandboxed environments
    corecore