9,529 research outputs found

    Scottish appeals and the proposed Supreme Court

    Get PDF

    GBM radiosensitizers: dead in the water…or just the beginning?

    Get PDF
    The finding that most GBMs recur either near or within the primary site after radiotherapy has fueled great interest in the development of radiosensitizers to enhance local control. Unfortunately, decades of clinical trials testing a wide range of novel therapeutic approaches have failed to yield any clinically viable radiosensitizers. However, many of  the previous radiosensitizing strategies were not based on clear pre-clinical evidence, and in many cases blood-barrier penetration was not considered. Furthermore, DNA repair inhibitors have only recenly arrived in the clinic, and likely represent potent agents for glioma radiosensitization. Here, we present recent progress in the use of small molecule DNA damage response inhibitors as GBM radiosensitizers. In addition, we discuss the latest progress in targeting hypoxia and oxidative stress for GBM radiosensitization

    On-board processing satellite network architecture and control study

    Get PDF
    The market for telecommunications services needs to be segmented into user classes having similar transmission requirements and hence similar network architectures. Use of the following transmission architecture was considered: satellite switched TDMA; TDMA up, TDM down; scanning (hopping) beam TDMA; FDMA up, TDM down; satellite switched MF/TDMA; and switching Hub earth stations with double hop transmission. A candidate network architecture will be selected that: comprises multiple access subnetworks optimized for each user; interconnects the subnetworks by means of a baseband processor; and optimizes the marriage of interconnection and access techniques. An overall network control architecture will be provided that will serve the needs of the baseband and satellite switched RF interconnected subnetworks. The results of the studies shall be used to identify elements of network architecture and control that require the greatest degree of technology development to realize an operational system. This will be specified in terms of: requirements of the enabling technology; difference from the current available technology; and estimate of the development requirements needed to achieve an operational system. The results obtained for each of these tasks are presented

    Three applications for mobile epidemic algorithms

    Get PDF
    This paper presents a framework for the pervasive sharing of data using wireless networks. 'FarCry' uses the mobility of users to carry files between separated networks. Through a mix of ad-hoc and infrastructure-based wireless networking, files are transferred between users without their direct involvement. As users move to different locations, files are then transmitted on to other users, spreading and sharing information. We examine three applications of this framework. Each of these exploits the physically proximate nature of social gatherings. As people group together in, for example, business meetings and cafés, this can be taken as an indication of similar interests, e.g. in the same presentation or in a type of music. MediaNet affords sharing of media files between strangers or friends, MeetingNet shares business documents in meetings, and NewsNet shares RSS feeds between mobile users. NewsNet also develops the use of pre-emptive caching: collecting information from others not for oneself, but for the predicted later sharing with others. We offer observations on developing this system for a mobile, multi-user, multi-device environment

    Degeneration of ALF D_n Metrics

    Get PDF
    Beginning with the Legendre transform construction of hyperk\"ahler metrics, we analyze the ALF version of the D_n metrics. We determine the constraint equation obtained from extremizing the ww coordinate of the generating function F(z,\bar{z},u,\bar{u},w) and study its behavior as we send two of the mass parameters of the DnD_n metric to zero. We find that the constraint equation enforces the limit that the metric becomes that of multi-Taub-NUT.Comment: 14 pages, 7 figures, LaTeX, minor corrections, to appear in JHE

    Supporting ethnographic studies of ubiquitous computing in the wild

    Get PDF
    Ethnography has become a staple feature of IT research over the last twenty years, shaping our understanding of the social character of computing systems and informing their design in a wide variety of settings. The emergence of ubiquitous computing raises new challenges for ethnography however, distributing interaction across a burgeoning array of small, mobile devices and online environments which exploit invisible sensing systems. Understanding interaction requires ethnographers to reconcile interactions that are, for example, distributed across devices on the street with online interactions in order to assemble coherent understandings of the social character and purchase of ubiquitous computing systems. We draw upon four recent studies to show how ethnographers are replaying system recordings of interaction alongside existing resources such as video recordings to do this and identify key challenges that need to be met to support ethnographic study of ubiquitous computing in the wild

    The Intermediate Coupling Regime in the AdS/CFT Correspondence

    Get PDF
    The correspondence between the 't Hooft limit of N=4 super Yang-Mills theory and tree-level IIB superstring theory on AdS(5)xS(5) in a Ramond-Ramond background at values of lambda=g^2 N ranging from infinity to zero is examined in the context of unitarity. A squaring relation for the imaginary part of the holographic scattering of identical string fields in the two-particle channels is found, and a mismatch between weak and strong 't Hooft coupling is pointed out within the correspondence. Several interpretations and implications are proposed.Comment: 10 pages, LaTeX, reference adde

    Caring for continence in stroke care settings: a qualitative study of patients’ and staff perspectives on the implementation of a new continence care intervention

    Get PDF
    Objectives: Investigate the perspectives of patients and nursing staff on the implementation of an augmented continence care intervention after stroke. Design: Qualitative data were elicited during semi-structured interviews with patients (n = 15) and staff (14 nurses; nine nursing assistants) and analysed using thematic analysis. Setting: Mixed acute and rehabilitation stroke ward. Participants: Stroke patients and nursing staff that experienced an enhanced continence care intervention. Results: Four themes emerged from patients’ interviews describing: (a) challenges communicating about continence (initiating conversations and information exchange); (b) mixed perceptions of continence care; (c) ambiguity of focus between mobility and continence issues; and (d) inconsistent involvement in continence care decision making. Patients’ perceptions reflected the severity of their urinary incontinence. Staff described changes in: (i) knowledge as a consequence of specialist training; (ii) continence interventions (including the development of nurse-led initiatives to reduce the incidence of unnecessary catheterisation among patients admitted to their ward); (iii) changes in attitude towards continence from containment approaches to continence rehabilitation; and (iv) the challenges of providing continence care within a stroke care context including limitations in access to continence care equipment or products, and institutional attitudes towards continence. Conclusion: Patients (particularly those with severe urinary incontinence) described challenges communicating about and involvement in continence care decisions. In contrast, nurses described improved continence knowledge, attitudes and confidence alongside a shift from containment to rehabilitative approaches. Contextual components including care from point of hospital admission, equipment accessibility and interdisciplinary approaches were perceived as important factors to enhancing continence care
    corecore