1,617 research outputs found

    Kvasir-Instruments and Polyp Segmentation Using UNet

    Get PDF
    This paper aims to describe the methodology used to develop, fine-tune and analyze a UNet model for creating masks for two datasets: Polyp Segmentation and Instrument Segmentation, which are part of MedAI challenge. For training and validation, we have used the same methodology on both tasks and finally on the hidden testing dataset the model resulted in an accuracy of 0.9721, dice score of 0.7980 for the instrumentation task, and the accuracy of 0.5646 and a dice score of 0.4100 was achieved for the Polyp Segmentation.publishedVersio

    Isoclinism in multiplicative Lie algebras

    Full text link
    The purpose of this paper is to introduce the notion of isoclinism and cover in a multiplicative Lie algebra which may be helpful to describe all multiplicative Lie algebra structures on a group. Consequently, we give the existence of the stem multiplicative Lie algebra. We also give the necessary and sufficient conditions for the existence of stem cover of a multiplicative Lie algebra

    MEDICINAL PLANTS WITH NEUROPHARMACOLOGICAL PROPERTIES FROM INDIAN ORIGIN

    Get PDF
    Neuropharmacology is the scientific study of the effects of drugs on the central nervous system. Its primary focus is actions of medications for psychiatric and neurologic disorders as well as those of drugs of abuse. The goal of Neuropharmacology is to apply information about drugs and their mechanisms of action, develop safer and more effective treatments and eventually curative and preventive measures for a host of nervous system abnormalities. There are a number of drugs being used in the traditional medicine for treatment of various CNS disorders and presently many of these drugs are being explored scientifically to ascertain their CNS activities. Significant number of studies has been performed to find alternative treatment for diseases of the nervous forum by identifying structures with activity at the central nervous system. However, most of the screenings are usually conducted on an ad hoc basis and not systematically. The initial purpose of this review is to summarize plants with neuropharmacological activities, in particular, those that have not been fully studied and that have molecular mechanisms whose active constituents are responsible for the activities remained to be identified. The second purpose was to identify potential target plants for future studies of new and alternative therapies for the treatment of neurological disorders and neurodegenerative diseases

    Smart Ceiling Temperature Controlled Fan

    Get PDF
    Previous generation models requires more human efforts but in the age of modern era as every technology is being evolving into a more advanced an modified version by operating automatically so here in the same way this project work will reinvent the ceiling fan to make it smarter. Fans make people feel cooler but don’t lower a room’s actual temperature. So to save energy, it will run automatically according to the temperature of the surroundings and will get turn off below a particular temperature by itself. Considering already existing ceiling fans it is difficult to control the speed of each and every fan depending upon the weather conditions. The idea behind the paper smart ceiling temperature controlled fan is to control the speed of fan using microcontroller ATMEGA16, based on variations in temperature detected by temperature sensor. Besides house owners, this smart feature in a fan can also benefit schools, firms and other public buildings as they also have a certain regular routine. Therefore this project work is taken up to minimize human effort and save energy at the same time which is a need of an hour. The software used for this project is PROTEUS_V78i and WINAVR studio4

    On the Construction of Near-MDS Matrices

    Full text link
    The optimal branch number of MDS matrices makes them a preferred choice for designing diffusion layers in many block ciphers and hash functions. However, in lightweight cryptography, Near-MDS (NMDS) matrices with sub-optimal branch numbers offer a better balance between security and efficiency as a diffusion layer, compared to MDS matrices. In this paper, we study NMDS matrices, exploring their construction in both recursive and nonrecursive settings. We provide several theoretical results and explore the hardware efficiency of the construction of NMDS matrices. Additionally, we make comparisons between the results of NMDS and MDS matrices whenever possible. For the recursive approach, we study the DLS matrices and provide some theoretical results on their use. Some of the results are used to restrict the search space of the DLS matrices. We also show that over a field of characteristic 2, any sparse matrix of order n≥4n\geq 4 with fixed XOR value of 1 cannot be an NMDS when raised to a power of k≤nk\leq n. Following that, we use the generalized DLS (GDLS) matrices to provide some lightweight recursive NMDS matrices of several orders that perform better than the existing matrices in terms of hardware cost or the number of iterations. For the nonrecursive construction of NMDS matrices, we study various structures, such as circulant and left-circulant matrices, and their generalizations: Toeplitz and Hankel matrices. In addition, we prove that Toeplitz matrices of order n>4n>4 cannot be simultaneously NMDS and involutory over a field of characteristic 2. Finally, we use GDLS matrices to provide some lightweight NMDS matrices that can be computed in one clock cycle. The proposed nonrecursive NMDS matrices of orders 4, 5, 6, 7, and 8 can be implemented with 24, 50, 65, 96, and 108 XORs over F24\mathbb{F}_{2^4}, respectively

    On the Direct Construction of MDS and Near-MDS Matrices

    Full text link
    The optimal branch number of MDS matrices makes them a preferred choice for designing diffusion layers in many block ciphers and hash functions. Consequently, various methods have been proposed for designing MDS matrices, including search and direct methods. While exhaustive search is suitable for small order MDS matrices, direct constructions are preferred for larger orders due to the vast search space involved. In the literature, there has been extensive research on the direct construction of MDS matrices using both recursive and nonrecursive methods. On the other hand, in lightweight cryptography, Near-MDS (NMDS) matrices with sub-optimal branch numbers offer a better balance between security and efficiency as a diffusion layer compared to MDS matrices. However, no direct construction method is available in the literature for constructing recursive NMDS matrices. This paper introduces some direct constructions of NMDS matrices in both nonrecursive and recursive settings. Additionally, it presents some direct constructions of nonrecursive MDS matrices from the generalized Vandermonde matrices. We propose a method for constructing involutory MDS and NMDS matrices using generalized Vandermonde matrices. Furthermore, we prove some folklore results that are used in the literature related to the NMDS code

    Nilpotency and Capability in multiplicative Lie algebras

    Full text link
    This paper aims to introduce the concept of nilpotency and capability in multiplicative Lie algebras. Also, we see the existence of covers of a multiplicative Lie algebra and thoroughly examine their relationships with capable and perfect multiplicative Lie algebras

    The Child-to-Child (C2C) Method: Participatory Design for, with and by Children in a Children's Museum

    Get PDF
    In this paper, we present the Child-to-Child method (C2C) for co-designing with children for children. The method is illustrated using a design case, where an interactive space for young children in Children’s Museum was designed. A three dimensional interactive books are envisioned and explored with children, and consequently embedded into the “Book Nook” exhibit. This interactive environment, intended for young children aged 3-5, was developed and prototyped by an intergenerational design team. The paper reflects upon challenges and opportunities provided by working with C2C method and presents results of preliminary investigation of an interactive space design that employs a novel concept of a 3D book. Further, we argue that C2C method is indeed a participatory design method for, with and by children. Reprint of a paper published in: IADIS International Journal on WWW/Internet Vol. 11, No. 2, pp. 92-113. Made available here with permission from IADIS. http://www.iadis.org
    • …
    corecore