3,067 research outputs found

    Adjunctive strategies in the management of resistant, 'undilatable' coronary lesions after successfully crossing a CTO with a guidewire.

    Get PDF
    Successful revascularisation of chronic total occlusions (CTOs) remains one of the greatest challenges in the era of contemporary percutaneous coronary intervention (PCI). Such lesions are encountered with increasing frequency in current clinical practice. A predictable increase in the future burden of CTO management can be anticipated given the ageing population, increased rates of renal failure, graft failure and diabetes mellitus. Given recent advances and developments in CTO PCI management, successful recanalisation can be anticipated in the majority of procedures undertaken at high-volume centres when performed by expert operators. Despite advances in device technology, the management of resistant, calcific lesions remains one of the greatest challenges in successful CTO intervention. Established techniques to modify calcific lesions include the use of high-pressure non-compliant balloon dilation, cutting-balloons, anchor balloons and high speed rotational atherectomy (HSRA). Novel approaches have proven to be safe and technically feasible where standard approaches have failed. A step-wise progression of strategies is demonstrated, from well-recognised techniques to techniques that should only be considered when standard manoeuvres have proven unsuccessful. These methods will be described in the setting of clinical examples and include use of very high-pressure non-compliant balloon dilation, intentional balloon rupture with vessel dissection or balloon assisted micro-dissection (BAM), excimer coronary laser atherectomy (ECLA) and use of HSRA in various 'offlabel' settings

    Fluctuation relations for heat engines in time-periodic steady states

    Full text link
    A fluctuation relation for heat engines (FRHE) has been derived recently. In the beginning, the system is in contact with the cooler bath. The system is then coupled to the hotter bath and external parameters are changed cyclically, eventually bringing the system back to its initial state, once the coupling with the hot bath is switched off. In this work, we lift the condition of initial thermal equilibrium and derive a new fluctuation relation for the central system (heat engine) being in a time-periodic steady state (TPSS). Carnot's inequality for classical thermodynamics follows as a direct consequence of this fluctuation theorem even in TPSS. For the special cases of the absence of hot bath and no extraction of work, we obtain the integral fluctuation theorem for total entropy and the generalized exchange fluctuation theorem, respectively. Recently microsized heat engines have been realized experimentally in the TPSS. We numerically simulate the same model and verify our proposed theorems.Comment: 9 page

    Nanomechanical inhomogeneities in CVA-deposited titanium nitride thin films: Nanoindentation and Finite Element Method Investigations

    Full text link
    Refractory metals that can withstand at high temperatures and harsh conditions are of utmost importance for solar-thermal and energy storage applications. Thin films of TiN have been deposited using cathodic vacuum arc deposition (CVA) at relatively low temperatures ~ 300 oC using the substrate bias ~ -60V. The nanomechanical properties of these films were investigated using nanoindentation and the spatial fluctuations were observed. The nanoindentation results were simulated using finite element method (FEM) through Johnson-Cook model. We have found the local nitridation plays an important role on nanomechanical properties of TiN thin films and confirms that the nitrogen deficient regions are ductile with low yield stress and hardening modulus. This study further opens the opportunities of modelling the nanoscale system using FEM analysis

    Using the blockchain to enable transparent and auditable processing of personal data in cloud- based services: Lessons from the Privacy-Aware Cloud Ecosystems (PACE) project

    Get PDF
    The architecture of cloud-based services is typically opaque and intricate. As a result, data subjects cannot exercise adequate control over their personal data, and overwhelmed data protection authorities must spend their limited resources in costly forensic efforts to ascertain instances of non-compliance. To address these data protection challenges, a group of computer scientists and socio-legal scholars joined forces in the Privacy-Aware Cloud Ecosystems (PACE) project to design a blockchain-based privacy-enhancing technology (PET). This article presents the fruits of this collaboration, highlighting the capabilities and limits of our PET, as well as the challenges we encountered during our interdisciplinary endeavour. In particular, we explore the barriers to interdisciplinary collaboration between law and computer science that we faced, and how these two fields’ different expectations as to what technology can do for data protection law compliance had an impact on the project's development and outcome. We also explore the overstated promises of techno-regulation, and the practical and legal challenges that militate against the implementation of our PET: most industry players have no incentive to deploy it, the transaction costs of running it make it prohibitively expensive, and there are significant clashes between the blockchain's decentralised architecture and GDPR's requirements that hinder its deployability. We share the insights and lessons we learned from our efforts to overcome these challenges, hoping to inform other interdisciplinary projects that are increasingly important to shape a data ecosystem that promotes the protection of our personal data

    Applying conflict management strategies in BDI Agents for resource management in computational grids

    Get PDF
    Managing resources in large scale distributed systems --- "Computational Grids", is a complex and time sensitive process. The computational resources being shared vary in type and complexity, and resource properties can change over time. An approach based on interacting software agents is presented, where each resource manager and resource requester is modelled as a BDI (Belief-Desire-Intention) agent. The proposed approach can help resolve conflicts that arise during resource discovery and application scheduling, and enables site autonomy to be maintained. The modelling and detection of conflicts is important in the context of this work, to enable each resource and application to respond to changes in the environment. We propose a BDI based framework that can be used to model agents that represent resources and applications --- and outline properties that each must maintain

    BioSec: A Biometric Authentication Framework for Secure and Private Communication among Edge Devices in IoT and Industry 4.0

    Get PDF
    With the rapid increase in the usage areas of Internet of Things (IoT) devices, it brings challenges such as security and privacy. One way to ensure these in IoT-based systems is user authentication. Until today, user authentication is provided by traditional methods such as pin and token based. But traditional methods have challenges such as forgotten, stolen, and shared with another user who is unauthorized. To address these challenges, we proposed a biometric method called BioSec to provide authentication in IoT integrated with edge consumer electronics using fingerprint authentication. Further, we ensured the security of biometric data both in the transmission channel and database with the standard encryption method. BioSec ensures secure and private communication among edge devices in IoT and Industry 4.0. Finally, we have compared three encryption methods used to protect biometric templates in terms of processing times and identified that AES-128-bit key encryption method outperforms others

    Chiral constituent quark model and the coupling strength of eta'

    Full text link
    Using the latest data pertaining to \bar u-\bar d asymmetry and the spin polarization functions, detailed implications of the possible values of the coupling strength of the singlet Goldstone boson \eta' have been investigated in the \chiCQM with configuration mixing. Using \Delta u, \Delta_3, \bar u-\bar d and \bar u/\bar d, the possible ranges of the coupling parameters a, \alpha^ 2, \beta^ 2 and \zeta^ 2, representing respectively the probabilities of fluctuations to pions, K, \eta and \eta^{'}, are shown to be 0.10 \lesssim a \lesssim 0.14, 0.2\lesssim \alpha \lesssim 0.5, 0.2\lesssim \beta \lesssim 0.7 and 0.10 lesssim |\zeta| \lesssim 0.70. To constrain the coupling strength of \eta', detailed fits have been obtained for spin polarization functions, quark distribution functions and baryon octet magnetic moments corresponding to the following sets of parameters: a=0.1, \alpha=0.4, \beta=0.7, |\zeta|=0.65 (Case I); a=0.1, \alpha=0.4, \beta=0.6, |\zeta|=0.70 (Case II); a=0.14, \alpha=0.4, \beta=0.2, \zeta=0 (Case III) and a=0.13, \alpha=\beta=0.45, |\zeta|=0.10 (Case IV). Case I represents the calculations where a is fixed to be 0.1, in accordance with earlier calculations, whereas other parameters are treated free and the Case IV represents our best fit. The fits clearly establish that a small non-zero value of the coupling of \eta' is preferred over the higher values of \eta' as well as when \zeta=0, the latter implying the absence of \eta' from the dynamics of \chiCQM. Our best fit achieves an overall excellent fit to the data, in particular the fit for \Delta u, \Delta d, \Delta_8 as well as the magnetic moments \mu_{n}, \mu_{\Sigma^-}, \mu_{\Sigma^+} and \mu_{\Xi^-} is almost perfect, the \mu_{\Xi^-} being a difficult case for most of the similar calculations.Comment: 8 RevTeX pages, 2 Tables, Revised version to appear in Int.J.Mod.Phys
    corecore