-
Research Article
Access and Usage of Information Resources and Digital Tools by Competitive Exam Aspirants in Mangalore University Library
Issue:
Volume 10, Issue 1, March 2026
Pages:
1-7
Received:
16 October 2025
Accepted:
29 October 2025
Published:
7 January 2026
Abstract: This study examines the access and utilization of information resources and digital tools by students preparing for competitive examinations at Mangalore University Library. Using questionnaires, informal interviews, and observations, data were collected from 125 respondents preparing for exams such as UPSC, KPSC, NET/SET, KSP, IBPS, KEA, SSC, and various banking tests. The findings reveal a growing reliance on digital platforms such as Unacademy, BYJU’S, Testbook, and Oliveboard for courses and mock tests, despite limited awareness and training in using these resources effectively. While most still prefer printed materials, there is a noticeable shift toward online platforms, particularly for mock testing and current affairs preparation. The majority of respondents were female (56%) and postgraduate students (51.2%), with Science students forming the largest disciplinary group (50.4%). GK Today and Affairs Cloud emerged as the most preferred online sources, whereas the university library and coaching centers were the leading physical resources for preparation. Books remain the dominant learning medium (37.5%), followed by electronic resources (24.17%). The study highlights the need for improved digital infrastructure, dedicated library sections for competitive exam preparation, and user orientation programs to enhance awareness and effective use of available resources. It emphasizes the necessity for academic libraries to adapt to evolving student needs by integrating print and digital support systems for competitive exam aspirants.
Abstract: This study examines the access and utilization of information resources and digital tools by students preparing for competitive examinations at Mangalore University Library. Using questionnaires, informal interviews, and observations, data were collected from 125 respondents preparing for exams such as UPSC, KPSC, NET/SET, KSP, IBPS, KEA, SSC, and ...
Show More
-
Methodology Article
Phase Mask Modeling for Improved Fiber Bragg Grating Efficiency in Optical Fibers
Randriana Heritiana Nambinina Erica*
,
Ando Nirina Andriamanalina
Issue:
Volume 10, Issue 1, March 2026
Pages:
8-14
Received:
15 December 2025
Accepted:
25 December 2025
Published:
19 January 2026
Abstract: The continuously increasing demand for higher data transmission rates in modern telecommunication systems is pushing existing optical filtering and dispersion management technologies to their fundamental limits. Among these technologies, fiber Bragg gratings (FBGs) have emerged as key components due to their compact size, wavelength selectivity, and compatibility with optical fiber infrastructures. However, the performance of conventional FBGs is often constrained by intrinsic limitations such as group delay ripples, limited bandwidth control, and non-ideal spectral responses, which become increasingly critical at high data rates. The present work focuses on the mathematical modeling and optimization of phase masks to improve the performance of fiber Bragg gratings. The first stage of this study is devoted to enhancing the planar Bragg grating configuration. Subsequently, a comprehensive analysis is carried out to identify and evaluate the parameters that govern the optical behavior of phase masks and, by extension, the resulting fiber Bragg gratings. Four key parameters are systematically investigated in this study. The first parameter is the grating length L, which plays a crucial role in determining the reflectivity, bandwidth, and spectral selectivity of the grating. The second parameter is the refractive index modulation Δn between the exposed and unexposed regions of the fiber core, which directly influences the coupling strength and overall efficiency of the grating. The third set of parameters concerns the group delay and bandwidth characteristics of chirped fiber Bragg gratings, which are particularly important for dispersion compensation and signal integrity in high-speed optical communication systems. Finally, the effect of various apodization functions is examined, as apodization is known to significantly reduce sidelobes and improve spectral smoothness. A detailed and systematic investigation of these parameters demonstrates that appropriate optimization can lead to a substantial reduction, and in some cases complete suppression, of group delay ripples. The elimination of these oscillations is a critical requirement for achieving high-fidelity signal transmission and minimizing distortion in optical communication links. The results show that the performance of phase masks and the resulting fiber gratings depends on the combined effects of structural and optical parameters. Optimizing these parameters together is essential to obtain high diffraction efficiency, good spectral quality, and stable grating inscription. The proposed approach provides practical design guidelines for developing high-performance grating-based components for next-generation optical communication systems.
Abstract: The continuously increasing demand for higher data transmission rates in modern telecommunication systems is pushing existing optical filtering and dispersion management technologies to their fundamental limits. Among these technologies, fiber Bragg gratings (FBGs) have emerged as key components due to their compact size, wavelength selectivity, an...
Show More
-
Research Article
A Novel Approach to Constructing Certain Classes of Quasi-Cyclic Codes
Akram Saleh*
,
Mohammad Reza Soleymani
Issue:
Volume 10, Issue 1, March 2026
Pages:
15-24
Received:
15 December 2025
Accepted:
26 December 2025
Published:
20 January 2026
Abstract: This paper investigates a construction algorithm for two specific families of quasi-cyclic codes defined over a finite commutative chain ring. First, by employing the Generalized Discrete Fourier Transform, we develop an efficient and systematic algorithm for constructing the generator matrix of repeated-root quasi-cyclic codes under specific structural constraints on the code length and the underlying ring. The proposed method avoids the need for exhaustive enumeration of constituent subcodes and instead operates directly on their generator matrices, leading to improved computational performance. Building on this result, using the Discrete Fourier Transform, we further specialize the proposed framework to derive an algorithm for obtaining the generator matrix of a particular class of simple-root quasi-cyclic codes over a restricted and well-defined category of rings. This specialization demonstrates the performance of the proposed approach and highlights its applicability to different quasi-cyclic code structures in a unified algebraic setting. The proposed construction methods offer significant improvements in computational efficiency when compared to existing approaches that rely on code construction techniques based on constituent subcodes. To evaluate the practical benefits of the proposed algorithms, we present a detailed performance comparison in terms of encoding time per iteration and memory consumption. The comparative results, illustrated through histograms, clearly indicate that the proposed methods achieve faster encoding, lower memory usage, highlighting their superior performance compared to conventional construction techniques as the code length increases.
Abstract: This paper investigates a construction algorithm for two specific families of quasi-cyclic codes defined over a finite commutative chain ring. First, by employing the Generalized Discrete Fourier Transform, we develop an efficient and systematic algorithm for constructing the generator matrix of repeated-root quasi-cyclic codes under specific struc...
Show More
-
Research Article
The "Airlock" and the "Fortress": A Strategic Blueprint for Secure Large Language Model Adoption in National Defence Contexts
Partha Majumdar*
Issue:
Volume 10, Issue 1, March 2026
Pages:
25-34
Received:
18 December 2025
Accepted:
30 December 2025
Published:
20 January 2026
Abstract: This report outlines a strategic blueprint for the secure adoption of Large Language Models (LLMs) within national defence contexts, addressing the trilemma of needing state-of-the-art AI, prohibiting the exposure of sensitive data, and the prohibitive cost of building a sovereign foundation model. It rejects a monolithic "one-size-fits-all" approach as strategically flawed, proposing instead a Tiered Hybrid AI Architecture that aligns deployment models with existing military data classification hierarchies. This framework is built upon three concurrent solutions. First, the "Secure Enclave" leverages government-grade cloud platforms like Azure OpenAI for Government, enabling the use of powerful proprietary models over private, isolated networks with contractual guarantees that data is never exposed or used for training, making it suitable for confidential and secret information. Second, for top-secret data requiring absolute sovereignty, the "Private Fortress" model involves deploying high-performance, pre-trained open-source models (e.g., Llama 3) on-premise in fully air-gapped environments. This provides maximum security while being significantly more feasible than building a model from scratch. Finally, the "Intelligent Airlock," an application-layer proxy, filters, redacts, and sanitises prompts and responses to prevent data leakage and malicious inputs. It serves as a primary control for low-risk data and as a crucial defence-in-depth component for the other two tiers. By integrating these solutions, this tiered strategy offers a pragmatic, secure, and financially viable roadmap for defence organisations to harness the transformative power of LLMs while upholding the non-negotiable mandate of data secrecy.
Abstract: This report outlines a strategic blueprint for the secure adoption of Large Language Models (LLMs) within national defence contexts, addressing the trilemma of needing state-of-the-art AI, prohibiting the exposure of sensitive data, and the prohibitive cost of building a sovereign foundation model. It rejects a monolithic "one-size-fits-all" approa...
Show More