266 research outputs found

    Variation of abductor pollicis longus tendons in cadavers

    Get PDF
    Background: First extensor compartment of the wrist comprises of abductor pollicis longus and extensor pollicis brevis. It helps in movement and stabilization of thumb. Variations in the number of tendons of APL muscle may be asymptomatic and often incidental finding. Stenosing tenosynovitis of the first dorsal compartment of the wrist or de Quervains disease is a commonly encountered debilitating condition of the wrist.Methods: This cadaveric study was done on 40 forearms in 20 cadavers available in Department of anatomy and forensic medicine at our institute. The muscles of extensor compartments were dissected, extensor retinaculum split over first extensor compartment, tendons of APL exposed. Study period from February-2017 to February-2018.Results: There were 6 female and 14 male cadavers. The APL muscle was found with a single tendon in 2, double in 30, triple in 8. There were variations in the insertion of the APL tendon as well. In all hands, the APL tendon had insertion into the first metacarpal bone and in 20 hands (50%), it had second insertion into the trapezium.Conclusions: Variation of APL muscle insertion in the Indian population and two or more tendinous slips attached commonly to the first metacarpal base and the trapezium may be the cause of treatment failure in DQT and cause of Trapeziometacarpal arthritis. Further studies needs to be done for further evaluation

    Deep Learning for User Behaviour Prediction Using Streaming Analytics

    Get PDF
    Streams of web user interactions reflect behaviour of customers or users of a web application through which a company is being operated online. The interactions may be in the form of visits to web components and even purchases made by users in case of e-Commerce applications. Modelling user behaviour can help the organizations to ascertain patterns of user behaviours and improve their products and services to meet their needs besides making promotional schemes. There are many existing methods for modelling user behaviour. However, of late, deep learning models are found to be more accurate and useful. In this paper a deep learning based framework is proposed for predicting web user behaviour from streams of user interactions. The framework is based on the mechanisms that exploit Recurrent Neural Network (RNN), one of the deep learning approaches, to learn from low-level features of sequential and streaming data. The mechanisms are used to model user interactions and predict the user behaviour with respect to purchasing items in future. In presence of plenty of items, item embeddings is explored for better results. In addition to this, attention mechanisms are employed to achieve RNN model interoperability. The empirical study revealed that the proposed framework is useful besides helping to evaluate different variants of attention mechanisms and item embeddings

    Characterization of 10-hydroxygeraniol dehydrogenase from Catharanthus roseus reveals cascaded enzymatic activity in iridoid biosynthesis

    Get PDF
    Catharanthus roseus [L.] is a major source of the monoterpene indole alkaloids (MIAs), which are of significant interest due to their therapeutic value. These molecules are formed through an intermediate, cis-trans-nepetalactol, a cyclized product of 10-oxogeranial. One of the key enzymes involved in the biosynthesis of MIAs is an NAD(P)+ dependent oxidoreductase system, 10-hydroxygeraniol dehydrogenase (Cr10HGO), which catalyses the formation of 10-oxogeranial from 10-hydroxygeraniol via 10-oxogeraniol or 10-hydroxygeranial. This work describes the cloning and functional characterization of Cr10HGO from C. roseus and its role in the iridoid biosynthesis. Substrate specificity studies indicated that, Cr10HGO has good activity on substrates such as 10-hydroxygeraniol, 10-oxogeraniol or 10-hydroxygeranial over monohydroxy linear terpene derivatives. Further it was observed that incubation of 10-hydroxygeraniol with Cr10HGO and iridoid synthase (CrIDS) in the presence of NADP+ yielded a major metabolite, which was characterized as (1R, 4aS, 7S, 7aR)-nepetalactol by comparing its retention time, mass fragmentation pattern and co-injection studies with that of the synthesized compound. These results indicate that there is concerted activity of Cr10HGO with iridoid synthase in the formation of (1R, 4aS, 7S, 7aR)-nepetalactol, an important intermediate in iridoid biosynthesis

    Composable security of delegated quantum computation

    Full text link
    Delegating difficult computations to remote large computation facilities, with appropriate security guarantees, is a possible solution for the ever-growing needs of personal computing power. For delegated computation protocols to be usable in a larger context---or simply to securely run two protocols in parallel---the security definitions need to be composable. Here, we define composable security for delegated quantum computation. We distinguish between protocols which provide only blindness---the computation is hidden from the server---and those that are also verifiable---the client can check that it has received the correct result. We show that the composable security definition capturing both these notions can be reduced to a combination of several distinct "trace-distance-type" criteria---which are, individually, non-composable security definitions. Additionally, we study the security of some known delegated quantum computation protocols, including Broadbent, Fitzsimons and Kashefi's Universal Blind Quantum Computation protocol. Even though these protocols were originally proposed with insufficient security criteria, they turn out to still be secure given the stronger composable definitions.Comment: 37+9 pages, 13 figures. v3: minor changes, new references. v2: extended the reduction between composable and local security to include entangled inputs, substantially rewritten the introduction to the Abstract Cryptography (AC) framewor

    Verifiable blind quantum computing with trapped ions and single photons

    Get PDF
    We report the first hybrid matter-photon implementation of verifiable blind quantum computing. We use a trapped-ion quantum server and a client-side photonic detection system networked via a fiber-optic quantum link. The availability of memory qubits and deterministic entangling gates enables interactive protocols without postselection - key requirements for any scalable blind server, which previous realizations could not provide. We quantify the privacy at ≲0.03 leaked classical bits per qubit. This experiment demonstrates a path to fully verified quantum computing in the cloud

    Ferroelectric Solitons Crafted in Epitaxial Bismuth Ferrite Superlattices

    Full text link
    In ferroelectrics, complex interactions among various degrees of freedom enable the condensation of topologically protected polarization textures. Known as ferroelectric solitons, these particle-like structures represent a new class of materials with promise for beyond CMOS technologies due to their ultrafine size and sensitivity to external stimuli. Such polarization textures have scarcely been reported in multiferroics. Here, we report a range of soliton topologies in bismuth ferrite strontium titanate superlattices. High-resolution piezoresponse force microscopy and Cs-corrected high-angle annular dark-field scanning transmission electron microscopy reveal a zoo of topologies, and polarization displacement mapping of planar specimens reveals center-convergent and divergent topological defects as small as 3 nm. Phase field simulations verify that some of these topologies can be classed as bimerons, with a topological charge of plus and minus one, and first-principles-based effective Hamiltonian computations show that the co-existence of such structures can lead to non-integer topological charges, a first observation in a BiFeO3-based system. Our results open new opportunities in multiferroic topotronics

    Verification of Quantum Computation and the Price of Trust

    Get PDF
    International audienc

    Boundary condition model for the simulation of organic solar cells

    Get PDF
    (c) 2017. This manuscript version is made available under the CC-BY-NC-ND 4.0 license http://creativecommons.org/licenses/by-nc-nd/4.0/http://www.sciencedirect.com/science/article/pii/S1566119917302434Organic solar cells (OSCs) are promising photovoltaic devices to convert solar energy into electrical energy. Their many advantages such as lightweight, flexibility and low manufacturing costs are intrinsic to the organic/polymeric technology. However, because the performance of OSCs is still not competitive with inorganic solar cells, there is urgent need to improve the device performance using better designs, technologies and models. In this work, we focus on the developing an accurate physics-based model that relates the charge carrier density at the metal-organic boundaries with the current density in OSCs using our previous studies on single-carrier and bipolar diodes. The model for the boundary condition of the charge carrier density at the interfaces of OSCs follows a power-law function with the current density, both in dark and under illumination, and simulated current-voltage characteristics are verified with experimental results. The numerical simulations of the current-voltage characteristics of OSCs consider well-established models for the main physical and optical processes that take place in the device: light absorption and generation of excitons, dissociation of excitons into free charge carriers, charge transport, recombination and injection-extraction of free carriers. Our analysis provides important insights on the influence of the metal-organic interfaces on the overall performance of OSCs. The model is also used to explain the anomalous S-shape current-voltage curves found in some experimental data.This work was supported by Ministerio de Educación y Ciencia under research Grant FPU12/02712 and MINECO/FEDER under research Project MAT2016-76892-C3-3-R, and the Canada Research Chair program, NSERC ResEau strategic network and the NCE IC-IMPACTS
    corecore