91 research outputs found

    Ascent and Descent of Composition Operators on Orlicz-lorentz space

    Full text link
    The aim of this paper is to discuss the characterizations of the composition operators on Orlicz-Lorentz space to have finite ascent (or descent)

    A prospective study of risk factors and feto-maternal outcome of preterm labor in OG department of tertiary care centre of South Gujarat

    Get PDF
    Background: Every year globally, an estimated 15 million babies are born preterm and this number is rising over major parts of the world. Severe morbidity is common in neonates born before 32-34 weeks of gestation. Management of prematurity is a team approach by the obstetrician and the pediatrician. Methods: This prospective observational study was conducted in the Department of Obstetrics and Gynecology, NCH, Surat from October 2019 to October 2020. 120 consenting consecutive subjects fulfilling inclusion criteria were enrolled. Results: The most common risk factor for preterm labor in my study was PPROM (premature rupture of membranes). 27% subjects were diagnosed with threatened preterm labor. 22% subjects delivered preterm due to advanced labor. Labor arrest with tocolytic drug nifedipine was attempted in 30 subjects without any complications, which was successful in 19 subjects. The most common maternal complication in preterm labor was postpartum hemorrhage. All neonates were admitted to NICU, amongst them 45 developed complications. The most common complication in preterm neonates was respiratory distress. The rate of early neonatal death was 6.6%. Conclusions: Inspite of advances in antenatal care and neonatal services, preterm birth remains a burden to families. Strengthening of referral systems to make sure that high risk patients are managed at tertiary care centers with NICU facilities will improve the neonatal outcome

    A New Approach of Cryptographic Technique Using Simple ECC ECF

    Full text link
    Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced

    Off Screen Perspectives: India’s Transnational Independent Film Production Culture

    Get PDF
    The academic scholarship on Indian film has predominantly focused on Bollywood cinema, examining central aspects such as the aesthetics, style, genre, ideology, industrial structure, and culture, as well as the transnational circulation and consumption of Bollywood in the era of globalization. This resulted in limited scholarship about independent, regional, and alternative cinemas in India. However, there is increasing interest in studying these cinemas, including their aesthetics, production processes and distribution models. Therefore, this dissertation contributes to and addresses this gap in the scholarship by examining India’s transnational independent film production culture. Employing an interdisciplinary approach that draws insights from Media Industry Studies, specifically John Caldwell's “cultural-industrial” method (2008), this dissertation emphasizes the need to examine the political-economic/industrial structures and labour practices in relation to each other. Therefore, it combines textual, industrial, and cultural analysis, alongside bottom-up methods such as personal interviews and participant observation to gain deeper insights into the film policies, practices, and professionals — making and facilitating Indian independent cinema transnationally. The focal point is the National Film Development Corporation of India (NFDC) – established in 1980 as a state-sponsored organization for developing alternative cinemas. This dissertation examines the management of NFDC, its annual film market Film Bazaar, as well as the professional world of its staff members and producers – who are primarily involved in creating independent cinema transnationally. The case study of NFDC explores how the organization managed and restructured itself in response to the neoliberal-national policies, leading to the formation of a transnational independent film production culture in the mid-2000s. The case study of Film Bazaar addresses the implications of these industrial structures on the programming, practices, and management, revealing the precarious work culture of its labour (e.g., low pay, contractual, and seasonal work). The final case study examines the under-explored role of Indian producers, their production culture, and the emotional labour within these transnational structures of independent filmmaking. Indian producers weave hero narratives, intertwining their beliefs and practices rooted in mentoring, networking, and creative entrepreneurship

    Pseudo Random Generator Based Public Key Cryptography

    Full text link
    Advances in communication technology have seen strong interest in digital data transmission. However, illegal data access has become more easy and prevalent in wireless and general communication networks. In order to protect the valuable data from illegal access, different kinds of cryptographic systems have been proposed. In this paper, a new integrating channel coding and cryptography design communication systems is proposed. So we use cryptography as an error detection tool. In order to preserve the advantages of encryption and to improve its disadvantages, we place the encryptor before the encoder. The hamming encoder is used to select the generator matrix to be used as a block code to form the new system .In this the security of common cryptographic primitive i.e a key stream generator based on LFSR can be strengthened by using the properties of a physical layer.So, a passive eaves dropping will experience great difficulty in cracking the LFSR based cryptography system as the computational complexity of discovering the secret key increases to large extent. The analysis indicates that the proposed design possesses the following feature. Its security is higher than the conventional one with the channel encoder only. Privacy is more due to unknown random codes. As the applied codes are unknown to a hostile user, this means that it is hardly possible to detect the message of another user. Anti-jam performance is good. It overcomes the disadvantage of Chaos based cryptography system as input data is not extended and hence bandwidth is not wasted. Moreover, the computer simulation shows that the proposed system has a good ability in error detection especially when the SNR per bit is moderate high, and the detection ability is enhanced when the increased length of Hamming code is employed

    PIN-FORMED1 polarity in the plant shoot epidermis is insensitive to the polarity of neighboring cells

    Get PDF
    At the Arabidopsis shoot apex, epidermal cells are planar-polarized along an axis marked by the asymmetric localization patterns of several proteins including PIN-FORMED1 (PIN1), which facilitates the directional efflux of the plant hormone auxin to pattern phyllotaxis. While PIN1 polarity is known to be regulated non -cell autonomously via the MONOPTEROS (MP) transcription factor, how this occurs has not been determined. Here, we use mosaic expression of the serine threonine kinase PINOID (PID) to test whether PIN1 polarizes according to the polarity of neighboring cells. Our findings reveal that PIN1 is insensitive to the po-larity of PIN1 in neighboring cells arguing against auxin flux or extracellular auxin concentrations acting as a polarity cue, in contrast to previous model proposals
    • …
    corecore