Palm patterns are made up of both the unique way each person’s palm is arranged (all those lines and ridges) and the veins and capillaries that reside just beneath the skin. Over the past couple of years, some companies have developed palm readers that match vein patterns for securing computer systems, but they have all been too big to use on cell phones. The new approach dispenses with the old way of looking at a person’s palm and uses nothing more than software analysis to identify to whom it belongs, paving the way for use on smartphones because each already comes equipped with a camera. To use such an outfitted phone, all a person would have to do is hold their hand out flat, palm down, over the phone to identify themselves as an allowed user of the phone. No muss, no fuss, and no password.The phone will be able to identify the user by their palm terrain using only a photo taken in ordinary light, which of course will present a problem for those using their phone in the dark. The company hasn’t said how it will handle that situation, but it seems plausible that they’d have the screen flash some light to reflect off the palm, rather than revert to the old password system. The downside to the development of the new software security system is that it’s proprietary, which means that when it’s rolled out by the end of the year to customers in Japan, only they will be able to reap its benefits. The rest of us will have to wait for the two companies to license the technology to others, or worse, for others to develop the same functionality on their own. Explore further © 2012 Phys.org via Tech-on (Phys.org)—By now everyone knows that the only way to protect the stuff you keep on your smartphone is to password protect the screen. Unfortunately, we all also know how easy it is to crack that little system as evidenced by various phone hacking scandals and stolen celebrity photos. Clearly a better way needs to be found, and now it seems Japanese mobile giant Softbank Mobile Corp, after teaming up with Universal Robot Co Ltd, might have found it; phone software that is able to recognize a person’s unique palm patterns. Credit: Tech-on More information: Citation: Japanese partnership results in palm recognition security for smartphones (2012, September 5) retrieved 18 August 2019 from https://phys.org/news/2012-09-japanese-partnership-results-palm-recognition.html I-maginary Phone: iPhone as a hand phone? (w/ video) This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only.
Journal information: Physical Review Letters The Holy Grail of quantum cryptography – beyond delivering security that cannot be classically achieved – is guaranteeing unconditional security when the untrusted quantum devices are involved. While this goal has been studied since the early 1990s, a robust solution has proven elusive. Although Jonathan Barrett and his co-authors published2,3 a strong Device-Independent Quantum Key Distribution (DIQKD) security guarantee in 2005, it focused on a weaker set of constraints than those imposed by quantum mechanics – specifically, the no-signaling property dictated by special relativity – which thereby yielded stronger results. At the same time, however, it had several drawbacks, including low efficiency and, most importantly, an assumption of independence between the different occurrences when the devices are used. Key rate obtained in our protocol (middle curve), expressed as a fraction of the raw key (bits obtained from the key rounds). On the x axis is the noise rate η as measured in the protocol. The top and bottom curves are the best achievable rates known for the case of quantum and no-signaling adversaries, respectively, under the additional assumption of causal independence. Credit: Umesh Vazirani and Thomas Vidick, “Fully Device-Independent Quantum Key Distribution,” Phys. Rev. Lett. 113, 140501 (2014). , Physical Review A “Prior to our work security had been established in two circumstances,” Vidick notes, the first being “In the first – the non-device-independent model – the adversary is all-powerful, but the users trust their devices. In other words, the devices area assumed to perform exactly as expected – but there’s a problem: how can this be confirmed?Scenario #2: Users don’t trust the devices, but it is guaranteed that the adversary will only try to attack the key one bit at a time. “One way to phrase this is that there is, again, an assumption that each time Alice and Bob use their device, it behaves in exactly the same way, independently of what happened in the past. Not only is this is a very strong condition, but again – since each time they use the device, we can’t go back in the past and check that it’s independent – how do we check?” It turns out that this simplifies analysis of these so-called independent identical distributed (i.i.d.) states, which is often done using de Finetti theorems. (An i.i.d. state is a sequence or other collection of random variables in which each random variable has the same probability distribution as the others and all are mutually independent; de Finetti-type theorems show that the analysis of permutation-invariant states can be reduced to the analysis of i.e. states – meaning that if it is assumed that the adversary treats all sequences in the same way, they can be reduced to independent attacks.”The challenge, then, was to remove all assumptions and give a general security proof,” Vidick explains. “Adversaries that can attack the whole protocol at once, instead of behaving independently across different rounds, are much harder to handle because they can use a lot of information – such as that obtained from what Alice and Bob said over the phone – and then perhaps make a global measurement that will extract information about all the bits of the key at once.”Vidick adds that their main insight had to do with the use of quantum monogamy – a property of entanglement stating that if strong correlations are observed between two parties, then the correlations must be weak with any third party – in this case, the adversary. “You can see this as an intuitive way to obtain security, but it’s very hard to make it quantitatively precise,” Vidick points out. “However, we’ve introduced techniques to do this. One is a technical tool – the use of pseudorandom objects studied in theoretical computer science known as extractors. Another technique is a conceptual tool that we call a ‘guessing game’ which demonstrates monogamy and shows that it makes certain tasks impossible.” (Vidick notes that the scientists knew prior to their work that monogamy would be a key ingredient in any complete proof of security. “However,” he says, “we’ve demonstrated that it’s actually possible.”) , Nature Explore further The idea, Vidick continues, is to show that, if the task was possible – for example, the eavesdropper could break the protocol – then the impossible would be possible. “In the guessing game, one of the users – let’s say Alice – is given a secret bit. Then Alice, Bob and the eavesdropper, each in their own corner of the world, do something with their devices. At the end, Eve manages to produce an accurate guess for Alice’s secret bit. If such a task were possible, special relativity would be violated in the form of secret information being sent from Alice to the eavesdropper. What we basically show is that, if our protocol could be broken, there would be a way to devise a successful strategy in the guessing game. However, we show that this is impossible, proving that out protocol is secure.”In their paper, the scientists discuss their new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol. “This involves more technical lemmas,” Vidick points out. (Lemmas, or lemmata, are propositions proved or accepted for immediate use in the proof of some other proposition) “We show a trade-off: if Alice and Bob observe sufficiently strong classical correlations when they talk over the phone and discuss the results of what they read off their respective devices, then the adversary does not even have quantum correlations with the inside of the users’ devices. These correlations are measured using a quantum measure of information, the quantum conditional min entropy.” (In information theory, min entropy corresponds to the most conservative way of measuring the unpredictability of a set of outcomes as the negative logarithm of the probability of the most likely outcome. Conditional quantum min entropy is a conservative analog of conditional quantum entropy.)A key contribution of the study described in the paper is using post-measurement states to achieve a more complete analytic picture of quantum mechanics compared to the previous no-signaling approach. “Previous proof techniques work even without using the formalism of quantum mechanics – that is, even if nature allows actions that are beyond quantum mechanics but are still restricted by relativity, they still obtained security,” Vidick says. On the one hand, this is stronger because the adversary is allowed more power – but is at the same time weaker because these approaches need to assume independent attacks. “In fact,” he adds, “we know that in this framework, we could not possibly obtain general security.”Vidick points out that this creates an important question. “In order to get general security we know one has to use quantum mechanics more strongly and more deeply than previous proofs did – but which principle should we use? Our proof gives an answer to this by showing that quantum mechanics, as a theory, gives us a way to describe the state of a system after a measurement has been made, allowing predictions the outcomes of further measurements to be made. The use of such post-measurement states is essential for us – and at a simple level, lets us model what happens when the devices have memory, and repeatedly measure the same state every time they’re used.”Another point discussed in the paper is the implication of the new protocol’s linear key rate and toleration of constant noise rate in the quantum devices. “I’d be lying if I said the protocol was practical,” Vidick quips. “However, getting linear rate and noise tolerance is an important step towards the possibility of practical implementations. These will always suffer from linear noise, and for the protocol to be efficient we want the rate to be linear.” That said, Vidick notes that in terms of analysis, allowing some amount of noise equates exactly with allowing the adversary to surreptitiously introduce some amount of adversarial behavior. “What we see as noise could very well be malicious behavior” he explains, “so the more noise we allow, the more power we give to the adversary, the harder the proof, and therefore the stronger the result. The proof would be much simpler if we were to tolerate only zero noise, since in that setting the devices can be very well-characterized4. However, this is not the case if we allow a little noise, which we really ought to do if we’re ever to use that protocol in the field.”Moving forward, Vidick says that he and Vazirani have several research directions planned:Improve the protocol’s practicality – specifically, better error dependence and key rate – so that it can be implementedExtend analysis to other types of device-independent protocols that have been proposed in the literature, such as measurement-device-independent protocols, which have weaker security guarantees but are more practical, and complete security analysis based on the tools they developApply their quantum monogamy techniques to completely different areas – the direction he finds most exciting – to quantum complexity theory, the quantum PCP conjecture, black hole theory (where there is significant discussion on the role played by monogamy but nothing quantitatively substantial), and other areas(Quantum complexity theory – part of computational complexity theory in theoretical computer science – studies complexity classes defined using quantum computers and quantum information which are computational models based on quantum mechanics. Specifically, it studies the hardness of problems in relation to these complexity classes, and the relationship between quantum and classical complexity classes. The PCP theorem, or PCP conjecture, is the foundation of the theory of computational hardness of approximation, which investigates the inherent difficulty in designing efficient approximation algorithms for various optimization problems; PCPs, or Probabilistically Checkable Proofs, embody the idea that verification of proofs becomes nearly trivial if one is willing to use randomness.)In addition, there are other innovations that the researchers might consider developing. “I think our proof technique has a very promising future, so I’d like to design device-independent protocols for tasks than other quantum key distribution,” Vidick tells Phys.org. “A very different kind of scenario it can be applied to is the following questions: Given access to some black-box machine that is supposedly a quantum computer, how do we know if it actually is? How do we gain confidence as to what is going on inside the machine if we can only have a classical interaction? While this is a very real concern, as is evidenced by the controversy surrounding the D-Wave system, very few convincing techniques are known. We just don’t know which kinds of quantum systems can be characterized outside of the inaccessible quantum black box, and how.”In addition to quantum cryptography, complexity theory and physics, Vidick notes that other areas of research that might benefit from the study include “Any area that draws heavily on the properties of entanglement requires tools like the ones that we develop,” he concludes, “such as areas of condensed-matter physics and the study of many-body systems.” Citation: Serious security: Device-Independent Quantum Key Distribution guards against the most general attacks (2014, October 20) retrieved 18 August 2019 from https://phys.org/news/2014-10-device-independent-quantum-key.html Recently, scientists at University of California, Berkeley and California Institute of Technology, Pasadena have devised a strong proof of DIQKD security using a standard variation of Artur K. Ekert’s entanglement-based protocol1 targeting general, or coherent, attacks. The researchers say that their protocol is robust, and is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol. (Quantum monogamy, one of the most fundamental properties of entanglement, states that if two qubits are maximally correlated they cannot be correlated at all with a third qubit.) The authors of the current paper state that their analysis relies on a more complete picture of quantum mechanics, in particular through the use of quantum mechanics’ description of post-measurement states.Prof. Thomas Vidick discussed the paper he and Prof. Umesh Vazirani published in Physical Review Letters. “Our main challenge is to prove security against attackers that perform general, or correlated, attacks,” Vidick tells Phys.org. “The kind of adversary, or eavesdropper, we’re worried about is the following scenario,” he illustrates. “In the morning, the adversary prepares three quantum devices – one for Alice, one for Bob, and one for himself. During the day, Alice and Bob use their devices to run the protocol. This involves pushing buttons, reading dials, and so on, they never open the device. Later in the day, Alice and Bob might also talk over the phone and exchange classical,” or non-quantum, “information – which is part of the protocol. At the end of the day, Alice and Bob come up with keys that they hope to be the same – and about which they hope no one else has any information.Enter the adversary, who by monitoring all of Alice and Bob’s telephone communication, can also perform measurements on his device. The challenge, Vidick explains, is showing that our protocol is such that (given that Alice and Bob do not notice any anomalies) the adversary has no information about the final key. This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. The guessing game. Any devices satisfying both the CHSH condition a⊕b = x × y and the guessing condition a = e with high enough probability must allow signaling between DA and DB + E. Credit: Umesh Vazirani and Thomas Vidick, “Fully Device-Independent Quantum Key Distribution,” Phys. Rev. Lett. 113, 140501 (2014). Quantum measurement carries information even when the measurement outcome is unread More information: Fully Device-Independent Quantum Key Distribution, Physical Review Letters 113, 140501 (29 September 2014), doi:10.1103/PhysRevLett.113.140501Related: 1Quantum cryptography based on Bell’s theorem, Physical Review Letters 67, 661 (5 August 1991), doi:10.1103/PhysRevLett.67.6612No Signaling and Quantum Key Distribution, Physical Review Letters 95, 010503 (27 June 2005), doi:10.1103/PhysRevLett.95.0105033Nonlocal correlations as an information-theoretic resource, Physical Review A 71, 022101 (2 February 2005), doi:10.1103/PhysRevA.71.0221014Classical command of quantum systems, Nature 496, 456–460 (25 April 2013), doi:10.1038/nature12035 © 2014 Phys.org
Examples of developmental abnormalities in Pleistocene people. Left to right: the Tianyuan 1, Sunghir 3 and Dolní V?stonice 15 abnormal femora, Center, top to bottom: the Palomas 23 mandibular “flange”, the Rochereil 3 cranial lacuna, the long Sunghir 1 clavicle, the Malarnaud 1 incisor agenesis. Right, top to bottom: the Shanidar 1 sacral hiatus, the Pataud 1 polygenesis, and the Dolní V?stonice 16 cleft palate. Credit: Erik Trinkaus. Journal information: Proceedings of the National Academy of Sciences The Pleistocene is the period from approximately 2.6 million years ago to approximately 11,700 years ago—it spans the last Ice Age. Prior research has shown this was also the period during which anatomic modern humans developed and spread outside of Africa. In this new effort, Trinkaus suggests it was also a time during which humans experienced a wide variety of physical deformations. His study consisted of gathering data on 66 fossils recovered from various sites, most of which were from approximately 200,000 years ago. He notes that most of the remains were from young adults and represented several species of Homo. In looking at the physical structure of the fossils, he found an unusually high number of deformities such as bowed arms or leg bones, or misshapen skulls and jaws. Intrigued by the high numbers, he added them up and averaged them among the group under study and compared the results with modern human anomalies.Trinkaus found that among the fossil samples was evidence of 75 abnormalities. He also found that approximately two-thirds of those anomalies showed up in less than 1 percent of modern humans. He also found that the abnormalities came about due to a variety of ailments such as blood disorders or hydrocephaly—but a lot of them could not be traced to a cause. He suggests the number of abnormalities is extremely high for such a small group of fossils.Trinkaus suggests inbreeding is one of the more likely reasons for such a high number of abnormalities—hunter-gatherer groups of the time are believed to have been rather small, increasing the odds of inbreeding. He also suggests that it is possible that individuals with such abnormalities received special treatment during burial, which increased the odds of their remains surviving to the modern age for analysis. Explore further This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. More information: Erik Trinkaus. An abundance of developmental anomalies and abnormalities in Pleistocene people, Proceedings of the National Academy of Sciences (2018). DOI: 10.1073/pnas.1814989115 Erik Trinkaus, an anthropologist at Washington University, has found what he describes as “an abundance of developmental anomalies” in people that lived during the Pleistocene. In his paper published in Proceedings of the National Academy of Sciences, he describes his study of fossils recovered from several sites in the Middle East and Eurasia, and what he found. © 2018 Science X Network Skulls of early humans carry telltale signs of inbreeding, study says Citation: Anthropologist finds high number of developmental anomalies in Pleistocene people (2018, November 6) retrieved 18 August 2019 from https://phys.org/news/2018-11-anthropologist-high-developmental-anomalies-pleistocene.html
Author and civil servant Shubha Sarma’s debut book Fly on the Wall and Other Stories examines different facets of life’s narrative with detachment, precision and compassion. A reading session and discussion based on the book was recently organised at Oxford Bookstore also an engaging session was conducted in presence of Jawhar Sircar, chairman Prasar Bharti, M Asaduddin, Head of the English Department, Jamia Millia Islamia and Yashodhara Mishra, guest editor, Indian Literature. Also Read – ‘Playing Jojo was emotionally exhausting’The subjects in the book range from up-market, urban settings to the depths of rural Odisha and areas of civil strife and deep social unrest. The narrative strings together anxious housewives, over-imaginative teenagers and men and women in the sunset of their lives. Much based on the experience of Sarma’s services for more than a decade in the tribal districts of Odisha where she endeavoured to catalyze social change, empower women and address complex issues concerning left-wing extremism.? Also Read – Leslie doing new comedy special with NetflixCharacters in the book are from all walks of life, there is Dipankar, yearning for Assam and returning to discover that he is a stranger in his own land and the beautiful Uma, mysteriously killed and awaiting justice; there is Arun craving parental affection and Shikha, defying social mores. They are people one encounters everyday on the bus, the metro and at times, the mirror. Each story is uniquely crafted with an ingenuous sense of structural balance. As a whole, this assortment of tales with a twist brings to life the realities and contradiction of India and makes it an enchanting collection of highly readable short stories.
Guests can savour delectable and inviting creations such as macaroons, eclairs, muffins, croissants, Paris brest, tarts, mousse, cheesecakes amongst other popular desserts specially crafted by a team of patissiers. There is also a wide range of chocolates, pralines, cookies and cakes readily available or made to order. Island Bar presents the ‘Happy Hours’, offering Delhi’s most extensive selection of wines and spirits. The Bar also features a collection of single malt whiskeys, international cigars and array of non-alcoholic beverages and appetizers. For wine lovers, it offers an extensive selection of wines that are true to their origin. Also Read – ‘Playing Jojo was emotionally exhausting’Café Uno is the place to start the perfect Sunday with a delectable and exquisite brunch. The brunch features an international cheese counter, exotic seafood bar, sushi, antipasti platters, a freshly baked bread station, Indian and Western delicacies to choose from. The cooking theaters at Café Uno each featuring a different culinary style, are showcases for the best of international cuisines. Where: Shangri-La’s – Eros Hotel When: Throughout the month
‘It is suprising that Manjhi kept quiet on the alleged temple purification incident for months… he should have taken action against whosoever responsible for it immediately after,’ Modi told reporters on the sidelines of ‘Janata Durbar’ at his official residence here. More than chief minister’s silence, doubts have surfaced over authenticity of the incident with Manjhi and his Minister Ramlakhan Ram making contradictory statements, he said.Under the circumstances, it will be in the fitness of things that either the chief minister sack his ministerial colleague for countering his claim, Modi said.
The upcoming G-20 Heads of State meeting in Brisbane, Australia in mid-November is being convened when urgent policy actions from major economies, advanced and emerging, call for coordinated and focused approach to get the world economy out of the anemic recovery. Latest economic data from global financial institutions such as the World Bank, the IMF, OECD and the WTO do not inspire hope that economic growth can pick up pace and verve to allay the jittery nerves of policymakers, planners and political leaders who have a lot of stake in the faster and decisive recovery of the global economy. Also Read – Syrian army suspends ‘Aleppo fighting’There is a distinct lack of sustained demand to drive growth the world over that dodges every economy, though massive amounts of countercyclical steps in the form of injection of liquidity through monetary easing with attendant ultra low interest rates in rich countries and fiscal stimulus in emerging economies and tax concessions to stoke demand continue unabated for quite a long time since 2008 when the global financial crisis struck like a tsunami. Also Read – Alarming seismic activityIn fact, the G-20 was set up as a coordinated response by global community to the global financial crisis. That crisis underscored the inadequacies of the extant institutional arrangements such as the IMF, touted to be the lender of the last resort, when major financial crisis abruptly broke out in one major epicenter but spread its octopus-like tentacles to the rest of the universe through fast and fraught transmission effects. That is why post-crisis, leaders of G-20 including India at the highest level meet once a year regularly to take stock of the situation and evolve a coordinated policy response. So beginning in Washington in 2008, the G-20 conclave was held subsequently in London, Pittsburgh, Toronto, Seoul, Cannes(France), Los Cabos (Mexico) and St Petersburg every year and this year the G-20 leaders including India’s Prime Minister Mr. Narendra Modi will gather together for two days on November 15-16 in Brisbane, the capital city of picturesque Queensland, Australia. Canberra has already stated that building on the St. Petersburg summit, it is easier to structure leaders’ discussions around the key themes of promoting stronger economic growth and employment outcomes, making the global economy more resilient to deal with future shocks and to maintaining a tight focus on practical results that would lift growth, boost participation, create jobs and build resilience of the global economy. In preparing a ‘Brisbane Action Plan’, Australia has contended that these growth strategies would need to include ‘practical actions to improve productivity and competitiveness, strengthen investment in infrastructure, encourage trade, make it easier to do business and boost employment’. At September 2014 meeting of G-20 Finance Ministers and Central Bank Governors in Cairns in which India’s Minister of State for Finance Mrs. Nirmala Sitaraman and RBI Governor Dr. Raghuram G. Rajan took part as the Finance Minister Mr. Arun Jaitley was indisposed, the leaders discussed the agenda of the G-20 summit. The IMF and OECD reckoned that the new growth strategies of G-20 members collectively would deliver two per cent increase in global GDP over five years. This would imply $2 trillion to the global economy and millions of new jobs. The host has already made it amply clear that its priority for Brisbane Summit is to link development actions to growth, by creating the conditions for developing and emerging economies to attract infrastructure investment, by reinforcing tax systems and by improving access to financial services. Canberra promised that its Presidency of G-20 would make it a priority to complete financial reforms in four principal areas directly related to the causes of the crisis, viz., building the resilience of banks, helping prevent and managing the failure of globally important financial institutions, making derivative markets safer and improving oversight of the shadow banking sector. For India, this is a key issue as a member of the Financial Stability Board (FSB) with FSB members under the G-20 umbrella having committed to adopt the maintenance of financial stability. Hence it already sought IMF/World Bank to conduct their joint Financial Sector Assessment Programme (FSAP) a couple of years ago. The mission worked in concert with RBI, the Insurance Regulatory Authority of India (IRDA), the Stock Exchanges Board of India (SEBI) and the Ministry of Finance. One of the FSAP reports—Financial Stability Assessment Update—on India was published by IMF in 2013. In hailing the comprehensive review recognizing that the Indian banking system remained largely stable on account of tightly controlled regulatory and supervisory regime by RBI, the assessment found gaps and constraints in the implementation of regulatory and supervisory framework. It however hastened to note that RBI has been striving to address these gaps and even when the RBI lacks de jure independence, there has been no de facto interference from the government. But this is a refreshing and qualified plaudit from a neutral observer, though the country’s apex bank is now fighting a losing battle to keep its inflation-setting function unhampered from interference by the Finance Ministry!It was also agreed on measures to stabilize the global financial system by looking forward to the challenges and getting on with the job of implementing the priorities of the FSB. There have also been some major initiatives to be delivered on in relation to the base erosion, profit shifting and international tax. In sum, as the leaders of the world’s most powerful 20 economies gather in Brisbane when at the end Turkey will assume the next year’s Presidency, there would be seamless continuity ‘in delivering our goals, in relation to the FSB priorities, in relation to the growth target of 2 per cent, in relation to the taxation initiatives and in relation to infrastructure and closer partnerships with the private sector’, according to Mr. Hockey. In sum, as India’s Prime Minister Mr. Modi visits Down Under with a renewed remit to his growing popularity, the world awaits his interaction with global stalwarts in setting policy agenda and taking them up for implementation back home to crank up India’s economic growth, analysts say.
Kolkata: Kolkata Police has introduced “The Winners”- a special all-women patrolling team to combat and prevent incidents of molestation and eve-teasing in the city.This is the first time in the history of Kolkata Police that such a special team has been set up to ensure safety and security of women.The women police will be patrolling different parts of the city on scooters and they will reach a spot soon after receiving information of any untoward incident. The team of “The Winners” initiated their journey from Lalbazar in presence of Rajeev Kumar, Commissioner of Police and other senior police officers. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedAll the women police personnel had received their training for the past three months in the Police Training School (PTS). Most importantly, all the women police personnel will be having body-cams like traffic sergeants.The women police will be deployed at different parts of the city. They will be maintaining vigil while patrolling different areas. It will make the “public places safer for women”.The women police will be patrolling on scooters at different locations in different parts of the city. Patrolling in areas including Park Street, Esplanade, Rabindra Sadan crossing, Elgin Road, Gariahat, Shyambazar, Ultadanga and areas around Victoria Memorial Hall, will be carried out on a regular basis. Also Read – Naihati: 10 councillors return to TMC from BJPIt may be mentioned that the police have already taken several steps to check incidents of sexual harassment on women. Now, with introduction of “The Winners”, the rate of such incidents will go down further. The women police have been trained in such a way that they are capable of taking prompt action to save a woman from becoming a victim of sexual harassment. In case there is need of any more manpower to tackle a situation, the women police will be contacting the concerned police officers and subsequent steps will be taken.Earlier, it was found that women had to approach traffic sergeants and constables for any kind of help. Now, with introduction of “The Winners”, they can approach an on-duty woman officer and at the same time, will feel comfortable in sharing their problems.It may be recalled that during the training of women police personnel at Police Training School, Kumar had given necessary advice to ensure that they get prepared properly.
Kolkata: Some MBBS students at the Calcutta Medical College and Hospital (CMCH) continued their demonstration for the fifth consecutive day, with the demand of a new hostel.The CMCH authorities on Friday categorically mentioned that they will not be able to fulfill the demands of the agitating students. Some of the representatives of the medical students taking part in the agitation met the principal of CMCH and held a prolonged discussion in this regard. Also Read – Speeding Jaguar crashes into Merc, 2 B’deshi bystanders killedIt has been learnt that senior officials of the CMCH had urged the students to lift the agitation which they turned down. According to the students, the agitation will be continued till the demands are met.The incident, however, had no impact on the health services of the hospital. It may be mentioned that a section of medical students at CMCH continued their demonstration so that their various demands are met, including setting up of a new hostel. Also Read – Naihati: 10 councillors return to TMC from BJPThe second, third and fourth year MBBS students of CMCH started a protest agitation inside the hospital campus, demanding a new hostel for them.The move was made after the first year MBBS students were given a new hostel by the CMCH authorities.The students taking part in the agitation alleged that the hostel meant for them is not in a good condition. The hostel rooms are not up to the mark. The students had also submitted a deputation to the CMCH principal on Tuesday, placing their various demands. These students have alleged that the hostel rooms are unhygienic and one cannot stay there for too long. The matter was taken up with the CMCH authorities but they are yet to take any step in this regard.They also said that first year students have got a new hostel, while the second, third and fourth year MBBS students have been deprived.CMCH principal Uchhal Bhadra urged the agitating students to stop the demonstration, which they refused to do. The students also threatened to continue the agitation until anew hostel is being allotted to them.
“Our study found that when you sit for six straight hours, or the majority of an eight-hour work day, blood flow to your legs is greatly reduced,” said lead author of the study Jaume Padilla, assistant professor of nutrition and exercise physiology at University of Missouri School of Medicine in the US.“We also found that just 10 minutes of walking after sitting for an extended time reversed the detrimental consequences,” Padilla noted.During the study, the researchers compared the vascular function of 11 healthy young men before and after a period of prolonged sitting. The findings indicated that blood flow in the popliteal —an artery in the lower leg—was greatly reduced after sitting at a desk for six hours. The findings appeared in the journal Experimental Physiology.