ChapterPDF Available
A preview of the PDF is not available
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Diabetes is a chronic condition affecting millions of people worldwide.One of its major complications is diabetic retinopathy (DR),which is the most common cause of legal blindness in the developedworld. Early screening and treatment of DR prevents visiondeterioration, however the recommendation of yearly screening isoften not being met. Mobile screening centres can increasing DRscreening, however they are time and resource intensive becausea clinician is required to process the images. This process can beimproved through computer aided diagnosis, such as by integratingautomated screening on smartphones. Here we explore the useof a SqueezeNet-based deep network trained on a fundus imagedataset composed of over 88,000 retinal images for the purpose ofcomputer aided screening for diabetic retinopathy. The results ofthis neural network validated the viability of conducting automatedmobile screening of diabetic retinopathy, such as on a smartphoneplatform.
Book
This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the authors introduced new chapters and updated the text throughout in response to new developments and updated standards. The first chapter, an introduction to authentication and key establishment, provides the necessary background on cryptography, attack scenarios, and protocol goals. A new chapter, computational security models, describes computational models for key exchange and authentication and will help readers understand what a computational proof provides and how to compare the different computational models in use. In the subsequent chapters the authors explain protocols that use shared key cryptography, authentication and key transport using public key cryptography, key agreement protocols, the Transport Layer Security protocol, identity-based key agreement, password-based protocols, and group key establishment. The book is a suitable graduate-level introduction, and a reference and overview for researchers and practitioners with 225 concrete protocols described. In the appendices the authors list and summarize the relevant standards, linking them to the main book text when appropriate, and they offer a short tutorial on how to build a key establishment protocol. The book also includes a list of protocols, a list of attacks, a summary of the notation used in the book, general and protocol indexes, and an extensive bibliography.
Conference Paper
Production of electricity from Bryophyllum pinnatum leaf is very cheap and the cells are easy to maintain and operate for any people as this leaf contains some organic acids. The main raw materials to produce electricity in this process are the zinc and copper plates and the juice of Bryophyllum pinnatum leaf. This plant can be grown anywhere. As there is plenty of free spaces in off-grid areas, the people can easily get some sort of electricity using this method. In this paper, we provide a comprehensive discussion on the main advancement of Nano-power plant in our off-grid regions using this technique and the estimated the cost to build that electrical source. We also discuss the cost of this kind of renewable power source and how their adaptability can enhancement the progression of new power management solutions, especially for their integration in living environments, making the practical application of such systems economically viable.
Article
The performance of a primary cell highly depends on the coulombic efficiency of that cell. Being a primary cell, Bryophyllum pinnatum leaf generated BPL cell, where electrodes-pair of zinc and copper dipped in the filtered leaf juice, a good efficiency is required. In this paper, we have tried to show the approximate coulombic efficiency of a unit BPL cell on a certain condition.