425 research outputs found

    Investigation of Structural, SEM, TEM and Dielectric Properties of BaTiO3 nanoparticles

    Get PDF
    BaTiO3 nanoparticles were prepared by solvothermal method. The X-ray diffraction (XRD) analysis was used to study the structure and crystallite size of BaTiO3 nanoparticles. The morphology and the size of the BaTiO3 nanoparticles were characterized using scanning and transmission electron microscopy (SEM and TEM). The optical properties were studied using the UV-Visible spectrum in the wavelength range of 300-800 nm. The dielectric properties of BaTiO3 nanoparticles were studied for different frequencies and different temperatures. The AC electrical conductivity study revealed that the conduction depended both on the frequency and the temperature

    Space Group and Unit Cell Dimensions of Copper Propionate Monohydrate

    Get PDF

    Reputation and punishment sustain cooperation in the optional public goods game

    Get PDF
    Cooperative behaviour has been extensively studied as a choice between cooperation and defection. However, the possibility to not participate is also frequently available. This type of problem can be studied through the optional public goods game. The introduction of the 'Loner' strategy' allows players to withdraw from the game, which leads to a cooperator-defector-loner cycle. While pro-social punishment can help increase cooperation, anti-social punishment - where defectors punish cooperators - causes its downfall in both experimental and theoretical studies. In this paper, we introduce social norms that allow agents to condition their behaviour to the reputation of their peers. We benchmark this with respect both to the standard optional public goods game and to the variant where all types of punishment are allowed. We find that a social norm imposing a more moderate reputational penalty for opting out than for defecting increases cooperation. When, besides reputation, punishment is also possible, the two mechanisms work synergically under all social norms that do not assign to loners a strictly worse reputation than to defectors. Under this latter set-up, the high levels of cooperation are sustained by conditional strategies, which largely reduce the use of pro-social punishment and almost completely eliminate anti-social punishment. This article is part of the theme issue 'The language of cooperation: reputation and honest signalling'

    ANATOMICAL DISPOSITION OF CARPAL BONES OF GOLDEN RETRIEVER DOG BY X-RAY EXPOSURE

    Get PDF
    The present study was conducted to know the general disposition of bones in carpal region of experimental dogs by X-ray study with an objective that the findings will facilitate to have an in-depth knowledge about the proper positioning of the carpal bones for surgical management of fractures and different types of bone deformities in dogs. In the present study, the anatomical disposition and arrangement pattern of carpal bones playing a pivotal role in providing the structural conformity in the limbs of Golden Retriever dog has been thoroughly confirmed by Xray exposure

    Progression and Challenges of IoT in Healthcare: A Short Review

    Full text link
    Smart healthcare, an integral element of connected living, plays a pivotal role in fulfilling a fundamental human need. The burgeoning field of smart healthcare is poised to generate substantial revenue in the foreseeable future. Its multifaceted framework encompasses vital components such as the Internet of Things (IoT), medical sensors, artificial intelligence (AI), edge and cloud computing, as well as next-generation wireless communication technologies. Many research papers discuss smart healthcare and healthcare more broadly. Numerous nations have strategically deployed the Internet of Medical Things (IoMT) alongside other measures to combat the propagation of COVID-19. This combined effort has not only enhanced the safety of frontline healthcare workers but has also augmented the overall efficacy in managing the pandemic, subsequently reducing its impact on human lives and mortality rates. Remarkable strides have been made in both applications and technology within the IoMT domain. However, it is imperative to acknowledge that this technological advancement has introduced certain challenges, particularly in the realm of security. The rapid and extensive adoption of IoMT worldwide has magnified issues related to security and privacy. These encompass a spectrum of concerns, ranging from replay attacks, man-in-the-middle attacks, impersonation, privileged insider threats, remote hijacking, password guessing, and denial of service (DoS) attacks, to malware incursions. In this comprehensive review, we undertake a comparative analysis of existing strategies designed for the detection and prevention of malware in IoT environments.Comment: 7 page

    A Low-spin Mn(III) Complex

    Get PDF
    205-20

    Depression, sleeping pattern, and suicidal ideation among medical students in Bangladesh: a cross-sectional pilot study

    Get PDF
    © 2020, Springer-Verlag GmbH Germany, part of Springer Nature. Background: Depression is a major morbidity and the most common mental disorder among the medical students in medical schools globally. Undergraduate students suffer stress more due to their academic curriculum than the students of other faculties. In low-resource settings like Bangladesh, there is a dearth in research on the mental health of undergraduate medical students. This pilot study was conducted to add to the existing limited evidence by reporting the prevalence of depression and describing sleeping pattern and suicidal tendencies among medical students. Relevantly, we have investigated the overall mental health status among the medical students in Bangladesh. Methods: This cross-sectional study was conducted in two medical colleges of Dhaka between July 2013 and December 2013, among 221 Bangladeshi medical students from first to fifth year. By the convenience sampling technique, data were collected by a pretested, structured, self-administered questionnaire and analysis was done by SPSS version 18.0. Depression was assessed by the validated Patient Health Questionnaire-9 (PHQ-9) tool among the respondents. Goldberg’s General Health Questionnaire (GHQ-28) was used for assessing overall mental health status. Results: Depression was found in 38.9% of participants, with 3.6%, 14.5%, and 20.8% being severe, moderate, and mild depression, respectively. 17.6% of medical students had suicidal tendency or attempted suicide at least once after attending medical school. The sleeping hours were inadequate and altered after starting this stressful academic course. 33.5% of medical students had poor mental health status. There was a statistically significant association between poor mental health status in the age group less than 22 years old and initial academic study year (1st to 3rd of MBBS). Conclusion: The findings are suggestive of a higher prevalence of depression among early-year medical students and marginal predominance in males. Suicidal tendency is also higher. This calls for further investigation with situation analysis, qualitative explorations, and surveys to explore the burden of such disorders in Bangladesh

    Secure software leasing without assumptions

    Get PDF
    Quantum cryptography is known for enabling functionalities that are unattainable using classical information alone. Recently, Secure Software Leasing (SSL) has emerged as one of these areas of interest. Given a target circuit C from a circuit class, SSL produces an encoding of C that enables a recipient to evaluate C, and also enables the originator of the software to verify that the software has been returned -- meaning that the recipient has relinquished the possibility of any further use of the software. Clearly, such a functionality is unachievable using classical information alone, since it is impossible to prevent a user from keeping a copy of the software. Recent results have shown the achievability of SSL using quantum information for a class of functions called compute-and-compare (these are a generalization of the well-known point functions). These prior works, however all make use of setup or computational assumptions. Here, we show that SSL is achievable for compute-and-compare circuits without any assumptions. Our technique involves the study of quantum copy-protection, which is a notion related to SSL, but where the encoding procedure inherently prevents a would-be quantum software pirate from splitting a single copy of an encoding for C into two parts, each of which enables a user to evaluate C. We show that point functions can be copy-protected without any assumptions, for a novel security definition involving one honest and one malicious evaluator; this is achieved by showing that from any quantum message authentication code, we can derive such an honest-malicious copy-protection scheme. We then show that a generic honest-malicious copy-protection scheme implies SSL; by prior work, this yields SSL for compute-and-compare functions
    corecore