2,548 research outputs found
Recommended from our members
Rhegmatogenous retinal detachment masquerading as exudative panuveitis with intense anterior chamber inflammatory reaction.
Purpose:This is a retrospective case report illustrating the diagnostic and therapeutic challenges associated with a chronic rhegmatogenous retinal detachment masquerading as a severe panuveitis with intense anterior chamber inflammation. We have included clinical features, anterior segment and fundus photography, B-scan ultrasonography, fluorescein angiography, and intraoperative findings. Observations:A 26-year-old male presented with features of unilateral panuveitis: hypotony, anterior segment inflammation (posterior synechiae and anterior chamber cell with fibrin clumping), diffuse choroidal thickening, and retinal detachment. Laboratory investigations for infectious or rheumatologic processes were negative, and empiric systemic corticosteroid therapy was unsuccessful. This prompted suspicion for an alternate primary etiology, and pars plana vitrectomy revealed small retinal breaks as the underlying cause of the retinal detachment and inflammation. Conclusions:Rhegmatogenous retinal detachments are a known cause of intraocular inflammation. Nevertheless, it remains a challenge to recognize retinal breaks in this setting, particularly with robust anterior segment inflammation and posterior findings resembling severe exudative uveitis. Being aware of this unique presentation may prevent delays in diagnosis and have important prognostic implications
Proposed New Antiproton Experiments at Fermilab
Fermilab operates the world's most intense source of antiprotons. Recently
various experiments have been proposed that can use those antiprotons either
parasitically during Tevatron Collider running or after the Tevatron Collider
finishes in about 2010. We discuss the physics goals and prospects of the
proposed experiments.Comment: 6 pages, 2 figures, to appear in Proceedings of IXth International
Conference on Low Energy Antiproton Physics (LEAP'08), Vienna, Austria,
September 16 to 19, 200
Production Performance of Indigenous Chicken under Semi Intensive Management Conditions in Central Tanzania
A study to evaluate four indigenous chicken – namely: Horasi, Kuchi, Naked neck and Frizzled in order to obtain grand-parent and parent stocks was carried out at Tanzania Livestock Research Institute, Mpwapwa district of Dodoma, Tanzania. The perfomance of the ecotypes were compared so as to come out with the best indigenous chicken among the four. A total of 548 indigenous chicken including Horasi (162), Kuchi (253), Naked neck (81) and Frizzled (52) were used in the study. All chicken were treated equally in terms of management under semi intensive system. Data were collected on body weight, external egg characteristics, day old chick weight, body weight gain, weight at 4, 8, 12, 16, 20, 24 weeks of age for each ecotype. Age at first egg and egg number were also determined. The collected data was analysed using General Linear Model of SAS (2006). The results showed that there were significant differences in mature body and egg weight between the ecotypes. The mature body weight and egg weight respectively were 2075g, 2070g, 1792g , 1622g and 44.73g, 45.94g, 38.28g, 38.08g for Horasi, Kuchi, Naked neck and Frizzled respectively. Day old chick weight were 34.26g, 36.26g, 31.99g and 29.02g for Horasi, Kuchi, Naked neck and Frizzled respectively. Average growth rate per day in grams for Horasi and Kuchi was 3.67g and 3.96g per day from day old chick to week 4 and 6.83g and 8.25g per day from week 5 to week 8, respectively. Average egg numbers per clutch for Horasi and Naked neck were 16 and 18 eggs respectively. Average body weight at week 24 for naked neck and Horasi (F1) were 1427g and 1572.8g respectively. Average ages at first egg for Horasi and Naked neck (F1) were found to be 15 weeks and 16 weeks, respectively. The study reveals that, Horasi and Naked neck ecotypes under semi intensive system perform better than Frizzed. It was conclude that, Horasi and Naked neck can be used at farm level for egg production and Kuchi could be used to improve meat production on other indigenous chicken hence increase income of smallholder farmers
Duality Invariant M-theory: Gauged supergravities and Scherk-Schwarz reductions
We consider the reduction of the duality invariant approach to M-theory by a
U-duality group valued Scherk-Schwarz twist. The result is to produce
potentials for gauged supergravities that are normally associated with
non-geometric compactifications. The local symmetry reduces to gauge
transformations with the gaugings exactly matching those of the embedding
tensor approach to gauged supergravity. Importantly, this approach now includes
a nontrivial dependence of the fields on the extra coordinates of the extended
space.Comment: 22 pages Latex; v2: typos corrected and references adde
PEMANFAATAN RADIO FREQUENCY IDENTIFICATION (RFID) UNTUK PEMANTAUAN KEBERADAAN KARYAWAN (Studi Kasus: Program Studi Teknik Informatika Universitas Pasundan)
Pemantauan dan pengendalian kedisiplinan karyawan merupakan hal yang penting untuk
memastikan karyawan hadir dan bekerja di tempat kerja selama jam kerja untuk meningkatkan
produktifitas lingkungan kerja. Pemantauan karyawan sangat bermanfaat untuk orang yang memiliki
kepentingan dengan karyawan tersebut, karena dapat mempermudah dalam mengetaui lokasi karyawan
secara akurat selama jam kerja. Pemantauan keberadaan lokasi karyawan di butuhkan untuk membantu
mengetaui lokasi karyawan tersebut berada untuk mempermudah dalam menemui karyawan. Untuk itu
perlu sistem untuk mengawasi karyawan dengan efektif. Namun, teknologi yang saat ini di gunakan
berupa fingerprint kurang efektif karena sistem tersebut hanya mampu mencegah pemalsuan presensi
saja namun tidak menjamin karyawan tersebut berada tempat kerja selama jam kerja. Bisa saja karyawan
keluar dari tempat kerja tanpa terdeteksi dan kembali ke tempat kerja saat jam pulang kantor, sehingga
data yang tersimpan hanya data pegawai masuk dan keluar dari tempat kerja.
Penelitian ini dilakukan untuk membantu Mahasiswa dan pihak yang berkepentingan untuk
mengetahui lokasi dimana karyawan tersebut berada dengan memanfaatkan Radio Frequency
Identification (RFID) sebagai alat untuk pemantauan keberadaan karyawan di program studi Teknik
Informatika Universitas Pasundan Bandung. Pemanfaatan RFID di pilih karena menggunakan metode
identifikasi objek maupun orang dengan menggunakan sarana tag dan reader untuk menyimpan dan
menerima data tanpa membutuhkan kontak secara langsung. Tag digunakan sebagai kartu tanda
pengenal karyawan dan reader ditempatkan di tiap lorong atau titik tertentu. Sehingga dengan sistem
karyawan dapat terpantau secara langsung karena tag mengirim terus menerus ke reader sehingga
keberadaan karyawan dapat diketahui lokasinya.
Hasil akhir dari penelitian ini adalah sebuah rencana Pemanfaatan RFID untuk pemantauan
keberadaan Karyawan di program studi Teknik Informatika, yang nantinya hasil pemantauan akan dapat
di lihat pada media Informasi Fakultas Teknik.
Kata kunci : Radio Frequency Identification, Reader, Tag, Pemantauan, teknik Informatika, Karyawa
Boundary Conditions for Interacting Membranes
We investigate supersymmetric boundary conditions in both the Bagger-Lambert
and the ABJM theories of interacting membranes. We find boundary conditions
associated to the fivebrane, the ninebrane and the M-theory wave. For the ABJM
theory we are able to understand the enhancement of supersymmetry to produce
the (4,4) supersymmetry of the self-dual string. We also include supersymmetric
boundary conditions on the gauge fields that cancel the classical gauge anomaly
of the Chern-Simons terms.Comment: 36 pages, latex, v2 minor typos correcte
The Open-Source Neuroimaging Research Enterprise
While brain imaging in the clinical setting is largely a practice of looking at images, research neuroimaging is a quantitative and integrative enterprise. Images are run through complex batteries of processing and analysis routines to generate numeric measures of brain characteristics. Other measures potentially related to brain function – demographics, genetics, behavioral tests, neuropsychological tests – are key components of most research studies. The canonical scanner – PACS – viewing station axis used in clinical practice is therefore inadequate for supporting neuroimaging research. Here, we model the neuroimaging research enterprise as a workflow. The principal components of the workflow include data acquisition, data archiving, data processing and analysis, and data utilization. We also describe a set of open-source applications to support each step of the workflow and the transitions between these steps. These applications include DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE viewing and storage tools, the EXTENSIBLE NEUROIMAGING ARCHIVE TOOLKIT data archiving and exploration platform, and an engine for running processing/analysis pipelines. The overall picture presented is aimed to motivate open-source developers to identify key integration and communication points for interoperating with complimentary applications
Computability of ordinary differential equations
In this paper we provide a brief review of several results about the
computability of initial-value problems (IVPs) defined with ordinary differential
equations (ODEs). We will consider a variety of settings and analyze
how the computability of the IVP will be affected. Computational
complexity results will also be presented, as well as computable versions
of some classical theorems about the asymptotic behavior of ODEs.info:eu-repo/semantics/publishedVersio
Efficient noninteractive certification of RSA moduli and beyond
In many applications, it is important to verify that an RSA public key (N; e) speci es a
permutation over the entire space ZN, in order to prevent attacks due to adversarially-generated
public keys. We design and implement a simple and e cient noninteractive zero-knowledge
protocol (in the random oracle model) for this task. Applications concerned about adversarial
key generation can just append our proof to the RSA public key without any other modi cations
to existing code or cryptographic libraries. Users need only perform a one-time veri cation of
the proof to ensure that raising to the power e is a permutation of the integers modulo N. For
typical parameter settings, the proof consists of nine integers modulo N; generating the proof
and verifying it both require about nine modular exponentiations.
We extend our results beyond RSA keys and also provide e cient noninteractive zero-
knowledge proofs for other properties of N, which can be used to certify that N is suitable
for the Paillier cryptosystem, is a product of two primes, or is a Blum integer. As compared to
the recent work of Auerbach and Poettering (PKC 2018), who provide two-message protocols for
similar languages, our protocols are more e cient and do not require interaction, which enables
a broader class of applications.https://eprint.iacr.org/2018/057First author draf
EVALUASI PENJADWALAN GALIAN C (PERTAMBANGAN PASIR) MENGGUNAKAN METODE (CPM DAN PERT) (Study Kasus Di PT. Graha Silver Silk)
Objek pada penelitian ini adalah perencanaan proyek, maka untuk
melakukan perencanaan proyek dibutuhkan data-data awal sebagai input dalam
pembuatan perencanaan waktu atau jadwal, untuk memperkirakan biaya suatu
pekerjaan, perusahaan ini menggunakan analisa data pengalaman dari
pekerjaan-pekerjaan proyek sebelumnya, dari perusahaan tersebut analisa ini
merupakan panduan biaya. Sedangkan CPM dan PERT digunakan untuk
mennunjukan hubungan antara kegiatan dan kapan kegiatan itu dilakukan, CPM
dan PERT ini sangat cocok dengan kondisi proyek yang sedang diteliti karena
terdapat hubungan pekerjaan yang tumpang tindih dengan kata lain pekerjaan B
dimulai tanpa harus menunggu Pekerjaan A selesai. Upaya yang dilakukan untuk
menyelesaikan persoalan dalam proyek ini (overallocation) yaitu dengan cara
leveling pada Microsoft project 2013, leveling dilakukan dengan cara menyusun
ulang jadwal kerja setiap kegiatan atau dengan cara menggeser jadwal beberapa
pekerjaan dan penundaan waktu pelaksanaan hingga setiap pekerjaan tidak ada
sumber daya yang overallocation. Seperti yang dilakukan pada evaluasi
penjadwalan proyek ini yaitu:
Mandor terjadi overallocation pada tanggal (15/05/2018 – 18/05/2018)
pekerjaan pengerukan menggunakan bucket wheel, pada tanggal (19/05/2019 –
18/06/2018) pekerjaan pembuatan dinding kobakan kolam, pada tanggal
(18/05/2018 – 22/06/2018) pekerjaan perakitan mesin penambang (Crusher),
pada tanggal (28/05/2018 – 13/07/2018) pekerjaan penyortiran pasir dan tanah
(23/05/2018 – 31/07/2018) pekerjaan pengolahan bahan galian, pada tanggal
(06/10/2018 – 12/10/2018) pekerjaan penggurukan area pertambangan, pada
tanggal (13/10/2018 – 20/10/2018) pekerjaan pembersihan lokasi.
Kata kunci: Microsoft Project 2013, levelling, Presedence (CPM dan
PERT
- …