Tsunami hit Indian coast 1,000 yrs back: Study

October 1, 2014

New Delhi, Oct 1: Looking for data on past tsunamis for a better understanding of the natural phenomenon, a team of researchers has come upon evidence which suggests that the Indian coast was hit by a sea surge some 1,000 years back, before the tsunami of 2004 which caused massive destruction in the country.

TsunamiThe team from the Centre for Earth Sciences (CEaS) at the Indian Institute of Science (IISc) made its finding while pursuing studies in tsunami geology.

The team undertook search at different sites, including the Andaman group of islands (Hut Bay, Port Blair, Interview Island and East Island) and Kaveripattinam on the Indian east coast to collect evidence and study how the geomorphic settings of these locations make them useful archives for paleo-tsunami deposits.

Coastal strips affected by regular sea surges and by anthropogenic, or human, activities are unlikely to preserve tsunami sands whereas inland lakes and streams have a greater potential of preserving these records.

Due to their greater inland penetration, tsunami deposits tend to occupy higher elevations (>5m) as compared to storm deposits, which typically are at heights of less than 4m.

Researchers found that locally-extensive occurrence of deposits such as sand, gravel and boulders, and their typically upward and inland presence are the two important characteristics of tsunami deposits.

The research, which was published early this month in the Journal of Asian Earth Science, presents the results of studies along these coastal tracts, described as "sheltered environments", which show a higher likelihood of preserving such deposits.

The 2004 tsunami was a devastating and unprecedented experience for the Indian Ocean countries. In the absence of any known tsunami during recent or historic periods, one has to depend on geological records.

Such data is very critical towards evaluating tsunami hazards and tsunami geology is an important and fast-growing research area.

"We need to develop strategies to succeed in tsunami geology research in tropical countries with very active coastal regions that barely preserve anything beyond a few years at the most.

"Identification of potential locations is key to developing paleo-tsunami archives for tsunami hazard and recurrence studies," Gubbi Labs said quoting Kusala Rajendran, one of the authors of the paper and an Associate Professor at CEaS.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

Twitter has joined efforts to do away with racially loaded terms such as master, slave and blacklist from its coding language in the wake of the death of African-American George Floyd and ensuing Black Lives Matter protests.

The project started even before the current movement for racial justice escalated following the death of 46-year-old George Floyd in police custody in May.

The use of terms such as "master" and "slave" in programming language originated decades ago. While "master" is used to refer to the primary version of a code, "slave" refers to the replicas. Similarly, the term "Blacklist" is used to refer to items which are meant to be automatically denied.

The efforts to change these terms in favour of more inclusive language at Twitter were initiated by Regynald Augustin and Kevin Oliver and the microblogging platform is now backing their efforts.

"Inclusive language plays a critical role in fostering an environment where everyone belongs. At Twitter, the language we have been using in our code does not reflect our values as a company or represent the people we serve. We want to change that. #WordsMatter," Twitter's engineering team said in a post on Thursday.

As per the recommendations from the team, the term "whitelist" could be replaced by "allowlist" and "blacklist" by "denylist".

Similarly, "master/slave" could be replaced by "leader/follower", "primary/replica" or "primary/standby".

Twitter, however, is not the first to start a project to bring inclusivity in programming language.

According to a report in CNET, the team behind the Drupal online publishing software started using "primary/replica" in place of "master/slave" as early as in 2014.

The use of the terms "master/slave" was also dropped by developers of the Python programming language in 2018.

Now similar efforts are underway at Microsoft's Github and LinkedIn divisions as well, said the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
April 28,2020

Los Angeles, Apr 28: People who experience loss of smell as one of the COVID-19 symptoms are likely to have a mild to moderate clinical course of the disease, according to a study which may help health care providers determine which patients require hospitalisation.

The findings, published in the journal International Forum of Allergy & Rhinology, follows an earlier study that validated the loss of smell and taste as indicators of infection with the novel coronavirus, SARS-CoV-2.

According to the scientists from the University of California (UC) San Diego Health in the US, patients who reported loss of smell were 10 times less likely to be hospitalised for COVID-19 compared to those without the symptom.

"One of the immediate challenges for health care providers is to determine how to best treat persons infected by the novel coronavirus," said Carol Yan, first author of the current study and rhinologist from the UC San Diego Health.

"If they display no or mild symptoms, can they return home to self-quarantine or will they likely require hospitalisation? These are crucial questions for hospitals trying to efficiently and effectively allocate finite medical resources," Yan said.

The findings, according to the researchers, suggest that loss of smell may be predictive of a milder clinical course of COVID-19.

"What's notable in the new findings is that it appears that loss of smell may be a predictor that a SARS-CoV-2 infection will not be as severe, and less likely to require hospitalisation," Yan said.

"If an infected person loses that sense, it seems more likely they will experience milder symptoms, barring other underlying risk factors," she added.

Risk factors for COVID-19 previously reported by other studies include age, and underlying medical conditions, such as chronic lung disease, serious heart conditions, diabetes, and obesity.

In the current study, the scientists made a retrospective analysis between March 3 and April 8 including 169 patients who tested positive for COVID-19 at UC San Diego Health.

They assessed olfactory and gustatory data for 128 of the 169 patients, 26 of whom required hospitalisation.

According to the researchers, patients who were hospitalised for COVID-19 treatment were significantly less likely to report anosmia or loss of smell -- 26.9 per cent compared to 66.7 per cent for COVID-19-infected persons treated as outpatients.

Similar percentages were found for loss of taste, known as dysgeusia, they said.

"Patients who reported loss of smell were 10 times less likely to be admitted for COVID-19 compared to those without loss of smell," said study co-author Adam S. DeConde.

"Moreover, anosmia was not associated with any other measures typically related to the decision to admit, suggesting that it's truly an independent factor and may serve as a marker for milder manifestations of Covid-19," DeConde said.

The researchers suspect that the findings hint at some of the physiological characteristics of the infection.

"The site and dosage of the initial viral burden, along with the effectiveness of the host immune response, are all potentially important variables in determining the spread of the virus within a person and, ultimately, the clinical course of the infection," DeConde said.

If the SARS-CoV-2 virus initially concentrates in the nose and upper airway, where it impacts olfactory function, that may result in an infection that is less severe and sudden in onset, decreasing the risk of overwhelming the host immune response, respiratory failure, and hospitalisation, the scientists added.

"This is a hypothesis, but it's also similar to the concept underlying live vaccinations," DeConde explained.

"At low dosage and at a distant site of inoculation, the host can generate an immune response without severe infection," he added.

Loss of smell, according to the study, might also indicate a robust immune response which has been localised to the nasal passages, limiting effects elsewhere in the body.

Citing the limitations of the study, the scientists said they relied upon self-reporting of anosmia from participants, which posed a greater chance of recall bias among patients once they had been diagnosed with COVID-19.

They added that patients with more severe respiratory disease requiring hospitalisation may not be as likely to recognise or recall the loss of smell.

So the researchers said more expansive studies are needed for validating the results.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 10,2020

Indian enterprises were flooded with a whopping 14.6 crore malware threats in 2019 - a growth of 48 per cent (year-on-year) compared to 2018, a new report said on Friday.

Manufacturing, BFSI (banking, financial services and insurance), education, healthcare, IT/ITES, and the government were the most at-risk industries in the country, said the report from Seqrite, the enterprise arm of Pune-based IT security firm Quick Heal Technologies.

Interestingly, almost a quarter (23 per cent) of the threats were identified through 'Signatureless behaviour-based' detection by Seqrite, indicating how a growing number of cybercriminals were deploying new or previously unknown threat vectors to compromise enterprise security.

"With the latest Seqrite annual threat report, we want to empower CIOs, CISOs, business leaders and all key public stakeholders with the insights they need to combat the growing complexity of the threat landscape," said Sanjay Katkar, Joint Managing Director and CTO, Quick Heal Technologies.

The most prominent trend was the drastic increase in the volume, intensity, and sophistication of cyber-attack campaigns targeting Indian enterprises in 2019.

The rapid integration of IoT devices, BYOD (bring your own device), and third-party APIs into enterprise networks has created newer security vulnerabilities that might go unnoticed until a major breach occurs.

Threat researchers at Seqrite observed several large-scale advanced persistent threats (APT) attacks deployed against organisations in the government sector.

"The entry of nation-states and organised cybercrime cells into the fray is expected to add more complication to this situation and will require Indian government bodies and corporate enterprises to shore up their cyber defence strategies in 2020 and beyond," the report noted.

More alarming, however, was the continued lack of security awareness amongst enterprises and government organisations.

"Unsecured Remote Desktop Protocol (RDP) and Server Message Block (SMB) protocols continued to be targeted through brute-force attacks," said the report.

Spear phishing attack campaigns leveraging Office exploits and infected macros were also used extensively by cybercriminals to gain access to enterprise networks and steal critical data.

"India's digital journey depends on ensuring robust cybersecurity for all stakeholders within the enterprise ecosystem," said Katkar.

The sharp spike should be a cause of concern for CIOs and CISOs in the country, especially given the growing digital penetration within their enterprise networks.

"With network vulnerabilities and potential entry points increasing at a rapid pace, threat actors are expected to leverage artificial intelligence (AI) capabilities to power their malware campaigns in the future to capitalise on newer attack vectors," the report added.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.