12,401 research outputs found
Suppressive Therapy In The Control Of Bilharziasis: A Comparative Trial In African School Children
A CAJM article on the control of bilharzia-sis in Zimbabwean (Rhodesian) African children.One of the major problems facing the health service in any country which has a high prevalence of bilharziasis is the shortage of medical personnel required for the successful treatment of the large numbers of people who show infection. However, if a totally safe regime involving the administration of relatively innocuous drug at low dosages over long periods of time to control or suppress the level of infection in the person, the administration of the drug could then be left to the teachers or to other responsible members of the community. It is in this context that the policy of suppressive therapy or management of schistosome infections shows its greatest attraction
Universal dynamical decoupling of a single solid-state spin from a spin bath
Controlling the interaction of a single quantum system with its environment
is a fundamental challenge in quantum science and technology. We dramatically
suppress the coupling of a single spin in diamond with the surrounding spin
bath by using double-axis dynamical decoupling. The coherence is preserved for
arbitrary quantum states, as verified by quantum process tomography. The
resulting coherence time enhancement is found to follow a general scaling with
the number of decoupling pulses. No limit is observed for the decoupling action
up to 136 pulses, for which the coherence time is enhanced more than 25 times
compared to spin echo. These results uncover a new regime for experimental
quantum science and allow to overcome a major hurdle for implementing quantum
information protocols.Comment: submitted 24 May 2010; published online 9 September 201
The relationship between acquired resistance and transmission of Schistosoma Weinland, 1858, in man and its influences on the prevalence of S Capense (Harley, 1864) and S Mansoni Sambon, 1907, in Southern Rhodesia
Bilharziasis ranks with Tuberculosis and Malaria as the three most important endemic diseases of man in Rhodesia. The prominence given to bilharziasis in the endemic diseases pattern arises from its high prevalence, particularly in the African population. It is probable that bilharziasis was endemic in the country even prior to the arrival in the conntry of the European settlers in 1890, but it was not until Orpen (1915) described the results of a small survey that local infections were proven. He reported 182 (31 percent) urinary infections in 592 African prisoners examined in the Salisbury gaol. In the ensuing 15 years there was only scanty evidence of the prevalence of the disease. However, in the decade 1931 to 1940 the Annual Public Health Reports of Southern Rhodesia indicated increasing prevalence, and this stimulated interest in the problem and led to the establishment in 1939 of a specialised laboratory to study the parasites causing the disease. The unpublished records of this laboratory indicate that in more recent years the disease has increased not only in prevalence but also in its intensity in infected individuals. Surveys show that the urinary form of the disease is more widespread than the intestinal form. Both forms are becoming more prevalent but the rapid increase of the latter, considered by most authorities to be the more severe, indicates that a greater importance must be accorded to it in the future. Introduction, p. 1
Constraining the Randall-Sundrum modulus in the light of recent PVLAS data
Recent PVLAS data put stringent constraints on the measurement of
birefringence and dichroism of electromagnetic waves travelling in a constant
and homogeneous magnetic field. There have been theoretical predictions in
favour of such phenomena when appropriate axion-electromagnetic coupling is
assumed. Origin of such a coupling can be traced in a low energy string action
from the requirement of quantum consistency. The resulting couplings in such
models are an artifact of the compactification of the extra dimensions present
inevitably in a string scenario. The moduli parameters which encode the compact
manifold therefore play a crucial role in determining the axion-photon
coupling. In this work we examine the possible bounds on the value of compact
modulus that emerge from the experimental limits on the coupling obtained from
the PVLAS data. In particular we focus into the Randall-Sundrum (RS) type of
warped geometry model whose modulus parameter is already restricted from the
requirement of the resolution of gauge hierarchy problem in connection with the
mass of the Higgs. We explore the bound on the modulus for a wide range of the
axion mass for both the birefringence and the dichroism data in PVLAS. We show
that the proposed value of the modulus in the RS scenario can only be
accommodated for axion mass \gsim 0.3 eV.Comment: 26 pages, 1 figure, LaTex; added references, typos corrected. Minor
changes in the text, a comment added in the Conclusio
Prediction of cognitive outcome based on the progression of auditory discrimination during coma.
To date, no clinical test is able to predict cognitive and functional outcome of cardiac arrest survivors. Improvement of auditory discrimination in acute coma indicates survival with high specificity. Whether the degree of this improvement is indicative of recovery remains unknown. Here we investigated if progression of auditory discrimination can predict cognitive and functional outcome.
We prospectively recorded electroencephalography responses to auditory stimuli of post-anoxic comatose patients on the first and second day after admission. For each recording, auditory discrimination was quantified and its evolution over the two recordings was used to classify survivors as "predicted" when it increased vs. "other" if not. Cognitive functions were tested on awakening and functional outcome was assessed at 3 months using the Cerebral Performance Categories (CPC) scale.
Thirty-two patients were included, 14 "predicted survivors" and 18 "other survivors". "Predicted survivors" were more likely to recover basic cognitive functions shortly after awakening (ability to follow a standardized neuropsychological battery: 86% vs. 44%; p=0.03 (Fisher)) and to show a very good functional outcome at 3 months (CPC 1: 86% vs. 33%; p=0.004 (Fisher)). Moreover, progression of auditory discrimination during coma was strongly correlated with cognitive performance on awakening (phonemic verbal fluency: rs=0.48; p=0.009 (Spearman)).
Progression of auditory discrimination during coma provides early indication of future recovery of cognitive functions. The degree of improvement is informative of the degree of functional impairment. If confirmed in a larger cohort, this test would be the first to predict detailed outcome at the single-patient level
A Short Counterexample Property for Safety and Liveness Verification of Fault-tolerant Distributed Algorithms
Distributed algorithms have many mission-critical applications ranging from
embedded systems and replicated databases to cloud computing. Due to
asynchronous communication, process faults, or network failures, these
algorithms are difficult to design and verify. Many algorithms achieve fault
tolerance by using threshold guards that, for instance, ensure that a process
waits until it has received an acknowledgment from a majority of its peers.
Consequently, domain-specific languages for fault-tolerant distributed systems
offer language support for threshold guards.
We introduce an automated method for model checking of safety and liveness of
threshold-guarded distributed algorithms in systems where the number of
processes and the fraction of faulty processes are parameters. Our method is
based on a short counterexample property: if a distributed algorithm violates a
temporal specification (in a fragment of LTL), then there is a counterexample
whose length is bounded and independent of the parameters. We prove this
property by (i) characterizing executions depending on the structure of the
temporal formula, and (ii) using commutativity of transitions to accelerate and
shorten executions. We extended the ByMC toolset (Byzantine Model Checker) with
our technique, and verified liveness and safety of 10 prominent fault-tolerant
distributed algorithms, most of which were out of reach for existing
techniques.Comment: 16 pages, 11 pages appendi
Recommended from our members
Interoperable End-to-End Remote Patient Monitoring Platform based on IEEE 11073 PHD and ZigBee Health Care Profile
This paper describes the implementation of an end-to-end remote monitoring platform based on the IEEE 11073 standards for Personal Health Devices (PHD). It provides an overview of the concepts and approaches and describes how the standard has been optimized for small devices with limited resources of processor, memory and power and that use short range wireless technology. It explains aspects of IEEE 11073, including the Domain Information Model, state model and nomenclature, and how these support its plug-and-play architecture. It shows how these aspects underpin a much larger eco-system of interoperable devices and systems that include IHE PCD-01, HL7 and BlueTooth LE medical devices, and the relationship to the Continua Guidelines, advocating the adoption of data standards and nomenclature to support semantic interoperability between health and ambient assisted living (AAL) in future platforms. The paper further describes the adaptions that have been made in order to implement the standard on the ZigBee Health Care Profile and the experiences of implementing an end-to-end platform that has been deployed to frail elderly patients with chronic disease(s) and patients with diabetes.This family of standards is the result of the work of the IEEE Personal Health Devices (PHD) working group and the author acknowledges the contribution of each of the members of the group towards the standards.
The Hydra project was funded by the Technology Strategy Board (TSB) and EPSRC, UK.
The inCasa project was funded by the European Commission.
The Reaction project was funded by the European Commission
Transcriptional Interference Regulates the Evolutionary Development of Speech
The human capacity to speak is fundamental to our advanced intellectual, technological and social development. Yet so very little is known regarding the evolutionary genetics of speech or its relationship with the broader aspects of evolutionary development in primates. In this study, we describe a large family with evolutionary retrograde development of the larynx and wrist. The family presented with severe speech impairment and incremental retrograde elongations of the pisiform in the wrist that limited wrist rotation from 180ā¦ to 90ā¦ as in primitive primates. To our surprise, we found that a previously unknown primate-specific gene TOSPEAK had been disrupted in the family. TOSPEAK emerged de novo in an ancestor of extant primates across a 540 kb region of the genome with a pre-existing highly conserved long-range laryngeal enhancer for a neighbouring bone morphogenetic protein gene GDF6. We used transgenic mouse modelling to identify two additional GDF6 long-range enhancers within TOSPEAK that regulate GDF6 expression in the wrist. Disruption of TOSPEAK in the affected family blocked the transcription of TOSPEAK across the 3 GDF6 enhancers in association with a reduction in GDF6 expression and retrograde development of the larynx and wrist. Furthermore, we describe how TOSPEAK developed a human-specific promoter through the expansion of a penta-nucleotide direct repeat that first emerged de novo in the promoter of TOSPEAK in gibbon. This repeat subsequently expanded incrementally in higher hominids to form an overlapping series of Sp1/KLF transcription factor consensus binding sites in human that correlated with incremental increases in the promoter strength of TOSPEAK with human having the strongest promoter. Our research indicates a dual evolutionary role for the incremental increases in TOSPEAK transcriptional interference of GDF6 enhancers in the incremental evolutionary development of the wrist and larynx in hominids and the human capacity to speak and their retrogression with the reduction of TOSPEAK transcription in the affected family
Star Formation History at the Centers of Lenticular Galaxies with Bars and Purely Exponential Outer Disks from SAURON Data
We have investigated the stellar population properties in the central regions
of a sample of lenticular galaxies with bars and single-exponential outer
stellar disks using the data from the SAURON integral-field spectrograph
retrieved from the open Isaac Newton Group Archive. We have detected chemically
decoupled compact stellar nuclei with a metallicity twice that of the stellar
population in the bulges in seven of the eight galaxies. A starburst is
currently going on at the center of the eighth galaxy and we have failed to
determine the stellar population properties from its spectrum. The mean stellar
ages in the chemically decoupled nuclei found range from 1 to 11 Gyr. The
scenarios for the origin of both decoupled nuclei and lenticular galaxies as a
whole are discussed.Comment: 10 pages, 4 figures, a slightly edited version of the paper published
by Astronomy Letters, v. 37, no.1, 201
Proving Safety with Trace Automata and Bounded Model Checking
Loop under-approximation is a technique that enriches C programs with
additional branches that represent the effect of a (limited) range of loop
iterations. While this technique can speed up the detection of bugs
significantly, it introduces redundant execution traces which may complicate
the verification of the program. This holds particularly true for verification
tools based on Bounded Model Checking, which incorporate simplistic heuristics
to determine whether all feasible iterations of a loop have been considered.
We present a technique that uses \emph{trace automata} to eliminate redundant
executions after performing loop acceleration. The method reduces the diameter
of the program under analysis, which is in certain cases sufficient to allow a
safety proof using Bounded Model Checking. Our transformation is precise---it
does not introduce false positives, nor does it mask any errors. We have
implemented the analysis as a source-to-source transformation, and present
experimental results showing the applicability of the technique
- ā¦