67 research outputs found
Lamb Wave Modes in Coal-Tar-Coated Steel Plates
In order to study the feasibility of using ultrasonic Lamb wave modes for detection and sizing of corrosion-related flaws in buried steel pipelines, we have calculated Lamb wave modes and performed numerous experiments on steel plates coated on one side with coal-tar enamel. The purpose of this paper is to discuss these theoretical and experimental results
Rotation of pear-shaped Ru nucleus
Atomic nuclei in general can have deformed shapes and nearly all these shapes
are symmetric with respect to reflection. Only a few Actinide nuclei have
stable reflection asymmetric pear shapes in their ground state and exhibit
characteristic rotational bands. In this article, we report on the observation
of two alternate parity rotational bands in 100Ru, which are connected by seven
interleaved electric dipole transitions and their rates are found to be
enhanced. In addition, the moments of inertia associated with these two
opposite parity rotational bands have been found to be similar. These
experimental observations indicate the rotation of a stable pear-shaped 100Ru
nucleus, which is the first such observation outside the Actinide mass region.
This shape is built on an excited configuration and originates from the
rotational alignment of the angular momenta of a pair of neutrons. This unique
observation establishes an alternate mechanism by which an atomic nucleus can
assume a pear shape.Comment: 13 pages, 7 figures, 2 table
Comparative efficacy of two microdoses of a potentized homoeopathic drug, Cadmium Sulphoricum, in reducing genotoxic effects produced by cadmium chloride in mice: a time course study
BACKGROUND: Cadmium poisoning in the environment has assumed an alarming problem in recent years. Effective antimutagenic agents which can reverse or combat cadmium induced genotoxicity in mice have not yet been reported. Therefore, in the present study, following the homeopathic principle of "like cures like", we tested the efficacy of two potencies of a homeopathic drug, Cadmium Sulphoricum (Cad Sulph), in reducing the genotoxic effects of Cadmium chloride in mice. Another objective was to determine the relative efficacy of three administrative modes, i.e. pre-, post- and combined pre and post-feeding of the homeopathic drugs. For this, healthy mice, Mus musculus, were intraperitoneally injected with 0.008% solution of CdCl(2) @ 1 ml/100 gm of body wt (i.e. 0.8 mcg/gm of bw), and assessed for the genotoxic effects through such studies as chromosome aberrations (CA), micronucleated erythrocytes (MNE), mitotic index (MI) and sperm head anomaly (SHA), keeping suitable succussed alcohol fed (positive) and CdCl(2) untreated normal (negative) controls. The CdCl(2) treated mice were divided into 3 subgroups, which were orally administered with the drug prior to, after and both prior to and after injection of CdCl(2) at specific fixation intervals and their genotoxic effects were analyzed. RESULTS: While the CA, MNE and SHA were reduced in the drug fed series as compared to their respective controls, the MI showed an apparent increase. The combined pre- and post-feeding of Cad Sulph showed maximum reduction of the genotoxic effects. CONCLUSIONS: Both Cad Sulph-30 and 200 were able to combat cadmium induced genotoxic effects in mice and that combined pre- and post-feeding mode of administration was found to be most effective in reducing the genotoxic effect of CdCl(2) followed by the post-feeding mode
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs
In this paper, we prove that the nonce-based enhanced hash-then-mask MAC () is secure up to MAC queries and verification queries (ignoring logarithmic factors) as long as the number of faulty queries is below , significantly improving the previous bound by Dutta et al. Even when goes beyond , enjoys graceful degradation of security.
The second result is to prove the security of PRF-based ; when is based on an -to- bit random function for a fixed size such that , it is proved to be secure up to any number of MAC queries and verification queries, if (1) and or (2) and , or (3) and . This result leads to the security proof of truncated that returns only bits of the original tag since a truncated permutation can be seen as a pseudorandom function. In particular, when , the truncated is secure up to MAC queries and verification queries as long as . For example, when (resp. ), the truncated is secure up to (resp. ) MAC queries. So truncation might provide better provable security than the original with respect to the number of MAC queries
Body Mass Index and Blood Pressure among Men of Three Ethnic Groups of Darjeeling, West Bengal, India
Longitudinal growth pattern of children during pre-school age and its relationship with different socio-economic classes
A longitudinal study on physical growth of children of different birth weight groups from birth to 5 years
A longitudinal study on protein calorie malnutrition in North Indian pre-school children
- …