Comprehensive ICU Protocol for Sedation, Analgesia, and Delirium Control by Dr. Vinod Srivastava
This comprehensive ICU protocol by Dr. Vinod Srivastava, an Associate Professor in Anaesthesiology & Critical Care at KGMU, covers key aspects such as sedation, analgesia, delirium assessment and control, stress ulcer and deep vein thrombosis prophylaxis, and glycaemic control in the ICU setting. Th
1 views • 50 slides
Mini-Batch Gradient Descent in Neural Networks
In this lecture by Geoffrey Hinton, Nitish Srivastava, and Kevin Swersky, an overview of mini-batch gradient descent is provided. The discussion includes the error surfaces for linear neurons, convergence speed in quadratic bowls, challenges with learning rates, comparison with stochastic gradient d
0 views • 31 slides
Inadequate Tap Water Supply in Defence Colony, Bagdogra: Letter to Editor
Residents of Defence Colony, Bagdogra face severe issues due to inadequate and poor quality tap water supply. The writer, Saurabh Srivastava, expresses concern in a formal letter to the Editor of The Siliguri Times, highlighting the health risks and urging authorities to address the situation prompt
0 views • 12 slides
Stabilizing Carrier-Envelope Phase in AMO Physics Research
Exploring the stabilization of carrier-envelope phase in Atomic, Molecular, and Optical (AMO) physics research at Kansas State University's Light Source facility. Mentored by Dr. Vinod Kumarappan, the project delves into mode-locked lasers, offset frequencies, and the intricate setup of f-to-2f arra
0 views • 14 slides
Embracing Failure and Unconventional Wisdom
Challenging conventional beliefs, Vinod Khosla encourages embracing failure as a pathway to success. His insights urge individuals to defy norms, challenge authority, and explore beyond boundaries. Through thought-provoking scenarios and unconventional advice, Khosla advocates for risk-taking, irrev
0 views • 55 slides
Understanding Fully Homomorphic Encryption in Information Security
Delve into the world of fully homomorphic encryption (FHE) with insights from Eran Tromer and Vinod Vaikuntanathan. Explore the implications of FHE on data confidentiality and delegation of computations without revealing sensitive information. Discover its applications in private search and cloud co
0 views • 42 slides
Unveiling the Aadhaar Security Breach Incident
Abhinav Srivastava, an IIT Kharagpur graduate, developed an Android app that exposed a serious security vulnerability in the Aadhaar system. The app utilized a publicly available API lacking encryption and validation measures, leading to unauthorized access to Aadhaar data. Despite intentions to com
0 views • 11 slides
Understanding Memory Snapshotting by Vinod Ganapathy
Explore the concept of memory snapshotting through images and insights shared by Vinod Ganapathy at the EECS Symposium. Delve into topics like malware detection, the layer-below principle, and the risks of OS infections due to exploits and social engineering attacks.
0 views • 42 slides