2,703 research outputs found

    Critical nutritional stress among adult tribal populations of West Bengal and Orissa, India.

    Get PDF
    This paper deals with cross-sectional studies carried out during the period 2004-2007. It is based on eight data sets of tribals of Paschim Medinipur and Bankura Districts of West Bengal and Keonjhar District of Orissa. The tribes include Bhumijs, Kora Mudis, Lodhas, Santals, Bathudis and Savars. Height and weight were measured following standard techniques. The body mass index (BMI) was computed following standard equation. Nutritional status (chronic energy deficiency, CED) was evaluated using internationally accepted cut-off values of BMI. We followed the World Health Organization's classification (1995) of the public health problem of low BMI, based on adult populations worldwide. Our results show that, in general, among the tribes studied:
i)Both sexes had very low levels of BMI
ii)There existed high rates of CED indicating a critical nutritional condition 
iii)Women experienced greater nutritional stress
iv)The nutritional situation is similar in both West Bengal as well as Orissa.
&#xa

    Outlier detection from ETL Execution trace

    Full text link
    Extract, Transform, Load (ETL) is an integral part of Data Warehousing (DW) implementation. The commercial tools that are used for this purpose captures lot of execution trace in form of various log files with plethora of information. However there has been hardly any initiative where any proactive analyses have been done on the ETL logs to improve their efficiency. In this paper we utilize outlier detection technique to find the processes varying most from the group in terms of execution trace. As our experiment was carried on actual production processes, any outlier we would consider as a signal rather than a noise. To identify the input parameters for the outlier detection algorithm we employ a survey among developer community with varied mix of experience and expertise. We use simple text parsing to extract these features from the logs, as shortlisted from the survey. Subsequently we applied outlier detection technique (Clustering based) on the logs. By this process we reduced our domain of detailed analysis from 500 logs to 44 logs (8 Percentage). Among the 5 outlier cluster, 2 of them are genuine concern, while the other 3 figure out because of the huge number of rows involved.Comment: 2011 3rd International Conference on Electronics Computer Technology (ICECT 2011

    What measurements of neutrino neutral current events can reveal

    Full text link
    We show that neutral current (NC) measurements at neutrino detectors can play a valuable role in the search for new physics. Such measurements have certain intrinsic features and advantages that can fruitfully be combined with the usual well-studied charged lepton detection channels in order to probe the presence of new interactions or new light states. In addition to the fact that NC events are immune to uncertainties in standard model neutrino mixing and mass parameters, they can have small matter effects and superior rates since all three flavours participate. We also show, as a general feature, that NC measurements provide access to different combinations of CP phases and mixing parameters compared to CC measurements at both long and short baseline experiments. Using the Deep Underground Neutrino Experiment (DUNE) as an illustrative setting, we demonstrate the capability of NC measurements to break degeneracies arising in CC measurements, allowing us, in principle, to distinguish between new physics that violates three flavour unitarity and that which does not. Finally, we show that NC measurements can enable us to restrict new physics parameters that are not easily constrained by CC measurements.Comment: 22 pages, 10 figure

    A smart contract system for decentralized borda count voting

    Get PDF
    In this article, we propose the first self-tallying decentralized e-voting protocol for a ranked-choice voting system based on Borda count. Our protocol does not need any trusted setup or tallying authority to compute the tally. The voters interact through a publicly accessible bulletin board for executing the protocol in a way that is publicly verifiable. Our main protocol consists of two rounds. In the first round, the voters publish their public keys, and in the second round they publish their randomized ballots. All voters provide Non-interactive Zero-Knowledge (NIZK) proofs to show that they have been following the protocol specification honestly without revealing their secret votes. At the end of the election, anyone including a third-party observer will be able to compute the tally without needing any tallying authority. We provide security proofs to show that our protocol guarantees the maximum privacy for each voter. We have implemented our protocol using Ethereum's blockchain as a public bulletin board to record voting operations as publicly verifiable transactions. The experimental data obtained from our tests show the protocol's potential for the real-world deployment

    Environmental Regulation and Technological Innovation with Spillovers

    Get PDF
    We present a two-period dynamic model of standard setting under asymmetric information to model the attempts by the Califormia Air Resources Board (CARB) in getting car manufacturers to comply with its phase-in of stringent emissions standards. After CARB chooses an initial emissions standard that ?rms are required to comply with, automakers respond by choosing R&D investment and production levels which provide CARB an imperfect signal whether they are more or less capable of complying with the standard. CARB resets the environmental standard and the ?rms once again choose research and production levels. Firms are Cournot duopolists in the product market and can choose to do research noncooperatively or cooperatively in the presence of spillovers. We show that ?rms will behave strategically and underinvest in research both under competitive and cooperative R&D, though the level of underinvestment — the ratchet effect — is greater under cooperative R&D when spillovers are large. We uncover a fundamental con?ict between the incentives of ?rms to do cooperative research and social welfare: that ?rms will want to engage in cooperative (resp. noncooperative) R&D only when spillovers are low (resp. high) while social welfare is greater under noncooperative (resp. cooperative) research.Car emissions; dynamic technology-forcing regulation; selfregulation; pre-commitment; cooperative R&D; ratchet effect.
    corecore