425 research outputs found
Investigation of Structural, SEM, TEM and Dielectric Properties of BaTiO3 nanoparticles
BaTiO3 nanoparticles were prepared by solvothermal method. The X-ray diffraction (XRD) analysis
was used to study the structure and crystallite size of BaTiO3 nanoparticles. The morphology and the size
of the BaTiO3 nanoparticles were characterized using scanning and transmission electron microscopy
(SEM and TEM). The optical properties were studied using the UV-Visible spectrum in the wavelength
range of 300-800 nm. The dielectric properties of BaTiO3 nanoparticles were studied for different frequencies
and different temperatures. The AC electrical conductivity study revealed that the conduction depended
both on the frequency and the temperature
Reputation and punishment sustain cooperation in the optional public goods game
Cooperative behaviour has been extensively studied as a choice between cooperation and defection. However, the possibility to not participate is also frequently available. This type of problem can be studied through the optional public goods game. The introduction of the 'Loner' strategy' allows players to withdraw from the game, which leads to a cooperator-defector-loner cycle. While pro-social punishment can help increase cooperation, anti-social punishment - where defectors punish cooperators - causes its downfall in both experimental and theoretical studies. In this paper, we introduce social norms that allow agents to condition their behaviour to the reputation of their peers. We benchmark this with respect both to the standard optional public goods game and to the variant where all types of punishment are allowed. We find that a social norm imposing a more moderate reputational penalty for opting out than for defecting increases cooperation. When, besides reputation, punishment is also possible, the two mechanisms work synergically under all social norms that do not assign to loners a strictly worse reputation than to defectors. Under this latter set-up, the high levels of cooperation are sustained by conditional strategies, which largely reduce the use of pro-social punishment and almost completely eliminate anti-social punishment. This article is part of the theme issue 'The language of cooperation: reputation and honest signalling'
ANATOMICAL DISPOSITION OF CARPAL BONES OF GOLDEN RETRIEVER DOG BY X-RAY EXPOSURE
The present study was conducted to know the general disposition of bones in carpal region of experimental dogs by X-ray study with an objective that the findings will facilitate to have an in-depth knowledge about the proper positioning of the carpal bones for surgical management of fractures and different types of bone deformities in dogs. In the present study, the anatomical disposition and arrangement pattern of carpal bones playing a pivotal role in providing
the structural conformity in the limbs of Golden Retriever dog has been thoroughly confirmed by Xray exposure
Progression and Challenges of IoT in Healthcare: A Short Review
Smart healthcare, an integral element of connected living, plays a pivotal
role in fulfilling a fundamental human need. The burgeoning field of smart
healthcare is poised to generate substantial revenue in the foreseeable future.
Its multifaceted framework encompasses vital components such as the Internet of
Things (IoT), medical sensors, artificial intelligence (AI), edge and cloud
computing, as well as next-generation wireless communication technologies. Many
research papers discuss smart healthcare and healthcare more broadly. Numerous
nations have strategically deployed the Internet of Medical Things (IoMT)
alongside other measures to combat the propagation of COVID-19. This combined
effort has not only enhanced the safety of frontline healthcare workers but has
also augmented the overall efficacy in managing the pandemic, subsequently
reducing its impact on human lives and mortality rates. Remarkable strides have
been made in both applications and technology within the IoMT domain. However,
it is imperative to acknowledge that this technological advancement has
introduced certain challenges, particularly in the realm of security. The rapid
and extensive adoption of IoMT worldwide has magnified issues related to
security and privacy. These encompass a spectrum of concerns, ranging from
replay attacks, man-in-the-middle attacks, impersonation, privileged insider
threats, remote hijacking, password guessing, and denial of service (DoS)
attacks, to malware incursions. In this comprehensive review, we undertake a
comparative analysis of existing strategies designed for the detection and
prevention of malware in IoT environments.Comment: 7 page
Precision grid and hand motion for accurate needle insertion in brachytherapy
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/98741/1/MPH004749.pd
Depression, sleeping pattern, and suicidal ideation among medical students in Bangladesh: a cross-sectional pilot study
© 2020, Springer-Verlag GmbH Germany, part of Springer Nature. Background: Depression is a major morbidity and the most common mental disorder among the medical students in medical schools globally. Undergraduate students suffer stress more due to their academic curriculum than the students of other faculties. In low-resource settings like Bangladesh, there is a dearth in research on the mental health of undergraduate medical students. This pilot study was conducted to add to the existing limited evidence by reporting the prevalence of depression and describing sleeping pattern and suicidal tendencies among medical students. Relevantly, we have investigated the overall mental health status among the medical students in Bangladesh. Methods: This cross-sectional study was conducted in two medical colleges of Dhaka between July 2013 and December 2013, among 221 Bangladeshi medical students from first to fifth year. By the convenience sampling technique, data were collected by a pretested, structured, self-administered questionnaire and analysis was done by SPSS version 18.0. Depression was assessed by the validated Patient Health Questionnaire-9 (PHQ-9) tool among the respondents. Goldberg’s General Health Questionnaire (GHQ-28) was used for assessing overall mental health status. Results: Depression was found in 38.9% of participants, with 3.6%, 14.5%, and 20.8% being severe, moderate, and mild depression, respectively. 17.6% of medical students had suicidal tendency or attempted suicide at least once after attending medical school. The sleeping hours were inadequate and altered after starting this stressful academic course. 33.5% of medical students had poor mental health status. There was a statistically significant association between poor mental health status in the age group less than 22 years old and initial academic study year (1st to 3rd of MBBS). Conclusion: The findings are suggestive of a higher prevalence of depression among early-year medical students and marginal predominance in males. Suicidal tendency is also higher. This calls for further investigation with situation analysis, qualitative explorations, and surveys to explore the burden of such disorders in Bangladesh
Secure software leasing without assumptions
Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone. Recently, Secure Software Leasing (SSL) has emerged as one of these areas of interest. Given a target circuit C from a circuit class, SSL produces an encoding of C that enables a recipient to evaluate C, and also enables the originator of the software to verify that the software has been returned -- meaning that the recipient has relinquished the possibility of any further use of the software. Clearly, such a functionality is unachievable using classical information alone, since it is impossible to prevent a user from keeping a copy of the software. Recent results have shown the achievability of SSL using quantum information for a class of functions called compute-and-compare (these are a generalization of the well-known point functions). These prior works, however all make use of setup or computational assumptions. Here, we show that SSL is achievable for compute-and-compare circuits without any assumptions.
Our technique involves the study of quantum copy-protection, which is a notion related to SSL, but where the encoding procedure inherently prevents a would-be quantum software pirate from splitting a single copy of an encoding for C into two parts, each of which enables a user to evaluate C. We show that point functions can be copy-protected without any assumptions, for a novel security definition involving one honest and one malicious evaluator; this is achieved by showing that from any quantum message authentication code, we can derive such an honest-malicious copy-protection scheme. We then show that a generic honest-malicious copy-protection scheme implies SSL; by prior work, this yields SSL for compute-and-compare functions
- …