11,578 research outputs found
Descriptive epidemiology of Escherichia coli bacteraemia in England, April 2012 to March 2014
We determined the incidence, risk factors and antimicrobial susceptibility associated with Escherichia coli bacteraemia in England over a 24 month period. Case data were obtained from the national mandatory surveillance database, with susceptibility data linked from LabBase2, a voluntary national microbiology database. Between April 2012 and March 2014, 66,512 E. coli bacteraemia cases were reported. Disease incidence increased by 6% from 60.4 per 100,000 population in 2012-13 to 63.5 per 100,000 population in 2013-14 (p < 0.0001). Rates of E. coli bacteraemia varied with patient age and sex, with 70.5% (46,883/66,512) of cases seen in patients aged ≥ 65 years and 52.4% (33,969/64,846) of cases in females. The most common underlying cause of bacteraemia was infection of the genital/urinary tract (41.1%; 27,328/66,512), of which 98.4% (26,891/27,328) were urinary tract infections (UTIs). The majority of cases (76.1%; 50,617/66,512) had positive blood cultures before or within two days of admission and were classified as community onset cases, however 15.7% (10,468/66,512) occurred in patients who had been hospitalised for over a week. Non-susceptibility to ciprofloxacin, third-generation cephalosporins, piperacillin-tazobactam, gentamicin and carbapenems were 18.4% (8,439/45,829), 10.4% (4,256/40,734), 10.2% (4,694/46,186), 9.7% (4,770/49,114) and 0.2% (91/42,986), respectively. Antibiotic non-susceptibility was higher in hospital-onset cases than for those presenting from the community (e.g. ciprofloxacin non-susceptibility was 22.1% (2,234/10,105) for hospital-onset vs 17.4% (5,920/34,069) for community-onset cases). Interventions to reduce the incidence of E. coli bacteraemia will have to target the community setting and UTIs if substantial reductions are to be realised
Melanosomes or microbes: Testing an alternative hypothesis for the origin of microbodies in fossil feathers
Microbodies associated with fossil feathers, originally attributed to microbial biofilm, have been reinterpreted as melanosomes: pigment-containing, eukaryotic organelles. This interpretation generated hypotheses regarding coloration in non-avian and avian dinosaurs. Because melanosomes and microbes overlap in size, distribution and morphology, we re-evaluate both hypotheses. We compare melanosomes within feathers of extant chickens with patterns induced by microbial overgrowth on the same feathers, using scanning (SEM), field emission (FESEM) and transmission (TEM) electron microscopy. Melanosomes are always internal, embedded in a morphologically distinct keratinous matrix. Conversely, microbes grow across the surface of feathers in continuous layers, more consistent with published images from fossil feathers. We compare our results to both published literature and new data from a fossil feather ascribed to Gansus yumenensis (ANSP 23403). 'Mouldic impressions' were observed in association with both the feather and sediment grains, supporting a microbial origin. We propose criteria for distinguishing between these two microbodies
Hard projectile penetration and trajectory stability
We present a general framework to describe the dynamics of a hard projectile penetrating into a solid target. Rigid body dynamics, differential area force law and semi-empirical resistance function are used to formulate the motion of the hard projectile. The proposed model is capable of predicting the projectile trajectory under various oblique and yaw angles. Critical conditions for the occurrences of the instability and the reverse of the projectile trajectory are discussed. It was found that the relative location of mass centre of the projectile has strong influence on the control of the rotation of the projectile, and thus, the projectile stability and the change of trajectory direction. The validity of the proposed model is limited to deep penetration and when the wake separation and reattachment between projectile body and target have negligible influence on the target resistance to the projectile. (C) 2011 Elsevier Ltd. All rights reserved
Structural behaviour of composite sandwich panels with plain and fibre-reinforced foamed concrete cores and corrugated steel faces
This paper studies the four-point bending response and failure mechanisms of sandwich panels with corrugated steel faces and either plain or fibre-reinforced foamed concrete core. Mechanical properties of both plain and polyvinyl alcohol fibre-reinforced foamed concrete were obtained, which are needed for the design of sandwich panel and numerical modelling. It is found that the fibre-reinforcement largely enhances the mechanical behaviour of foamed concrete and composite sandwich panels. Finite element code Abaqus/Standard was employed to investigate the influence of face/core bonding and fastening on the four-point bending response of the sandwich panels. It was found that face/core bonding plays a crucial role in the structural performance while the influence of fastening is negligible. (C) 2011 Elsevier Ltd. All rights reserved
Visual Function Questionnaire as an outcome measure for homonymous hemianopia: subscales and supplementary questions, analysis from the VISION trial
Background: We conduct supplementary analyses of the NEI VFQ-25 data to evaluate where changes occurred within subscales of the NEI VFQ-25 leading to change in the composite scores between the three treatment arms, and evaluate the NEI VFQ-25 with and without the Neuro 10 supplement. Methods: A prospective, multicentre, parallel, single-blind, three-arm RCT of fourteen UK acute stroke units was conducted. Stroke survivors with homonymous hemianopia were recruited. Interventions included: Fresnel prisms for minimum 2 h, 5 days/week over 6-weeks (Arm a), Visual search training for minimum 30 min, 5 days/week over 6-weeks (Arm b) and standard care-information only (Arm c). Primary and secondary outcomes (including NEI VFQ-25 data) were measured at baseline, 6, 12 and 26 weeks after randomisation. Results: Eighty seven patients were recruited (69% male; mean age (SD) equal to 69 (12) years). At 26 weeks, outcomes for 24, 24 and 22 patients, respectively, were compared to baseline. NEI VFQ-25 (with and without Neuro 10) responses improved from baseline to 26 weeks with visual search training compared to Fresnel prisms and standard care. In subscale analysis, the most impacted across all treatment arms was ‘driving’ whilst the least impacted were ‘colour vision’ and ‘ocular pain’. Conclusions: Composite scores differed systematically for the NEI VFQ-25 (Neuro 10) versus NEI VFQ-25 at all time points. For subscale scores, descriptive statistics suggest clinically relevant improvement in distance activities and vision-specific dependency subscales for NEI VFQ-25 scores in the visual search treatment arm. Trial Registration: Current Controlled Trials ISRCTN05956042
Oocyte donor age has a significant impact on oocyte recipients' cumulative live-birth rate: a population-based cohort study
© 2019 Objective: To study the impact of the donor's and recipient's age on the cumulative live-birth rate (CLBR) in oocyte donation cycles. Design: A population-based retrospective cohort study. Setting: Not applicable. Patient(s): All women using donated oocytes (n = 1,490) in Victoria, Australia, between 2009 and 2015. Intervention(s): None. Main Outcome Measure(s): The association between the donor's and recipient's age and CLBR modeled by multivariate Cox proportional hazard regression with the covariates of male partner's age, recipient parity, and cause of infertility adjusted for, and donor age grouped as <30, 30–34, 35–37, 38–40, and ≥41 years, and recipient age as <35, 35–37, 38–40, 41–42, 43–44, and ≥45 years. Result(s): The mean age of the oocyte donors was 33.7 years (range: 21 to 45 years) with 49% aged 35 years and over. The mean age of the oocyte recipients was 41.4 years (range: 19 to 53 years) with 25.4% aged ≥45 years. There was a statistically significant relationship between the donor's age and the CLBR. The CLBR for recipients with donors aged <30 years and 30–34 years was 44.7% and 43.3%, respectively. This decreased to 33.6% in donors aged 35–37 years, 22.6% in donors aged 38–40 years, and 5.1% in donors aged ≥41 years. Compared with recipients with donors aged <30 years, the recipients with donors aged 38–40 years had 40% less chance of achieving a live birth (adjusted hazard ratio 0.60; 95% CI, 0.43–0.86) and recipients with donors aged ≥41 years had 86% less chance of achieving a live birth (adjusted hazard ratio 0.14; 95% CI, 0.04–0.44). The multivariate analysis showed no statistically significant effect of the recipient's age on CLBR. Conclusion(s): We have demonstrated that the age of the oocyte donor is critical to the CLBR and is independent of the recipient woman's age. Recipients using oocytes from donors aged ≥35 years had a statistically significantly lower CLBR when compared with recipients using oocytes from donors aged <35 years
Cryptocurrencies and future financial crime.
Background: Cryptocurrency fraud has become a growing global concern, with various governments reporting an increase in the frequency of and losses from cryptocurrency scams. Despite increasing fraudulent activity involving cryptocurrencies, research on the potential of cryptocurrencies for fraud has not been examined in a systematic study. This review examines the current state of knowledge about what kinds of cryptocurrency fraud currently exist, or are expected to exist in the future, and provides comprehensive definitions of the frauds identified. Methods: The study involved a scoping review of academic research and grey literature on cryptocurrency fraud and a 1.5-day expert consensus exercise. The review followed the PRISMA-ScR protocol, with eligibility criteria based on language, publication type, relevance to cryptocurrency fraud, and evidence provided. Researchers screened 391 academic records, 106 of which went on to the eligibility phase, and 63 of which were ultimately analysed. We screened 394 grey literature sources, 128 of which passed on to the eligibility phase, and 53 of which were included in our review. The expert consensus exercise was attended by high-profile participants from the private sector, government, and academia. It involved problem planning and analysis activities and discussion about the future of cryptocurrency crime. Results: The academic literature identified 29 different types of cryptocurrency fraud; the grey literature discussed 32 types, 14 of which were not identified in the academic literature (i.e., 47 unique types in total). Ponzi schemes and (synonymous) high yield investment programmes were most discussed across all literature. Participants in the expert consensus exercise ranked pump-and-dump schemes and ransomware as the most profitable and feasible threats, though pump-and-dumps were, notably, perceived as the least harmful type of fraud. Conclusions: The findings of this scoping review suggest cryptocurrency fraud research is rapidly developing in volume and breadth, though we remain at an early stage of thinking about future problems and scenarios involving cryptocurrencies. The findings of this work emphasise the need for better collaboration across sectors and consensus on definitions surrounding cryptocurrency fraud to address the problems identified
Charge depletion of n(+)-In0.53Ga0.47As potential wells by background acceptor doping
Published versio
Parameterized Model-Checking for Timed-Systems with Conjunctive Guards (Extended Version)
In this work we extend the Emerson and Kahlon's cutoff theorems for process
skeletons with conjunctive guards to Parameterized Networks of Timed Automata,
i.e. systems obtained by an \emph{apriori} unknown number of Timed Automata
instantiated from a finite set of Timed Automata templates.
In this way we aim at giving a tool to universally verify software systems
where an unknown number of software components (i.e. processes) interact with
continuous time temporal constraints. It is often the case, indeed, that
distributed algorithms show an heterogeneous nature, combining dynamic aspects
with real-time aspects. In the paper we will also show how to model check a
protocol that uses special variables storing identifiers of the participating
processes (i.e. PIDs) in Timed Automata with conjunctive guards. This is
non-trivial, since solutions to the parameterized verification problem often
relies on the processes to be symmetric, i.e. indistinguishable. On the other
side, many popular distributed algorithms make use of PIDs and thus cannot
directly apply those solutions
- …