Japanese partnership results in palm recognition security for smartphones

first_img Palm patterns are made up of both the unique way each person’s palm is arranged (all those lines and ridges) and the veins and capillaries that reside just beneath the skin. Over the past couple of years, some companies have developed palm readers that match vein patterns for securing computer systems, but they have all been too big to use on cell phones. The new approach dispenses with the old way of looking at a person’s palm and uses nothing more than software analysis to identify to whom it belongs, paving the way for use on smartphones because each already comes equipped with a camera. To use such an outfitted phone, all a person would have to do is hold their hand out flat, palm down, over the phone to identify themselves as an allowed user of the phone. No muss, no fuss, and no password.The phone will be able to identify the user by their palm terrain using only a photo taken in ordinary light, which of course will present a problem for those using their phone in the dark. The company hasn’t said how it will handle that situation, but it seems plausible that they’d have the screen flash some light to reflect off the palm, rather than revert to the old password system. The downside to the development of the new software security system is that it’s proprietary, which means that when it’s rolled out by the end of the year to customers in Japan, only they will be able to reap its benefits. The rest of us will have to wait for the two companies to license the technology to others, or worse, for others to develop the same functionality on their own. Explore further © 2012 Phys.org via Tech-on (Phys.org)—By now everyone knows that the only way to protect the stuff you keep on your smartphone is to password protect the screen. Unfortunately, we all also know how easy it is to crack that little system as evidenced by various phone hacking scandals and stolen celebrity photos. Clearly a better way needs to be found, and now it seems Japanese mobile giant Softbank Mobile Corp, after teaming up with Universal Robot Co Ltd, might have found it; phone software that is able to recognize a person’s unique palm patterns. Credit: Tech-oncenter_img More information: Citation: Japanese partnership results in palm recognition security for smartphones (2012, September 5) retrieved 18 August 2019 from https://phys.org/news/2012-09-japanese-partnership-results-palm-recognition.html I-maginary Phone: iPhone as a hand phone? (w/ video) This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.last_img read more

Read more 0 Comments

Serious security DeviceIndependent Quantum Key Distribution guards against the most general attacks

first_img Journal information: Physical Review Letters The Holy Grail of quantum cryptography – beyond delivering security that cannot be classically achieved – is guaranteeing unconditional security when the untrusted quantum devices are involved. While this goal has been studied since the early 1990s, a robust solution has proven elusive. Although Jonathan Barrett and his co-authors published2,3 a strong Device-Independent Quantum Key Distribution (DIQKD) security guarantee in 2005, it focused on a weaker set of constraints than those imposed by quantum mechanics – specifically, the no-signaling property dictated by special relativity – which thereby yielded stronger results. At the same time, however, it had several drawbacks, including low efficiency and, most importantly, an assumption of independence between the different occurrences when the devices are used. Key rate obtained in our protocol (middle curve), expressed as a fraction of the raw key (bits obtained from the key rounds). On the x axis is the noise rate η as measured in the protocol. The top and bottom curves are the best achievable rates known for the case of quantum and no-signaling adversaries, respectively, under the additional assumption of causal independence. Credit: Umesh Vazirani and Thomas Vidick, “Fully Device-Independent Quantum Key Distribution,” Phys. Rev. Lett. 113, 140501 (2014). , Physical Review A “Prior to our work security had been established in two circumstances,” Vidick notes, the first being “In the first – the non-device-independent model – the adversary is all-powerful, but the users trust their devices. In other words, the devices area assumed to perform exactly as expected – but there’s a problem: how can this be confirmed?Scenario #2: Users don’t trust the devices, but it is guaranteed that the adversary will only try to attack the key one bit at a time. “One way to phrase this is that there is, again, an assumption that each time Alice and Bob use their device, it behaves in exactly the same way, independently of what happened in the past. Not only is this is a very strong condition, but again – since each time they use the device, we can’t go back in the past and check that it’s independent – how do we check?” It turns out that this simplifies analysis of these so-called independent identical distributed (i.i.d.) states, which is often done using de Finetti theorems. (An i.i.d. state is a sequence or other collection of random variables in which each random variable has the same probability distribution as the others and all are mutually independent; de Finetti-type theorems show that the analysis of permutation-invariant states can be reduced to the analysis of i.e. states – meaning that if it is assumed that the adversary treats all sequences in the same way, they can be reduced to independent attacks.”The challenge, then, was to remove all assumptions and give a general security proof,” Vidick explains. “Adversaries that can attack the whole protocol at once, instead of behaving independently across different rounds, are much harder to handle because they can use a lot of information – such as that obtained from what Alice and Bob said over the phone – and then perhaps make a global measurement that will extract information about all the bits of the key at once.”Vidick adds that their main insight had to do with the use of quantum monogamy – a property of entanglement stating that if strong correlations are observed between two parties, then the correlations must be weak with any third party – in this case, the adversary. “You can see this as an intuitive way to obtain security, but it’s very hard to make it quantitatively precise,” Vidick points out. “However, we’ve introduced techniques to do this. One is a technical tool – the use of pseudorandom objects studied in theoretical computer science known as extractors. Another technique is a conceptual tool that we call a ‘guessing game’ which demonstrates monogamy and shows that it makes certain tasks impossible.” (Vidick notes that the scientists knew prior to their work that monogamy would be a key ingredient in any complete proof of security. “However,” he says, “we’ve demonstrated that it’s actually possible.”) , Nature Explore further The idea, Vidick continues, is to show that, if the task was possible – for example, the eavesdropper could break the protocol – then the impossible would be possible. “In the guessing game, one of the users – let’s say Alice – is given a secret bit. Then Alice, Bob and the eavesdropper, each in their own corner of the world, do something with their devices. At the end, Eve manages to produce an accurate guess for Alice’s secret bit. If such a task were possible, special relativity would be violated in the form of secret information being sent from Alice to the eavesdropper. What we basically show is that, if our protocol could be broken, there would be a way to devise a successful strategy in the guessing game. However, we show that this is impossible, proving that out protocol is secure.”In their paper, the scientists discuss their new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol. “This involves more technical lemmas,” Vidick points out. (Lemmas, or lemmata, are propositions proved or accepted for immediate use in the proof of some other proposition) “We show a trade-off: if Alice and Bob observe sufficiently strong classical correlations when they talk over the phone and discuss the results of what they read off their respective devices, then the adversary does not even have quantum correlations with the inside of the users’ devices. These correlations are measured using a quantum measure of information, the quantum conditional min entropy.” (In information theory, min entropy corresponds to the most conservative way of measuring the unpredictability of a set of outcomes as the negative logarithm of the probability of the most likely outcome. Conditional quantum min entropy is a conservative analog of conditional quantum entropy.)A key contribution of the study described in the paper is using post-measurement states to achieve a more complete analytic picture of quantum mechanics compared to the previous no-signaling approach. “Previous proof techniques work even without using the formalism of quantum mechanics – that is, even if nature allows actions that are beyond quantum mechanics but are still restricted by relativity, they still obtained security,” Vidick says. On the one hand, this is stronger because the adversary is allowed more power – but is at the same time weaker because these approaches need to assume independent attacks. “In fact,” he adds, “we know that in this framework, we could not possibly obtain general security.”Vidick points out that this creates an important question. “In order to get general security we know one has to use quantum mechanics more strongly and more deeply than previous proofs did – but which principle should we use? Our proof gives an answer to this by showing that quantum mechanics, as a theory, gives us a way to describe the state of a system after a measurement has been made, allowing predictions the outcomes of further measurements to be made. The use of such post-measurement states is essential for us – and at a simple level, lets us model what happens when the devices have memory, and repeatedly measure the same state every time they’re used.”Another point discussed in the paper is the implication of the new protocol’s linear key rate and toleration of constant noise rate in the quantum devices. “I’d be lying if I said the protocol was practical,” Vidick quips. “However, getting linear rate and noise tolerance is an important step towards the possibility of practical implementations. These will always suffer from linear noise, and for the protocol to be efficient we want the rate to be linear.” That said, Vidick notes that in terms of analysis, allowing some amount of noise equates exactly with allowing the adversary to surreptitiously introduce some amount of adversarial behavior. “What we see as noise could very well be malicious behavior” he explains, “so the more noise we allow, the more power we give to the adversary, the harder the proof, and therefore the stronger the result. The proof would be much simpler if we were to tolerate only zero noise, since in that setting the devices can be very well-characterized4. However, this is not the case if we allow a little noise, which we really ought to do if we’re ever to use that protocol in the field.”Moving forward, Vidick says that he and Vazirani have several research directions planned:Improve the protocol’s practicality – specifically, better error dependence and key rate – so that it can be implementedExtend analysis to other types of device-independent protocols that have been proposed in the literature, such as measurement-device-independent protocols, which have weaker security guarantees but are more practical, and complete security analysis based on the tools they developApply their quantum monogamy techniques to completely different areas – the direction he finds most exciting – to quantum complexity theory, the quantum PCP conjecture, black hole theory (where there is significant discussion on the role played by monogamy but nothing quantitatively substantial), and other areas(Quantum complexity theory – part of computational complexity theory in theoretical computer science – studies complexity classes defined using quantum computers and quantum information which are computational models based on quantum mechanics. Specifically, it studies the hardness of problems in relation to these complexity classes, and the relationship between quantum and classical complexity classes. The PCP theorem, or PCP conjecture, is the foundation of the theory of computational hardness of approximation, which investigates the inherent difficulty in designing efficient approximation algorithms for various optimization problems; PCPs, or Probabilistically Checkable Proofs, embody the idea that verification of proofs becomes nearly trivial if one is willing to use randomness.)In addition, there are other innovations that the researchers might consider developing. “I think our proof technique has a very promising future, so I’d like to design device-independent protocols for tasks than other quantum key distribution,” Vidick tells Phys.org. “A very different kind of scenario it can be applied to is the following questions: Given access to some black-box machine that is supposedly a quantum computer, how do we know if it actually is? How do we gain confidence as to what is going on inside the machine if we can only have a classical interaction? While this is a very real concern, as is evidenced by the controversy surrounding the D-Wave system, very few convincing techniques are known. We just don’t know which kinds of quantum systems can be characterized outside of the inaccessible quantum black box, and how.”In addition to quantum cryptography, complexity theory and physics, Vidick notes that other areas of research that might benefit from the study include “Any area that draws heavily on the properties of entanglement requires tools like the ones that we develop,” he concludes, “such as areas of condensed-matter physics and the study of many-body systems.” Citation: Serious security: Device-Independent Quantum Key Distribution guards against the most general attacks (2014, October 20) retrieved 18 August 2019 from https://phys.org/news/2014-10-device-independent-quantum-key.html Recently, scientists at University of California, Berkeley and California Institute of Technology, Pasadena have devised a strong proof of DIQKD security using a standard variation of Artur K. Ekert’s entanglement-based protocol1 targeting general, or coherent, attacks. The researchers say that their protocol is robust, and is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol. (Quantum monogamy, one of the most fundamental properties of entanglement, states that if two qubits are maximally correlated they cannot be correlated at all with a third qubit.) The authors of the current paper state that their analysis relies on a more complete picture of quantum mechanics, in particular through the use of quantum mechanics’ description of post-measurement states.Prof. Thomas Vidick discussed the paper he and Prof. Umesh Vazirani published in Physical Review Letters. “Our main challenge is to prove security against attackers that perform general, or correlated, attacks,” Vidick tells Phys.org. “The kind of adversary, or eavesdropper, we’re worried about is the following scenario,” he illustrates. “In the morning, the adversary prepares three quantum devices – one for Alice, one for Bob, and one for himself. During the day, Alice and Bob use their devices to run the protocol. This involves pushing buttons, reading dials, and so on, they never open the device. Later in the day, Alice and Bob might also talk over the phone and exchange classical,” or non-quantum, “information – which is part of the protocol. At the end of the day, Alice and Bob come up with keys that they hope to be the same – and about which they hope no one else has any information.Enter the adversary, who by monitoring all of Alice and Bob’s telephone communication, can also perform measurements on his device. The challenge, Vidick explains, is showing that our protocol is such that (given that Alice and Bob do not notice any anomalies) the adversary has no information about the final key. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. The guessing game. Any devices satisfying both the CHSH condition a⊕b = x × y and the guessing condition a = e with high enough probability must allow signaling between DA and DB + E. Credit: Umesh Vazirani and Thomas Vidick, “Fully Device-Independent Quantum Key Distribution,” Phys. Rev. Lett. 113, 140501 (2014). Quantum measurement carries information even when the measurement outcome is unread More information: Fully Device-Independent Quantum Key Distribution, Physical Review Letters 113, 140501 (29 September 2014), doi:10.1103/PhysRevLett.113.140501Related: 1Quantum cryptography based on Bell’s theorem, Physical Review Letters 67, 661 (5 August 1991), doi:10.1103/PhysRevLett.67.6612No Signaling and Quantum Key Distribution, Physical Review Letters 95, 010503 (27 June 2005), doi:10.1103/PhysRevLett.95.0105033Nonlocal correlations as an information-theoretic resource, Physical Review A 71, 022101 (2 February 2005), doi:10.1103/PhysRevA.71.0221014Classical command of quantum systems, Nature 496, 456–460 (25 April 2013), doi:10.1038/nature12035 © 2014 Phys.orglast_img read more

Read more 0 Comments

Anthropologist finds high number of developmental anomalies in Pleistocene people

first_imgExamples of developmental abnormalities in Pleistocene people. Left to right: the Tianyuan 1, Sunghir 3 and Dolní V?stonice 15 abnormal femora, Center, top to bottom: the Palomas 23 mandibular “flange”, the Rochereil 3 cranial lacuna, the long Sunghir 1 clavicle, the Malarnaud 1 incisor agenesis. Right, top to bottom: the Shanidar 1 sacral hiatus, the Pataud 1 polygenesis, and the Dolní V?stonice 16 cleft palate. Credit: Erik Trinkaus. Journal information: Proceedings of the National Academy of Sciences The Pleistocene is the period from approximately 2.6 million years ago to approximately 11,700 years ago—it spans the last Ice Age. Prior research has shown this was also the period during which anatomic modern humans developed and spread outside of Africa. In this new effort, Trinkaus suggests it was also a time during which humans experienced a wide variety of physical deformations. His study consisted of gathering data on 66 fossils recovered from various sites, most of which were from approximately 200,000 years ago. He notes that most of the remains were from young adults and represented several species of Homo. In looking at the physical structure of the fossils, he found an unusually high number of deformities such as bowed arms or leg bones, or misshapen skulls and jaws. Intrigued by the high numbers, he added them up and averaged them among the group under study and compared the results with modern human anomalies.Trinkaus found that among the fossil samples was evidence of 75 abnormalities. He also found that approximately two-thirds of those anomalies showed up in less than 1 percent of modern humans. He also found that the abnormalities came about due to a variety of ailments such as blood disorders or hydrocephaly—but a lot of them could not be traced to a cause. He suggests the number of abnormalities is extremely high for such a small group of fossils.Trinkaus suggests inbreeding is one of the more likely reasons for such a high number of abnormalities—hunter-gatherer groups of the time are believed to have been rather small, increasing the odds of inbreeding. He also suggests that it is possible that individuals with such abnormalities received special treatment during burial, which increased the odds of their remains surviving to the modern age for analysis. Explore further This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. More information: Erik Trinkaus. An abundance of developmental anomalies and abnormalities in Pleistocene people, Proceedings of the National Academy of Sciences (2018). DOI: 10.1073/pnas.1814989115center_img Erik Trinkaus, an anthropologist at Washington University, has found what he describes as “an abundance of developmental anomalies” in people that lived during the Pleistocene. In his paper published in Proceedings of the National Academy of Sciences, he describes his study of fossils recovered from several sites in the Middle East and Eurasia, and what he found. © 2018 Science X Network Skulls of early humans carry telltale signs of inbreeding, study says Citation: Anthropologist finds high number of developmental anomalies in Pleistocene people (2018, November 6) retrieved 18 August 2019 from https://phys.org/news/2018-11-anthropologist-high-developmental-anomalies-pleistocene.htmllast_img read more

Read more 0 Comments

A twisted assortment of tales

first_imgAuthor and civil servant Shubha Sarma’s debut book Fly on the Wall and Other Stories examines different facets of life’s narrative with detachment, precision and compassion. A reading session and discussion based on the book was recently organised at Oxford Bookstore also an engaging session was conducted in presence of Jawhar Sircar, chairman Prasar Bharti,  M Asaduddin, Head of the English Department, Jamia Millia Islamia and Yashodhara Mishra, guest editor, Indian Literature. Also Read – ‘Playing Jojo was emotionally exhausting’The subjects in the book range from up-market, urban settings to the depths of rural Odisha and areas of civil strife and deep social unrest. The narrative strings together anxious housewives, over-imaginative teenagers and men and women in the sunset of their lives. Much based on the experience of Sarma’s services for more than a decade in the tribal districts of Odisha where she endeavoured to catalyze social change, empower women and address complex issues concerning left-wing extremism.? Also Read – Leslie doing new comedy special with NetflixCharacters in the book are from all walks of life, there is Dipankar, yearning for Assam and returning to discover that he is a stranger in his own land and the beautiful Uma, mysteriously killed and awaiting justice; there is Arun craving parental affection and Shikha, defying social mores. They are people one encounters everyday on the bus, the metro and at times, the mirror. Each story is uniquely crafted with an ingenuous sense of structural balance. As a whole, this assortment of tales with a twist brings to life the realities and contradiction of India and makes it an enchanting collection of highly readable short stories.last_img read more

Read more 0 Comments

Foodies corner

first_imgGuests can savour delectable and inviting creations such as macaroons, eclairs, muffins, croissants, Paris brest, tarts, mousse, cheesecakes amongst other popular desserts specially crafted by a team of patissiers. There is also a wide range of chocolates, pralines, cookies and cakes readily available or made to order. Island Bar presents the ‘Happy Hours’, offering Delhi’s most extensive selection of wines and spirits. The Bar also features a collection of single malt whiskeys, international cigars and array of non-alcoholic beverages and appetizers. For wine lovers, it offers an extensive selection of wines that are true to their origin. Also Read – ‘Playing Jojo was emotionally exhausting’Café Uno is the place to start the perfect Sunday with a delectable and exquisite brunch. The brunch features an international cheese counter, exotic seafood bar, sushi, antipasti platters, a freshly baked bread station,  Indian and Western delicacies to choose from. The cooking theaters at Café Uno each featuring a different culinary style, are showcases for the best of international cuisines. Where: Shangri-La’s – Eros Hotel When: Throughout the monthlast_img read more

Read more 0 Comments

Temple purification row BJP asks why was CM quiet so far

first_img‘It is suprising that Manjhi kept quiet on the alleged temple purification incident for months… he should have taken action against whosoever responsible for it immediately after,’ Modi told reporters on the sidelines of ‘Janata Durbar’ at his official residence here.  More than chief minister’s silence, doubts have surfaced over authenticity of the incident with Manjhi and his Minister Ramlakhan Ram making contradictory statements, he said.Under the circumstances, it will be in the fitness of things that either the chief minister sack his ministerial colleague for countering his claim, Modi said.last_img read more

Read more 0 Comments

Destination Brisbane

first_imgThe upcoming G-20 Heads of State meeting in Brisbane, Australia in mid-November is being convened when urgent policy actions from major economies, advanced and emerging, call for coordinated and focused approach to get the world economy out of the anemic recovery. Latest economic data from global financial institutions such as the World Bank, the IMF, OECD and the WTO do not inspire hope that economic growth can pick up pace and verve to allay the jittery nerves of policymakers, planners and political leaders who have a lot of stake in the faster and decisive recovery of the global economy. Also Read – Syrian army suspends ‘Aleppo fighting’There is a distinct lack of sustained demand to drive growth the world over that dodges every economy, though massive amounts of countercyclical steps in the form of injection of liquidity through monetary easing with attendant ultra low interest rates in rich countries and fiscal stimulus in emerging economies and tax concessions to stoke demand continue unabated for quite a long time since 2008 when the global financial crisis struck like a tsunami. Also Read – Alarming seismic activityIn fact, the G-20 was set up as a coordinated response by global community to the global financial crisis. That crisis underscored the inadequacies of the extant institutional arrangements such as the IMF, touted to be the lender of the last resort, when major financial crisis abruptly broke out in one major epicenter but spread its octopus-like tentacles to the rest of the universe through fast and fraught transmission effects. That is why post-crisis, leaders of G-20 including India at the highest level meet once a year regularly to take stock of the situation and evolve a coordinated policy response. So beginning in Washington in 2008, the G-20 conclave was held subsequently in London, Pittsburgh, Toronto, Seoul, Cannes(France), Los Cabos (Mexico) and St Petersburg every year and this year the G-20 leaders including India’s Prime Minister Mr. Narendra Modi will gather together for two days on November 15-16 in Brisbane, the capital city of picturesque Queensland, Australia. Canberra has already stated that building on the St. Petersburg summit, it is easier to structure leaders’ discussions around the key themes of promoting stronger economic growth and employment outcomes, making the global economy more resilient to deal with future shocks and to maintaining a tight focus on practical results that would lift growth, boost participation, create jobs and build resilience of the global economy. In preparing a ‘Brisbane Action Plan’, Australia has contended that these growth strategies would need to include ‘practical actions to improve productivity and competitiveness, strengthen investment in infrastructure, encourage trade, make it easier to do business and boost employment’. At September 2014 meeting of G-20 Finance Ministers and Central Bank Governors in Cairns in which India’s Minister of State for Finance Mrs. Nirmala Sitaraman and RBI Governor Dr. Raghuram G. Rajan took part as the Finance Minister Mr. Arun Jaitley was indisposed,  the leaders discussed the agenda of the G-20 summit. The IMF and OECD reckoned that the new growth strategies of G-20 members collectively would deliver two per cent increase in global GDP over five years. This would imply $2 trillion to the global economy and millions of new jobs.  The host has already made it amply clear that its priority for Brisbane Summit is to link development actions to growth, by creating the conditions for developing and emerging economies to attract infrastructure investment, by reinforcing tax systems and by improving access to financial services. Canberra promised that its Presidency of G-20 would make it a priority to complete financial reforms in four principal areas directly related to the causes of the crisis, viz., building the resilience of banks, helping prevent and managing the failure of globally important financial institutions, making derivative markets safer and improving oversight of the shadow banking sector. For India, this is a key issue as a member of the Financial Stability Board (FSB) with FSB members under the G-20 umbrella having committed to adopt the maintenance of financial stability. Hence it already sought IMF/World Bank to conduct their joint Financial Sector Assessment Programme (FSAP) a couple of years ago. The mission worked in concert with RBI, the Insurance Regulatory Authority of India (IRDA), the Stock Exchanges Board of India (SEBI) and the Ministry of Finance. One of the FSAP reports—Financial Stability Assessment Update—on India was published by IMF in 2013. In hailing the comprehensive review recognizing that the Indian banking system remained largely stable on account of tightly controlled regulatory and supervisory regime by RBI, the assessment found gaps and constraints in the implementation of regulatory and supervisory framework. It however hastened to note that RBI has been striving to address these gaps and even when the RBI lacks de jure independence, there has been no de facto interference from the government. But this is a refreshing and qualified plaudit from a neutral observer, though the country’s apex bank is now fighting a losing battle to keep its inflation-setting function unhampered from interference by the Finance Ministry!It was also agreed on measures to stabilize the global financial system by looking forward to the challenges and getting on with the job of implementing the priorities of the FSB.  There have also been some major initiatives to be delivered on in relation to the base erosion, profit shifting and international tax. In sum, as the leaders of the world’s most powerful 20 economies gather in Brisbane when at the end Turkey will assume the next year’s Presidency, there would be seamless continuity ‘in delivering our goals, in relation to the FSB priorities, in relation to the growth target of 2 per cent, in relation to the taxation initiatives and in relation to infrastructure and closer partnerships with the private sector’, according to Mr. Hockey.  In sum, as India’s Prime Minister Mr. Modi visits Down Under with a renewed remit to his growing popularity, the world awaits his interaction with global stalwarts in setting policy agenda and taking them up for implementation back home to crank up India’s economic growth, analysts say.last_img read more

Read more 0 Comments

Allwomen cop team to keep an eye on city streets

first_imgKolkata: Kolkata Police has introduced “The Winners”- a special all-women patrolling team to combat and prevent incidents of molestation and eve-teasing in the city.This is the first time in the history of Kolkata Police that such a special team has been set up to ensure safety and security of women.The women police will be patrolling different parts of the city on scooters and they will reach a spot soon after receiving information of any untoward incident. The team of “The Winners” initiated their journey from Lalbazar in presence of Rajeev Kumar, Commissioner of Police and other senior police officers. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedAll the women police personnel had received their training for the past three months in the Police Training School (PTS). Most importantly, all the women police personnel will be having body-cams like traffic sergeants.The women police will be deployed at different parts of the city. They will be maintaining vigil while patrolling different areas. It will make the “public places safer for women”.The women police will be patrolling on scooters at different locations in different parts of the city. Patrolling in areas including Park Street, Esplanade, Rabindra Sadan crossing, Elgin Road, Gariahat, Shyambazar, Ultadanga and areas around Victoria Memorial Hall, will be carried out on a regular basis. Also Read – Naihati: 10 councillors return to TMC from BJPIt may be mentioned that the police have already taken several steps to check incidents of sexual harassment on women. Now, with introduction of “The Winners”, the rate of such incidents will go down further. The women police have been trained in such a way that they are capable of taking prompt action to save a woman from becoming a victim of sexual harassment. In case there is need of any more manpower to tackle a situation, the women police will be contacting the concerned police officers and subsequent steps will be taken.Earlier, it was found that women had to approach traffic sergeants and constables for any kind of help. Now, with introduction of “The Winners”, they can approach an on-duty woman officer and at the same time, will feel comfortable in sharing their problems.It may be recalled that during the training of women police personnel at Police Training School, Kumar had given necessary advice to ensure that they get prepared properly.last_img read more

Read more 0 Comments

Demand for new hostel CMCH students continue agitation for fifth day

first_imgKolkata: Some MBBS students at the Calcutta Medical College and Hospital (CMCH) continued their demonstration for the fifth consecutive day, with the demand of a new hostel.The CMCH authorities on Friday categorically mentioned that they will not be able to fulfill the demands of the agitating students. Some of the representatives of the medical students taking part in the agitation met the principal of CMCH and held a prolonged discussion in this regard. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedIt has been learnt that senior officials of the CMCH had urged the students to lift the agitation which they turned down. According to the students, the agitation will be continued till the demands are met.The incident, however, had no impact on the health services of the hospital. It may be mentioned that a section of medical students at CMCH continued their demonstration so that their various demands are met, including setting up of a new hostel. Also Read – Naihati: 10 councillors return to TMC from BJPThe second, third and fourth year MBBS students of CMCH started a protest agitation inside the hospital campus, demanding a new hostel for them.The move was made after the first year MBBS students were given a new hostel by the CMCH authorities.The students taking part in the agitation alleged that the hostel meant for them is not in a good condition. The hostel rooms are not up to the mark. The students had also submitted a deputation to the CMCH principal on Tuesday, placing their various demands. These students have alleged that the hostel rooms are unhygienic and one cannot stay there for too long. The matter was taken up with the CMCH authorities but they are yet to take any step in this regard.They also said that first year students have got a new hostel, while the second, third and fourth year MBBS students have been deprived.CMCH principal Uchhal Bhadra urged the agitating students to stop the demonstration, which they refused to do. The students also threatened to continue the agitation until anew hostel is being allotted to them.last_img read more

Read more 0 Comments

10minute walk break can reverse vascular dysfunction

first_img“Our study found that when you sit for six straight hours, or the majority of an eight-hour work day, blood flow to your legs is greatly reduced,” said lead author of the study Jaume Padilla, assistant professor of nutrition and exercise physiology at University of Missouri School of Medicine in the US.“We also found that just 10 minutes of walking after sitting for an extended time reversed the detrimental consequences,” Padilla noted.During the study, the researchers compared the vascular function of 11 healthy young men before and after a period of prolonged sitting. The findings indicated that blood flow in the popliteal —an artery in the lower leg—was greatly reduced after sitting at a desk for six hours. The findings appeared in the journal Experimental Physiology.last_img read more

Read more 0 Comments

Software engg builds organisation to help poor visuallyimpaired

first_imgSiliguri: A software engineer has started an organization to help visually impaired people and boost their mental power.Jitendra Jangra, a middle-aged man has named the organisation — ‘The wisdom of mind’ where he has served nearly 400 blind people for free in the past six years.His project constitutes of different brain exercises which help visually challenged people to strengthen their intuition so that they can relate to different colours, letters, words and even sentences. Also Read – Rain batters Kolkata, cripples normal lifeJangra, started off with social work after leaving his job at Chitkara University in Chandigarh, where he was working as a professor of technological sciences. He demonstrated on a student of class 5, Sidhdharth Sharma, in Siliguri on Tuesday, who could read the lines without looking at the paper that was given to him during the demonstration procedure.Jangra, the one-man army, runs the association free of cost for the visually handicapped and poor people. Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedWhile for private institutions, he has a few co-workers appointed under him, who are paid salaries based on different projects.”I am doing this to help the needy who cannot avail the expense of curing their eyesight and remain uneducated. We help people to build themselves,” stated Jangra.Institutions like Matrichaya in Matigara have a few blind students who, without family support, are being helped by the association.Jangra conceived the idea in June 2017 and work started off in the early months of this year. At present, teams from the Army and Airforce are being trained by the association that might help them in their field work.The upcoming projects are being executed in schools for the blind students in Kalimpong and various other parts of Sikkim.”There is an uncountable potentiality in human brain. I am trying to help people so that they use these potentialities which are often not known by the common people,” believes Jangra.last_img read more

Read more 0 Comments

Playing with acrylic

first_imgAcrylic canvas sheet paintings have come a long way since the 1940s, and the versatility of acrylics has won over many artists and collectors, increasing the number of masterfully-rendered acrylic paintings available in both abstract and representational styles. Young Artist Balu Chaudhari , born in Maharashtra and currently residing in Bhopal is currently exhibiting his this innovative  Acrylic  as medium paintings at Triveni Art Gallery in the national Capital. Also Read – ‘Playing Jojo was emotionally exhausting’The exhibition titled ‘Meandering Metamorphosis’ shows  the artist’s strong power of imagination and confidences. His obsession with details and his clear vision is shown through the paintings which will be displayed from November 23 to December 2. Balu Chaudhari says that when an art lover comes to view his paintings he hopes they take something away a spark of memory an emotion a thought because that’s what an artwork should do.The present work of Balu Chaudhari can be defined as a spirit of daring innovation. Driven by his yearning to express unknown invisible forms of nature, he in the last three years, has totally transformed his medium as well as his forms.  Also Read – Leslie doing new comedy special with NetflixHe has used dry thick base of color as a natural metaphor of frozen time and provided fluidity through the use of glass pieces in standing rows. Most recently, Balu has used more unconventional materials such as reverse painted acrylic sheets which are heated to create a frozen flow of physical reverberation. Balu Chaudhari’s work is characterised by technical facility, richness of color, and breadth of vision, he addresses subjects of profound universal significance, yet does so through personal metaphor and imagery.  Engagements with his  paintings is always a satisfying and enriching encounter.last_img read more

Read more 0 Comments

Faking a smile may not make you happier study

first_imgFaking a smile may not make you happier after all, according to a large new study which contradicts the belief that our body’s movements can affect our mood.The idea that faking a smile may brighten our mood, which came out of a psychological experiment from the 1980s, may not be true, as scientists were not able to repeat the results in a lab setting.In the facial-feedback hypothesis, dating back to 1988, participants rated the humour of cartoons while inadvertently mimicking either a smile or a pout. Also Read – Add new books to your shelfThe participants were simply asked to hold a pen in their mouths, either with their lips (which pushes the face into a frown-like expression) or their teeth (which mimics a smile).The participants who used the pen to mimic a smile rated the cartoons as funnier.Now, a new study on 1,894 participants has found no evidence that such an effect exists, ‘Live Science’ reported. Eric-Jan Wagenmakers, the lead researcher of the replication attempt from the University of Amsterdam in the Netherlands and colleagues in 17 labs around the world recruited participants and repeated the pen-in-mouth experiment. Also Read – Over 2 hours screen time daily will make your kids impulsiveThey used the same cartoon series, ‘The Far Side,’ that was used in the 1988 experiments, but they selected different cartoon panels, which they tested among outside raters to ensure that the raters reached consensus that each cartoon used in the study was “moderately funny.” “None of the experiments yielded a statistically reliable effect individually,” Wagenmakers said.“Overall, these are the kind of data you would expect to see if you tried to replicate an effect that doesn’t exist or is so small you can’t find it with the paradigm you were using,” he said.last_img read more

Read more 0 Comments

Shantipur hooch tragedy Death toll touches 12

first_imgKolkata: The death toll reached 12 in the Shantipur hooch incident. 4 more persons died at the hospital since Wednesday, while several more were admitted. On the other hand, the Officer-in-Charge (OC) of Shantipur police station, Sourav Chatterjee, was removed.The death toll is feared to go up as more persons have been admitted on Thursday. Though Criminal Investigation Department (CID) has been ordered to probe the incident, the case handover process has not been completed yet. Sources informed that though the process in underway, the CID team and Nadia district police are working hand in hand to investigate and nab the suspected culprits. Also Read – Rain batters Kolkata, cripples normal lifeOn Thursday, four arrested persons were produced before the court and were remanded to 4 days police custody. Eight people including a woman had died while 20 fell ill from Tuesday night till Wednesday. Four persons were arrested for their alleged connection with the hooch den at Shantipur. They were arrested on charges of culpable homicide not amounting to murder (IPC 304), causing hurt by means of poison with intent to commit an offence (IPC 328) and sale of noxious food or drink (IPC 273). Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedState Finance minister Amit Mitra had on Wednesday announced a compensation of Rs 2 lakh to extend support to the family members of each of the deceased. Eleven officers from the Excise department, including the Excise officer-in-charge of Shantipur circle and Deputy Excise Collector (DEC) of Ranaghat circle, have been suspended immediately after the incident. Locals informed that the majority of the deceased and the sick are brick-field labourers. Police were informed immediately after the incident. The district administration was also informed. Mitra stressed that it was heard from local people that spurious liquor had been brought into the state from Jharkhand and Bihar in vans and its distribution is not restricted to bordering districts only.last_img read more

Read more 0 Comments

State Forest Development Corporation to boost ecotourism

first_imgKolkata: The West Bengal Forest Development Corporation (WBFDC) is taking a slew of measures for the development of eco-tourism in the state and at the same time will be incorporating as many as 15 eco-tourism centres spread across the state in its booking portal from January 2019.”We have chalked out an elaborate plan to promote ecotourism and also giving a major overhaul to infrastructure development in areas where we have our eco-resorts,” said Ravinder Pall Saini, managing director, WBFDC. Also Read – Rain batters Kolkata, cripples normal lifeIt may be mentioned that the WBFDC currently runs eco-tourism resorts in 19 locations of which 13 are located in North Bengal and six in South Bengal. In north Bengal, the WBFDC has nature resorts at Jaldhaka, Murti, Paren, Rasikbil, Suntalekhola, Loleygaon, Lava, Kalimpong, Mongpong, Samsing, Barodabri, Rajabhatkhawa and Lepchajagat, while South Bengal has resorts at Garpanchakot, Mukutmanipur, Jhargram, Lodhashuli, Tajpur and Garchumuk. The WBFDC in coordination with the state Tourism department is also working on developing home stay tourism in Bengal. From January 2019, we will be gradually bringing as many as 15 eco-tourism centres on our booking portal that includes Hatibari in Jhargram, Susunia in Bankura, Chatakpur in Darjeeling, Panjhore in Gorumara, Mendabari under Jaldapara National Park, Nemati under Buxa Tiger Reserve, Bonnie in the Sunderbans to name a few. It may be mentioned that all the 19 resorts under the WBFDC has online Also Read – Speeding Jaguar crashes into Mercedes car in Kolkata, 2 pedestrians killedbooking facilities The WBFDC will be taking up thematic development of various sites and will set up watch towers wherever there will be availability of space. “We are also making arrangements for live demonstration for tourists regarding zoos, arboretum, bambusetum, orchidarium to develop awareness. We want to spread the message that an eco-resort is not like a conventional hotel and they have to adhere to certain rules while staying in it,” a senior official of the WBFDC said. The tourist amenities that are being provided include waiting lounges, reception centre, exhibition of local cultural activities and a scientific plan for solid waste management. “A blend of natural surrounding and local traditional style will be put in place while creating accommodation,” the official added.The general principles that will be followed include — use of indigenous and ecologically sustainable resources for tourist accomplishments and most importantly working for economic welfare and improved livelihood for local villagers. It may be mentioned that the WBFDC has roped in some local villagers from Panijhora to work at its Murti Resort in Dooars. According to a senior WBFDC official, these villagers not only do cooking and other activities for tourists but also guide them about the best time for animal sighting during jungle safaris.last_img read more

Read more 0 Comments

Look fresh yet glamorous during summer

first_imgWith the mercury refusing to climb down, toss away your dark and dramatic make-up palette. Less is more, opt for a subtle yet bold look, say experts.Casual day out with friends: You would need to keep your make-up natural and light. The idea is to look effortless yet glamorous. So the best way to embrace the summer vibe would be to refrain from using too much liquid make-up. Instead, just dab on a semi matte stick concealer and you are good to go. Also Read – Add new books to your shelfFor bright, sunny brunches: You want to look glowing, fresh and contoured in the photographs. So here is how you can take your pictures to the next level. Simply apply a light shimmery blush in peach or pink undertones over the apples of your cheeks, across the bridge of your nose, and on your temple.For the summer dance parties: There can be a lot of rules for party make-up but the best way is to keep it minimal. Blend a touch of highlighter and apply it on top of the cheekbones and brow bones and down the bridge of the nose. The cream-based shimmer can also be used to illuminate the face and the shoulders. Also Read – Over 2 hours screen time daily will make your kids impulsiveMake your lips summer ready: Summer is the time when you drink lots of fluids. You would neither want to leave lipstick on every glass at restaurants and pubs or let the heat make your lipstick bleed. It will be only wise to use a lip liner before applying any lipstick as it controls the chances of bleeding. So, pick a lip liner of the same colour of the lipstick you are going to use. Try the lip pencils that are smooth enough to define, enhance and complement any colour of lipstick or gloss. Use SPF-based make-up: It is important to protect your skin from dryness, tanning and premature ageing, especially during summer. Make-up with SPF content in it will shield your skin from the heat outside and will make you look gorgeous in summer without compromising with the health of your skin.Wear waterproof make-up: The most annoying thing about summer is the constant sweating which ruins your make-up. Either the make-up starts coming off or starts cracking altogether. Waterproof make-up stands out as the ultimate saviour. Not only is it light on your skin but is long lasting as well.Ditch the shimmer, go for natural look: Natural look is the most convenient and apt look for summer. It saves people from applying heavy foundation on the face and helps to get sun-kissed look with just a concealer, blush and highlighter.Blotting papers to the rescue: To get rid of sticky summer skin, use blotting papers to soak up moisture and get the fresh look.last_img read more

Read more 0 Comments

Kolkatans bid adieu to book fair 2019 in high spirits even as

first_imgKolkata: Enthusiasm among the book lovers of the city failed to wane even as the 43rd International Kolkata Book Fair (IKBF) ended a day sooner than other years on Sunday.According to statistics provided by the Publishers and Booksellers Guild authorities, books worth Rs 20 crore were sold and 22 lakh people visited the book fair in 2018. In comparison, the sale of books has increased to Rs 21 crore this year, despite the fair ending a day earlier. Also, the number of visitors has also seen a substantial jump to 23 lakh. The guild’s general secretary Tridib Chatterjee has expressed his gratitude towards the Mamata Banerjee government for making the event a success for yet another year. Also Read – Bose & Gandhi: More similar than apart, says Sugata BoseAccording to the guild authorities, four persons were presented with a token cheque of Rs 1 lakh each, which can only be used to buy books and a book shelf. The guild has also mentioned about one Debabrata Chatterjee, a school teacher from Chakdah in Nadia, who had bought books worth Rs 2.42 lakh. Apart from the prizes given away by the guild to the four lottery winners, it has also honoured 2019 focus country Guatemala’s ambassador Giovanni Castillo. He said: “I am honoured. We will participate in the IKBF in future even if we do not become the focus country again.” Also Read – Rs 13,000 crore investment to provide 2 lakh jobs: MamataIn a first, the guild had decided to focus and showcase the literature and culture of the Lepcha community during the book fair. During the 12-day-long event, representatives from the Hill community had come up with a stall. Representatives of the community were acknowledged for their active participation in the fair. The guild authorities have also honoured the Bidhannagar Police, the Fire and Emergency Services department, state Transport department, Urban Development department, Bidhannagar Municipal Corporation, and other agencies and departments, for their efforts to make the 2019 book fair a success. Representatives from the departments were also presented with a memento each. Around 150 street children from Narkeldanga canal side area were given free books on Monday evening.last_img read more

Read more 0 Comments

Rock in offshoulder lowback outfits

first_imgCaught in a dilemma about how to carry off an off-shoulder or low-back ensemble as a top-heavy woman? Be smart about choose the right lingerie, say experts. Few Tips: Sheer, backless and crop tops are all the rage this season but while it’s loved by all, women are still clueless about what to wear underneath without ruining the look. If you’re planning on or already picked out an outfit like this, go for a bra with a transparent back strap. Find a supportive strapless bra: Choose a bra with a wide underwire and extra enforcement at the sides. Strapless bras that have side boning and broad side wings will Also Read – Add new books to your shelfgive you a secure fit and hold up large breasts comfortably. Nowadays, many ethnic outfits come with thin straps, strapless and even boat neck tops. While they may look absolutely gorgeous, many women avoid buying them either because they don’t know what bra to wear underneath or don’t trust their strapless bra will stay in place. Even if you opt for garments with a really complicated top half, with its multiway bras are a perfect match. Opt for bras that have a self-adhesive silicone strip on the inner band. This will make sure that the bra sticks to your body and doesn’t slide down. Choose a bra with a high centre bridge. This is the centre part of the bra that connects the two cups. The higher the centre bridge, the more coverage your bra will give you so that the tops of your breasts do not spill over. Also Read – Over 2 hours screen time daily will make your kids impulsiveGo for a bra with a wider band. Contrary to popular belief, the band (and not the straps) is actually responsible for providing a massive majority of the bra’s support. A wider band can better distribute the weight of the breasts, which is why it’s ideal for women who are top heavy. For low back outfits, its best to go for a transparent strap bra, since heavy busts need band support. This way, you can still have a sexy backless look without compromising on the support. Opt for a matte-look back strap which is virtually invisible, giving you the effect of wearing nothing at all. You can also go for bras with lace back straps that add a stylish element to your low back top.last_img read more

Read more 0 Comments

The Adult Symbolism in Alices Adventures in Wonderland

first_imgEven though the rumors aren’t true that Lewis Carroll wrote Alice’s Adventures in Wonderland during a hallucinogenic trip, the book still remains a fascinating study of reality while being a prime example of the nonsensical fantasy genre. Just because something is nonsense doesn’t mean you can’t learn from it, and you don’t need a literature degree to notice that the novel is rife with symbolism. While both the book and Disney film adaptation are kooky on a superficial level, anyone paying close enough attention will notice the rampant symbolism in both: adulthood.Alice in Wonderland, illustration by Gertrude A. Kay, 1923The main character, Alice, is a little girl of undefined age (though in the sequel she claims she’s seven and a half, so we can assume she’s at least seven years old) who has years of physical and mental change ahead of her.The Adventures in Wonderland begin with young Alice sitting in a garden. Idyllic and beautiful, this verdant space draws parallels to the Garden of Eden. Rather than plucking a forbidden apple, though, Alice gives in to desire and crawls into the tree.Alice in Wonderland, illustration by John Tenniel, 1865This retreat away from reality reflects Alice’s desire to remain a child, rather than face the advancing sands of time. However, this isn’t Peter Pan, and her journey of self-exploration has frightening themes of aging and sexuality as she slips further towards puberty and adolescence.Once inside Wonderland, her adventure is fraught with complications and she no longer knows an innocent or peaceable life. Through several bizarre happenings, Alice’s body grows disproportionately large and small, many times with no good reason, and she is unable to understand why. Though seven is a bit young to be undergoing such drastic changes, this is without a doubt an allusion to puberty.Alice trying to play croquet with a flamingoDuring her adventures, Alice is repeatedly asked to prove what she knows and often recites the lessons she’s learned to others she meets along the way. During Victorian times experimental language was all the rage and Carroll made use of it extensively.Here are some hilarious Victorian vulgarities that people should know:Several characters contradict her, however, and Alice finds herself questioning her own mind. These interactions are no doubt relatable to any child who’s ever struggled to get credibility, let alone a sympathetic ear, from an adult.Jessie Willcox Smith’s illustration of Alice surrounded by the characters of Wonderland, 1923Her acquaintance with the caterpillar gives rise to a curious event in which Alice needs to tackle a mysterious mushroom to maintain her ever-changing size.This can be interpreted in two ways: does the mushroom represent temptation in the form of drug use, as some say teens see illicit activities as the only way to control their own lives in a parentally-controlled setting? Or is it a phallic symbol, presenting temptation and the penultimate hurdle into womanhood?Color plate from the 1907 edition of ‘Alice’s Adventures in Wonderland’: Chapter 7 – A Mad Tea PartyThe LSD-Carroll association myth is easily debunked given that the drug wasn’t officially announced until the 1930s, but it’s undeniable that the magic mushroom has trippy effects.It would also be a stretch to imply an improper relationship with the caterpillar, as he leaves before Alice tastes the mushroom. In a less risqué analysis, the mushroom could simply represent the young girl learning decision making skills, problem solving to come to a solution (in Alice’s case, maintaining her normal size).The Pool of Tears by Milo WinterMoving away from raunchier themes, confusion is a central element throughout the story and a very prevalent factor in growing up. Nothing Alice does or sees seems to make sense.There are puzzles everywhere, be it the Caucus race, the riddles put forth by the Mad Hatter, or the croquet game Alice is drafted into against the Queen of Hearts. None of these events have a definitive outcome, and Alice can’t seem to figure out how or why any of them occur. Anyone who’s reached adulthood already could attest to confusion being a pretty regular feeling.The White RabbitWhile it may seem like one fantastic journey for a young girl, Alice’s Adventures in Wonderland carries an underlying message which encompasses the inevitable loss of childhood.Read another story from us: The Original Story Of Pinocchio is Scary as HellThe Disney adaptation’s quaint imagery may cover up this depressive realization, but this analysis will be clear to anyone reading the original text.last_img read more

Read more 0 Comments

VIDEO The Florida Gator mascot took a foul ball to the head

first_imgMost of the time in Florida, if you see an alligator roaming around the stadium at a sporting event, it’s time to head for the exits. Unless it’s Albert, the Florida Gator mascot.Last night, during UF’s game against North Florida, Albert was cheesing it up with a kid in the stands when he spotted a foul ball headed in their direction. Instead of saving himself, Albert put himself in the line of fire, and took the foul ball off his headpiece rather than risk it hitting the kid.The kid returned the favor by performing CPR on Albert, who survived the incident.It’s always nice to see courage in action, even in small doses. Even from a mascot.Saving children from foul balls – just another reason to follow @AlbertGator on Twitter! #GoGators pic.twitter.com/44j6FgkpXa— Florida Gators (@FloridaGators) April 19, 2017last_img read more

Read more 0 Comments