2,908 research outputs found

    Shock propagation in locally driven granular systems

    Full text link
    We study shock propagation in a system of initially stationary hard-spheres that is driven by a continuous injection of particles at the origin. The disturbance created by the injection of energy spreads radially outwards through collision between particles. Using scaling arguments, we determine the exponent characterizing the power law growth of this disturbance in all dimensions. The scaling functions describing the various physical quantities are determined using large scale event driven simulations in two and three dimensions for both the elastic and the inelastic system. The results are shown to describe well the data from two different experiments on granular systems that are similarly driven.Comment: 8 pages, 9 figure

    Purification and properties of an endoglucanase from Thermoascus aurantiacus

    Get PDF
    AbstractAn Endo-cellulase was purified to homogeneity using ammonium sulfate precipitation, ion exchange and size exclusion chromatography from newly isolated strain of Thermoascus aurantiacus RBB-1. The recovery and purification fold were 13.3% and 6.6, respectively, after size exclusion chromatography. The purified cellulase has a molecular mass (M) of 35kDa. Optimum temperature for the enzyme was found to be 70°C and stability was upto 80°C for 1h. Along with higher stability at 80°C, enzyme showed half lives of 192h and 144h at 50 and 70°C respectively. The purified cellulase was optimally active at pH 4.0 and was stable over a broad pH range of 3.0–7.0. The enzyme purified showed apparent Km and Vmax values of 37mg/ml and 82.6U/min/mg protein respectively with higher salt tolerance of 10% for 1h

    Catalytic transesterification of beta-ketoesters with zeolite H-FER under solvent free conditions

    Get PDF
    Zeolite H-FER catalyzes the transesterification of ??-ketoesters with variety of alcohols under solvent-less condition in excellent yields. The catalyst can be reused without any loss of activity. ?? ARKAT

    Study of drug prescription pattern in ischemic heart disease patients

    Get PDF
    Background: Drug utilization pattern studies helps to screen, assess and propose appropriate modifications in prescription practices, this would help to make patient care rational and cost effective. Study was intended to analyse the drug prescribing pattern for treatment of Ischemic heart disease using WHO indicators.Methods: This is a cross sectional observational study conducted on ischemic heart disease patients admitted at inpatient department of medicine in a tertiary care teaching hospital. The study consisted of analysis of drug utilization pattern of prescribed drugs.Results: IHD was more commonly seen in males (70.06%) than females (29.94%). IHD was most commonly seen in patients of age group of 61-70 year. Drugs prescribed to patients belong to various therapeutic classes ranging from anti-platelets, anticoagulants, anti-anginal, antithrombin, thrombolytic, hypolipidemics. The most commonly prescribed therapeutic class of drugs was antiplatelet (86.26%) followed by hypolipidemic (82.25%) and ACE inhibitors drugs (46.60%). Average number of drugs per encounter was 7.70. Drugs were prescribed by their generic names were 29.99%. Out of total study group 22.06% patients were prescribed at least one antibiotic. Injections were prescribed only in 1392 (27.86%) out of 4995 drugs. Of total drugs 3270 (65.45%) of drugs were from National List of Essential Medicines-2016 (NLEM -2016) and 2774 (55.53%) drugs prescribed were from WHO-EML-2016.Conclusions: Risk of artery disease increased with increasing age. IHD was more common in males than females. The most commonly prescribed drug classes in Ischemic heart disease were anti-platelet drugs followed by hypolipidemic agents

    Study of protein calorie malnutrition amongst under six children In a slum area of kanpur

    Get PDF
    Rresearch Problem: What is the prevalence of PCM amongst under six children in slum area of Kanpur? Objectives: 1) To study the prevalence of PCM.2) To apply health educational interventions. Study Design: Cross - sectional study. Setting: All the households in the study area having under six children. Participants: Under - six children showing signs of PCM. Sample Size: 1260 children in the age group ofO - 6 years. Study Variables: Age - group, sex, education of mother, occupation of father, social class, type of family. Outcome Variables: Children with signs of PCM. Statistical Analysis: By chi - square test. Result: The occurrence of PCM was the highest in the 0 - 1 year age group. Boys suffered from overall PCM and grade I PCM more than the girls in whom grade III PCM was more common. Overall as well as grade I and II PCM was seen more in children of illiterate mothers and unemployed fathers. Majority of the children belonged to social class IV and were from unitary families. Conclusion: Mother's education plays an important role in the health and nutrition of children

    Some Directions beyond Traditional Quantum Secret Sharing

    Full text link
    We investigate two directions beyond the traditional quantum secret sharing (QSS). First, a restriction on QSS that comes from the no-cloning theorem is that any pair of authorized sets in an access structure should overlap. From the viewpoint of application, this places an unnatural constraint on secret sharing. We present a generalization, called assisted QSS (AQSS), where access structures without pairwise overlap of authorized sets is permissible, provided some shares are withheld by the share dealer. We show that no more than λ1\lambda-1 withheld shares are required, where λ\lambda is the minimum number of {\em partially linked classes} among the authorized sets for the QSS. Our result means that such applications of QSS need not be thwarted by the no-cloning theorem. Secondly, we point out a way of combining the features of QSS and quantum key distribution (QKD) for applications where a classical information is shared by quantum means. We observe that in such case, it is often possible to reduce the security proof of QSS to that of QKD.Comment: To appear in Physica Scripta, 7 pages, 1 figure, subsumes arXiv:quant-ph/040720
    corecore