978 research outputs found

    Understanding Neural Pathways in Zebrafish through Deep Learning and High Resolution Electron Microscope Data

    Full text link
    The tracing of neural pathways through large volumes of image data is an incredibly tedious and time-consuming process that significantly encumbers progress in neuroscience. We are exploring deep learning's potential to automate segmentation of high-resolution scanning electron microscope (SEM) image data to remove that barrier. We have started with neural pathway tracing through 5.1GB of whole-brain serial-section slices from larval zebrafish collected by the Center for Brain Science at Harvard University. This kind of manual image segmentation requires years of careful work to properly trace the neural pathways in an organism as small as a zebrafish larva (approximately 5mm in total body length). In automating this process, we would vastly improve productivity, leading to faster data analysis and breakthroughs in understanding the complexity of the brain. We will build upon prior attempts to employ deep learning for automatic image segmentation extending methods for unconventional deep learning data.Comment: 8 pages, 5 figures (1a to 5c), PEARC '18: Practice and Experience in Advanced Research Computing, July 22--26, 2018, Pittsburgh, PA, US

    Sanctioned Unemployment: The Impact of Occupational Licensing Restrictions on ExOffenders

    Get PDF
    This note by Annie Zhang explores how occupational licensing restrictions on ex-offenders create a significant barrier to employment that undermines efforts to rehabilitate offenders and reduce recidivism. Zhang notes that these restrictions are particularly burdensome when they apply to low-income occupations like barbering and cosmetology and proposes that licensing boards be required to consider rehabilitation factors in assessing licensing applications, a direct connection between the conviction and the licensed occupation, and a presumption of licensure for ex-offenders that have completed their vocational training at a correctional facility

    Vortex shedding and hovering of a rigid body in an oscillating flow

    Full text link
    The fluid dynamics video shows rigid, spatially asymmetric bodies interacting with oscillating background flows. A free rigid object, here a hollow "pyramid," can hover quite stably against gravity in the oscillating airflow with a zero mean, when its peak speed is sufficiently high. We further show in shadowgraph imaging how this asymmetric body sheds vortices in such an unsteady flow, thus enabling the body to "ratchet" itself through the background flow

    An Analysis of a Linear Algebra Based Group Key Exchange Protocol

    Get PDF
    Group key exchange protocols are used to establish session keys, which can then be used as encryption keys to set up secure channels of communication, between more than two parties simultaneously. Many different group key exchange protocols exist and require security proofs in order to determine the strength of the protocol and answer the following questions: does the protocol provide authentication, and if so, to what degree? Does the protocol provide key secrecy? In this thesis we examine a particular group key exchange protocol that we call the \textit{vector space projection protocol} as first described in “A Group Key Establishment Scheme” by Guzey, Kurt, and Ozdemir, and show using a particular type of security proof — the game based security model — that the protocol as described does not achieve key secrecy. We show that there are at least four adversaries with non-negligible probabilities of winning the key secrecy security game, which indicates that this key exchange protocol is not one that should be implemented
    • …
    corecore