300 research outputs found

    Codes on m-repeated solid burst errors

    Get PDF
    In coding theory, several kinds of errors due to the different behaviours of communication channels have been considered and accordingly error detecting and error correcting codes have been constructed. In general communication due to the long messages, the strings of same type of error may repeat in a vector itself. The concept of repeated bursts is introduced by Beraradi, Dass and Verma [4] which has opened a new area of study. They defined 2-repeated bursts and obtained results for detection and correction of such type of errors. The study was further extended to m-repeated bursts [3]. Solid burst errors are common in many communications. This paper considers a new similar kind of error which will be termed as ‘m-repeated solid burst error of length b’. A lower bound on the number of parity checks required for the existence of codes that detect such errors is obtained. Further, codes capable of detecting and simultaneously correcting such errors have also been dealt with.Publisher's Versio

    Child Marriage: Its Causes and Worse Impacts in Indian society.

    Get PDF
    Child Marriage is a human rights violation. Now child marriage is a curse in the global society. Child marriage is a burning problem around the world including India. It is especially prevalent in India, where more than one third of child brides live. According to UNICEF, 47% of girls are married by 18 years of age & 18% are married by 15 years of age. Majority of girls who were married below 18 years are from poor & below poverty line families. These marriages are often performed without the consent of the girls involved in the marriage. Indian law has made child marriage illegal, but it is still widely practiced across the nation. The highest rates are seen particularly in the rural states in India. In most cases young girls get married off to older men, when they are still children. Child marriages must be viewed within a context of force & coercion, involving pressure & children’s lack of choice or capacity to give their full consent. Child marriage is common practice in India, Niger, Chad, Bangladesh, Pakistan, Guinea, Mali, Burkina Faso, Africa & Nepal, Where mostly girls are married below the age of 18. Child marriage is rooted in gender inequality, culture & tradition, poverty & insecurity. Child marriage has worse effect on the young girls, society and her children’s health. It has severe negative health consequences of girls are often not psychologically, physically & sexually mature. It is resulting in death, health problems, poverty, violence & lack of education

    Codes correcting key errors

    Get PDF
    The objective of coding theory is to protect a message going through a noisy channel. The nature of errors that cause noisy channel depends on different factors. Accordingly codes are needed to develop to deal with different types of errors. Sharma and Gaur [6] introduced a new kind of error which is termed as ‘key error’. This paper presents lower and upper bounds on the number of parity-check digits required for linear codes capable of correcting such errors. An example of such a code is also provided.Publisher's Versio

    Location of burst and repeated burst error in single and adjacent sub-blocks

    Get PDF
    The paper gives necessary and sufficient conditions for the existence of linear codes capable of identifying burst/repeated burst errors whether it is confined to one sub-block or spread over two adjacent sub-blocks. Examples of such codes are also provided. We also provide two methods one using tensor product and other using cyclic code to construct such codes. Finally, comparisons on the number of check digits of such codes with the corresponding error detecting and correcting codes are also provided.Publisher's Versio

    Codes on s-periodic errors

    Get PDF
    In this paper, we study linear codes capable of detecting and correcting s-periodic errors. Lower and upper bounds on the number of parity check digits required for codes detecting such errors are obtained. Another bound on codes correcting such errors is also obtained. An example of a code detecting such errors is provided

    A REVIEW ON PAST AND PRESENT STATUS OF MEDICAL EDUCATION SYSTEM

    Get PDF
    The origin of medical education dates back to era of starting of Hindu civilization. The Vedic literature can be called as the source of all medical education systems. Amongst them Ayurveda is that science which has give emphasize on holistic approach towards health. Surprisingly the modalities for a learner of medical science have been well described in the texts of Ayurveda. The present situation is somehow different regarding the status of medical education all over the world. So, this study has been conducted to show the glorious approaches as present in ancient medical education system which can revive the present scenario and status of medicinal education. Materials & Methods: The excessive texts of Ayurveda have been studied and critically analyzed to identify the status of medical education as described. Simultaneously the present states of contemporary medical education been studied. The demerits have been tried to evaluate & along with that some solution have been shown which may be helpful to change the present scenario of medical education throughout the world. Results: The result shows that the approach with the basic principle of Ayurveda can modify or resolve the problems as arises in modern medical educational system. Conclusion: Therefore, it can be proposed that a collaborative approach is the need of time to solve all the obstacles so that medical educational system can be updated & become more beneficial for the society

    BOOSTING THE SKIN DELIVERY OF CURCUMIN THROUGH STEARIC ACID-ETHYL CELLULOSE BLEND HYBRID NANOCARRIERS-BASED APPROACH FOR MITIGATING PSORIASIS

    Get PDF
    Objective: Curcumin presents poor topical bioavailability when administered orally, which poses a major hurdle in its use as an effective therapy for the management of psoriasis. The present study reports the utilization of lipid-polymer hybrid nanoparticles (LPHNPs) for the topical delivery of curcumin which can be a potential approach for mitigating psoriasis. Methods: Curcumin-loaded LPHNPs were prepared by the emulsification solvent evaporation method and characterized. The optimized Curcumin-loaded LPHNPs (DLN-3) were further incorporated into 2% Carbopol 940 gels and evaluated for its therapeutic efficacy in the Imiquimod (IMQ)-induced psoriasis rat model. Results: The average particle size, polydispersity index, zeta potential, drug entrapment and loading efficiency for DLN-3 were found to be 200.9 nm, 0.342,-28.3 mV, 87.40±0.99% and 4.57±0.04%, respectively. FT-IR, DSC and XRD studies confirmed that all the components used for the formulation are compatible with each other, whereas SEM and TEM analysis affirmed the spherical shape of LPHNPs with a smooth surface. The in vitro drug release studies suggest that curcumin was released from the LPHNPs in a sustained manner over a period of 24 h via super case II transport mechanism. Results of in vitro skin permeation study revealed that 38.39±2.67% of curcumin permeated at 12 h across excised pig ear skin with a permeation flux of 18.74±3.59 µg/cm2/h. Further, in vivo evaluation and histopathological studies demonstrated that NLHG-1 hydrogels showed better therapeutic efficacy against the psoriatic skin lesions than the standard marketed gels. Conclusion: These results suggest that the developed LPHNPs have a superior ability to improve the skin penetration or accumulation of DLN-3 within psoriatic skin and offer a potential delivery system for the management of psoriasis

    An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks

    Get PDF
    The refurbishing of conventional medical network with the wireless medical sensor network has not only amplified the efficiency of the network but concurrently posed different security threats. Previously, Servati and Safkhani had suggested an Internet of Things (IoT) based authentication scheme for the healthcare environment promulgating a secure protocol in resistance to several attacks. However, the analysis demonstrates that the protocol could not withstand user, server, and gateway node impersonation attacks. Further, the protocol fails to resist offline password guessing, ephemeral secret leakage, and gateway-by-passing attacks. To address the security weaknesses, we furnish a lightweight three-factor authentication framework employing the fuzzy extractor technique to safeguard the user’s biometric information. The Burrows-Abadi-Needham (BAN) logic, Real-or-Random (ROR) model, and Scyther simulation tool have been imposed as formal approaches for establishing the validity of the proposed work. The heuristic analysis stipulates that the proposed work is impenetrable to possible threats and offers several security peculiarities like forward secrecy and three-factor security. A thorough analysis of the preexisting works with the proposed ones corroborates the intensified security and efficiency with the reduced computational, communication, and security overheads

    The detection of possible transient Quasi-Periodic Oscillations in the γ\gamma-ray light curve of PKS 0244-470 and 4C+38.41

    Full text link
    The continuous monitoring capability of Fermi-LAT has enabled the exploration of Quasi-Periodic Oscillations (QPOs) in the γ\gamma-ray light curve of blazar that has given a new perspective to probe these source and jet physics over a wide range of time scales. We report the presence of transient QPOs in the long-term γ\gamma-ray light curve of blazars PKS 0244-470 \& 4C +38.41. We first identified different flux states using the Bayesian Block algorithm and then explored the possible transient QPOs in the segments of each flux phase where the flux level changes over fairly regular intervals. Combining this with source intrinsic variance, we identified two flux phases for PKS 0244-470: one activity (AP-1) and one quiescent phase (QP-1). For 4C+38.41, we similarly identified four activity (AP-1, AP-2, AP-3, and AP-4) and two quiescent (QP-1 and QP-2) phases. AP-1 phase of PKS 0244-470 shows QPO of ∼\sim 225 days persisting for 8 cycles (∼\sim 4.1 σ\sigma). In 4C+38.41, AP-1 and AP-2 phases show QPO of ∼\sim 110 days and ∼\sim 60 days, respectively, persisting for 5 cycles. In AP-3, we identified three sub-phases, and all show a ∼\sim week scale recurrent rise with five complete cycles, while in QP-1, we could identify 2 sub-phases (Q1 and Q2). Q1 phase shows a significant period of ∼\sim 104 days with six complete cycles. Q2 phase also shows significant QPO but with only ∼\sim 3.7 cycles. All the detections are locally significant with at least four or more cycles. We discuss the possible origin and argue that the current driven kink instability and curved jet model seem the most likely cause for shorter and longer QPOs though the latter requires continuous acceleration or injection of particles to explain these

    Radiocarbon Dating of Historical Bricks: Exploring the Unprotected Archaeological Mounds in the Environs of Excavated Site of Nalanda

    Get PDF
    Nalanda was a renowned Buddhist monastery which is believed to have been active for 800 years from around 4th/5th to 12th centuries AD. We know about the site from the accounts of 7th century Chinese traveler (Xuanzang) and later from 19th century British surveyors (Buchanan, Cunningham and Broadley). There are many studies on this site, recent one among them is a geospatial analysis which has revealed a larger extent (~7.25 sq. km) of the site compared to what is protected at present as World Heritage (WH) inscribed by UNESCO (0.23 sq. km. as core zones and 0.58 sq. km. as buffer zone) and has identified several unprotected archaeological mounds in the vicinity. Since we have a range of period when the site was active, it is possible that the dates of structures in each unexcavated mound are decades or centuries apart. To understand the time sequence in which the site existed one could use absolute dating method. This paper reports result of preliminary dating analysis using the Accelerator Mass Spectrometry (AMS) technique on bricks collected from unprotected mounds in the environs of Nalanda. This paper also reports methods and issues in sample collection, preparation and discusses challenges to overcome in future efforts
    • …
    corecore