1,150 research outputs found

    India’s Emerging Technology Commercialization Policy: Lessons From The American Model

    Get PDF
    India, the world’s 4th largest economy (PPP) is riddled with dichotomies. It can be called the IT capital of the world, though 200 million people go without enough food each day. Is India using its scientific and technological prowess for national good? America has had a rich set of experiences in the areas of \u27Technology Commercialization and Licensing\u27. We present recommendations for India’s upcoming legislative deliberations. These are based on India’s current landscape and the success factors in America’s experiences in this arena. We see the following as essential immediate impact points: Policy Harmonization; Steady Budget Increase & Enforcement Institutions

    A light shed on Lepton flavor universality in B decays

    Full text link
    At the back of succeeding measurements of anomalies in semileptonic decays at several collider experiments hinting at the possible violation of lepton universality, we undertake a concise review of theoretical foundations of the tree- and loop-level b-hadron decays along with experimental environments. We revisit the world averages for RD(D∗)R_{D(D^*)}, RK(K∗)R_{K(K^*)}, RJ/ψR_{J/\psi} and RηcR_{\eta_c}, and provide results within the framework of the relativistic independent quark model in addition to the results from model-independent studies. A confirmation of these measurements would soon turn out to be the first observation of physics beyond the Standard Model giving a wider outlook on the better understanding of new physics.Comment: 8 pages, 3 figures, review pape

    Purification and characterization of a Bacillus subtilis keratinase and its prospective application in feed industry

    Get PDF
    We have isolated a Bacillus subtilis strain (RSE163) from soil and explored for keratinase production. Keratinase was purified using chromatographic methods (Sephadex G-75 and Q Sepharose) resulting in 8.42-fold purification with 3303 U/mg specific activity.The purified enzyme displayed 3 bands in close proximity between 20 to 22 kDa in SDS-PAGE which were apparent to the zone of hydrolysis in gelatin zymogram. Enzyme was stable over a wide pH (7.0-10.0) and temperature (30 °C to 70 °C) range with optimum activity at pH 9.0 and 60 °C. Keratinase activity was stimulated in presence of Mn2+, β-mercaptoethanol and surfactants (Triton-X and Tween-80) and inhibited by Fe3+, Cd2+, K+, PMSF (phenyl methane sulfonyl fluoride) and other chelating and reducing agents. The enzyme efficiently hydrolyzed a variety of complex protein substrates (chicken feather, keratin hydrolyzate and casein) and enzyme kinetics parameters were determined using Lineweaver Burk plot (Km = 6.6 mg/ml, Vmax = 5 U/ml/min). Hydrolyzed feather keratin obtained through fermentation with B. subtilis RSE163 has been explored for its cytotoxicity using liver cell line (HepG2). No cytotoxicity has been determined up to 0.015% concentration of hydrolyzed product indicating its potential applicability as feed supplement

    Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles

    Full text link
    With the recent advent of Large Language Models (LLMs), such as ChatGPT from OpenAI, BARD from Google, Llama2 from Meta, and Claude from Anthropic AI, gain widespread use, ensuring their security and robustness is critical. The widespread use of these language models heavily relies on their reliability and proper usage of this fascinating technology. It is crucial to thoroughly test these models to not only ensure its quality but also possible misuses of such models by potential adversaries for illegal activities such as hacking. This paper presents a novel study focusing on exploitation of such large language models against deceptive interactions. More specifically, the paper leverages widespread and borrows well-known techniques in deception theory to investigate whether these models are susceptible to deceitful interactions. This research aims not only to highlight these risks but also to pave the way for robust countermeasures that enhance the security and integrity of language models in the face of sophisticated social engineering tactics. Through systematic experiments and analysis, we assess their performance in these critical security domains. Our results demonstrate a significant finding in that these large language models are susceptible to deception and social engineering attacks.Comment: 10 pages, 16 tables, 5 figures, IEEE BigData 2023 (Workshops

    RescueAlert-an accident detection and rescue mechanism

    Get PDF
    With the increase of vehicles and cars of different kind and the large movement that occurs every day on the roads it was natural to observe an increase in traffic accidents, but the real dilemma lies in how to make the rescue process efficient. The problem that we want to solve is the response of ambulances towards accidents and the lengthy registration process of patients in hospitals. In the above two scenarios, the manual process of calling the ambulance leads to delay in rescue of patients from an accident and the delay in registration of patient leads to delay in medication or treatment of the patient. We want to make the process more efficient by automating accident detection for increasing the efficiency of the ambulance rescue process and by sending the details of the patient before the patient reaches the hospitals for faster treatment of patients. Along with this, alert messages will be sent to the family or friends of the patients to notify them as soon as an accident is detected
    • …
    corecore