نتایج جستجو برای: rotary agitated extractors

تعداد نتایج: 13559  

Journal: :Journal of neurology, neurosurgery, and psychiatry 1977
J L Medina S Chokroverty F A Rubino

Three patients presented with sudden visual impairment followed by agitated delirium one to three days later. Examination revealed marked agitation, dementia, and loss of vision. Computerised axial tomography demonstrated temporo-occipital infarctions. All recovered from the agitated state in four days to two months, but their visual impairment and dementia persisted one to four years later.

2014
Johanne Desrosiers Anabelle Viau-Guay Marie Bellemare Louis Trudel Isabelle Feillou Anne-Céline Guyon

Introduction. In long-term care (LTC), person-centred approaches are encouraged. One such approach, relationship-based care (RBC), aims among other things to reduce residents' agitated behaviours. RBC has been used in numerous Quebec LTC facilities over the past decade but it has never been studied. Objective. Explore correlations between use of RBC by trained caregivers and the frequency of ag...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2015
Xin Li

We give the first explicit construction of deterministic extractors for affine sources over F2, with entropy k ≥ log n for some large enough constant C, where n is the length of the source. Previously the best known results are by Bourgain [Bou07], Yehudayoff [Yeh11] and Li [Li11b], which require the affine source to have entropy at least Ω(n/ √ log log n). Our extractor outputs one bit with er...

2006
Jingwei Wu Richard Holt

This report describes a suite of program extractors which we developed by adopting and extending existing program parsing and extraction techniques or tools. This suite is called CX because it is mainly targeted at extracting facts from C and C++ programs. This suite is currently composed of four extractors: CPPX, BFX, LDX and CTSX. The main goal of creating CX is to provide a convenient set of...

2016
Alan Akbik Laura Chiticariu Marina Danilevsky Yonas Kbrom Yunyao Li Huaiyu Zhu

We present POLYGLOTIE, a web-based tool for developing extractors that perform Information Extraction (IE) over multilingual data. Our tool has two core features: First, it allows users to develop extractors against a unified abstraction that is shared across a large set of natural languages. This means that an extractor needs only be created once for one language, but will then run on multilin...

Journal: :IACR Cryptology ePrint Archive 2014
Charles Herder Ling Ren Marten van Dijk Meng-Day Yu Srinivas Devadas

We describe a method of cryptographically-secure key extraction from a noisy biometric source. The computational security of our method can be clearly argued through hardness of Learning Parity With Noise (LPN). We use a fuzzy commitment scheme so the extracted key is chosen by definition to have uniformly random bits. The biometric source is used as the noise term in the LPN problem. A key ide...

2009
Avi Wigderson Zeev Dvir

Randomness is used in many places in our daily lives. Some examples are gambling, statistics, algorithms, cryptography etc. For such applications one typically assumes a supply of completely unbiased and independent randim bits. This raises the problem of where to get these assumed random bits from. We could try and use natural sources of randomness such as sun spots, the stock market or the we...

2014
Jatin Gupta Vineeta Nikhil Padmanabh Jha

AIMS To compare amount of root canal debris and irrigant extruded apically after irrigants agitation using closed and open chambers. METHODS AND MATERIAL Sixty maxillary central incisors were selected, decoronated, and mounted in preweighed glass vials filled with distilled water. Biomechanical preparation was completed using ProTaper rotary files until number F4 and 1 mL of 3% NaOCl solution...

2018
Avraham Ben-Aroya Eshan Chattopadhyay Dean Doron Xin Li Amnon Ta-Shma

Our main contribution in this paper is a new reduction from explicit two-source extractors for polynomially-small entropy rate and negligible error to explicit t-non-malleable extractors with seed-length that has a good dependence on t. Our reduction is based on the Chattopadhyay and Zuckerman framework [CZ16], and surprisingly we dispense with the use of resilient functions which appeared to b...

2003
Yevgeniy Dodis Roberto Oliveira

We introduce the notion of a super-strong extractor. Given two independent weak random sources X,Y , such extractor EXT(·, ·) has the property that EXT(X,Y ) is statistically random even if one is given Y . Namely, 〈Y, EXT(X,Y )〉 ≈ 〈Y,R〉. Super-strong extractors generalize the notion of strong extractors [16], which assume that Y is truly random, and extractors from two weak random sources [26,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید