23 research outputs found

    An interdisciplinary approach to restore missing maxillary lateral incisor with Orthodontics and Implant Prosthodontics: A Case Report

    Get PDF
    Abstract The absence of the maxillary lateral incisors create an asthetic problem that can be managed with different treatment modalities. Comprehensive treatment planning is required to achieve a satisfactory result, keeping in mind the aesthetics, function and periodontal stability. An interdisciplinary treatment approach is beneficial and involves orthodontic closure of the space with maxillary canine substitution or space opening for single- tooth implants, bridges and tooth-supported restorations. The present case of a 21-year-old female dental student with agenesis of maxillary left lateral incisor with the presence of maxillary left canine in place of lateral incisor, and midline deviation. Treatment included space creation and placement of 3.3mm implant together with bone augmentation, immediate temporization and finally restored with porcelain crown after healing period of three months

    A Study of Traditional Russian Women’s Costumes

    No full text

    A STUDY ON THE EFFECTS OF SMARTPHONE USAGE ON STUDENTS (CASE STUDY: YANGON UNIVERSITY OF ECONOMICS)

    No full text
    The use of smartphone among students in the 20th century is seen as an important part of their life because of its advanced features. Students use their smartphone to accomplish their various daily tasks. Students utilize smartphones for various objectives. This study aims to examine the usage of smartphone among students and to analyze all the positive and negative effects of smartphone usage on students. A descriptive study was conducted on the total of 224 respondents in Yangon University of Economics (Kamayut, Hlaing and Ywathagyi). This study found that 86.2% of the respondents favorite the internet features and 89.3% of the respondents used the smartphone to use social media (such as Facebook, Twitter, Gtalk and Chatting). It also found that 67.4% of the respondents use online application and 36.6% of the respondents use phone bills with the amount between 10000-20000kyats. Respondents in this study have knowledge about the effects of smartphone usage but 74.1% of the respondents use the smartphone for long hours which cause negative effects

    Clustering Homogeneous and Heterogeneous XML Documents by Summarizing Edge

    No full text
    Extensible Markup Language(XML) is amarkup language that defines a set of rules forencoding documents in format that is both humanreliableand machine-reliable. Large amount ofXML documents on the web require the developedclustering techniques to group.In this system,XEdgeclustering algorithm is applied for clusteringof the homogeneous and heterogeneous XMLdocuments in order to utilize in searchengine.LevelStructure and LevelEdge aregenerated from tree and then calculate similarityand distance metrics.X-Edge provides a structurerepresentation of XML documents based on edgessummaries.Finally, the outputs of the system areclusters for homogeneous and heterogeneous XMLdocuments. The advantage of this system is thatthe output clusters can be applied in the searchengine

    You only Get One-Shot: Eavesdropping Input Images to Neural Network by Spying SoC-FPGA Internal Bus

    No full text
    International audienceDeep learning is currently integrated into edge devices with strong energy consumption and real-time constraints. To fulfill such requirements, high hardware performances can be provided by hardware acceleration of heterogeneous integrated circuits (IC) such as System-on-Chip (SoC)-field programmable gate arrays (FPGAs). With the rising popularity of hardware accelerators for artificial intelligence (AI), more and more neural networks are employed in a variety of domains, involving computer vision applications. Autonomous driving, defence and medical domains are well-known examples from which the latter two in particular require processing sensitive and private data. Security issues of such systems should be addressed to prevent the breach of privacy and unauthorised exploitation of systems. In this paper, we demonstrate a confidentiality vulnerability in a SoC-based FPGA binarized neural network (BNN) accelerator implemented with a recent mainstream framework, FINN, and successfully extract the secret BNN input image by using an electromagnetic (EM) side-channel attack. Experiments demonstrate that with the help of a near-field magnetic probe, an attacker can, with only one inference, directly retrieve sensitive information from EM emanations produced by the internal bus of the SoC-FPGA. Our attack reconstructs SoC-FPGA internal images and recognizes a handwritten digit image with an average accuracy of 89% using a non-retrained MNIST classifier. Such vulnerability jeopardizes the confidentiality of SoC-FPGA embedded AI systems by exploiting side-channels that withstand the protection of chip I/Os through cryptographic methods. © 2023 ACM

    Bus Electrocardiogram: Vulnerability of SoC-FPGA Internal AXI Buses to Electromagnetic Side-Channel Analysis

    No full text
    International audienceThis article demonstrates a confidential data vulner-ability in integrated circuits, especially in System-on-Chip (SoC)-field programmable gate array (FPGA) circuits. We demonstratethat the electromagnetic (EM) emanations of internal AdvancedeXtensible Interface (AXI) standard data buses are exploitable.Electromagnetic pulses recorded by a near-field probe in thevicinity of such data buses can be mapped to the underlying dataflux, just as an electrocardiogram (ECG) would map the heartactivity and blood circulation. This vulnerability is demonstratedby spying on the EM emanations caused by internal buseswhile MNIST handwritten digit images are sent through them.The transmitted MNIST data are found to be framed by pre-amble and post-amble signals enabling the detection of thetransmitted data themselves. Data (images, in this paper) arethen reconstituted by using a simple algorithm

    Bus Electrocardiogram: Vulnerability of SoC-FPGA Internal AXI Buses to Electromagnetic Side-Channel Analysis

    No full text
    International audienceThis article demonstrates a confidential data vulner-ability in integrated circuits, especially in System-on-Chip (SoC)-field programmable gate array (FPGA) circuits. We demonstratethat the electromagnetic (EM) emanations of internal AdvancedeXtensible Interface (AXI) standard data buses are exploitable.Electromagnetic pulses recorded by a near-field probe in thevicinity of such data buses can be mapped to the underlying dataflux, just as an electrocardiogram (ECG) would map the heartactivity and blood circulation. This vulnerability is demonstratedby spying on the EM emanations caused by internal buseswhile MNIST handwritten digit images are sent through them.The transmitted MNIST data are found to be framed by pre-amble and post-amble signals enabling the detection of thetransmitted data themselves. Data (images, in this paper) arethen reconstituted by using a simple algorithm

    Bus Electrocardiogram: Vulnerability of SoC-FPGA Internal AXI Buses to Electromagnetic Side-Channel Analysis

    No full text
    International audienceThis article demonstrates a confidential data vulner-ability in integrated circuits, especially in System-on-Chip (SoC)-field programmable gate array (FPGA) circuits. We demonstratethat the electromagnetic (EM) emanations of internal AdvancedeXtensible Interface (AXI) standard data buses are exploitable.Electromagnetic pulses recorded by a near-field probe in thevicinity of such data buses can be mapped to the underlying dataflux, just as an electrocardiogram (ECG) would map the heartactivity and blood circulation. This vulnerability is demonstratedby spying on the EM emanations caused by internal buseswhile MNIST handwritten digit images are sent through them.The transmitted MNIST data are found to be framed by pre-amble and post-amble signals enabling the detection of thetransmitted data themselves. Data (images, in this paper) arethen reconstituted by using a simple algorithm
    corecore