24,726 research outputs found

    Bivalirudin versus unfractionated heparin: a meta-analysis of patients receiving percutaneous coronary intervention for acute coronary syndromes

    Get PDF
    OBJECTIVE: Acute coronary syndrome (ACS) encompasses ST segment elevation myocardial infarction (STEMI), with generally high thrombus burden and non-ST segment elevation ACS (NSTE-ACS), with lower thrombus burden. In the setting of percutaneous coronary intervention (PCI) for ACS, bivalirudin appears superior to unfractionated heparin (UFH), driven by reduced major bleeding. Recent trials suggest that the benefit of bivalirudin may be reduced with use of transradial access and evolution in antiplatelet therapy. Moreover, a differential role of bivalirudin in ACS cohorts is unknown. METHODS: A meta-analysis of randomised trials comparing bivalirudin and UFH in patients with ACS receiving PCI, with separate analyses in STEMI and NSTE-ACS groups. Overall estimates of treatment effect were calculated with random-effects model. RESULTS: In 5 trials of STEMI (10 358 patients), bivalirudin increased the risk of acute stent thrombosis (ST) (OR 3.62; CI 1.95 to 6.74; p<0.0001) compared with UFH. Bivalirudin reduced the risk of major bleeding only when compared with UFH plus planned glycoprotein IIb/IIIa inhibitors (GPI) (OR 0.49; CI 0.36 to 0.67; p<0.00001). In 14 NSTE-ACS trials (25 238 patients), there was no difference between bivalirudin and UFH in death, myocardial infarction or ST. However, bivalirudin reduced the risk of major bleeding compared with UFH plus planned GPI (OR 0.52; CI 0.43 to 0.62; p<0.00001), or UFH plus provisional GPI (OR 0.68; CI 0.46 to 1.01; p=0.05). The reduction in major bleeding with bivalirudin was not related to vascular access site. CONCLUSIONS: Bivalirudin increases the risk of acute ST in STEMI, but may confer an advantage over UFH in NSTE-ACS while undergoing PCI, reducing major bleeding without an increase in ST

    Individual and Domain Adaptation in Sentence Planning for Dialogue

    Full text link
    One of the biggest challenges in the development and deployment of spoken dialogue systems is the design of the spoken language generation module. This challenge arises from the need for the generator to adapt to many features of the dialogue domain, user population, and dialogue context. A promising approach is trainable generation, which uses general-purpose linguistic knowledge that is automatically adapted to the features of interest, such as the application domain, individual user, or user group. In this paper we present and evaluate a trainable sentence planner for providing restaurant information in the MATCH dialogue system. We show that trainable sentence planning can produce complex information presentations whose quality is comparable to the output of a template-based generator tuned to this domain. We also show that our method easily supports adapting the sentence planner to individuals, and that the individualized sentence planners generally perform better than models trained and tested on a population of individuals. Previous work has documented and utilized individual preferences for content selection, but to our knowledge, these results provide the first demonstration of individual preferences for sentence planning operations, affecting the content order, discourse structure and sentence structure of system responses. Finally, we evaluate the contribution of different feature sets, and show that, in our application, n-gram features often do as well as features based on higher-level linguistic representations

    CP-violating Supersymmetric Higgs at the Tevatron and LHC

    Full text link
    We analyze the prospect for observing the intermediate neutral Higgs boson (h2h_2) in its decay to two lighter Higgs bosons (h1h_1) at the presently operating hadron colliders in the framework of the CP violating MSSM using the PYTHIA event generator. We consider the lepton+ 4-jets+ \met channel from associate Wh2W h_2 production, with W h_2 \ra W h_1 h_1 \ra \ell \nu_\ell b \bar b b\bar b. We require two, three or four tagged bb-jets. We explicitly consider all relevant Standard Model backgrounds, treating cc-jets separately from light flavor and gluon jets and allowing for mistagging. We find that it is very hard to observe this signature at the Tevatron, even with 20 fb−1^{-1} of data, in the LEP--allowed region of parameter space due to the small signal efficiency, even though the background is manageable. At the LHC, a priori huge SM backgrounds can be suppressed by applying judiciously chosen kinematical selections. After all cuts, we are left with a signal cross section of around 0.5 fb, and a signal to background ratio between 1.2 and 2.9. According to our analysis this Higgs signal should be viable at the LHC in the vicinity of present LEP exclusion once 20 to 50 fb−1^{-1} of data have been accumulated at s=14\sqrt{s}=14 TeV.Comment: 27 pages, 12 figure

    Enhancement of magnetoresistance in manganite multilayers

    Get PDF
    Magnanite multilayers have been fabricated using La0.67Ca0.33MnO3 as the ferromagnetic layer and Pr0.7Ca0.3MnO3 and Nd0.5Ca0.5MnO3 as the spacer layers. All the multilayers were grown on LaAlO3 (100) by pulse laser deposition. An enhanced magnetoresistnace (defined (RH- R0)/R0) of more than 98% is observed in these multilayers. Also a low field magnetoresistance of 41% at 5000 Oe is observed in these multilayer films. The enhanced MR is attributed to the induced double exchange in the spacer layer, which is giving rise to more number of conducting carriers. This is compared by replacing the spacer layer with LaMnO3 where Mn exists only in 3+ state and no enhancement is observed in the La0.67Ca0.33MnO3 / LaMnO3 multilayers as double exchange mechanism can not be induced by external magnetic fields.Comment: 13 pages, 5 Figure

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots

    Elasticity-mediated self-organization and colloidal interactions of solid spheres with tangential anchoring in a nematic liquid crystal

    Full text link
    Using laser tweezers and fluorescence confocal polarizing microscopy, we study colloidal interactions of solid microspheres in the nematic bulk caused by elastic distortions around the particles with strong tangential surface anchoring. The particles aggregate into chains directed at about 30 degrees to the far field director and, at higher concentrations, form complex kinetically trapped structures. We characterize the distance and angular dependencies of the colloidal interaction forces.Comment: 6 pages, 5 figure
    • …
    corecore