2,394 research outputs found
An Evolutionary Approach to Drug-Design Using Quantam Binary Particle Swarm Optimization Algorithm
The present work provides a new approach to evolve ligand structures which
represent possible drug to be docked to the active site of the target protein.
The structure is represented as a tree where each non-empty node represents a
functional group. It is assumed that the active site configuration of the
target protein is known with position of the essential residues. In this paper
the interaction energy of the ligands with the protein target is minimized.
Moreover, the size of the tree is difficult to obtain and it will be different
for different active sites. To overcome the difficulty, a variable tree size
configuration is used for designing ligands. The optimization is done using a
quantum discrete PSO. The result using fixed length and variable length
configuration are compared.Comment: 4 pages, 6 figures (Published in IEEE SCEECS 2012). arXiv admin note:
substantial text overlap with arXiv:1205.641
Distributed deep learning inference in fog networks
Today's smart devices are equipped with powerful integrated chips and built-in heterogeneous sensors that can leverage their potential to execute heavy computation and produce a large amount of sensor data. For instance, modern smart cameras integrate artificial intelligence to capture images that detect any objects in the scene and change parameters, such as contrast and color based on environmental conditions. The accuracy of the object recognition and classification achieved by intelligent applications has improved due to recent advancements in artificial intelligence (AI) and machine learning (ML), particularly, deep neural networks (DNNs).
Despite the capability to carry out some AI/ML computation, smart devices have limited battery power and computing resources. Therefore, DNN computation is generally offloaded to powerful computing nodes such as cloud servers. However, it is challenging to satisfy latency, reliability, and bandwidth constraints in cloud-based AI. Thus, in recent years, AI services and tasks have been pushed closer to the end-users by taking advantage of the fog computing paradigm to meet these requirements. Generally, the trained DNN models are offloaded to the fog devices for DNN inference. This is accomplished by partitioning the DNN and distributing the computation in fog networks.
This thesis addresses offloading DNN inference by dividing and distributing a pre-trained network onto heterogeneous embedded devices. Specifically, it implements the adaptive partitioning and offloading algorithm based on matching theory proposed in an article, titled "Distributed inference acceleration with adaptive dnn partitioning and offloading". The implementation was evaluated in a fog testbed, including Nvidia Jetson nano devices. The obtained results show that the adaptive solution outperforms other schemes (Random and Greedy) with respect to computation time and communication latency
A NEW TECHNIQUE TO ENCRYPT A CODE WORD
The principal goal of designing any encryption algorithm is to hide the original message and send the non-readable text message to the receiver so that secret message communication can take place over the web. The strength of an encryption algorithm depends on the difficulty of cracking the original message. A number of symmetric and asymmetric key encryption algorithms like DES, TRIPLE DES, AES, BLOWFISH, RSA has been developed to provide greater security affects one over the other. I have described a protocol in this paper, which fits the technique to realistic communication environments, and extend the security and the range of applications of the technique. The basic motive behind the new approach is not to use a ‘key’. Encryption is done by the use of the logic operations amongst the bits of the code word. This can be said as "security through obscurity" where the shared secret is not an encryption key, but the encryption algorithm itself. This algorithm can prove to be an efficient method of encryption and can reduce the complexity of a system that encrypts or decrypts a message. Analysis has been done which shows the advantages and the limitations of this algorithm. With this new approach we are implementing a technique to enhance the security level and to further reduce the time for encryption and decryption
Large Deviation Principle for complex solution to squared Bessel SDE
Complex solutions to squared Bessel SDEs appear naturally in relation to
Schramm-Loewner evolutions. We prove a large deviation principle for such
solutions as the dimension parameter tends to .Comment: 12 Page
Post-Covid Challenges and Opportunities for Higher Education
All over the world, the Covid-19 pandemic has had a big impact on the higher education sector. It has also put a lot of pressure on the Indian system of higher education. As a result, all academic institutions and colleges now teach their students through online platforms, thus forcing the higher education sector of the country to move its base online. The present crisis should be used as an opportunity to devise new ways to improve education that everyone can use and understand. Many new types of learning, new ideas, and recent trends have resulted from the pandemic. As we move forward, the same may happen
Tribal Parents’ Attitude Towards Higher Education of Girls in Relation to Levels of Education and Their Socioeconomic Status in West Bengal
The study focuses on the attitude of parents from tribal communities in West Bengal towards their daughters’ higher education, in terms of levels of education and socioeconomic status. The level of education is low among scheduled tribes of India due to a lack of education awareness. The aim of this study is to examine the attitude of tribal parents towards the higher education of their daughters in relation to levels of education. The study is based on quantitative data. The primary data was acquired from 400 parents, through a random sampling technique, from specific tribal areas in West Bengal. The socioeconomic status of the parents is determined by three indicators including gender dimension, educational status, and geographical (rural and urban) location. The attitude of tribal parents is associated with the psychological behavior of tribal communities because the cultural practices of the communities determine their socio-economic status
A Review on Tribal Literature Focus on Tribal Education With Special Reference to Tribal Women
Indian women, who had been respected in medieval India but instead were ignored many decades ago, are now receiving more attention. In India, considerable progress has been achieved in this area, but there is still much more to be done. Tribal society lags in terms of education and social and economic advancement, making it difficult for them to integrate into today's "men-dominated" world. Because of the co-relation and low adoption of educational technology, most people in tribal areas are backward. Tribal communities are secluded, isolated cultures that live in small groups. To some extent, this type of rural development education was attempted even before independence, as part of the community experts to develop the Programme. Education, on the other hand, has been restricted to a few sectors and projects, with extension services developed exclusively to conduct state or national-level plans
- …
