2,044 research outputs found

    Irreducible representations of the rational Cherednik algebra associated to the Coxeter group H_3

    Full text link
    This paper describes irreducible representations in category O of the rational Cherednik algebra H_c(H_3,h) associated to the exceptional Coxeter group H_3 and any complex parameter c. We compute the characters of all these representations explicitly. As a consequence, we classify all the finite dimensional irreducible representations of H_c(H_3,h).Comment: Version 2: a minor error in 5.1 and its consequences in 3.1. and 3.2 corrected. Comments welcom

    The Sierpinski Triangle and The Ulam-Warburton Automaton

    Full text link
    This paper is about the beauty of fractals and the surprising connections between them. We will explain the pioneering role that the Sierpinski triangle plays in the Ulam-Warburton automata and show you a number of pictures along the way.Comment: 13 pages, 12 figure

    Nutritional status, socio-economic and hygienic condition of school aged children of a village of Pune District, Maharashtra

    Get PDF
    Introduction: The field of anthropometry encompasses a variety of human body measurements, such as weight, height and size; including skin fold thickness, circumference, lengths, and breadths. Anthropometry is a key component of nutritional status assessment in children and adults. Anthropometric data for children reflect general health status, dietary adequacy and growth and development over time. The main objective of the study was to diagnose and analyze the magnitude and causes of nutritional and health problems of the village. Method: Anthropometric reference data of 100 children between 7-14 years of age from a small village situated 30 km from Pune. Using this data BMI i.e. Body Mass Index was calculated which helps in determining whether an individual is overweight or underweight. Result: The overall study helped us to find out the socioeconomic condition, hygienic condition as well as nutritional status of children. All the anthropometric measurements of the girls and boys in 7-14 years age group was found to be significantly normal. Conclusion: The hygienic condition of the village was good enough and in turn BMI data shows that the socioeconomic condition of the village was also good

    Ceftraixone induced anaphylaxis and death: a case report

    Get PDF
    Ceftriaxone, a broad spectrum third generation cephalosporin antibiotic and sulbactam is a beta-lactamase inhibitor. The combination is used for pre-operative surgical prophylaxis for prevention is secondary bacterial infection.  We describe a patient who developed anaphylaxis and death soon after intravenous administration of ceftriaxone and sulbactam combination and review similar cases of adverse effects to these class of drugs. The patient was a 68 year old male admitted to surgery ward for obstructed inguinal hernia. He was prescribed injection ceftriaxone and sulbactam combination along with concomitant medication injection pantoprazole and injection metronidazole. The patient was injected injection ceftriaxone and sulbactam, within 15 minutes he suddenly developed anaphylactic shock and died for fluid aspiration in lungs during resuscitation. PubMed was searched for the following terms: anaphylaxis, ceftriaxone, sulbactam. The papers containing these terms and their references were reviewed. Anaphylactic shock caused by ceftriaxone is an uncommon adverse event in patients receiving the drug. However, similar reactions have been observed in some cases in India and world-wide. Clinicians should be aware that anaphylaxis secondary to ceftriaxone and sulbactam combination is a serious death threatening side-effect

    Static Malware Detection using Deep Neural Networks on Portable Executables

    Full text link
    There are two main components of malware analysis. One is static malware analysis and the other is dynamic malware analysis. Static malware analysis involves examining the basic structure of the malware executable without executing it, while dynamic malware analysis relies on examining malware behavior after executing it in a controlled environment. Static malware analysis is typically done by modern anti-malware software by using signature-based analysis or heuristic-based analysis. This thesis proposes the use of deep neural networks to learn features from a malware’s portable executable (PE) to minimize the occurrences of false positives when recognizing new malware. We use the EMBER dataset for training our model and compare our results with other known malware datasets. We show that using a simple deep neural network for learning vectorized PE features is not only effective, but is also less resource intensive as compared to conventional heuristic detection methods. Our model achieves an Area Under Curve (AUC) of 99.8% with 98% true positives at 1% false positives on the Receiver Output Characteristics (ROC) curve. We further propose the practical implementation of this model to show that it can potentially compliment or replace conventional anti-malware software

    Enhancing the Security of Yioop Discussion Board

    Get PDF
    Yioop is an open-source web portal that serves as a search engine and a discussion board, enabling users to create, join, and share content within groups. Data security is a critical concern for Yioop, as it involves storing and accessing user-generated data and generating statistical data. Yioop has an existing security mechanism in place, but continuous enhancements are needed to protect against potential vulnerabilities and cyber threats. This project aims to strengthen the security of Yioop by implementing additional security measures that build upon the existing security mechanism. To prevent statistical attacks, this project extends differential privacy to mask the number of users in groups. Furthermore, a flag feature is added to allow users to flag posts that they find offensive, which is reviewed by a newly added moderator group. Secret sharing is employed to further fortify the encryption keys, ensuring that only authorized users with the required shares can potentially use the key. These security measures have been rigorously tested and evaluated to ensure that they effectively contribute to the overall security of Yioop, enabling users to enjoy secure interactions and content sharing within the portal while preserving their privacy and confidentiality. This report provides an in-depth overview of these security measures, their implementation, testing procedures, and their impact on Yioop’s overall security. The success of this project will contribute to a more secure environment for Yioop users, preserving user privacy and confidentiality while promoting secure interactions and content sharing within the portal

    A Study on the Impact of Locality in the Decoding of Binary Cyclic Codes

    Full text link
    In this paper, we study the impact of locality on the decoding of binary cyclic codes under two approaches, namely ordered statistics decoding (OSD) and trellis decoding. Given a binary cyclic code having locality or availability, we suitably modify the OSD to obtain gains in terms of the Signal-To-Noise ratio, for a given reliability and essentially the same level of decoder complexity. With regard to trellis decoding, we show that careful introduction of locality results in the creation of cyclic subcodes having lower maximum state complexity. We also present a simple upper-bounding technique on the state complexity profile, based on the zeros of the code. Finally, it is shown how the decoding speed can be significantly increased in the presence of locality, in the moderate-to-high SNR regime, by making use of a quick-look decoder that often returns the ML codeword.Comment: Extended version of a paper submitted to ISIT 201

    Dynamic modeling, simulation and control design of a parafoil-payload system for ship launched aerial delivery system (SLADS)

    Get PDF
    The objective of this research was to develop a high-fidelity dynamic model of a parafoilpayload system with respect to its application for the Ship Launched Aerial Delivery System (SLADS). SLADS is a concept in which cargo can be transfered from ship to shore using a parafoil-payload system. It is accomplished in two phases: An initial towing phase when the glider follows the towing vessel in a passive lift mode and an autonomous gliding phase when the system is guided to the desired point. While many previous researchers have analyzed the parafoil-payload system when it is released from another airborne vehicle, limited work has been done in the area of towing up the system from ground or sea. One of the main contributions of this research was the development of a nonlinear dynamic model of a towed parafoil-payload system. After performing an extensive literature review of the existing methods of modeling a parafoil-payload system, a five degree-of-freedom model was developed. The inertial and geometric properties of the system were investigated to predict accurate results in the simulation environment. Since extensive research has been done in determining the aerodynamic characteristics of a paraglider, an existing aerodynamic model was chosen to incorporate the effects of air flow around the flexible paraglider wing. During the towing phase, it is essential that the parafoil-payload system follow the line of the towing vessel path to prevent an unstable flight condition called ‘lockout’. A detailed study of the causes of lockout, its mathematical representation and the flight conditions and the parameters related to lockout, constitute another contribution of this work. A linearized model of the parafoil-payload system was developed and used to analyze the stability of the system about equilibrium conditions. The relationship between the control surface inputs and the stability was investigated. In addition to stability of flight, one more important objective of SLADS is to tow up the parafoil-payload system as fast as possible. The tension in the tow cable is directly proportional to the rate of ascent of the parafoil-payload system. Lockout instability is more favorable when tow tensions are large. Thus there is a tradeoff between susceptibility to lockout and rapid deployment. Control strategies were also developed for optimal tow up and to maintain stability in the event of disturbances
    corecore