1,501 research outputs found

    Role and support of libraries towards India’s start-up and stand-up entrepreneurship movement program

    Get PDF
    Now a day’s India is one of the major markets in the world which is still achieved common growth in both print and digital media. It’s start-up and stand-up movement campaigning program is based on the major action plan aimed for promoting sufficient bank finance towards a new start-up ventures to boost and generate entrepreneurship and also to promote start-ups with much more job creation facilities. Start-up India should be coincident with public libraries and will also provide the supporting infrastructures like; accessories, equipments, computer peripherals with good amenities and well accommodation for reading and learning facilities for users in both indoor and outdoor of school and colleges through both online and offline mode. All Public libraries could do the same in a start-up economy and play a major vital role with sufficient beneficiary assets for users to develop knowledge, education and will gain certain creativity power through start-up and stand-up India movement programs

    Vulnerability of Agriculture to Climate Shocks in Odisha, India

    Get PDF
    This paper explores the vulnerability of agriculture to climate shocks in Odisha, India and also shows the loss of agricultural crops and productivity due to extreme climate events like droughts, floods and cyclones. Climate change and climate shocks affect different sectors, and livelihoods of population differently depending on the adaptive capacity. Using secondary data, the study analyses the agricultural vulnerability to the increasing climate shocks and present a historical picture of climate shocks that took place in the state of Odisha during last few decades. It is observed that climate shocks are increasing and it is affecting agriculture sector to a large extent leading to the vulnerability of agricultural dependent communities. Analyzing the vulnerability of agriculture to climate shocks, the study also explored the possibility to adapt the shocks and suggested some adaptation strategies to reduce the agricultural vulnerability. Keywords: Climate Change, Vulnerability, Agricultur

    ASSOCIATION OF DEMOGRAPHIC AND CLINICAL CHARACTERISTICS WITH SELF-CARE BEHAVIOR IN PATIENTS WITH DIABETES MELLITUS: A CROSS-SECTIONAL STUDY.

    Get PDF
    Background:  Self-care behavior improves diabetes and prevents the progression and worsening of the outcomes of this disease. There is a lack of consistency in the research about how self-care impacts patients with diabetes in the Indian setting. This study was carried out to find the association of demographic and clinical characteristics with self-care behavior in patients with diabetes mellitus.  Method:  This was a cross-sectional study carried out at the Department of General Medicine IGIMS. The duration of this study was from December 2023 to February 2024. There were 100 participants selected from those visiting the IGIMS general medicine department for follow-up of diabetes. Socio-demographic and clinical characteristics, such as age, sex, duration of diagnosis, literacy, BMI, smoking history, and treatment received were recorded. Lab reports were reviewed for diabetes-related complications and HbA1c. Summary of Diabetes Self-Care Activities Questionnaire (SDSCA) was used to determine details regarding self-care. Association was determined statistically.  Results:  The study quantitatively analyzed the impact of self-care behaviors among 100 diabetic patients. Statistical analysis revealed significant associations: patients engaging in consistent self-care behaviors—such as non-smoking, adhering to diet and exercise regimes, and using oral hypoglycemic agents—had lower HbA1c levels, with an average decrease of 0.5% compared to those with poor self-care practices (p < 0.05). Furthermore, better self-care scores were inversely correlated with the presence of diabetes-related complications, emphasizing the critical role of self-management in diabetes control.  Conclusion:  From this study, it is found that patients with lesser HbA1C are more inclined towards self-care habits that help in the management of diabetes.  Recommendation:  Self-care habits prevent the worsening of diabetes. It should be recommended and encouraged for each diabetic individual.  

    How to Securely Compute the Modulo-Two Sum of Binary Sources

    Full text link
    In secure multiparty computation, mutually distrusting users in a network want to collaborate to compute functions of data which is distributed among the users. The users should not learn any additional information about the data of others than what they may infer from their own data and the functions they are computing. Previous works have mostly considered the worst case context (i.e., without assuming any distribution for the data); Lee and Abbe (2014) is a notable exception. Here, we study the average case (i.e., we work with a distribution on the data) where correctness and privacy is only desired asymptotically. For concreteness and simplicity, we consider a secure version of the function computation problem of K\"orner and Marton (1979) where two users observe a doubly symmetric binary source with parameter p and the third user wants to compute the XOR. We show that the amount of communication and randomness resources required depends on the level of correctness desired. When zero-error and perfect privacy are required, the results of Data et al. (2014) show that it can be achieved if and only if a total rate of 1 bit is communicated between every pair of users and private randomness at the rate of 1 is used up. In contrast, we show here that, if we only want the probability of error to vanish asymptotically in block length, it can be achieved by a lower rate (binary entropy of p) for all the links and for private randomness; this also guarantees perfect privacy. We also show that no smaller rates are possible even if privacy is only required asymptotically.Comment: 6 pages, 1 figure, extended version of submission to IEEE Information Theory Workshop, 201

    The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel

    Full text link
    We consider oblivious transfer between Alice and Bob in the presence of an eavesdropper Eve when there is a broadcast channel from Alice to Bob and Eve. In addition to the secrecy constraints of Alice and Bob, Eve should not learn the private data of Alice and Bob. When the broadcast channel consists of two independent binary erasure channels, we derive the oblivious transfer capacity for both 2-privacy (where the eavesdropper may collude with either party) and 1-privacy (where there are no collusions).Comment: This is an extended version of the paper "The Oblivious Transfer Capacity of the Wiretapped Binary Erasure Channel" to be presented at ISIT 201

    On the Oblivious Transfer Capacity of the Degraded Wiretapped Binary Erasure Channel

    Full text link
    We study oblivious transfer (OT) between Alice and Bob in the presence of an eavesdropper Eve over a degraded wiretapped binary erasure channel from Alice to Bob and Eve. In addition to the privacy goals of oblivious transfer between Alice and Bob, we require privacy of Alice and Bob's private data from Eve. In previous work we derived the OT capacity (in the honest-but-curious model) of the wiretapped binary independent erasure channel where the erasure processes of Bob and Eve are independent. Here we derive a lower bound on the OT capacity in the same secrecy model when the wiretapped binary erasure channel is degraded in favour of Bob.Comment: To be presented at the IEEE International Symposium on Information Theory (ISIT 2015), Hong Kon

    Super-resolution and super-sensitivity of quantum LiDAR with multi-photonic state and binary outcome photon counting measurement

    Full text link
    Here we are investigating the enhancement in phase sensitivity and resolution in Mach-Zehnder interferometer (MZI) based quantum LiDAR. We are using multi-photonic state (MPS), superposition of four coherent states [1], as the input state and binary outcome parity photon counting measurement and binary outcome zero-nonzero photon counting measurement as the measurement schemes. We thoroughly investigate the results in lossless as well as in lossy cases. We found enhancement in resolution and phase sensitivity in comparison to the coherent state and even coherent superposition state (ECSS) based quantum LiDAR. Our analysis shows that MPS may be an alternative nonclassical resource in the field of quantum imaging and quantum sensing technologies, like in quantum LiDAR.Comment: We welcome comment

    Geotechnical Characterization of Clinker-Stabilized Fly Ash–Coal Mine Overburden Mixes for Subbase of Mine Haul Road

    Get PDF
    Fly ash is a major by-product of thermal power plants that adversely affects land, water, and air. Its gainful utilization in many areas is being continuously explored. Use of fly ash in opencast coal mine haul road construction is one such option. This article reports detailed laboratory investigations carried out on clinker-stabilized fly ash–mine overburden mixes to evaluate their suitability for subbase of mine haul roads. Composite materials were prepared from fly ash, mine overburden, and clinker at different proportions. Proctor compaction test, unconfined compressive strength (UCS), and ultrasonic pulse velocity tests were carried out at different curing periods. UCS values were found to be strongly dependent on clinker content as well as curing period. Ultrasonic pulse velocity tests confirmed the obtained UCS results. The composite with 62% fly ash and 8% clinker content showed adequate mechanical strength suitable for the subbase of a mine haul road

    A New Type of Coincidence and Common Fixed-Point Theorems for Modified ð-Admissible ð©-Contraction Via Simulation Function

    Get PDF
    In this manuscript, we introduce the concept of modified α-admissible contraction with the help of a simulation function and use this concept to establish some coincidence and common fixed-point theorems in metric space. An illustrative example that yields the main result is given. Also, several existing results within the frame of metric space are established. The main theorem was applied to derive the coincidence and common fixed-point results for α-admissible ð’µ-contraction
    • …
    corecore