2,045 research outputs found

    EFFICACY OF SUTURE VERSUS SUTURELESS TECHNIQUE AFTER PERIODONTAL FLAP SURGERY – A SPLIT MOUTH STUDY

    Get PDF
    Suturing is an integral part of periodontal flap surgery, but it has disadvantages such as difficulty in maintaining oral hygiene, increased post-operative discomfort, and higher infection rate. To overcome these problems, a search for an alternative like tissue adhesives, possibly a sutureless technique has been experimented. The aim of the study was to compare the stability & healing properties after periodontal flap surgery using tissue adhesive and surgical sutures

    Spoof detection using time-delay shallow neural network and feature switching

    Full text link
    Detecting spoofed utterances is a fundamental problem in voice-based biometrics. Spoofing can be performed either by logical accesses like speech synthesis, voice conversion or by physical accesses such as replaying the pre-recorded utterance. Inspired by the state-of-the-art \emph{x}-vector based speaker verification approach, this paper proposes a time-delay shallow neural network (TD-SNN) for spoof detection for both logical and physical access. The novelty of the proposed TD-SNN system vis-a-vis conventional DNN systems is that it can handle variable length utterances during testing. Performance of the proposed TD-SNN systems and the baseline Gaussian mixture models (GMMs) is analyzed on the ASV-spoof-2019 dataset. The performance of the systems is measured in terms of the minimum normalized tandem detection cost function (min-t-DCF). When studied with individual features, the TD-SNN system consistently outperforms the GMM system for physical access. For logical access, GMM surpasses TD-SNN systems for certain individual features. When combined with the decision-level feature switching (DLFS) paradigm, the best TD-SNN system outperforms the best baseline GMM system on evaluation data with a relative improvement of 48.03\% and 49.47\% for both logical and physical access, respectively

    A Study On External Environment Of Business And Its Influence On Msmes In The Context Of Covid-19

    Get PDF
    Businesses across the globe has decided ‘just to survive apart from making huge profit’, from a global pandemic which has created huge disaster to economy of almost all countries in the world. In India pharmaceutical industry is improving its status day by day, on the other hand travel and tourism industry, entertainment sector, market for luxury products and services is deteriorating among which the drastic-hit is the MSMEs.This study aims at analysing various external factors influencing the performance of business especially during times of COVID-19 pandemic, those factors include political, social, cultural,economic, legal, technological, etc., The study aims at finding out those external factor and potential ways to recover from the losses incurred

    Liver Tumour Detection for Ct Images

    Get PDF
    A cancer is an abnormal growth of cells typically derived from a single abnormal cell. Detection of liver tumour in early stage is important for the prevention of liver tumour. Many techniques have been developed for the detection of liver tumour from CT images. Treatment of any cancer mainly depends on tumour size and grading. Hepatocellular carcinoma is the most common type of liver cancer. Diagnosis involves CT scan of abdomen provides accurate results. Tumour segmentation in liver CT images is a challenging task. This paper deals with the detection of liver tumour from CT images. Implementation of FCM technique and some default tools help to detect the shape of tumour. Finally the tumour part is extracted from CT images and its exact position and shape is determined to calculate the abnormality are

    Analysis of Security methods in Internet of Things

    Get PDF
    Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. In addition, the Internet of Things can be providing variety applications via convergence with other technology such as machine-to-machine, Wireless Sensor Network, and Web technology. In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated communication that can be applied in IoT environment. DOI: 10.17762/ijritcc2321-8169.16044

    C# Application to Deal with Neutrosophic g(alpha)-Closed Sets In Neutrosophic Topology

    Get PDF
    In this paper, we have developed a C# Application for finding the values of the complement, union, intersection and the inclusion of any two neutrosophic sets in the neutrosophic field by using .NET Framework, Microsoft Visual Studio and C# Programming Language. In addition to this, the system can find neutrosophic topology, neutrosophic alpha-closed sets and neutrosophic g(alpha)-closed sets in each resultant screens. Also, this computer-based application produces the complement values of each neutrosophic closed sets
    • …
    corecore